All Posts (12256)
Sent: Thursday, August 13, 2009 8:14 PM
Subject: shielding
Sorry for the multiple post.
Look up the materials that the stealth bomber uses to deflect and absorb RADAR energy. Has anyone tried combinations of Teflon, cellophane, etc? High di-electric constant material should help reduce some of the effects usingpassive shielding techniques. Since the military’s system uses adaptivebeamforming technologies, passive shielding will have its limitations. It willadapt to find the maximum entry overtime. More sophisticated methods of activejamming with alterations in the magnetic flux and the expected spectralabsorption lines for the ions of interest would be far more effective.
My book is getting close to completion. Would anyone care to proof read it before it goes to the editor and publisher?
An Introduction to Information Warfare Theory, Technologies, and Practice.
Engineering Intelligence and Designing Gods
Book Contents
Preface.......................................................................................................................................... 13
Introduction by Noam Chomsky and Ray Kurzweil................................................................... 14
Chapter 1 Enemy of theState...............................................................................................14
Chapter 2 Advanced Sensors and Systems forBio-Communications................................. 15
RADAR..................................................................................................................................... 16
Doppler RADAR.................................................................................................................................................................. 17
Signal to Noise Ratio, Gain, and Sensitivity at a Distance Parameters.................................................................. 23
Full Spectrum Radar and Multiresolution Wavelets................................................................................................. 24
Adaptive filtering........................................................................................................................................................... 26
Phased Locked Loops................................................................................................................................................... 27
Phased Arrays and Multi-dynamic RADAR.............................................................................................................. 28
Heterodyning High Frequencies into Low Frequency Sidebands......................................................................... 29
Reflection, Absorption, and Scatter............................................................................................................................ 30
Passive and Active Sensing......................................................................................................................................... 30
Adaptive Beam Forming and Electronic Scanning.................................................................................................... 31
Holography and Interferometry.................................................................................................................................. 32
Electronic Warfare and Radio Frequency Interference........................................................... 34
Directed Energy Weapons........................................................................................................ 34
Communication Warfare........................................................................................................... 36
NSA Encoding and Decoding Techniques..................................................................................................................... 36
Imaging...................................................................................................................................... 40
Spectrograms........................................................................................................................................................................ 41
Magnetic Nuclear Resonance............................................................................................................................................ 41
Electron Spin Resonance.................................................................................................................................................... 41
Scintillation of Organic Molecules Using Free Radicals and Spin Probes................................................................. 41
Viewable Scintillation of Ion Density............................................................................................................................... 42
Ion and Electron Cyclotron Resonance........................................................................................................................... 42
Using Doppler to Scan Ion Current Density with Frequency Spread......................................................................... 42
Filtering, Identification of Signatures, and Tracking Algorithms............................................ 43
Chapter 3 Modes of NeuronInfluence.................................................................................44
Directed Energy........................................................................................................................ 44
Energy Wave Shaping........................................................................................................................................................ 46
Thermal Elastic Expansion.................................................................................................................................................. 47
Thermal Catalytic Reaction Speeds.................................................................................................................................. 48
Heating...................................................................................................................................... 48
Stored Waveform Inverse Fourier Transform (SWIFT).......................................................... 48
The Diode Effect....................................................................................................................... 49
Neurotransmitter Release........................................................................................................ 49
Electron Cyclotron Current Driving......................................................................................... 51
Ion Cyclotron Resonance, Ion Heating.................................................................................... 51
Magnetic Induction................................................................................................................... 52
Quasi-Static High Voltage Electric Fields................................................................................ 52
Ultrasonic energy...................................................................................................................... 53
Colloidal Vibration Potential.............................................................................................................................................. 53
Kinetic Elastic Expansion................................................................................................................................................... 53
Direct under skull electrical probes......................................................................................... 53
Genetic Engineering and TSS Chemical Division Research for the “psi” Gene.................... 53
Chapter 4 Wet and Dry NeuralNetworks............................................................................54
Information Theory................................................................................................................... 54
Data → Information → Knowledge → Wisdom → Enlightenment............................................................................. 54
Memetics and the Mating of Minds......................................................................................... 55
Super Intelligence..................................................................................................................... 55
The Global Brain Project.......................................................................................................... 55
Hive Minds and Swarm Theory of Information........................................................................ 55
Integrated Intelligent Systems................................................................................................. 55
Centralized and Distributed Intelligence................................................................................. 56
The Global Brain Project..................................................................................................................................................... 56
Cybernetic Hive Minds....................................................................................................................................................... 56
Human Networks................................................................................................................................................................. 56
Super-Intelligence................................................................................................................................................................ 57
Cognitive Entities, Networks, and Society of Minds................................................................................................ 57
Harvesting Human Minds and Other Wet Nets........................................................................................................ 58
Think Tanks (Brainstorming)........................................................................................................................................ 58
Organizational Behaviors.............................................................................................................................................. 60
Network Structures........................................................................................................................................................ 60
Hierarchies and Classism.................................................................................................................................................... 60
Structure, Importance, Relevance, and Meaning............................................................................................................ 61
Defining Human Cognition and the Sense of Self..................................................................... 61
Computational Equivalence and the Conscious Universe....................................................... 62
Chapter 5 NeuralProgramming...........................................................................................63
AutoCorrelograms.................................................................................................................... 64
Mapping.................................................................................................................................... 64
Self-organizing unsupervised learning / reinforcement learning / neurodynamic programming............................. 65
Classification and Brain Printing Identification.............................................................................................................. 65
Port Scanning.................................................................................................................................................................. 66
Brute force hacking........................................................................................................................................................ 67
Compression................................................................................................................................................................... 67
Cataloguing............................................................................................................................... 69
Personality Segmentation................................................................................................................................................... 69
Loyalty Affinities and Belief System Classification.................................................................................................. 69
Personality Simulations................................................................................................................................................. 69
Creating Cogs in the Machine...................................................................................................................................... 69
Data-mining Anomalies...................................................................................................................................................... 70
Counter Terrorism.......................................................................................................................................................... 70
Counter Intelligence....................................................................................................................................................... 70
Censorship and Information Flow Controls............................................................................................................... 70
Cognitive Configurations.......................................................................................................... 71
Virtual Neurons......................................................................................................................... 71
Transformations between Machine and Human Knowledge Storage...................................... 72
Integrating the Internet with Wet and Dry Neural Networks.................................................. 72
Adding Non-biological Sensors to Human Perception............................................................. 72
Chapter 6 Applications..........................................................................................................73
Self Directed Evolution............................................................................................................. 73
Autonomous Modification, “Free Will”, Deterministic Reprogramming, and ‘Bit Twiddling’................................ 73
Diagnostics and Monitoring...................................................................................................... 74
Efficient Communications......................................................................................................... 75
Universal Translators.......................................................................................................................................................... 75
Telepathy and Psychophony............................................................................................................................................ 75
Distributed Knowledge Management...................................................................................... 75
Self Organizing Adaptable Reconfiguration and Swarm Theory................................................................................. 75
Dream Harvesting – Utilizing Down Cycles.................................................................................................................... 76
Beaming and ‘Transporter’ Technology.......................................................................................................................... 76
Enhanced Human Performance................................................................................................ 77
Over-clocking the common fundamental Human Algorithms....................................................................................... 77
Forced Sleep and Adrenaline Boosts............................................................................................................................... 77
Memory Enhancement........................................................................................................................................................ 77
Intelligence and knowledge enhancements..................................................................................................................... 78
Extra Senses and Psi-borgs(Cybernetic biological computer entities)........................................................................ 80
Mood Management............................................................................................................................................................. 81
Enhancing Biological Sensors........................................................................................................................................... 81
Silicon Immortality............................................................................................................................................................... 81
Virtual Heaven and Hell................................................................................................................................................. 81
Crime and Punishment.............................................................................................................. 82
Automating Justice and Preventing Crimes.................................................................................................................... 82
Correctional Alternatives................................................................................................................................................... 83
“Behavioral Training”, Brainwashing, psychic driving and programming............................................................ 83
Secret Prisons................................................................................................................................................................. 83
Big Brother, Aliens, and the Voice of God................................................................................................................. 85
Cultural Engineering and Cultural Normalization.................................................................... 85
Accelerated Education........................................................................................................................................................ 87
Directed Evolution............................................................................................................................................................... 88
Productivity of Society....................................................................................................................................................... 89
Entertainment Applications...................................................................................................... 89
Ego trip.................................................................................................................................................................................. 89
Memory implants................................................................................................................................................................. 90
Virtual vacations.................................................................................................................................................................. 90
Shared interactive movie and music creation.................................................................................................................. 90
Virtual sex.............................................................................................................................................................................. 90
Electromagnetic Psychoactive Drugs and Altered Conscious States......................................................................... 91
War Gaming.......................................................................................................................................................................... 91
Sensing of desires and fulfilling them.............................................................................................................................. 92
Medical Applications................................................................................................................ 92
A New Medical Instrument that Spin Tags and Monitors Free Radicals................................................................... 92
Accelerated Healing............................................................................................................................................................ 92
Anit-Depression medication, Cure for Post Traumatic Stress Syndrome................................................................... 92
Cure for Loneliness and Broken Hearts........................................................................................................................... 92
Behavioral Modification to Quit Smoking, Lose Weight, Exercise Motivation......................................................... 93
Analgesics and Sensitization............................................................................................................................................. 93
Monitoring of seizures, heart activity.............................................................................................................................. 93
Diagnostics through Pain Sharing.................................................................................................................................... 93
Empathy Creation................................................................................................................................................................ 93
Universal Translator...................................................................................................................................................... 94
Replace Ritalin and many psychoactive pharmaceuticals............................................................................................. 95
Drug Rehabilitation............................................................................................................................................................. 95
Sobriety signal..................................................................................................................................................................... 95
Replace dying brain cells with virtual ones..................................................................................................................... 95
Cures for Blindness and Deafness.................................................................................................................................... 95
Muscular sclerosis (MS), Seizures, Bi-polar, Schizophrenia Cures............................................................................. 96
Bionics and spinal injuries................................................................................................................................................. 96
Biological Cloning and Mental Cloning........................................................................................................................... 97
Immortality............................................................................................................................................................................ 97
Military applications.................................................................................................................. 97
Spying/ESPionage/Remote Viewing................................................................................................................................. 97
Control of enemy................................................................................................................................................................. 98
Control of politics................................................................................................................................................................ 98
Control of civilians opinions.............................................................................................................................................. 99
Remote control soldiers...................................................................................................................................................... 99
Reading of vitals................................................................................................................................................................ 100
Enhanced human performance........................................................................................................................................ 100
Faster reaction times......................................................................................................................................................... 100
Psi-borg extra senses........................................................................................................................................................ 100
EEG control of robotic machines..................................................................................................................................... 101
Current Uses........................................................................................................................... 101
Silencing Dissenters and Government Whistle Blowers............................................................................................. 101
Brain print assassinations........................................................................................................................................... 101
Remote Lobotomies and Remotely Induced Schizophrenia.................................................................................. 102
Finding the outlying thinkers..................................................................................................................................... 105
Controlling Mass Media................................................................................................................................................... 105
Controlling Religions........................................................................................................................................................ 105
Acquiring Black Mail on Politicians............................................................................................................................... 105
Assassinating with plausible denial targets in the US and abroad........................................................................... 105
Controlling World Politics................................................................................................................................................ 106
Controlling Financial Markets......................................................................................................................................... 106
Collapsing Economies like the Former Soviet Union or the United States.......................................................... 106
Cheating at Gambling Games...................................................................................................................................... 106
Brain bugs - Spying, Espionage, and Sabotage............................................................................................................ 106
Human Robots and Psi-Borg Slaves............................................................................................................................... 106
Creating Alter Personalities – Dr. Jekyll and Mr. Hyde.......................................................................................... 106
Passing/failing Polygraphs and Brain Printing fMRI Truth Detectors................................................................ 107
Stress Conditioning..................................................................................................................................................... 107
Remote Interrogations – No-Touch Torture and Mind Probing................................................................................ 108
Dream Programming and Memory Probing.................................................................................................................... 109
Evolving Mind Virus Weapon Effectiveness................................................................................................................ 109
Directed Evolution............................................................................................................................................................. 110
Eugenics, Genocide, and the Silent Holocaust........................................................................................................ 110
Menticide and Silent Warfare..................................................................................................................................... 111
Intelligent Design......................................................................................................................................................... 111
Human animals and machines with souls................................................................................................................. 112
Chapter 7 Hacking Computer and BiologicalSystems..................................................... 113
History of Mind Hacking........................................................................................................ 113
Mind Hacking and The Enemy Within................................................................................... 114
Cognitive and Perception Warfare......................................................................................... 115
Cognitive Modeling and Reverse Engineering the Brain..................................................... 115
Mind Viruses........................................................................................................................... 120
Genetic Algorithms and Directed Evolution.................................................................................................................. 121
Human Experimentation, Brain Knapping, and Food for Thought....................................................................... 121
Malicious Payloads........................................................................................................................................................... 122
Replacing Personalities............................................................................................................................................... 123
Protected Memory, Partitioning, and Cognitive Containment......................................................... 123
Infinite Looping................................................................................................................................................................. 124
Demons............................................................................................................................................................................... 124
Crashing the Operating System Through Error Amplification.............................................. 124
Zombification and Remote Control Attacks........................................................................... 125
Scalable Enslavement and Zombification Strategies.................................................................................................... 126
Spiders................................................................................................................................................................................. 126
Bots...................................................................................................................................................................................... 127
Intelligent Agents.............................................................................................................................................................. 127
Brute Force Hacking – Master/Slave Roles.......................................................................... 127
Queuing Executables - Subliminal and Hypnosis................................................................... 128
Logic and Memory Buffer Overflow....................................................................................... 128
Denial of Service Attacks....................................................................................................... 129
Trojan Horses......................................................................................................................... 130
Triggers and Triggered Payloads...................................................................................................................................................... 131
Personality Overlays.................................................................................................................................................... 131
Psycho-bombs.............................................................................................................................................................. 132
Programmed Assassins............................................................................................................................................... 132
Terrorists....................................................................................................................................................................... 134
Pleasure/Pain principles.......................................................................................................... 134
Spoofing................................................................................................................................... 136
Social Engineering, Identity Theft, and Doppelgangers............................................................................................. 137
Authority, Privilege, Access, and Role Level Hacking................................................................................................ 138
White Noise Generators, Jammers, and scramblers............................................................. 138
Phreaking and mobile phone cloning...................................................................................... 139
Phishing and Brain Scanning – Finding hosts......................................................................... 139
Co-Processor Usurpation....................................................................................................... 139
Inserting Secret Hooks in Device Drivers............................................................................ 140
Worms , Memetic Viruses, and Psychotronic Viruses........................................................... 140
Ghosting the Sensor Systems................................................................................................. 140
Cloaking and Stealth Technologies........................................................................................ 140
Hacking the Variables of Belief Systems............................................................................... 141
Dictionary Attack.............................................................................................................................................................. 141
Purging and Altering Memory......................................................................................................................................... 141
Electronic Dissolution of Memory --- E.D.O.M....................................................................................................... 142
Thought filtering and suppression................................................................................................................................. 142
Hacking Decision Trees.................................................................................................................................................... 144
Psychographic Mapping............................................................................................................................................. 144
Game Theory................................................................................................................................................................. 144
John Nash Equilibriums............................................................................................................................................... 145
Reflashing the BIOS, Infecting Boot Sectors, Substitution of Operating System Files........ 146
Hacking Input Output Ports – The 5 Senses and Motor Cortex.......................................... 148
Spyware................................................................................................................................... 152
Stealing Passwords.................................................................................................................. 154
Key Stroke Loggers........................................................................................................................................................... 154
Soul Catchers and Recording the Entire Life of Every Human.............................................................................. 154
Memory Probing..................................................................................................................... 156
Bi-directional Associative Memory (BAM) Probing................................................................................................... 156
Self Destruct Algorithms........................................................................................................ 157
Suicide bombers / Psycho-bombs................................................................................................................................... 157
Suicide through torture and depression signals........................................................................................................... 158
Amplification of destructive behaviors and addiction pathways.............................................................................. 158
Shutting down and Stressing the Subsystems........................................................................ 158
Heart Failure, blood clots, and Strokes.......................................................................................................................... 159
Secondary and tertiary diseases caused by prolonged stress.............................................................................. 159
Spooking to death............................................................................................................................................................. 160
Context Switching................................................................................................................... 162
Emotional Control.............................................................................................................................................................. 162
Handles, Handlers, and Proxies............................................................................................. 162
Invoking Defensive Algorithms then Redirecting a Counter Attack.................................... 162
Terrorists and Proxy Agent Provocateurs..................................................................................................................... 162
Psycho-Bombs................................................................................................................................................................... 162
Trip Wires and Detection Algorithms.................................................................................... 162
Van Eck Hacking and TEMPEST standards.......................................................................... 163
Network Analyzers and Packet Sniffers................................................................................. 164
Echelon for the mind......................................................................................................................................................... 164
Wireless hacking – electronic warfare, signal and communication intelligence.................... 164
AntiVirus Software.................................................................................................................. 165
Encryption and Protocols........................................................................................................ 165
Firewalls.................................................................................................................................. 165
Thought Stream Filtering.................................................................................................................................................. 167
Trace route and multi levels of indirection............................................................................ 168
Disrupting Human Networks.................................................................................................. 168
Plants and Agent Provocateurs...................................................................................................................................... 169
Hacking the Hackers.............................................................................................................. 170
Scarecrow Effect and Decoys.......................................................................................................................................... 170
Usurping the Eye Tracking Virtual Interface Controls and Audio Commands........................................................ 171
Chapter 8 Resistance is Futile - Counter ResistanceTechniques.................................... 173
Alice in Wonderland................................................................................................................ 174
Wizard of Oz – ‘The Kubark Manual’.................................................................................... 175
Angels and Demons Script............................................................................................... 175
Sleeping Beauty – The Script for sleeper agents and disposable CIA assets....................... 181
Snow White and the Seven Dwarfs................................................................................................................................ 182
The A, B, C’s of Enhanced Interrogation and Torture.......................................................... 182
False Confessions for Staged Courts and Media Events............................................................................................ 190
Brainwashing...................................................................................................................................................................... 191
Neural Linguistic Programming and Psychic Driving.................................................................................................. 192
Plausible Deniability................................................................................................................ 192
GasLighting........................................................................................................................................................................ 193
Framing (Setting up a target to be disposed of)........................................................................................................... 193
Scripts and Dirty Tricks.................................................................................................................................................... 194
The Art of War and the Art of Deception..................................................................................................................... 196
Tricks, Illusions, and the Psychology of Magic........................................................................................................... 197
Chapter 9 Designing Gods - Active DoD, NSA, and CIASystems................................... 198
Global Communication Warfare – code name “Gabriel”................................................. 199
Biometric Recognition And Identification Network – B.R.A.I.N................................................... 200
Remote Hypnotic Intra-cerebralControl ---- R.H.I.C.................................................................. 202
Mentally Integrated Neuron Duplicator ---- M.I.N.D.................................................................... 202
Artificial Linguistic Internet Computer Entity ---- A.L.I.C.E.......................................................... 203
The Ghost in the Machine and Demons of Destruction.............................................................................................. 206
Thought And Memory Interface ---- T.A.M.I.............................................................................. 207
Common Human Routines Inference Software Technology – C.H.R.I.S.T................................... 208
Silent Assassination Through Adapting Networks ---- S.A.T.A.N.................................................. 208
Death Doctors and Angels of Death.............................................................................................................................. 209
Voodoo Doll: No-touch torture subprograms............................................................................................................... 210
Mind Games - Psychic Warfare Training................................................................................ 223
Project “Noah’s Ark”......................................................................................................... 229
Chapter 10 The Politics and Ethics of Controlling HumanBeings................................... 230
Legal Issues............................................................................................................................ 232
The Costs and Benefits.................................................................................................................................................... 233
Appendix of Formulas and Calculations.................................................................................. 234
Other Methods of Spying and Sabotage.................................................................................... 235
Index........................................................................................................................................... 237
CD packet containing viral code, port scanners, Back Orifice, and many other hacking utilities and codesamples........................................................................................................................................247
Chapter 11 About theauthor................................................................................................248
Chapter 12 Review Quotes:...................................................................................................249
Frank Olson was an American citizen, born in 1910 and murdered in New York City in 1953 by the CIA. Here's an outline of the case:Fort Detrick is the U.S. Army's biowarfare facility, founded in 1943. Frank Olson was one of the first scientists to work there. From the final years of World War II through the Korean War and up to the present time scientists at Fort Detrick developed biological weapons including anthrax.
Following the end of World War II the U.S. conducted "Operation Paperclip", which scoured Germany for Nazi scientists who could be useful. It found some who had conducted experiments on prisoners in Dachau and other Nazi concentration camps, including one Kurt Blome. He was among the defendants in the Nuremberg War Trials, and would have been convicted and hanged but for American intervention. In return for agreeing to provide information to the Americans about his experiments in Dachau, and advice in the development of their own germ warfare program, an acquittal was arranged, and he escaped the gallows.
Frank Olson and Kurt Blome (who had become a protegé of the Americans) later met at Camp King in Germany in the early 1950s when Olson made several visits there to participate in "Operation Artichoke", in which the U.S. Army and the CIA experimented with the use of drugs (including LSD) in interrogation. Olson was present during brutal interrogations by the Americans of Soviet prisoners and suspected double agents, some of whom died under torture. Olson was deeply disturbed by what he had seen.
In the summer of 1953 Olson travelled again to Europe. In Berlin in August he witnessed several brutal interrogations involving torture and the use of drugs. On his return to the U.S. he confided to a friend and colleague at Fort Detrick, Norman Cournoyer, that he was disgusted with what the CIA was doing and was determined to leave.
In November 1953 Olson attended a meeting of a group of CIA agents at a country retreat where they discussed their work. Olson was suspected by the CIA of being a security risk. He was given a drink laced with LSD and when well under the influence of the drug he was subjected to interrogation using Artichoke techniques, probably a very unpleasant experience.
A week later Olson was staying in Room 1018A at the Hotel Statler in New York City under the supervision of a CIA doctor, Richard Lashbrook. The manager of the hotel, Armond Pastore, heard a thump outside and went out to find Olson dying on the pavement, having fallen from the 13th floor. The manager later found that a phone call had been made from Room 1018A to a number in Long Island and the caller had said only, "Olson's gone."
The CIA maintained that Olson had leapt through the closed window to his death. However, an autopsy conducted forty years later on the exhumed corpse revealed an injury to the skull most likely caused by a blow to the head and no evidence of any cuts to the body from broken glass. It seems that Olson, exactly as recommended in a CIA assassination manual, was struck on the head (possibly while drugged) and thrown from the window to his death thirteen floors below.
Olson was working at Fort Detrick during the Korean War and some have speculated that the U.S. developed germ weapons which it used against Korean and Chinese soldiers and civilians. If so then Olson would probably have known about this. The CIA believed that there was the risk that Olson would reveal what he knew about the activities of the CIA during the Korean war and about its brutal experiments in interrogation techniques, so he was murdered.
The fact that Frank Olson had died shortly after being given LSD in a CIA experiment came out in 1975 as a consequence of President Ford's Rockefeller Commission investigation into the CIA's domestic activities. Further investigation was called for, but in a White House memo advisers to President Ford stated that this would risk revealing state secrets (probably meaning, in part, the use by the U.S. of germ warfare in Korea); further investigation was suppressed and the whole matter covered up. The names of those White House advisers were Dick Cheney, current U.S. Vice-President, and Donald Rumsfeld, current Secretary of Defense. They have never been questioned as to what they knew about Olson's death.http://www.serendipity.li/cia/olson2.htm
http://www.google.com/#hl=en&q=gilead+sciences+tamiflu+rumsfeld&aq=f&oq=&aqi=&fp=azWfBBCvguAhttp://www.google.com/#hl=en&ei=J4eBSsCYIJaBtweHpvjVCg&sa=X&oi=spell&resnum=0&ct=result&cd=1&q=gilead+sciences+World+health+organization&spell=1&fp=azWfBBCvguAhttp://www.dailymail.co.uk/news/article-1205705/GMTV-host-Andrew-Castle-lost-daughter-swine-flu-drug.html
Frank Olson was an American citizen, born in 1910 and murdered in New York City in 1953 by the CIA. Here's an outline of the case:Fort Detrick is the U.S. Army's biowarfare facility, founded in 1943. Frank Olson was one of the first scientists to work there. From the final years of World War II through the Korean War and up to the present time scientists at Fort Detrick developed biological weapons including anthrax.
Following the end of World War II the U.S. conducted "Operation Paperclip", which scoured Germany for Nazi scientists who could be useful. It found some who had conducted experiments on prisoners in Dachau and other Nazi concentration camps, including one Kurt Blome. He was among the defendants in the Nuremberg War Trials, and would have been convicted and hanged but for American intervention. In return for agreeing to provide information to the Americans about his experiments in Dachau, and advice in the development of their own germ warfare program, an acquittal was arranged, and he escaped the gallows.
Frank Olson and Kurt Blome (who had become a protegé of the Americans) later met at Camp King in Germany in the early 1950s when Olson made several visits there to participate in "Operation Artichoke", in which the U.S. Army and the CIA experimented with the use of drugs (including LSD) in interrogation. Olson was present during brutal interrogations by the Americans of Soviet prisoners and suspected double agents, some of whom died under torture. Olson was deeply disturbed by what he had seen.
In the summer of 1953 Olson travelled again to Europe. In Berlin in August he witnessed several brutal interrogations involving torture and the use of drugs. On his return to the U.S. he confided to a friend and colleague at Fort Detrick, Norman Cournoyer, that he was disgusted with what the CIA was doing and was determined to leave.
In November 1953 Olson attended a meeting of a group of CIA agents at a country retreat where they discussed their work. Olson was suspected by the CIA of being a security risk. He was given a drink laced with LSD and when well under the influence of the drug he was subjected to interrogation using Artichoke techniques, probably a very unpleasant experience.
A week later Olson was staying in Room 1018A at the Hotel Statler in New York City under the supervision of a CIA doctor, Richard Lashbrook. The manager of the hotel, Armond Pastore, heard a thump outside and went out to find Olson dying on the pavement, having fallen from the 13th floor. The manager later found that a phone call had been made from Room 1018A to a number in Long Island and the caller had said only, "Olson's gone."
The CIA maintained that Olson had leapt through the closed window to his death. However, an autopsy conducted forty years later on the exhumed corpse revealed an injury to the skull most likely caused by a blow to the head and no evidence of any cuts to the body from broken glass. It seems that Olson, exactly as recommended in a CIA assassination manual, was struck on the head (possibly while drugged) and thrown from the window to his death thirteen floors below.
Olson was working at Fort Detrick during the Korean War and some have speculated that the U.S. developed germ weapons which it used against Korean and Chinese soldiers and civilians. If so then Olson would probably have known about this. The CIA believed that there was the risk that Olson would reveal what he knew about the activities of the CIA during the Korean war and about its brutal experiments in interrogation techniques, so he was murdered.
The fact that Frank Olson had died shortly after being given LSD in a CIA experiment came out in 1975 as a consequence of President Ford's Rockefeller Commission investigation into the CIA's domestic activities. Further investigation was called for, but in a White House memo advisers to President Ford stated that this would risk revealing state secrets (probably meaning, in part, the use by the U.S. of germ warfare in Korea); further investigation was suppressed and the whole matter covered up. The names of those White House advisers were Dick Cheney, current U.S. Vice-President, and Donald Rumsfeld, current Secretary of Defense. They have never been questioned as to what they knew about Olson's death.http://www.serendipity.li/cia/olson2.htm
I'm positing that Morgellon's is a fast mutating, Mycorrhial type fungi attempting to form a symbiotic relationship with humans. The key to thisprocess is to exist within the human body without causing harm and without alerting the immune system. No small feat. Ultimately the fungal systemwill exist as sort of a second nervous system. What is termed Morgellon's is primarily the erradication of fungal cells that for one reason oranother aren't working - i.e. damaging the person's body or activating the immune system. If a given sore is open and active (i.e. infected), ifsubmerged in isopropyl alcohol, the alcohol will draw the offending fungi from the sore - a black sinewy substance/strands. As I will explain later,this is not the only function of the sores.
There are other pointers... One of the many primary symptoms is a periodic, intense craving for sweets. This would align with providing thecarbohydrates the fungi needs (and receives from the relationship) for sustenance.
Mycorrhial fungi often will attract and kill springtails as a source of nitrogen - for itself and the plant. I believe it is this type of mechanismthat is occurring and attracting other organisms resulting in the confusing cross-infection appearance of Morgellon's. This is one of theadditional functions of the sores (i.e. the attraction of specific other organisms as nutrient sources). This process is a small portion of thevitamin/mineral absorption assistance the fungi will provide.
Also occurring at the sores is the alteration of RNA and subsequent DNA as a corrective response to the offending cells being eradicated from thesystem. I am not knowledgeable with regards to genetics and such or how such a mechanism might work. So I'm gonna skip faking it. However, thereare specific details regarding the sores' process that support them being a part of fungal development and production. (concentration is at apremium...)
Additional connections and evidence: basically the dysfunctional symptoms of Morgellon's (e.g. brain fog, various digestive, etc...) are the resultof improper fungal cells being introduced into that area of the body (brain, intestines, etc. respectively) and then corrected.
So the fungi are getting a stable existence out of the symbiosis, what are the people getting? Once the process is complete (up to 10 years) theperson will have enhanced water, vitamin, and mineral absorption, heightened intelligence, expanded perception (mild cross-dimensional and telepathiccommunicative abilities), strengthened immune response, extended life-expectancy, likely among others.
Brain is tired. Well, what do you think?
copyright & usage | |
| Click here for more ATS Skunk Works topics Hot Topics|Top Topics|This Week|Subscribe|Home | |
reply posted on 8-8-2008 @ 01:23 PM by prevenge | |
very interesting. see the 2012 link in my signature for some extra goodies. - | |
copyright & usage | |
reply posted on 8-8-2008 @ 03:14 PM by Kruel | |
Very interesting indeed. I'll be keeping tabs on this possibility. It seems more likely an explanation for morgellon's than a nanotech infection. If this is the case, then I hope a harmonious symbiotic relationship can be found between fungi and human biology. It may be quite an "upgrade",just as long as I don't have to deal with mushrooms sprouting from my skin! | |
copyright & usage | |
reply posted on 8-8-2008 @ 06:55 PM by verbal kint | |
reply to post by Kruel your comment about mushrooms sprouting from your skin reminded me of this:
| |
