All Posts (12228)
The specter of private contractors carrying out assassinations on behalf of the US government has been raised in a New York Times article that says the CIA hired contractors from security firm Blackwater to help carry out its recently-revealed hit squad program.
The article, which appeared at the Times Wednesday night, says that in 2004, contractors from Blackwater “helped the spy agency with planning, training and surveillance” in the secret program that, according to media reports, never became fully functional.
The CIA hit squad, ostensibly meant to target al Qaeda’s leadership in the years after 9/11, became public news when CIA Director Leon Panetta informed congressional intelligence committees about it in late June. Since then, stories have appeared linking Vice President Dick Cheney to the decision to keep the hit squads secret — a decision that may violate the National Security Act, which mandates congressional oversight of the CIA.
The involvement of Blackwater, however, is a new revelation. That the CIA used a private contractor for the program “was a major reason that [Panetta] became alarmed and called an emergency meeting to tell Congress that the agency had withheld details of the program for seven years,” the Times reports.
The Times writes:
It is unclear whether the CIA had planned to use the contractors to capture or kill Qaeda operatives, or just to help with training and surveillance. American spy agencies have in recent years outsourced some highly controversial work, including the interrogation of prisoners. But government officials said that bringing outsiders into a program with lethal authority raised deep concerns about accountability in covert operations.
Officials said that the CIA did not have a formal contract with Blackwater for this program but instead had individual agreements with top company officials, including the founder, Erik D. Prince, a politically connected former member of the Navy Seals and the heir to a family fortune. Blackwater’s work on the program actually ended years before Mr. Panetta took over the agency, after senior C.I.A. officials themselves questioned the wisdom of using outsiders in a targeted killing program.
Blackwater’s reputation was damaged beyond repair on September 16, 2007, when guards employed by the company killed 11 people in Baghdad’s Nisour Square. That resulted in the company being forced out of Iraq, and having to rebrand itself as Xe Services LLC.
Blackwater’s reputation was further damaged by revelations earlier this month that the company’s founder, Erik Prince, has been implicated in “one or more murders” by witnesses who gave depositions in a civil suit against the company.
According to the unnamed witnesses — who are testifying on behalf of Iraqi civilians suing Blackwater — Prince allegedly ordered the killing of at least one person who was planning to testify about “ongoing criminal activity” at the company.
One of the twenty-first century’s greatest violations of human rights is the proliferation of mind control technologies and their accompanying abuse and torture.
Despite of disagreements of religions, I indeed believe that everyone should fight against torture and abuse of mind control technologies and Directed Energy Weapons.
No matter what religions you believe, I wish that you can stand up for justice - To expose such horrible torture and abuse of mind control technologies to public; to urge the government to investigate such horrible crime; to help victims.
Please join the following groups to connect people who had same religions with you.
Muslims fight against Mind Control
https://peacepink.ning.com/group/muslims-fight-against-mind-control
Buddhists fight against Mind Control
https://peacepink.ning.com/group/buddhists-fight-against-mind-control
Christians fight against Mind Control
https://peacepink.ning.com/group/prayersgroup
Atheists fight against Mind Control
https://peacepink.ning.com/group/atheist-fight-against-mind-control
More about this website
https://peacepink.ning.com/notes/Note_to_Everyone
As the creator of this forum, If you want to know who I am and my belief, please go to my page
https://peacepink.ning.com/profile/1033oxmqvvrga
Mind control technologies are weapons which use drugs, electronic microchip implants, nanotechnologies, microwaves and /or electromagnetic waves to subvert an individual's sense of control over their own thinking, behavior, emotions or decision making by attacking the brain and nervous system.
I have collected many reported articles which introduce 'mind control technologies'. The listing of these articles will not mislead readers; it is a short cut for readers to learn what mind control technologies are.
https://peacepink.ning.com/forum/topics/introduce-mind-control-and
In the book of Twelve Years in the Grave: Mind Control with Electromagnetic Spectrums, the Invisible Modern Concentration Camp. Soleilmavis Liu, one of many private citizens, discovered that she and many other people were test-subject victims for the study of electromagnetic spectrums mind control weapons and global surveillance equipment. This book tells the true story that during her horrible period in the grave, her soul was waylaid, but God answered her cries, and gave her love and support. Losing her life to find God was a true consolation and brought joy to her soul and gave her the strength to be a soldier rather than a victim.
http://www.lulu.com/spotlight/soleilmavis
--------------------------------------------------------------------------
We respect everyone in the world, no matter what religions they believe.
Previous Posts and Evidence-To be used by International World Courts of Justice for the prosecution of crimes against humanity. Direct Violation of the United Nations Article 1 Declaration against torture,Violation of the Geneva Conventions, Violation of the Helsinki Doctrine
.Sent: Wednesday, August 19, 2009 8:21 PM
To: v911t@ya… Continue
Added by ron angell on August 20, 2009 at 6:25am — 1 Comment
Diseased African Monkeys Used to Make Swine Flu Vaccines; DYNACORP Video
Added by ron angell on August 20, 2009 at 12:58am — 4 Comments
Woman Convicted in Fake Flu Vaccine Case for her involvement in the distribution of a fake flu vaccine to more than 1000 persons in the Houston area,
Added by ron angell on August 19, 2009 at 4:10am — No Comments
The Paperchase TV SERIES-Remember it?
Added by ron angell on August 18, 2009 at 8:00pm — 2 Comments
On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology- Journal of Psycho-Social Studies, 2003.
Added by ron angell on August 18, 2009 at 5:45pm — 2 Comments
http://www.thefluecase.com by jame burgermeister of Austria- thank you so much Frau Burgermeister!! Danke, Grazi, Prego, Gracias, thank you, merci
Added by ron angell on August 18, 2009 at 5:02pm — 5 Comments
Complaint to stop enforced vaccinations in Washhington State filed on Monday: a guide to filing yourself
Added by ron angell on August 18, 2009 at 4:33pm — 1 Comment
MKULTRA: Veterans Sue CIA Over Past Chemical Tests on Soldiers
Added by ron angell on August 17, 2009 at 10:00pm — 5 Comments
Diseased African Monkeys Used to Make Swine Flu Vaccines; DYNACORP Private Military Contractor Holds Key Patents
Added by ron angell on August 17, 2009 at 7:30pm — 9 Comments
Evidence of Genocide IN USA 6/12/09 A squad of 150 to 200 cruisers and SUVs came in and practically massacred our people. There was blood everywhere,
Added by ron angell on August 17, 2009 at 5:07pm — 1 Comment
Sorry, I used an outdated list and here is the last list I was sent a few days ago- here is the most current list of 950 Tortured in the USA and worldwide-
Added by ron angell on August 17, 2009 at 4:30pm — 5 Comments
From Dr. Robert Duncan-Project Soul Catcher-An Introduction to Information Warfare Theory, Technologies, and Practice.
Sent: Thursday, August 13, 2009 8:14 PM
Subject: shielding
Sorry for the multiple post.
… ContinueAdded by ron angell on August 15, 2009 at 4:03pm — 2 Comments
President Ronald Reagan was on "The Blue List of Death" Google "Red List of Death" Google "Blue List of Death" Rumsfeld, Cheney, Bush Sr are on the Yellow List- (The one's that are doing the murder)
Sent: Thursday, August 13, 2009 8:14 PM
Subject:… Continue
Added by ron angell on August 15, 2009 at 4:00pm — 2 Comments
Rep. Jan Schakowsky (D-Ill.), chair of the House Subcommittee on Oversight and Investigations, told the Huffington Post that the 9/11 secret counterterro
Added by ron angell on August 14, 2009 at 4:30pm — 5 Comments
MIND/ BRAIN READING, BRAIN COPYING, TORTURE, FINANCIAL TERRORIZING AND SLUM-COVERT WAR IN VIETNAM BUSINESS. USING SATELLITE WEAPONS
Subject: FW: [Torture, Human Rights and Crimes Against Humanity] Mind/ Brain Reading, Brain Copying, Torture and Financial Terrorism in Vietnam business
To: 'ip-libe@europarl.eu.int', 'foreign-press@europarl.europa.eu', 'inta-press@europarl.europa.eu', 'envi-press@europarl.europa.eu', 'indu-press@europarl.eur… Continue
Added by ron angell on August 12, 2009 at 5:30pm — 2 Comments
A California history professor, Kathryn Olmstead, has discovered documents at the Gerald Ford library which were written by Cheney and Rumsfeld
Added by ron angell on August 11, 2009 at 4:00pm — 7 Comments
ABC News 1979 Special: Mission Mind Control (29 mins)- Coffee and water poison in USA
Continue
Added by ron angell on August 11, 2009 at 2:30pm — 4 Comments
For those of us who were trained in a psychoanalytical approach to the patient which was characterised as patient centred, and which acknowledged that the effort to understand the world of the other person entailed an awareness that the treatment was essentially one of mutuality and trust, the American Psychiatry Association’s Diagnostic Criteria for Schizotypal personality was always a cause for alarm. The Third Edition (1987) of Diagnostic and Statistical Manual of Mental Disorders (DSM) required that there be at least four of the characteristics set out for a diagnosis of schizophrenia, and an approved selection of four could be: magical thinking, telepathy or sixth sense; limited social contact; odd speech; and over-sensitivity to criticism. By 1994, the required number of qualifying characteristics were reduced to two or more, including, say, hallucinations and ‘negative ‘ symptoms such as affective flattening, or disorganised or incoherent speech – or only one if the delusions were bizarre or the hallucination consisted of a voice keeping up a running commentary on the person’s behaviour or thoughts. The next edition of the DSM is not due until the year 2010.
In place of a process of a labelling which brought alienation and often detention, sectioning, and mind altering anti-psychotic medication, many psychoanalysts and psychotherapists felt that even in severe cases of schizoid withdrawal we were not necessarily wasting our time in attempting to restore health by the difficult work of unravelling experiences in order to make sense of an illness. In this way, psychoanalysis has been, in its most radical form, a critic of a society, which failed to exercise imaginative empathy when passing judgement on people. The work of Harry Stack Sullivan, Frieda Fromm-Reichmann, Harold Searles or R.D. Laing - all trained as psychiatrists and all of them rebels against the standard procedures – provided a way of working with people very different from the psychiatric model, which seemed to encourage a society to repress its sickness by making a clearly split off group the carriers of it. A psychiatrist in a mental hospital once joked to me, with some truth, when I commented on the number of carrier bags carried by many of the medicated patients around the hospital grounds, that they assessed the progress of the patient in terms of the reduction of the number of carrier bags. It is too often difficult to believe, however, when hearing the history of a life, that the “schizophrenic” was not suffering the effects of having been made, consciously and unconsciously, the carefully concealed carrier of the ills of the family.
For someone who felt his mind was going to pieces, to be put into the stressful situation of the psychiatric examination, even when the psychiatrist acquitted himself with kindness, the situation of the assessment procedure itself, can be ‘an effective way to drive someone crazy, or more crazy.’ (Laing, 1985, p 17). But if the accounting of bizarre experiences more or less guaranteed you a new label or a trip to the psychiatric ward, there is even more reason for a new group of people to be outraged about how their symptoms are being diagnosed. A doubly cruel sentence is being imposed on people who are the victims of the most appalling abuse by scientific-military experiments, and a totally uncomprehending society is indifferent to their evidence. For the development of a new class of weaponry now has the capability of entering the brain and mind and body of another person by technological means.
Harnessing neuroscience to military capability, this technology is the result of decades of research and experimentation, most particularly in the Soviet Union and the United States. (Welsh, 1997, 2000) We have failed to comprehend that the result of the technology that originated in the years of the arms race between the Soviet Union and the West, has resulted in using satellite technology not only for surveillance and communication systems but also to lock on to human beings, manipulating brain frequencies by directing laser beams, neural-particle beams, electro-magnetic radiation, sonar waves, radiofrequency radiation (RFR), soliton waves, torsion fields and by use of these or other energy fields which form the areas of study for astro-physics. Since the operations are characterised by secrecy, it seems inevitable that the methods that we do know about, that is, the exploitation of the ionosphere, our natural shield, are already outdated as we begin to grasp the implications of their use. The patents deriving from Bernard J. Eastlund’s work provide the ability to put unprecedented amounts of power in the Earth’s atmosphere at strategic locations and to maintain the power injection level, particularly if random pulsing is employed, in a manner far more precise and better controlled than accomplished by the prior art, the detonation of nuclear devices at various yields and various altitudes. (ref High Frequency Active Auroral Research Project, HAARP).
Some patents, now owned by Raytheon, describe how to make “nuclear sized explosions without radiation” and describe power beam systems, electromagnetic pulses and over-the-horizon detection systems. A more disturbing use is the system developed for manipulating and disturbing the human mental process using pulsed radio frequency radiation (RFR), and their use as a device for causing negative effects on human health and thinking. The victim, the innocent civilian target is locked on to, and unable to evade the menace by moving around. The beam is administered from space. The Haarp facility as military technology could be used to broadcast global mind-control, as a system for manipulating and disturbing the human mental process using pulsed radio frequency (RFR). The super-powerful radio waves are beamed to the ionosphere, heating those areas, thereby lifting them. The electromagnetic waves bounce back to the earth and penetrate human tissue.
Dr Igor Smirnov, of the Institute of Psycho-Correction in Moscow, says: “It is easily conceivable that some Russian ‘Satan’, or let’s say Iranian – or any other ‘Satan’, as long as he owns the appropriate means and finances, can inject himself into every conceivable computer network, into every conceivable radio or television broadcast, with relative technological ease, even without disconnecting cables…and intercept the radio waves in the ether and modulate every conceivable suggestion into it. This is why such technology is rightfully feared.”(German TV documentary, 1998).
If we were concerned before about diagnostic criteria being imposed according to the classification of recognizable symptoms, we have reason now to submit them to even harsher scrutiny. The development over the last decades since the Cold War arms race has included as a major strategic category, psycho-electronic weaponry, the ultimate aim of which is to enter the brain and mind. Unannounced, undebated and largely unacknowledged by scientists or by the governments who employ them – technology to enter and control minds from a distance has been unleashed upon us. The only witnesses who are speaking about this terrible technology with its appalling implications for the future, are the victims themselves and those who are given the task of diagnosing mental illness are attempting to silence them by classifying their evidence and accounts as the symptoms of schizophrenia, while the dispensers of psychic mutilation and programmed pain continue with their work, aided and unopposed.
If it was always crucial, under the threat of psychiatric sectioning, to carefully screen out any sign of confused speech, negativity, coldness, suspicion, bizarre thoughts, sixth sense, telepathy, premonitions, but above all the sense that “others can feel my feelings, and that someone seemed to be keeping up a running commentary on your thoughts and behaviour,” then reporting these to a psychiatrist, or anyone else for that matter who was not of a mind to believe that such things as mind-control could exist, would be the end of your claim to sanity and probably your freedom. For one of the salient characteristics of mind-control is the running commentary, which replicates so exactly, and surely not without design, the symptoms of schizophrenia. Part of the effort is to remind the victim that they are constantly under control or surveillance. Programmes vary, but common forms of reminders are electronic prods and nudges, body noises, twinges and cramps to all parts of the body, increasing heart beats, applying pressures to internal organs – all with a personally codified system of comments on thoughts and events, designed to create stress, panic and desperation. This is mind control at its most benign. There is reason to fear the use of beamed energy to deliver lethal assaults on humans, including cardiac arrest, and bleeding in the brain.
It is the government system of secrecy, which has facilitated this appalling prospect. There have been warning voices. “…the government secrecy system as a whole is among the most poisonous legacies of the Cold War …the Cold War secrecy (which) also mandate(s) Active Deception…a security manual for special access programs authorizing contractors to employ ‘cover stories to disguise their activities. The only condition is that cover stories must be believable.” (Aftergood & Rosenberg, 1994; Bulletin of Atomic Scientist). Paranoia has been aided and abetted by government intelligence agencies.
In the United Kingdom the fortifications against any disturbing glimmer of awareness of such actual or potential outrages against human rights and social and political abuses seem to be cast in concrete. Complete with crenellations, ramparts and parapets, the stronghold of nescience reigns supreme. To borrow Her Majesty the Queen’s recent observation: “There are forces at work of which we are not aware.” One cannot say that there is no British Intelligence on the matter, as it is quite unfeasible that the existence of the technology is not classified information. Indeed it is a widely held belief that the women protesting against the presence of cruise missiles at Greenham Common were victims of electro-magnetic radiation at gigahertz frequency by directed energy weapons, and that their symptoms, including cancer, were consistent with such radiation effects as reported by Dr Robert Becker who has been a constantly warning voice against the perils of electro-magnetic radiation. The work of Allen Frey suggests that we should consider radiation effects as a grave hazard producing increased permeability of the blood-brain barrier, and weakening crucial defenses of the central nervous system against toxins. (Becker, 1985, p. 286). Dr Becker has written about nuclear magnetic resonance as a familiar tool in medecine known as magnetic resonance imaging or MRI. Calcium efflux is the result of cyclotronic resonance which latter can be explained thus: If a charged particle or ion is exposed to a steady magnetic field in space, it will begin to go into a circular or orbital, motion at right angles to the applied magnetic field.The speed with which it orbits will be determined by the ratio between the charge and the mass of the particle and by the strength of the magnetic field. (Becker, 1990,p.235) The implications of this for wide scale aggression by using a combination of radar based energy and the use of nuclear resonating are beyond the scope of the writer, but appear to be worth the very serious consideration of physicists in assessing how they might be used against human beings.
Amongst medical circles, however, it has so far not been possible for the writer to find a neuroscientist, neurologist or a psychiatrist, nor for that matter, a general medical practitioner, who acknowledges even the potential for technological manipulation of the nervous system as a problem requiring their professional interest. There has been exactly this response from some of England’s most eminent practitioners of the legal profession, not surprisingly, because the information about such technology is not made available to them. They would refer anyone attempting to communicate mind- harassment as a psychiatric problem, ignoring the crime that is being committed.
The aim here is not to attempt a comprehensive history and development of the technology of mind control. These very considerable tasks - which have to be done under circumstances of the most extreme difficulty - have been addressed with clarity and courage by others, who live with constant harm and threats, not least of all contemptuous labelling. Their work can be readily accessed on the internet references given at the end of this paper. For a well-researched outline of the historical development of electro-magnetic technology the reader should refer to the timeline of dates and electromagnetic weapon development by Cheryl Welsh, president of Citizens against Human Rights Abuse. (Welsh 1997; 2001). There are at least one and a half thousand people worldwide who state they are being targeted. Mojmir Babacek, now domiciled in his native Czech Republic, after eight years of residence in the United States in the eighties, has made a painstakingly meticulous review of the technology, and continues his research. (Babacek 1998, 2002)
We are concerned here with reinforcing in the strongest possible terms:
i) The need for such abuses to human rights and the threats to democracy to be called to consciousness, and without further delay.
ii) To analyse the reasons why people might defend themselves from becoming conscious of the existence of such threats.
iii) To address the urgent need for intelligence, imagination, and information - not to mention compassion - in dealing with the victims of persecution from this technology, and
iv) To alert a sleeping society, to the imminent threats to their freedom from the threat from fascist and covert operations who have in all probability gained control of potentially lethal weaponry of the type we are describing.
It is necessary to emphasise that at present there is not even the means for victims to gain medical attention for the effects of radiation from this targeting. Denied the respect of credulity of being used as human guinea pigs, driven to suicide by the breakdown of their lives, they are treated as insane – at best regarded as ‘sad cases’. Since the presence of a permanent ‘other’ in one’s mind and body is by definition an act of the most intolerable cruelty, people who are forced to bear it but who refuse to be broken by it, have no other option than to turn themselves into activists, their lives consumed by the battle against such atrocities, their energies directed to alerting and informing the public of things they don’t want to hear or understand about evil forces at work in their society.
It is necessary, at this point, to briefly outline a few – one might say the precious few – attempts by public servants to verify the existence and dangers inherent in this field:
- In January 1998, an annual public meeting of the French National Bioethics Committee was held in Paris. Its chairman, Jean-Pierre Changeux, a neuroscientist at the Institut Pasteur in Paris, told the meeting that “advances in cerebral imaging make the scope for invasion of privacy immense. Although the equipment needed is still highly specialized, it will become commonplace and capable of being used at a distance. That will open the way for abuses such as invasion of personal liberty, control of behaviour and brainwashing. These are far from being science-fiction concerns…and constitute “a serious risk to society.” (“Nature.” Vol 391, 1998.
- In January 1999, the European Parliament passed a resolution where it calls “ for an international convention introducing a global ban on all development and deployment of weapons which might enable any form of manipulation of human beings. It is our conviction that this ban can not be implemented without the global pressure of the informed general public on the governments. Our major objective is to get across to the general public the real threat which these weapons represent for human rights and democracy and to apply pressure on the governments and parliaments around the world to enact legislature which would prohibit the use of these devices to both government and private organisations as well as individuals.” (Plenary sessions/Europarliament, 1999)
- In October 2001, Congressman Dennis J. Kucinich introduced a bill to the House of Representatives which, it was hoped would be extremely important in the fight to expose and stop psycho-electronic mind control experimentation on involuntary, non-consensual citizens. The Bill was referred to the Committee on Science, and in addition to the Committee on Armed Services and International Relations. In the original bill a ban was sought on ‘exotic weapons’ including electronic, psychotronic or information weapons, chemtrails, particle beams, plasmas, electromagnetic radiation, extremely low frequency (ELF) or ultra low frequency (ULF) energy radiation, or mind control technologies. Despite the inclusion of a prohibition of the basing of weapons in space, and the use of weapons to destroy objects or damage objects in space, there is no mention in the revised bill of any of the aforementioned mind-invasive weaponry, nor of the use of satellite or radar or other energy based technology for deploying or developing technology designed for deployment against the minds of human beings. (Space Preservation Act, 2002)
In reviewing the development of the art of mind-invasive technology– there are a few outstanding achievements to note:
In 1969 Dr Jose Delgado, a Yale psychologist, published a book: “Physical Control of the Mind: Towards a Psychocivilized Society”. In essence, he displayed in practical demonstrations how, by means of electrical stimulation of the brain which had been mapped out in its relations between different points and activities, functions and sensations, - by means of electrical stimulation, how the rhythm of breathing and heartbeat could be changed, as well as the function of most of the viscera, and gall bladder secretion. Frowning, opening and closing of eyes and mouth, chewing, yawning, sleep, dizziness, epileptic seizures in healthy persons were induced. The intensity of feelings could be controlled by turning the knob, which controlled the intensity of the electric current. He states at the end of his book the hope that the new power will remain limited to scientists or some charitable elite for the benefit of a “psychocivilized society.”
In the 1980’s the neuromagnetometer was developed which functions as an antenna and could monitor the patterns emerging from the brain. (In the seventies the scientists had discovered that electromagnetic pulses enabled the brain to be stimulated through the skull and other tissues, so there was no more need to implant electrodes in the brain). The antenna, combined with the computer, could localize the points in the brain where the brain events occur. The whole product is called the magnetoencephalograph.
In January 2000 the Lockheed Martin neuroengineer Dr John D. Norseen, was quoted (US News and World Report, 2000) as hoping to turn the electrohypnomentalaphone, a mind reading machine, into science fact. Dr Norseen, a former Navy pilot, claims his interest in the brain stemmed from reading a Soviet book in the 1980’s claiming that research on the mind would revolutionize the military and society at large. By a process of deciphering the brain’s electrical activity, electromagnetic pulsations would trigger the release of the brain’s own transmitters to fight off disease, enhance learning, or alter the mind’s visual images, creating a ‘synthetic reality’. By this process of BioFusion, (Lockheed Martin, 2000) information is placed in a database, and a composite model of the brain is created. By viewing a brain scan recorded by (functional) magnetic resonance imaging (fMRI) machine, scientists can tell what the person was doing at the time of recording – say reading or writing, or recognise emotions from love to hate. “If this research pans out”, says Norseen, “you can begin to manipulate what someone is thinking even before they know it.” But Norseen says he is ‘agnostic’ on the moral ramifications, that he’s not a mad scientist – just a dedicated one. “The ethics don’t concern me,” he says, “but they should concern someone else.”
The next big thing looks like being something which we might refer to as a neurocomputer but it need not resemble a laptop – it may be reducible to whatever size is convenient for use, such as a small mobile phone. Arising from a break-through and exploitation of PSI-phenomena, it may be modelled on the nervous-psychic activity of the brain – that is, as an unbalanced, unstable system of neurotransmitters and interacting neurones, the work having been derived from the creation of a copy of a living brain – accessed by chance, and ESP and worked on by design.
On receiving a communication from the writer on the feasibility of a machine being on the horizon which, based on the project of collecting electromagnetic waves emanating from the brain and transmitting them into another brain that would read a person’s thoughts, or using the same procedure in order to impose somebody else’s thoughts on another brain and in this way direct his actions – there was an unequivocal answer from IBM at executive level that there was no existing technology to create such a computer in the foreseeable future. This is at some variance with the locating of a patent numbered 03951134 on the Internet pages of IBM Intellectual Property Network for a device, described in the patent, as capable of picking up at a distance the brain waves of a person, process them by computer and emit correcting waves which will change the original brain waves. Similar letters addressed to each of the four top executives of Apple Inc., in four individual letters marked for their personal attention, produced absolutely no response. This included the ex- Vice President of the United States, Mr Al Gore, newly elected to the Board of Directors of Apple.
Enough people have been sufficiently concerned by the reports of victims of mind control abuse to organise The Geneva Forum, in 2002, held as a joint initiative of the Quaker United Nations Office, Geneva; the United Nations Institute for Disarmament Research; the International Committee of the Red cross, and the Human Rights Watch (USA), and Citizens against Human Rights Abuses (CAHRA); and the Programme for Strategic and International Security Studies, which was represented by the Professor and Senior Lecturer from the Department of Peace Studies at the University of Bradford.
In England, on May 25, 1995, the Guardian newspaper in the U.K. carried an article based on a report by Nic Lewer, the peace researcher from Bradford University, which listed “more than 30 different lines of research into ‘new age weapons’…”some of the research sounds even less rational. There are, according to Lewer, plans for ‘pulsed microwave beams’ to destroy enemy electronics, and separate plans for very-low-frequency sound beams to induce vomiting, bowel spasm, epileptic seizures and also crumble masonry.” Further, the article states, “There are plans for ‘mind control’ with the use of 'psycho-correction messages’ transmitted by subliminal audio and visual stimuli. There is also a plan for ‘psychotronic weapons’ – apparently the projection of consciousness to other locations – and another to use holographic projection to disseminate propaganda and misinformation.” (Welsh, Timeline). Apart from this notable exception it is difficult to locate any public statement of the problem in the United Kingdom.
Unfortunately, the problem of credulity does not necessarily cease with frequent mention, as in the United States, in spite of the number of reported cases, there is still not sufficient public will to make strenuous protest against what is not only already happening, but against what will develop if left unchecked. It appears that the administration believes that it is necessary and justifiable, in the interests of national security, to make experimental human sacrifices, to have regrettable casualties, for there to be collateral damage, to suffer losses in place of strife or war. This is, of course, totally incompatible with any claims to be a democratic nation which respects the values of human life and democracy, and such an administration which tutors its servants in the ways of such barbaric tortures must be completely condemned as uncivilised and hypocritical.
Disbelief as a Defence Mechanism
In the face of widespread disbelief about mind-control, it seems worth analysing the basis of the mechanisms employed to maintain disbelief:
i) In the sixties, Soviet dissidents received a significant measure of sympathy and indignant protest from western democracies on account of their treatment, most notedly the abuse of psychiatric methods of torture to which they were subjected. It is noteworthy that we seem to be able to access credulity, express feelings of indignant support when we can identify with victims, who share and support our own value system, and who, in this particular historical case, reinforced our own values, since they were protesting against a political system which also threatened us at that time. Psychologically, it is equally important to observe that support from a safe distance, and the benefits to the psyche of attacking a split-off ‘bad father’, the soviet authorities in this case, presents no threat to one’s internal system; indeed it relieves internal pressures. On the other hand, recognizing and denouncing a similar offence makes very much greater psychic demands of us when it brings us into conflict with our own environment, our own security, our own reality. The defence against disillusion serves to suppress paranoia that our father figure, the president, the prime minister, our governments - might not be what they would like to be seen to be.
ii) The need to deposit destructive envy and bad feelings elsewhere, on account of the inability of the ego to acknowledge ownership of them - reinforces the usefulness of persons or groups, which will serve to contain those, disowned, projected feelings which arouse paranoid anxieties. The concepts of mind-invasion strike at the very heart of paranoid anxiety, causing considerable efforts to dislodge them from the psyche. The unconscious identification of madness with dirt or excrement is an important aspect of anal aggression, triggering projective identification as a defence.
iii) To lay oneself open to believing that a person is undergoing the experience of being invaded mentally and physically by an unseen manipulator requires very great efforts in the self to manage dread.
iv) The defence against the unknown finds expression in the split between theory and practice; between the scientist as innovator and the society who can make the moral decisions about his inventions; between fact and science fiction, the latter of which can present preposterous challenges to the imagination without undue threat, because it serves to reinforce a separation from the real.
v) Identification with the aggressor. Sadistic fantasies, unconscious and conscious, being transferred on to the aggressor and identified with, aid the repression of fear of passivity, or a dread of punishment. This mechanism acts to deny credulity to the victim who represents weakness. This is a common feature of satanic sects.
vi) The liberal humanist tradition which denies the worst destructive capacities of man in the effort to sustain the belief in the great continuity of cultural and scientific tradition; the fear, in one’s own past development, of not being ‘ongoing’, can produce the psychic effect of reversal into the opposite to shield against aggressive feelings. This becomes then the exaggerated celebration of the ‘new’ as the affirmation of human genius which will ultimately be for the good of mankind, and which opposes warning voices about scientific advances as being pessimistic, unenlightened, unprogressive and Luddite. Strict adherence to this liberal position can act as overcompensation for a fear of envious spoiling of good possessions, i.e. cultural and intellectual goods.
vii) Denial by displacement is also employed to ignore the harmful aspects of technology. What may be harmful for the freedom and good of society can be masked and concealed by the distribution of new and entertaining novelties. The technology, which puts a camera down your gut for medical purposes, is also used to limit your freedom by surveillance. The purveyors of innovative technology come up with all sorts of new gadgets, which divert, entertain and feed the acquisitive needs of insatiable shoppers, and bolster the economy. The theme of “Everything’s up to date in Kansas City” only takes on a downside when individual experience – exploding breast implants, say – takes the gilt off the gingerbread. Out of every innovation for evil (i.e. designed for harming and destroying) some ‘good’ (i.e. public diversion or entertainment) can be promoted for profit or crowd-pleasing.
viii) Nasa is sending a spacecraft to Mars, or so we are told. They plan to trundle across the Martian surface searching for signs of water and life. We do not hear dissenting voices about its feasibility.
Why is it that, when a person accounts that their mind is being disrupted and they are being persecuted by an unseen method of invasive technology, that we cannot bring ourselves to believe them? Could it be that the horror involved in the empathic identification required brings the shutters down? Conversely, the shared experience of the blasting of objects into space brings with it the possibilities of shared potency or the relief that resonates in the unconscious of a massive projection or evacuation – a shared experience which is blessed in the name of man’s scientific genius.
ix) The desire ‘not to be taken in’, not to be taken for a fool, provides one of the most powerful and common defence mechanism against credulity.
Power, Paranoia and Unhealthy Governments
The ability to be the bearer and container of great power without succumbing to the pressures of latent narcissistic psychoses is an important matter too little considered. The effect of holding power and the expectation and the need to be seen as capable of sustaining it, if not exercising it, encourages omnipotence of thought. In the wake of this, a narcissistic overevaluation of the subject’s own mental processes may set in. In the effort to hold himself together as the possessor, container and executor of power, he (or indeed, she) may also, undergo a process of splitting which allows him, along with others, to bear enthralled witness of himself in this illustrious role. This may mean that the seat of authority is vacated, at least at times. The splitting process between the experiencing ego and the perceiving ego allows the powerful leader to alternate his perception of himself inside and outside, sometimes beside, himself. With the reinforcement of himself from others as his own narcissistic object, reality testing is constrained. In this last respect, he has much in common with the other powerful figure of the age, the movie star. or by those, in Freud’s words, who are “ruined by success.”
In a world, which is facing increasing disillusion about the gulf between the public platforms on which governments are elected, and the contingencies and pragmatics of retaining defence strategies and economic investments, the role of military and intelligence departments, with their respective tools of domination and covert infiltration, is increasingly alarming. Unaccountable to the public, protected from exposure and prosecution by their immunity, licensed to lie as well as to kill, it is in the hands of these agents that very grave threats to human rights and freedom lies. Empowered to carry out aggression through classified weapon experimentation which is undetectable, these men and women are also open to corruption from lucrative offers of financial reward from powerful and sinister groups who can utilize their skills, privileged knowledge and expertise for frankly criminal and fascist purposes.
Our information about the psychological profiles of those who are employed to practice surveillance on others is limited, but it is not difficult to imagine the effects on the personality that would ensue with the persistent practice of such an occupation, so constantly exposed to the perversions. One gains little snatches of insight here and there. In his book on CIA mind control research (Marks, 1988), John Marks quotes a CIA colleague’s joke (always revealing for personality characteristics): “If you could find the natural radio frequency of a person’s sphincter, you could make him run out of the room real fast.” (One wonders if the same amusement is derived from the ability to apply, say infra-sound above 130 decibels, which is said to cause stoppage of the heart, according to one victim/activist from his readings of a report for the Russian Parliament.)
Left to themselves, these servants of the state may well feel exempt from the process of moral self-scrutiny, but the work must be dehumanising for the predator as well as the prey. It is probably true that the need to control their agents in the field was an incentive to develop the methods in use today. It is also an effectively brutalising training for persecuting others. Meanwhile the object, the prey, in a bid for not only for survival but also in a desperate effort to warn his or her fellows about what is going on, attempts to turn himself into a quantum physicist, a political researcher, a legal sleuth, an activist, a neurologist, a psychologist, a physiologist – his own doctor, since he cannot know what effects this freakish treatment might have on his body, let alone his mind. There are always new methods to try out which might prove useful in the search to find ways of disabling and destroying opponents – air injected into brains and lungs, lasers to strike down or blind, particle beams, sonar waves, or whatever combination of energies to direct, or destabilise or control.
Science and Scepticism
Scientists can be bought, not just by governments, but also by sinister and secret societies. Universities can be funded by governments to develop technology for unacceptably inhumane uses. The same people who deliver the weapons - perhaps respected scientists and academics - may cite the acceptable side of scientific discoveries, which have been developed by experimenting on unacknowledged, unfortunate people. In a cleaned up form, they are then possibly celebrated as a break-through in the understanding of the natural laws of the universe. It is not implausible that having delivered the technical means for destruction, the innovator and thinker goes on, wearing a different hat, to receive his (or her) Nobel Prize. There are scientists who have refused to continue to do work when they were approached by CIA and Soviet representatives. These are the real heroes of science.
In the power struggle, much lies at stake in being the first to gain control of ultimate mind-reading and mind-controlling technology. Like the nuclear bomb, common ownership would seem by any sane calculations to cancel out the advantage of possession, but there is always a race to be the first to possess the latest ultimate means of mass destruction. The most desirable form is one that can be directed at others without contaminating oneself in the process - one that can be undetected and neatly, economically and strategically delivered. We should be foolish to rule out secret organisations, seeing threat only from undemocratic countries and known terrorist groups.
As consumers in a world which is increasingly one in which shopping is the main leisure activity, we should concern ourselves to becoming alert to the ways in which human welfare may have been sacrificed to produce an awesome new gadget. It may be the cause for celebration for the ‘innovator’, but brought about as the result of plugging in or dialling up the living neuronal processes of an enforced experimentee. If we are concerned not to eat boiled eggs laid by battery hens, we might not regard it morally irrelevant to scrutinise the large corporations producing electronically innovative ‘software.’ We might also be wary about the origins of the sort of bland enticements of dating agencies who propose finding your ideal partner by matching up brain frequencies and ‘bio-rhythms’.
We do not know enough about the background of such technology, nor how to evaluate it ethically. We do not know about its effects on the future, because we are not properly informed. If governments persist in concealing the extent of their weapon capability in the interests of defence, they are also leaving their citizens disempowered of the right to protest against their deployment. More alarmingly, they are leaving their citizens exposed to their deployment by ruthless organisations whose concerns are exactly the opposite of democracy and human rights.
Back in the United Kingdom
Meanwhile, back in England, the Director of the Oxford Centre for Cognitive Neuroscience, Professor Colin Blakemore, also the elective Chief Executive of the Medical Research Council writes to the author that he “... knows of no technology (not even in the wildest speculations of neuroscientists) for scanning and collecting ‘neuronal data’ at a distance.” (Blakemore, 2003, ) This certitude is at distinct variance with the fears of other scientists in Russia and the United States, and not least of all with the fears of the French neuroscientist, Jean-Pierre Changeux of the French National Bioethics Committee already quoted (see page 5). It is also very much at odds with the writing of Dr Michael Persinger from the Behavioural Neuroscience Laboratory at Laurentian University in Sudbury, Ontario, Canada. His article “On the Possibility of Directly Accessing Every Human Brain by Electromagnetic Induction of Algorithms” (1995), he describes the ways that individual differences among human brains can be overcome and comes to a conclusion about the technological possibilities of influencing a major part of the approximately six billion people on this planet without mediation through classical sensory modalities but by generating electromagnetic induction of fundamental algorithms in the atmosphere. Dr Persinger’s work is referred to by Captain John Tyler whose work for the American Air Force and Aerospace programmes likens the human nervous system to a radio receiver. (1990)
Very recently the leading weekly cultural BBC radio review had as one of its guests, the eminent astro-physicist and astronomer royal, Sir Martin Rees, who has recently published a book, “Our Final Century”, in which he makes a sober and reasoned case for the fifty-fifty chance that millions of people, probably in a ‘third-world country’ could be wiped out in the near future through biotechnology and bio-terrorism – “by error or malign release.” He spoke of this devastation as possibly coming from small groups or cults, based in the United States. “…few individuals with the right technology to cause absolute mayhem.” He also said that in this century, human nature is no longer a fixed commodity, that perhaps we should contemplate the possibility that humans would even have implants in the brain.
The other guests on this programme were both concerned with Shakespeare, one a theatre producer and the other a writer on Shakespeare, while his remaining guest was a young woman who had a website called “Spiked”, the current theme of which was Panic Attack, that is to say, Attack on Panic. This guest vigorously opposed what she felt was the pessimism of Sir Martin, regarding his ideas as essentially eroding trust, and inducing panic. This reaction seems to typify one way of dealing with threat and anxiety, and demonstrates the difficulty that a warning voice, even from a man of the academic distinction of Martin Rees, has in alerting people to that which they do not want to hear. This flight reaction was reinforced by the presenter who summed up the morning’s discussion at the end of the programme with the words: “We have a moral! Less panic, more Shakespeare!”
The New Barbarism
Since access to a mind-reading machine will enable the operator to access the ideas of another person, we should prepare ourselves for a new world order in which ideas will be, as it were, up for grabs. We need not doubt that the contents of another’s mind will be scooped up, scooped out, sorted through as if the event was a jumble sale. The legal profession would therefore be well advised to consider the laws on Intellectual Property very judiciously in order to acquit themselves with any degree of authenticity. We should accustom ourselves to the prospect of recognizing our work coming out of the mouth of another. The prospect of wide-scale fraud, and someone posturing in your stolen clothes will not be a pretty sight. The term “personal mind enhancement” is slipping in through the back door, to borrow a term used by the Co-Director of the Center for Cognitive Liberty and Ethics, and it is being done through technologically-induced mental co-ercion – mind raping and looting. In place of, or in addition to, cocaine, we may expect to see ‘mind-enhanced’ performances on “live” television.
The brave new science of neuropsychiatry and brain mapping hopes to find very soon, with the fMRI scanner - this “brand new toy that scientists have got their hands on” - “the blob for love” and “the blob for guilt”, (BBC Radio 4: All in the Mind, 5 March, 2003). Soon we will be able to order a brain scan for anyone whose behaviour strikes us as odd or bizarre, and the vicissitudes of a life need no longer trouble us in our diagnostic assessments. In his recent Reith Lectures for the BBC (2003), Professor Ramachandran, the celebrated neuroscientist from the La Hoya Institute in San Diego, California, has demonstrated for us many fascinating things that the brain can do. He has talked to us about personality disorders and shown that some patients, who have suffered brain damage from head injury, do not have the capacity to recognise their mothers. Others feel that they are dead. And indeed he has found brain lesions in these people. In what seems to be an enormous but effortless leap, the self-styled “kid in a candy store” is now hoping to prove that all schizophrenics, have damage to the right hemisphere of the brain, which results in the inability to distinguish between fantasy (sic) and reality. Since Professor Ramachandran speaks of schizophrenia in the same breath as denial of illness, or agnosia, it is not clear, and it would be interesting to know, whether the person with the head injury has been aware or unaware of the head injury. Also does the patient derive comfort and a better chance at reality testing when he is told of the lesion? Does he feel better when he has received the diagnosis? And what should the psychoanalysts – and the psychiatrists, - feel about all those years of treating people of whose head injuries they were absolutely unaware? Was this gross negligence? Were we absolutely deluded in perceiving recovery in a sizeable number of them?
It is, however, lamentable that a neuroscientist with a professed interest in understanding schizophrenia should seek to provide light relief to his audience by making jokes about schizophrenics being people who are “convinced that the CIA has implanted devices in their brain to control their thoughts and actions, or that aliens are controlling them.” (Reith Lecture, No 5, 2003).
There is a new desire for concretisation. The search for meaning has been replaced by the need for hard proof. If it doesn’t light up or add up it doesn’t have validity. The physician of the mind has become a surgeon. “He found a lump as big as a grapefruit!”
Facing up to the Dread and Fear of the Uncanny
Freud believed that an exploration of the uncanny would be a major direction of exploration of the mind in this century. The fear of the uncanny has been with us for a very long time. The evil eye, or the terrifying double, or intruder, is a familiar theme in literature, notably of Joseph Conrad in The Secret Sharer, and Maupassant’s short story, Le Horla. Freud’s analysis of the uncanny led him back to the old animistic conception of the universe: “…it seems as if each one of us has been through a phase of individual development corresponding to the animistic phase in primitive men, that none of us has passed through it without preserving certain residues and traces of it which are still capable of manifesting themselves, and that everything which now strikes us as ‘uncanny’ fulfils the condition of touching those residues of animistic mental activity within us and bringing them to expression.” (Freud: 1919. p.362)
The separation of birth, and the childhood fear of ‘spooks in the night’, also leave their traces in each and every one of us. The individual experience of being alone in one’s mind – the solitary fate of man which has never been questioned before, and upon which the whole history of civilised nurture is based - is now assaulted head-on. Since growing up is largely synonymous with acceptance of one’s aloneness, the effort to assuage it is the basis for compassion and protection of others; it is the matrix for the greatest good, that of ordinary human kindness, and is at the heart of the communicating power of great art. Even if we must all live and die alone, we can at least share this knowledge in acts of tenderness which atone for our lonely state. In times of loss and mental breakdown, the starkness of this aloneness is all too clear. The best of social and group constructiveness is an effort to allay the psychotic anxieties that lie at the base of every one of us, and which may be provoked under extreme enough conditions.
The calculated and technological entry into another person’s mind is an act of monumental barbarism which obliterates– perhaps with the twiddling of a dial – the history and civilisation of man’s mental development. It is more than an abuse of human rights, it is the destruction of meaning. For any one who is forced into the hell of living with an unseen mental rapist, the effort to stay sane is beyond the scope of tolerable endurance. The imaginative capacity of the ordinary mind cannot encompass the horror of it. We have attempted to come to terms with the experiments of the Nazis in concentration camps. We now have the prospect of systematic control authorised by men who issue instructions through satellite communications for the destruction of societies while they are driving new Jaguars and Mercedes, and going to the opera.
This is essentially about humiliation, and disempowerment. It is a manifestation of rage acted out by those who fear impotence with such dread, that their whole effort is directed into the emasculation and destruction of the terrifying rival of their unconscious fantasies. In this apocalypse of the mind the punitive figure wells up as if out of the bowels of the opera stage, and this phantasmagoria is acted out on a global scale. These men may be mad enough to believe they are creating a ‘psychocivilised world order”. For anyone who has studied damaged children, it is more resonant of the re-enactment from the unconscious, reinforced by a life devoid of the capacity for empathic identification, of the obscenities of the abused and abusing child in the savage nursery. Other people -which were to them like Action Man toys to be dismembered, or Barbie Dolls to be obscenely defiled - become as meaningless in their humanity as pixillated dots on a screen.
Although forced entry into a mind is by definition obscene, an abbreviated assessment of the effects that mind-invaded people describe testifies to the perverted nature of the experiments. Bizarre noises are emitted from the body, a body known well enough by its owner to recognise the noises as extrinsic; air is pumped in and out of orifices as if by a bicycle pump. Gradually the repertoire is augmented - twinges and spasms to the eyes, nose, lips, strange tics, pains in the head, ringing in the ears, obstructions in the throat, pressure on the bowel and bladder causing incontinence; tingling in the fingers, feet, pressures on the heart, on breathing, dizziness, eye problems leading to cataracts; running eyes, running nose; speeding up of heart beats and the raising of pressure in the heart and chest; breathing and chest complaints leading to bronchitis and deterioration of the lungs; agonizing migraines; being woken up at night, sometimes with terrifying jolts ; insomnia; intolerable levels of stress from the loss of one’s privacy. This collection of assorted symptoms is a challenge to any medical practitioner to diagnose.
There are, more seriously, if the afore-going is characterised as non-lethal, the potential lethal effects since the capability of ultrasound and infra-sound to cause cardiac arrest, and brain lesions, paralysis and blindness, as well as blinding by laser beam, or inducing asphyxia by altering the frequencies which control breathing in the brain, epileptic seizure – all these and others may be at the fingertips of those who are developing them. And those who do choose to use them may be sitting with the weapon, which resembles, say, a compact mobile telephone, on the restaurant table next to the bottle of wine, or beside them at the swimming pool.
Finally – if the victims at this point in the new history of this mind-control, cannot yet prove their abuse, it must be asserted that, faced with the available information about technological development – it is certainly not possible for those seeking to evade such claims – to disprove them. To wait until the effects become widespread will be too late.
- For these and other reasons which this paper has attempted to address, we would call for an acknowledgement of such technology at a national and international level. Politicians, scientists and neurologists, neuroscientists, physicists and the legal profession should, without further delay, demand public debate on the existence and deployment of psychotronic technology; and for the declassification of information about such devices which abuse helpless people, and threaten democratic freedom.
- Victims’ accounts of abuse should be admitted to public account, and the use of psycho-electronic weapons should be made illegal and criminal,
- The medical profession should be helped to recognise the symptoms of mind-control and psychotronic abuse, and intelligence about their deployment should be declassified so that this abuse can be seen to be what it is, and not interpreted automatically as an indication of mental illness.
If, in the present confusion and insecurity about the search for evidence of weapons of mass destruction, we conclude that failure to locate them - whatever the truth of the matter –encourages us to be generally complacent, then we shall be colluding with very dark forces at work if we conclude that a course of extreme vigilance signifies paranoia. For there may well be other weapons of mass destruction being developed and not so far from home; weapons which, being even more difficult to locate, are developed invisibly, unobstructed, unheeded in our midst, using human beings as test-beds. Like ESP, the methods being used on humans have not been detectable using conventional detection equipment. It is likely that the signals being used are part of a physics not known to scientists without the highest level of security clearance. To ignore the evidence of victims is to deny, perhaps with catastrophic results, the only evidence which might otherwise lead the defenders of freedom to becoming alert to the development of a fearful new methods of destruction. Manipulating terrorist groups and governments alike, these sinister and covert forces may well be very thankful for the professional derision of the victims, and for public ignorance.
References
Laing, R.D. (1985) : Wisdom, Madness and Folly: The Making of a Psychiatrist. Macmillan, 1985
Welsh, Cheryl (1997): Timeline of Important Dates in the History of Electromagnetic Technology and Mind Control, at:
www.dcn.davis.ca.us/~welsh/timeline.htm
Welsh, Cheryl (2001):Electromagnetic Weapons: As powerful as the Atomic Bomb, President Citizens Against Human Rights Abuse, CAHRA Home Page: U.S. Human Rights Abuse Report: www.dcn.davis.ca.us/~welsh/emr13.htm
Begich, Dr N. and Manning, J.: 1995 Angels Don’t Play this HAARP, Advances in Tesla Technology, Earthpulse Press.
ZDF TV: “Secret Russia: Moscow – The Zombies of the Red Czars”, Script to be published in Resonance, No. 35
Aftergood, Steven and Rosenberg, Barbara: “The Soft Kill Fallacy”, in The Bulletin of the Atomic Scientists, Sept/Oct 1994.
Becker, Dr Robert: 1985,The Body Electric: Electromagnetism and the Foundation of Life, William Morrow, N.Y.
Babacek, Mojmir: International Movement for the Ban of Manipulation of The Human Nervous System: http://mindcontrolforums.com/babacek.htm and go to: Ban of Manipulation of Human Nervous System
“Is it Feasible to Manipulate the Human Brain at a Distance?”
www.aisjca-mft.org/braindist.htm
“Psychoelectronic Threat to Democracy”
http://mindcontrolforums.com/babacek.htm
Nature: “Advances in Neuroscience May Threaten Human Rights”, Vol, 391, Jan. 22, 1998, p. 316; (ref Jean- Pierre Changeux)
Space Preservation Act: Bill H.R.2977 and HR 3616 IH in 107th Congress – 2nd Session: see: www.raven1.net/govptron.htm
Sessions European Parliament:
www.europarl.eu.int/home/default_en.htm?redirected=1
Click at Plenary Sessions, scroll down to Reports by A4 number, click, choose 1999 and fill in oo5 to A4
Delgado, Jose M.R: 1969. “Physical Control of the Mind: Towards a Psychocivilized Society”, Vol. 41, World Perspectives, Harper Row, N.Y.
US News & World Report: Lockheed Martin Aeronautics/ Dr John Norseen; Report January 3/10 2000, P.67
Freud, Sigmund: 1919: Art and Literature:” The Uncanny”. Penguin,
Also “Those Wrecked by Success.”
Marks, John: 1988 :The CIA and Mind Control – the Search for the Manchurian Candidate, ISBN 0-440-20137-3
Persinger, M.A. “On the Possibility of Directly Accessing Every Human Brain by Electromagnetic Induction of Fundamental Algorythms”; In Perception and Motor Skills, June, 1995, vol. 80, p. 791 – 799
Tyler, J.“Electromagnetic Spectrum in Low Intensity Conflict,” in “Low Intensity Conflict and Modern Technology”, ed. Lt. Col. J. Dean, USAF, Air University Press, Centre For Aerospace Doctrine, Research and Education, Maxwell Air Force base, Alabama, June, 1986.
Rees, Martin Our Final Century: 2003, Heinemann.
Conrad, Joseph: The Secret Sharer, 1910. Signet Classic.
Maupassant, Guy de: Le Horla, 1886. Livre de Poche.
Carole Smith is a British psychoanalyst. In recent years she has been openly critical of government use of intrusive technology on non-consenting citizens for the development of methods of state control. Carole Smith
E-mail: rockpool@dircon.co.uk
Global Research Articles by Carole Smith |
August 5, 2009 by mike
Filed under Government
August 5, 2009
Natural News
by: Mike Adams
To most people, vaccines sound medically harmless. “They’re good for you!” say the doctors and drug companies, but they never really talk about what’s in those vaccines. There’s a good reason for that: If people knew what was really in those vaccines, they would never allow themselves to be injected with them.
Aside from the dangerous ingredients many people already know about (like squalene or thimerosal), one of the key ingredients used in flu vaccines (including the vaccines being prepared for the swine flu pandemic) is the diseased flesh of African Green Monkeys. This is revealed in U.S. patent No. 5911998 - Method of producing a virus vaccine from an African green monkey kidney cell line.
As this patent readily explains, ingredients used in the vaccine are derived from the kidneys of African Green Monkeys who are first infected with the virus, then allowed to fester the disease, and then are killed so that their diseased organs can be used make vaccine ingredients. This is done in a cruel, inhumane “flesh factory” environment where the monkeys are subjected to a process that includes “incubating said inoculated cell line to permit proliferation of said virus.” Then: “harvesting the virus resulting from step (c); and… (ii) preparing a vaccine from the harvested virus.”
Aside from the outrageous cruelty taking place with all this (”incubating” the virus in the kidneys of living monkeys, for example), there’s another disturbing fact that has surfaced in all this: The patent for this process is held not just by the National Institutes of Health, but by another private corporation known as DynCorp.
This, of course, brings up the obvious question: Who is Dyncorp? And why do they hold a patent on live attenuated vaccine production using African Green Monkeys?
DynCorp, it turns out, is a one of the top private military contractors working for the U.S. government. In addition to allegedly trafficking in under-age sex slaves in Bosnia and poisoning rural farmers in Ecuador with its aerial spraying of Colombian coca crops , Dyncorp just happens to be paid big dollars by the U.S. government to patrol the U.S. / Mexico border, near where the H1N1 first swine flu virus was originally detected.
DynCorp also happens to be in a position to receive tremendous financial rewards from its patents covering attenuated live viral vaccine harvesting methods, as described in four key patents jointly held by DynCorp and the National Institutes of Health:
(6025182) Method for producing a virus from an African green monkey kidney cell line
(6117667) Method for producing an adapted virus population from an African green monkey kidney cell line
(5911998) Method of producing a virus vaccine from an African green monkey kidney cell line
(5646033) African green monkey kidney cell lines useful for maintaining viruses and for preparation of viral vaccines
One of the key inventors in these patents now held by DynCorp was Dr. Robert H. Purcell. Who is Dr. Robert Purcell? He’s one of the co-chiefs of the Laboratory of Infectious Diseases of the National Institute of Allergy and Infectious Diseases operating under the National Institutes of Health of the U.S. government.
That office, located at 50 South Drive, Bethesda, MD 20892, is less than 15 miles away from the headquarters of DynCorp.
It’s not too many more miles to Washington D.C., where U.S. government health authorities awarded over $1 billion in swine flu vaccine contracts to pharmaceutical companies. Can you guess which company received one of the largest vaccine manufacturing contracts? Baxter Pharmaceuticals, the very same company using ingredients derived from African Green Monkeys in precisely the way described in the patents held jointly by DynCorp and the NIH. Remember, Baxter is the company that was caught inserting live viruses into vaccine materials distributed to 18 different countries.
Are you following all this?
So far, we have the U.S. government awarding swine flu vaccine manufacturing contracts to a major U.S. vaccine manufacturer (Baxter) that uses vaccine ingredients from African Green Monkeys (sick!), derived from a process covered in a patent invented by U.S. government NIH researchers (Dr. Purcell and others) and now held jointly by the NIH and a private military contractor named DynCorp — the very same company that’s paid to monitor the U.S. / Mexico border where H1N1 swine flu first appeared.
And just today, there’s yet another development in all this: A Tamiflu-resistant strain of swine flu has just been discovered. Care to guess where? On the U.S.-Mexico border.
Once you understand all this, some obvious questions come to mind: Could H1N1 swine flu have been intentionally created and released into the wild (in Mexico) in order to create a windfall of vaccine profits that would financially benefit both the drug companies and the vaccine production patent holders? Because it certainly appears that a grand conspiracy between the NIH, the vaccine makers and private military contractors could have pulled this off.
But wait: Would a private military contractor really resort to such tactics just to make money?
Decide for yourself. Dyncorp has already been accused of crimes against humanity and genocide .
U.S. GOVERNMENT PRINTING OFFICE50-070 PDF WASHINGTON : 2009For sale by the Superintendent of Documents, U.S. Government PrintingOffice Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800;DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP,Washington, DC 20402-0001COMMITTEE ON THE JUDICIARYJOHN CONYERS, Jr., Michigan, ChairmanHOWARD L. BERMAN, California LAMAR SMITH, TexasRICK BOUCHER, Virginia F. JAMES SENSENBRENNER, Jr.,JERROLD NADLER, New YorkWisconsinROBERT C. ``BOBBY'' SCOTT, Virginia HOWARD COBLE, North CarolinaMELVIN L. WATT, North Carolina ELTON GALLEGLY, CaliforniaZOE LOFGREN, California BOB GOODLATTE, VirginiaSHEILA JACKSON LEE, Texas DANIEL E. LUNGREN, CaliforniaMAXINE WATERS, California DARRELL E. ISSA, CaliforniaWILLIAM D. DELAHUNT, Massachusetts J. RANDY FORBES, VirginiaROBERT WEXLER, Florida STEVE KING, IowaSTEVE COHEN, Tennessee TRENT FRANKS, ArizonaHENRY C. ``HANK'' JOHNSON, Jr., LOUIE GOHMERT, TexasGeorgia JIM JORDAN, OhioPEDRO PIERLUISI, Puerto Rico TED POE, TexasMIKE QUIGLEY, Illinois JASON CHAFFETZ, UtahLUIS V. GUTIERREZ, Illinois TOM ROONEY, FloridaBRAD SHERMAN, California GREGG HARPER, MississippiTAMMY BALDWIN, WisconsinCHARLES A. GONZALEZ, TexasANTHONYD. WEINER, New YorkADAM B. SCHIFF, CaliforniaLINDA T. SANCHEZ, CaliforniaDEBBIE WASSERMAN SCHULTZ, FloridaDANIEL MAFFEI, New YorkPerry Apelbaum, Majority Staff Director and Chief CounselSean McLaughlin, Minority Chief of Staff and General Counsel------Subcommittee on the Constitution, Civil Rights, and Civil LibertiesJERROLD NADLER, New York, ChairmanMELVIN L. WATT, North Carolina F. JAMES SENSENBRENNER, Jr.,ROBERT C. ``BOBBY'' SCOTT, Virginia WisconsinWILLIAM D. DELAHUNT, Massachusetts TOM ROONEY, FloridaHENRY C. ``HANK'' JOHNSON, Jr., STEVE KING, IowaGeorgia TRENT FRANKS, ArizonaTAMMY BALDWIN, Wisconsin LOUIE GOHMERT, TexasJOHN CONYERS, Jr., Michigan JIM JORDAN, OhioSTEVE COHEN, TennesseeBRADSHERMAN,CaliforniaSHEILA JACKSON LEE, TexasDavid Lachmann, Chief of StaffPaul B. Taylor, Minority CounselC O N T E N T S----------JUNE 4, 2009PageTHE BILLH.R. 984, the ``State Secret Protection Act of 2009.............. 4OPENING STATEMENTSThe Honorable Jerrold Nadler, a Representative in Congress fromthe State of New York, and Chairman, Subcommittee on theConstitution, Civil Rights, and Civil Liberties................ 1The Honorable F. James Sensenbrenner, Jr., a Representative inCongress from the State of Wisconsin,and RankingMember,Subcommittee on the Constitution, Civil Rights, and CivilLiberties...................................................... 17The Honorable John Conyers, Jr., a Representative in Congressfrom the State of Michigan, Chairman, Committee on theJudiciary, and Member, Subcommittee on the Constitution, CivilRights, and Civil Liberties.................................... 18WITNESSESThe Honorable Patricia M. Wald, retired Chief Judge, U.S. CourtoF Appeals for the District of ColumbiaOral Testimony................................................. 21Prepared Statement............................................. 24The Honorable Asa Hutchinson, Senior Partner, Hutchinson LawGroupOral Testimony................................................. 29PreparedStatement............................................. 31Mr.Andrew Grossman, Senior Legal Policy Analyst, The HeritageFoundationOral Testimony................................................. 55Prepared Statement............................................. 57Mr. Ben Wizner, National Security Project Staff Attorney,American Civil Liberties UnionOral Testimony................................................. 83Prepared Statement............................................. 85APPENDIXMaterial Submitted for the Hearing Record........................ 111STATE SECRET PROTECTION ACT OF 2009----------THURSDAY, JUNE 4, 2009House of Representatives,Subcommittee on theConstitution,Civil Rights, and Civil Liberties,Committee on the Judiciary,Washington, DC.The Subcommittee met, pursuant to notice, at 2:09 p.m., inroom 2141, Rayburn House Office Building, the Honorable JerroldNadler (Chairman of the Subcommittee) presiding.Present: Representatives Nadler, Conyers, Delahunt,Johnson, Sensenbrenner, Franks, and King.Staff Present: Heather Sawyer, Majority Counsel; and PaulTaylor, Minority Counsel.Mr. Nadler. This hearing of the Subcommittee on theConstitution, Civil Rights, and Civil Liberties will come toorder.Today's hearing will examine the state secrets privilege.The Chair recognizes himself for 5 minutes for an openingstatement.Today, the Subcommittee examines legislation that I haveintroduced, alongwith the distinguished Chairman of the fullCommittee, with Representative TomPetri, and with severalother Members of the Committee, that would codify uniformstandards for dealing with claims of the state secretsprivilege by the government in civil litigation.In the last Congress, we had an oversight hearing on thestate secrets privilege and a hearing on this legislation. Thebill was reported favorably to the full Committee.Our experience has demonstrated the destructive impact thatsweeping claims of privilege and secrecy can have on ourNation. In order for the rule of law to have any meaning,individual liberties and rights must be enforceable in ourcourts. Separation-of-powers concerns are at their highest withregard to secret executive branch conduct, and the governmentsimply cannot be allowed to hide behind unexamined claims ofsecrecy and become the final arbiter ofits own conduct.Yet, claims of secrecy have been used to conceal mattersfrom Congress even though Members have the security clearancenecessary to be briefed in an appropriately secure setting.That has been the case with respect to the use of torture, withthe use of illegal spying on Americans, and other matters oftremendous national importance.And let me add here that this issue is perhaps the mostimportant issue, in my judgment, this Committee will face,because this Committee is charged with enforcing civil rightsand civil liberties under our Constitution. And there is anancient maxim of law that says there is no right without aremedy. And if the government violates your rights, if itkidnaps you, it tortures you, it deliberately burns down yourhouse, it wiretaps you without a warrant, whatever, how do youenforce your right against the government?Well, theAdministration could criminally prosecute its ownmembers who have done so; that isunlikely. Congress couldexercise oversight; that is hit or miss. Or the victim can suein tort, he can sue the government for illegal wiretapping, forkidnapping, for intentional infliction of mental distress, forassault, whatever.But if the government can eliminate that lawsuit on thepleadings simply by coming into court and using the magicincantation of the words ``state secrets,'' and say, ``Thiscase should be dismissed because we say, in our unexaminedassertion, that trying the case would necessitate therevelation of state secrets, case dismissed,'' then there is norecourse to the courts and there is no enforcement of rights.And rights without a remedy are illusory and we have no rights.Therefore, we must put some limits on this use of the statesecret doctrine.The same pattern ofresorting to extravagant state secretsclaims has been evident in the courts. While theBushadministration did not invent the use of the state secretsprivilege to conceal wrongdoing, it certainly perfected theart. The state secrets privilege has been abused by priorAdministrations to protect officials who have behaved illegallyor improperly or simply in an embarrassing manner, rather thanto protect the safety and security of the Nation.The landmark case in the field, U.S. v. Reynolds, is aperfect case in point. The widows of three civilian engineerssued the government for negligence stemming from a fatal aircrash. The government refused to produce the accident report,even refusing to provide it to the court to review, claiming itwould reveal sensitive state secrets that would endangernational security. The Supreme Court concurred without everlooking behind the government'sunsupported assertion thatnational security was involved.Half a century later, thereport was found, nowdeclassified, online by the daughter of one of the engineers,and it clearly revealed no state secrets. It clearly could havebeen made available in a form that would have enabled thosefamilies to vindicate their rights in court. It did, however,reveal that the crash was caused by government negligence,which I suspect was the real reason for the invocation, or theinvention in that case, of the state secrets doctrine.Protecting the government from embarrassment and civilliability, not protecting national security, was the realreason for withholding the accident report. Yet these familieswere denied justice because the Supreme Court never lookedbehind the government's false claim to determine whether it wasvalid.Similarly, in the Pentagon Papers case,then-SolicitorGeneral Erwin Griswold warned the Supreme Court thatpublication of the information wouldpose a grave and immediatedanger to national security. Eighteen years later, heacknowledged that he had never seen, quote, ``any trace of athreat to the national security,'' unquote, from thepublication of the information and further admitted that,quote, ``The principle concern is not with national securitybut rather with government embarrassment of one sort oranother,'' close quote.It is important to protect national security, and sometimesour courts have to balance the need for individual justice withnational security considerations. Congress has in the pastbalanced these important, albeit sometimes competing, demands.In the criminal context, we enacted the Classified InformationsProcedure Act. In FISA, we set up procedures for the courts toexamine sensitivematerials. Through the Freedom of InformationAct, we sought to limit any withholding of information from thepublic whom the government is supposed to serve.We can and should do the same in civil cases. Our system ofgovernment and our legal system have never relied on takingassurances at face value. The courts and the Congress have aduty to look behind what this Administration or anyAdministration says to determine whether or not thoseassurances are well-founded.Presidents and other government officials have been knownnot to tell the truth on occasion, especially when it is intheir interest to conceal something. The founders of thisNation knew that there needed to be checks in each branch ofthe government to prevent such abuses from taking the place.Or, in the words of the Ninth Circuit in the recent Jeppesendecision, ``The executive cannot be its own judge.'' To allowthat--and these are now my words--to allow that is to abandonall the protections against tyranny that ourFounding Fathersestablished.Courts have a duty to protect national security secrets,but they also have a duty to make an independent judgment as towhether state secrets claims have any merit. When thegovernment itself is a party, the court cannot allow it tobecome the final arbiter of its own case. The purpose of thislegislation is to ensure that the correct balance is struck.I would just add that I am extremely disappointed that theDepartment of Justice has declined to provide a witness todiscuss this very important issue at this hearing. I have metwith the Attorney General, and I understand that a review ofthis policy is currently under way. Nonetheless, the Departmentcontinues to go into court while this review is under way andtake positions that areremarkably similar to positions takenby the last Administration.While I greatly appreciate the Attorney General'swillingness to work with us, I believe that it should bepossible to send someone to provide us with theAdministration's views and to answer our questions to theextent that they are able. I hope this is not a sign of thingsto come.I look forward to the testimony of our witnesses.I would now recognize the distinguished Ranking minorityMember, the gentleman from Wisconsin, Mr. Sensenbrenner, forhis opening statement.[The bill, H.R. 984, follows:][GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]Mr. Sensenbrenner. Thank you, Mr. Chairman.The state secrets privilege is a longstanding legaldoctrine the Supreme Court most recently described in a casecalled U.S. v. Reynolds. In that case, the court made it clearthat if the court,after giving appropriate deference to theexecutive branch, determines that public disclosure ofinformation would harmnational security, the court is obligedto either dismiss the case or limit the public disclosure ofnational security information as necessary.Under this doctrine, people with legitimate claims are notdenied access to court review. Rather, the doctrine allowsjudges to personally review any sensitive information. Whilethis doctrine may occasionally disadvantage someone suing incourt, it is vital to protecting the safety of all Americans.The roots of the state secrets privilege extend all the wayback to Chief Justice Marshall, the author of Marbury v.Madison, who held that the government need not provide anyinformation that would endanger public safety.In the modern era, Congress debated the issue of the statesecrets privilege under Federal law in the1970's butultimately chose to maintain the status quo, including elementsof the privilege put in place by the Supreme Courtin itsReynolds decision. The Fourth Circuit Court of Appeals recentlyemployed the doctrine in affirming the dismissal of the case,including that the state secrets privilege has a firmfoundation in the Constitution.Not surprisingly, the privilege has played a significantrole in the Justice Department's response to civil litigationarising out of our counterterrorism efforts following 9/11.The state secrets doctrine remains strongly supported bytoday's Supreme Court. Even in its Boumediene decision grantinghabeas litigation rights to terrorists, Justice Kennedy, in hismajority opinion, acknowledged the government's legitimateinterest in protecting sources and methods of intelligencegathering and stated, ``We expect the district court will useitsdiscretion to accommodate this interest to the greatestextent possible,'' while citing the Reynolds state secrets caseImentioned earlier in doing so.I oppose any efforts, including this bill, that invite thecourts to deviate from the sound procedures they currentlyfollow to protect vital national security information. H.R. 984would preclude judges from giving weight to the executivebranch's assessment of national security. And it wouldauthorize courts not to use ex parte proceedings in conductinga review of privileged claims. And it would prevent courts frombeing able to dismiss a case when the government cannot defenditself without using privileged information.The Obama administration is clearly not enamored with theapproach of this legislation and has adhered in court to thedoctrine as asserted by the previous Administration in at leastthree cases already. Accordingto The Washington Post editorialpage, the Obama administration's position on state secretsmakes it hard to distinguish fromits predecessor. AnthonyRomero, the executive director of the ACLU, has written thatthe new Administration has embraced policies held over from theBush era, including the use of the state secrets claim.Last Congress, legislation essentially the same as H.R. 984was cosponsored in the Senate by Senators Joe Biden and HillaryClinton, who are now President Obama's Vice President andSecretary of State. But this year, President Obama, VicePresident Biden, and Secretary of State Clinton have gonesilent on the bill. When asked about it recently, the VicePresident's communications director said, quote, ``No commenton this one here.''http://mcvictimsworld.ning.com/profiles/blogs/abc-news-1979-special-missionABC News 1979 Special: Mission Mind Control (29 mins)- Coffee and water poison in USA also chemtrail sprays and tainted food, over the counter drugs, prescription drugs.ABC News 1979 Special: Mission Mind Control (29 mins)
Sent: Thursday, August 13, 2009 8:14 PM
Subject: shielding
Sorry for the multiple post.
Look up the materials that the stealth bomber uses to deflect and absorb RADAR energy. Has anyone tried combinations of Teflon, cellophane, etc? High di-electric constant material should help reduce some of the effects usingpassive shielding techniques. Since the military’s system uses adaptivebeamforming technologies, passive shielding will have its limitations. It willadapt to find the maximum entry overtime. More sophisticated methods of activejamming with alterations in the magnetic flux and the expected spectralabsorption lines for the ions of interest would be far more effective.
My book is getting close to completion. Would anyone care to proof read it before it goes to the editor and publisher?
An Introduction to Information Warfare Theory, Technologies, and Practice.
Engineering Intelligence and Designing Gods
Book Contents
Preface.......................................................................................................................................... 13
Introduction by Noam Chomsky and Ray Kurzweil................................................................... 14
Chapter 1 Enemy of theState...............................................................................................14
Chapter 2 Advanced Sensors and Systems forBio-Communications................................. 15
RADAR..................................................................................................................................... 16
Doppler RADAR.................................................................................................................................................................. 17
Signal to Noise Ratio, Gain, and Sensitivity at a Distance Parameters.................................................................. 23
Full Spectrum Radar and Multiresolution Wavelets................................................................................................. 24
Adaptive filtering........................................................................................................................................................... 26
Phased Locked Loops................................................................................................................................................... 27
Phased Arrays and Multi-dynamic RADAR.............................................................................................................. 28
Heterodyning High Frequencies into Low Frequency Sidebands......................................................................... 29
Reflection, Absorption, and Scatter............................................................................................................................ 30
Passive and Active Sensing......................................................................................................................................... 30
Adaptive Beam Forming and Electronic Scanning.................................................................................................... 31
Holography and Interferometry.................................................................................................................................. 32
Electronic Warfare and Radio Frequency Interference........................................................... 34
Directed Energy Weapons........................................................................................................ 34
Communication Warfare........................................................................................................... 36
NSA Encoding and Decoding Techniques..................................................................................................................... 36
Imaging...................................................................................................................................... 40
Spectrograms........................................................................................................................................................................ 41
Magnetic Nuclear Resonance............................................................................................................................................ 41
Electron Spin Resonance.................................................................................................................................................... 41
Scintillation of Organic Molecules Using Free Radicals and Spin Probes................................................................. 41
Viewable Scintillation of Ion Density............................................................................................................................... 42
Ion and Electron Cyclotron Resonance........................................................................................................................... 42
Using Doppler to Scan Ion Current Density with Frequency Spread......................................................................... 42
Filtering, Identification of Signatures, and Tracking Algorithms............................................ 43
Chapter 3 Modes of NeuronInfluence.................................................................................44
Directed Energy........................................................................................................................ 44
Energy Wave Shaping........................................................................................................................................................ 46
Thermal Elastic Expansion.................................................................................................................................................. 47
Thermal Catalytic Reaction Speeds.................................................................................................................................. 48
Heating...................................................................................................................................... 48
Stored Waveform Inverse Fourier Transform (SWIFT).......................................................... 48
The Diode Effect....................................................................................................................... 49
Neurotransmitter Release........................................................................................................ 49
Electron Cyclotron Current Driving......................................................................................... 51
Ion Cyclotron Resonance, Ion Heating.................................................................................... 51
Magnetic Induction................................................................................................................... 52
Quasi-Static High Voltage Electric Fields................................................................................ 52
Ultrasonic energy...................................................................................................................... 53
Colloidal Vibration Potential.............................................................................................................................................. 53
Kinetic Elastic Expansion................................................................................................................................................... 53
Direct under skull electrical probes......................................................................................... 53
Genetic Engineering and TSS Chemical Division Research for the “psi” Gene.................... 53
Chapter 4 Wet and Dry NeuralNetworks............................................................................54
Information Theory................................................................................................................... 54
Data → Information → Knowledge → Wisdom → Enlightenment............................................................................. 54
Memetics and the Mating of Minds......................................................................................... 55
Super Intelligence..................................................................................................................... 55
The Global Brain Project.......................................................................................................... 55
Hive Minds and Swarm Theory of Information........................................................................ 55
Integrated Intelligent Systems................................................................................................. 55
Centralized and Distributed Intelligence................................................................................. 56
The Global Brain Project..................................................................................................................................................... 56
Cybernetic Hive Minds....................................................................................................................................................... 56
Human Networks................................................................................................................................................................. 56
Super-Intelligence................................................................................................................................................................ 57
Cognitive Entities, Networks, and Society of Minds................................................................................................ 57
Harvesting Human Minds and Other Wet Nets........................................................................................................ 58
Think Tanks (Brainstorming)........................................................................................................................................ 58
Organizational Behaviors.............................................................................................................................................. 60
Network Structures........................................................................................................................................................ 60
Hierarchies and Classism.................................................................................................................................................... 60
Structure, Importance, Relevance, and Meaning............................................................................................................ 61
Defining Human Cognition and the Sense of Self..................................................................... 61
Computational Equivalence and the Conscious Universe....................................................... 62
Chapter 5 NeuralProgramming...........................................................................................63
AutoCorrelograms.................................................................................................................... 64
Mapping.................................................................................................................................... 64
Self-organizing unsupervised learning / reinforcement learning / neurodynamic programming............................. 65
Classification and Brain Printing Identification.............................................................................................................. 65
Port Scanning.................................................................................................................................................................. 66
Brute force hacking........................................................................................................................................................ 67
Compression................................................................................................................................................................... 67
Cataloguing............................................................................................................................... 69
Personality Segmentation................................................................................................................................................... 69
Loyalty Affinities and Belief System Classification.................................................................................................. 69
Personality Simulations................................................................................................................................................. 69
Creating Cogs in the Machine...................................................................................................................................... 69
Data-mining Anomalies...................................................................................................................................................... 70
Counter Terrorism.......................................................................................................................................................... 70
Counter Intelligence....................................................................................................................................................... 70
Censorship and Information Flow Controls............................................................................................................... 70
Cognitive Configurations.......................................................................................................... 71
Virtual Neurons......................................................................................................................... 71
Transformations between Machine and Human Knowledge Storage...................................... 72
Integrating the Internet with Wet and Dry Neural Networks.................................................. 72
Adding Non-biological Sensors to Human Perception............................................................. 72
Chapter 6 Applications..........................................................................................................73
Self Directed Evolution............................................................................................................. 73
Autonomous Modification, “Free Will”, Deterministic Reprogramming, and ‘Bit Twiddling’................................ 73
Diagnostics and Monitoring...................................................................................................... 74
Efficient Communications......................................................................................................... 75
Universal Translators.......................................................................................................................................................... 75
Telepathy and Psychophony............................................................................................................................................ 75
Distributed Knowledge Management...................................................................................... 75
Self Organizing Adaptable Reconfiguration and Swarm Theory................................................................................. 75
Dream Harvesting – Utilizing Down Cycles.................................................................................................................... 76
Beaming and ‘Transporter’ Technology.......................................................................................................................... 76
Enhanced Human Performance................................................................................................ 77
Over-clocking the common fundamental Human Algorithms....................................................................................... 77
Forced Sleep and Adrenaline Boosts............................................................................................................................... 77
Memory Enhancement........................................................................................................................................................ 77
Intelligence and knowledge enhancements..................................................................................................................... 78
Extra Senses and Psi-borgs(Cybernetic biological computer entities)........................................................................ 80
Mood Management............................................................................................................................................................. 81
Enhancing Biological Sensors........................................................................................................................................... 81
Silicon Immortality............................................................................................................................................................... 81
Virtual Heaven and Hell................................................................................................................................................. 81
Crime and Punishment.............................................................................................................. 82
Automating Justice and Preventing Crimes.................................................................................................................... 82
Correctional Alternatives................................................................................................................................................... 83
“Behavioral Training”, Brainwashing, psychic driving and programming............................................................ 83
Secret Prisons................................................................................................................................................................. 83
Big Brother, Aliens, and the Voice of God................................................................................................................. 85
Cultural Engineering and Cultural Normalization.................................................................... 85
Accelerated Education........................................................................................................................................................ 87
Directed Evolution............................................................................................................................................................... 88
Productivity of Society....................................................................................................................................................... 89
Entertainment Applications...................................................................................................... 89
Ego trip.................................................................................................................................................................................. 89
Memory implants................................................................................................................................................................. 90
Virtual vacations.................................................................................................................................................................. 90
Shared interactive movie and music creation.................................................................................................................. 90
Virtual sex.............................................................................................................................................................................. 90
Electromagnetic Psychoactive Drugs and Altered Conscious States......................................................................... 91
War Gaming.......................................................................................................................................................................... 91
Sensing of desires and fulfilling them.............................................................................................................................. 92
Medical Applications................................................................................................................ 92
A New Medical Instrument that Spin Tags and Monitors Free Radicals................................................................... 92
Accelerated Healing............................................................................................................................................................ 92
Anit-Depression medication, Cure for Post Traumatic Stress Syndrome................................................................... 92
Cure for Loneliness and Broken Hearts........................................................................................................................... 92
Behavioral Modification to Quit Smoking, Lose Weight, Exercise Motivation......................................................... 93
Analgesics and Sensitization............................................................................................................................................. 93
Monitoring of seizures, heart activity.............................................................................................................................. 93
Diagnostics through Pain Sharing.................................................................................................................................... 93
Empathy Creation................................................................................................................................................................ 93
Universal Translator...................................................................................................................................................... 94
Replace Ritalin and many psychoactive pharmaceuticals............................................................................................. 95
Drug Rehabilitation............................................................................................................................................................. 95
Sobriety signal..................................................................................................................................................................... 95
Replace dying brain cells with virtual ones..................................................................................................................... 95
Cures for Blindness and Deafness.................................................................................................................................... 95
Muscular sclerosis (MS), Seizures, Bi-polar, Schizophrenia Cures............................................................................. 96
Bionics and spinal injuries................................................................................................................................................. 96
Biological Cloning and Mental Cloning........................................................................................................................... 97
Immortality............................................................................................................................................................................ 97
Military applications.................................................................................................................. 97
Spying/ESPionage/Remote Viewing................................................................................................................................. 97
Control of enemy................................................................................................................................................................. 98
Control of politics................................................................................................................................................................ 98
Control of civilians opinions.............................................................................................................................................. 99
Remote control soldiers...................................................................................................................................................... 99
Reading of vitals................................................................................................................................................................ 100
Enhanced human performance........................................................................................................................................ 100
Faster reaction times......................................................................................................................................................... 100
Psi-borg extra senses........................................................................................................................................................ 100
EEG control of robotic machines..................................................................................................................................... 101
Current Uses........................................................................................................................... 101
Silencing Dissenters and Government Whistle Blowers............................................................................................. 101
Brain print assassinations........................................................................................................................................... 101
Remote Lobotomies and Remotely Induced Schizophrenia.................................................................................. 102
Finding the outlying thinkers..................................................................................................................................... 105
Controlling Mass Media................................................................................................................................................... 105
Controlling Religions........................................................................................................................................................ 105
Acquiring Black Mail on Politicians............................................................................................................................... 105
Assassinating with plausible denial targets in the US and abroad........................................................................... 105
Controlling World Politics................................................................................................................................................ 106
Controlling Financial Markets......................................................................................................................................... 106
Collapsing Economies like the Former Soviet Union or the United States.......................................................... 106
Cheating at Gambling Games...................................................................................................................................... 106
Brain bugs - Spying, Espionage, and Sabotage............................................................................................................ 106
Human Robots and Psi-Borg Slaves............................................................................................................................... 106
Creating Alter Personalities – Dr. Jekyll and Mr. Hyde.......................................................................................... 106
Passing/failing Polygraphs and Brain Printing fMRI Truth Detectors................................................................ 107
Stress Conditioning..................................................................................................................................................... 107
Remote Interrogations – No-Touch Torture and Mind Probing................................................................................ 108
Dream Programming and Memory Probing.................................................................................................................... 109
Evolving Mind Virus Weapon Effectiveness................................................................................................................ 109
Directed Evolution............................................................................................................................................................. 110
Eugenics, Genocide, and the Silent Holocaust........................................................................................................ 110
Menticide and Silent Warfare..................................................................................................................................... 111
Intelligent Design......................................................................................................................................................... 111
Human animals and machines with souls................................................................................................................. 112
Chapter 7 Hacking Computer and BiologicalSystems..................................................... 113
History of Mind Hacking........................................................................................................ 113
Mind Hacking and The Enemy Within................................................................................... 114
Cognitive and Perception Warfare......................................................................................... 115
Cognitive Modeling and Reverse Engineering the Brain..................................................... 115
Mind Viruses........................................................................................................................... 120
Genetic Algorithms and Directed Evolution.................................................................................................................. 121
Human Experimentation, Brain Knapping, and Food for Thought....................................................................... 121
Malicious Payloads........................................................................................................................................................... 122
Replacing Personalities............................................................................................................................................... 123
Protected Memory, Partitioning, and Cognitive Containment......................................................... 123
Infinite Looping................................................................................................................................................................. 124
Demons............................................................................................................................................................................... 124
Crashing the Operating System Through Error Amplification.............................................. 124
Zombification and Remote Control Attacks........................................................................... 125
Scalable Enslavement and Zombification Strategies.................................................................................................... 126
Spiders................................................................................................................................................................................. 126
Bots...................................................................................................................................................................................... 127
Intelligent Agents.............................................................................................................................................................. 127
Brute Force Hacking – Master/Slave Roles.......................................................................... 127
Queuing Executables - Subliminal and Hypnosis................................................................... 128
Logic and Memory Buffer Overflow....................................................................................... 128
Denial of Service Attacks....................................................................................................... 129
Trojan Horses......................................................................................................................... 130
Triggers and Triggered Payloads...................................................................................................................................................... 131
Personality Overlays.................................................................................................................................................... 131
Psycho-bombs.............................................................................................................................................................. 132
Programmed Assassins............................................................................................................................................... 132
Terrorists....................................................................................................................................................................... 134
Pleasure/Pain principles.......................................................................................................... 134
Spoofing................................................................................................................................... 136
Social Engineering, Identity Theft, and Doppelgangers............................................................................................. 137
Authority, Privilege, Access, and Role Level Hacking................................................................................................ 138
White Noise Generators, Jammers, and scramblers............................................................. 138
Phreaking and mobile phone cloning...................................................................................... 139
Phishing and Brain Scanning – Finding hosts......................................................................... 139
Co-Processor Usurpation....................................................................................................... 139
Inserting Secret Hooks in Device Drivers............................................................................ 140
Worms , Memetic Viruses, and Psychotronic Viruses........................................................... 140
Ghosting the Sensor Systems................................................................................................. 140
Cloaking and Stealth Technologies........................................................................................ 140
Hacking the Variables of Belief Systems............................................................................... 141
Dictionary Attack.............................................................................................................................................................. 141
Purging and Altering Memory......................................................................................................................................... 141
Electronic Dissolution of Memory --- E.D.O.M....................................................................................................... 142
Thought filtering and suppression................................................................................................................................. 142
Hacking Decision Trees.................................................................................................................................................... 144
Psychographic Mapping............................................................................................................................................. 144
Game Theory................................................................................................................................................................. 144
John Nash Equilibriums............................................................................................................................................... 145
Reflashing the BIOS, Infecting Boot Sectors, Substitution of Operating System Files........ 146
Hacking Input Output Ports – The 5 Senses and Motor Cortex.......................................... 148
Spyware................................................................................................................................... 152
Stealing Passwords.................................................................................................................. 154
Key Stroke Loggers........................................................................................................................................................... 154
Soul Catchers and Recording the Entire Life of Every Human.............................................................................. 154
Memory Probing..................................................................................................................... 156
Bi-directional Associative Memory (BAM) Probing................................................................................................... 156
Self Destruct Algorithms........................................................................................................ 157
Suicide bombers / Psycho-bombs................................................................................................................................... 157
Suicide through torture and depression signals........................................................................................................... 158
Amplification of destructive behaviors and addiction pathways.............................................................................. 158
Shutting down and Stressing the Subsystems........................................................................ 158
Heart Failure, blood clots, and Strokes.......................................................................................................................... 159
Secondary and tertiary diseases caused by prolonged stress.............................................................................. 159
Spooking to death............................................................................................................................................................. 160
Context Switching................................................................................................................... 162
Emotional Control.............................................................................................................................................................. 162
Handles, Handlers, and Proxies............................................................................................. 162
Invoking Defensive Algorithms then Redirecting a Counter Attack.................................... 162
Terrorists and Proxy Agent Provocateurs..................................................................................................................... 162
Psycho-Bombs................................................................................................................................................................... 162
Trip Wires and Detection Algorithms.................................................................................... 162
Van Eck Hacking and TEMPEST standards.......................................................................... 163
Network Analyzers and Packet Sniffers................................................................................. 164
Echelon for the mind......................................................................................................................................................... 164
Wireless hacking – electronic warfare, signal and communication intelligence.................... 164
AntiVirus Software.................................................................................................................. 165
Encryption and Protocols........................................................................................................ 165
Firewalls.................................................................................................................................. 165
Thought Stream Filtering.................................................................................................................................................. 167
Trace route and multi levels of indirection............................................................................ 168
Disrupting Human Networks.................................................................................................. 168
Plants and Agent Provocateurs...................................................................................................................................... 169
Hacking the Hackers.............................................................................................................. 170
Scarecrow Effect and Decoys.......................................................................................................................................... 170
Usurping the Eye Tracking Virtual Interface Controls and Audio Commands........................................................ 171
Chapter 8 Resistance is Futile - Counter ResistanceTechniques.................................... 173
Alice in Wonderland................................................................................................................ 174
Wizard of Oz – ‘The Kubark Manual’.................................................................................... 175
Angels and Demons Script............................................................................................... 175
Sleeping Beauty – The Script for sleeper agents and disposable CIA assets....................... 181
Snow White and the Seven Dwarfs................................................................................................................................ 182
The A, B, C’s of Enhanced Interrogation and Torture.......................................................... 182
False Confessions for Staged Courts and Media Events............................................................................................ 190
Brainwashing...................................................................................................................................................................... 191
Neural Linguistic Programming and Psychic Driving.................................................................................................. 192
Plausible Deniability................................................................................................................ 192
GasLighting........................................................................................................................................................................ 193
Framing (Setting up a target to be disposed of)........................................................................................................... 193
Scripts and Dirty Tricks.................................................................................................................................................... 194
The Art of War and the Art of Deception..................................................................................................................... 196
Tricks, Illusions, and the Psychology of Magic........................................................................................................... 197
Chapter 9 Designing Gods - Active DoD, NSA, and CIASystems................................... 198
Global Communication Warfare – code name “Gabriel”................................................. 199
Biometric Recognition And Identification Network – B.R.A.I.N................................................... 200
Remote Hypnotic Intra-cerebralControl ---- R.H.I.C.................................................................. 202
Mentally Integrated Neuron Duplicator ---- M.I.N.D.................................................................... 202
Artificial Linguistic Internet Computer Entity ---- A.L.I.C.E.......................................................... 203
The Ghost in the Machine and Demons of Destruction.............................................................................................. 206
Thought And Memory Interface ---- T.A.M.I.............................................................................. 207
Common Human Routines Inference Software Technology – C.H.R.I.S.T................................... 208
Silent Assassination Through Adapting Networks ---- S.A.T.A.N.................................................. 208
Death Doctors and Angels of Death.............................................................................................................................. 209
Voodoo Doll: No-touch torture subprograms............................................................................................................... 210
Mind Games - Psychic Warfare Training................................................................................ 223
Project “Noah’s Ark”......................................................................................................... 229
Chapter 10 The Politics and Ethics of Controlling HumanBeings................................... 230
Legal Issues............................................................................................................................ 232
The Costs and Benefits.................................................................................................................................................... 233
Appendix of Formulas and Calculations.................................................................................. 234
Other Methods of Spying and Sabotage.................................................................................... 235
Index........................................................................................................................................... 237
CD packet containing viral code, port scanners, Back Orifice, and many other hacking utilities and codesamples........................................................................................................................................247
Chapter 11 About theauthor................................................................................................248
Chapter 12 Review Quotes:...................................................................................................249