Featured Posts (74)

Sort by

Dear Human Rights Watch

Dear Human Rights Watch:

CC: To whom it may concern

 

Please pay close attention to Amnesty International “ Briefing to UN Committee Against Torture, Canada” . Here is the copy of my letter to AI. Thank you very much.

 

Best regards,

Robin yan

 

Dear Amnesty International:

 

On behalf of myself, thank you for your “ Briefing to UN Committee Against Torture, Canada”  

http://www.amnesty.org/en/library/info/AMR20/004/2012/en

http://www.amnesty.org/en/library/asset/AMR20/004/2012/en/b46d9371-1b2c-414b-90e9-b97c3953cb48/amr200042012en.pdf ( Torture with Non Lethal Weapons, Page 30)

 

Here are two videos below to support your statement regarding torture with Non Lethal Weapons in Canada. Please read the explanations under these two videos. Thank you again.

Video 1:

First response to the Government of Canada after our tabled petition for a public inquiry into acts of torture with Non Lethal weapons ( mind control weapons)  was refused. The House of Commons of Canada stated: "The Government  has no information on any such activities."

https://www.youtube.com/watch?v=O3QpbrnCiAQ&feature=channel&list=UL

Video 2:

Torture and Crimes Against Humanity with Non Lethal Weapons, Heart Attack Guns, Noise Weapons

https://www.youtube.com/watch?v=yQo5sFwkpfo&feature=channel&list=UL

 

Best regards,

Robin yan

 

IEC@amnesty.org

secgen@amnesty.org

irene.khan@amnesty.org

 

 

 

Read more…

ACLU Sues U.S. for Information on Targeted Killing Program

Today we filed a lawsuit under the Freedom of Information Act to demand that the government release basic — and accurate — information about the government’s targeted killing program.

Our government’s deliberate and premeditated killing of American terrorism suspects raises profound questions that ought to be the subject of public debate. Unfortunately the Obama administration has released very little information about the practice — its official position is that the targeted killing program is a state secret — and some of the information it has released has been misleading.

Our suit overlaps with the one recently filed by The New York Times insofar as it seeks the legal memos on which the targeted killing program is based. But our suit is broader. We’re seeking, in addition to the legal memos, the government’s evidentiary basis for strikes that killed three Americans in Yemen in the fall of 2011. We’re also seeking information about the process by which the administration adds Americans to secret government “kill lists.” We think it’s crucial that the administration release the legal memos, but we don’t think the memos alone will allow the public to evaluate the lawfulness and wisdom of the program.

We know something about the fall 2011 strikes from media reports. On September 30, the CIA and the military’s Joint Special Operations Command (JSOC) jointly carried out the targeted killing of Anwar al-Awlaki, a U.S. citizen born in New Mexico, using missiles fired from unmanned drones in Yemen. A second U.S. citizen, Samir Khan, was killed in the same attack. Two weeks later, Anwar al-Awlaki’s son, Abdulrahman, a 16-year-old U.S. citizen born in Colorado, was killed in another U.S. drone strike elsewhere in Yemen. The administration has not adequately explained the legal basis for these strikes, and it has not explained the factual basis, either.

Soon after the fall 2011 strikes, we submitted a FOIA request to the CIA, Department of Defense, and Department of Justice (DOJ). Three months later, we have yet to receive a single document in response. Outrageously, the CIA and the DOJ Office of Legal Counsel responded by refusing to confirm or deny the existence or nonexistence of records responsive to our request. Essentially, these agencies are saying the targeted killing program is so secret that they can’t even acknowledge that it exists. More...

Read more…

The truth!

V2k broadcasters use spotlight audio(holosonics)by way of converting speech within the ultrasonic range amplified by linear sound.The spotlight audio converts audible sound into ultratones which disperse through the airwaves(using cb and other communication methods)picking up on all known recievers(including the fcc rule)dispersing them everywhere within our homes,these go undetected!let me mention that v2k suffers go through the exact same process as a legitimate mental patient only to be separated by triggering.Triggering is linear compressed speech exchanged with natural subconcious actions which are are amplified by your illness, further more by the ultra tone conversions which combine within you e.g breath.This is your very first subconcious action as a vowel is a letter between breaths , which combine with the perpitrators second person gramma(and your own gramma)as your thoughts now begin to project from within you to the point of sight.Sight is an important factor as it keeps there broadcast continuous by having the air inbetween you and what you see amplified by linear sound at the same time as amplifying there broadcast which now exchanges your vowels with there constonants (which are spelt by way of sight)combining sight(a subconcious action)with distance(solids).Triggering can now take place as the broadcaster plays commands and such likes using streams of words sentences without vowels as this reaches our minds on the nearest scale.Because we now hear on this level it goes undetected to everybody else ,and because of this the broadcaster can say anything live! on the top of triggers.Our thought projection of vowels and constinonts exchange with theres in the way of above mentioned.There are countless victims over a vast area giving way for fantasists to second guess what were thinking as we have no option but to hear. There broadcast is returned back to them by time and distance causing an echo which acts as a vibration which in turn attracts light from there lcd source, this will be visions in negative as this lighting attracts the subconcious mind .(black and white).We are now dealing with holosonics!

Read more…

Mind Control bioweapons and operation

I am a Bulgaria victim TI for + 2years and 1 years  monitored   bioweapons with satellite olso in  another countrys . The voices are synthetic telepathy and attached to AI (Artificial Intelligence). If you have the following symptons, they will be AI actors:


■Voices are the same persons/actors almost 24/7
■Voices often use repeated keywords and phrases
■Voices cannot follow logical arguments

But occasionally a human controller(s) will interact. They will try and test you to make you 'work' like a machine. They will upload scripts into your subconcious state and use voice commands when you are concious. If you can, try and take control of yourself when you notice any activity in your subconcious e.g. while you are sleeping, it is difficult, but I have been able to do it and interrupt and stop whatever they were doing, otherwise they interact with you sub-conciously on a friendly basis and your defences go down. The voices are enemies, they broke in and entered your mind without your consent; that is the way I look at it.


The AI actors are resident 'programs' in your mind. They are like 'client' software. There is a backend system that the AI actors interface (BCI - Brain Computer Interface), which is a supercomputer(s) running AI Core knowledge base, AI processes and databases. This backend is the 'server' software. So the AI Control System is client-server. If you notice the AI control system software on the supercomputer/server side, functions exactly like the human mind, just much bigger.


The Brain has been turned to their control by modelling it on a computer, using remote surgical maser knife. This might be a satellite with a maser (microwave beam burner/cutter). The surgery involves mutilating the brain, to create an operating system, that wires the human brain neuro processing centres with the neuro memory network and heart operasion -infarkt or some problem whit heart . I call this operating system AI BRAINWARE. A logical unit of human memory is a meme. The meme is just a closed circuit path of connected neurons. The fusion to create a connection between one or more neurons, is done by releasing a protein, probably PKMZeta. This is how the memory is physically created. Have you ever noticed a tickly liquid-flooding sensation in your brain while you sleep? Summary: neuro processing centres are wired to meme memory locations. The AI Brainware system, just loads scripts and expects the TI to execute them. The supervisor and jury programs are common applications that get uploaded, but can only work if the AI Brainware is installed. The AI use your knowledge base and report back to the AI control system at some point e.g. when you are non-active, sleeping. I believe that data is also uploaded to your brain via a datalink e.g. satellite and microwave carrier signal. The human data ports are the auditory and visual cortexes. I have experienced digital video, images and computer generated images-Exelon sistem
But go easy, because they control individuals/groups to harrass (gangstalk) or even murder TI's or many people.


I challenged myself to develop my own 'psychological devices' against the AI actors and have found it worked to a degree of success

Read more…

Keep the Ethical Light Burning

Keep the Ethical Light Burning

Lynn Weed, the President of KELB, a 501 C3 non-profit organization is involved in several projects to expose government sponsored covert crimes. Such projects included filing a lawsuit against the U.S. government, creating a safe house community, which include organic farming and developing and education campaign that informs the general public about these crimes.

Read more…

 

http://science.dodlive.mil/2010/09/01/remote-control-of-brain-activity-using-ultrasound/

 

Dr. William J. Tyler is an Assistant Professor in the School of Life Sciences at Arizona State University, is a co-founder and the CSO of SynSonix, Inc., and a member of the 2010 DARPA Young Faculty Award class.

Every single aspect of human sensation, perception, emotion, and behavior is regulated by brain activity. Thus, having the ability to stimulate brain function is a powerful technology.

Recent advances in neurotechnology have shown that brain stimulation is capable of treating neurological diseases and brain injury, as well as serving platforms around which brain-computer interfaces can be built for various purposes. Several limitations however still pose significant challenges to implementing traditional brain stimulation methods for treating diseases and controlling information processing in brain circuits.

For example, deep-brain stimulating (DBS) electrodes used to treat movement disorders such as Parkinson’s disease require neurosurgery in order to implant electrodes and batteries into patients. Transcranial magnetic stimulation (TMS) used to treat drug-resistant depression and other disorders do not require surgery, but have a low spatial resolution of approximately one centimeter and cannot stimulate deep brain circuits where many diseased circuits reside.

These illustrations show the surgical invasiveness of deep-brain stimulating electrodes (left) and depict the low spatial resolutions conferred by transcranial magnetic stimulation (right). (Image: Tyler Lab)

These illustrations show the surgical invasiveness of deep-brain stimulating electrodes (left) and depict the low spatial resolutions conferred by transcranial magnetic stimulation (right). (Image: Tyler Lab)

 To overcome the above limitations, my laboratory has engineered a novel technology which implements transcranial pulsed ultrasound to remotely and directly stimulate brain circuits without requiring surgery. Further, we have shown this ultrasonic neuromodulation approach confers a spatial resolution approximately five times greater than TMS and can exert its effects upon subcortical brain circuits deep within the brain.

A portion of our initial work has been supported by the U.S. Army Research, Development and Engineering Command (RDECOM) Army Research Laboratory (ARL) where we have been working to develop methods for encoding sensory data onto the cortex using pulsed ultrasound.

Through a recent grant made by the Defense Advanced Research Projects Agency (DARPA) Young Faculty Award Program, our research will begin undergoing the next phases of research and development aimed towards engineering future applications using this neurotechnology for our country’s warfighters. Here, we will continue exploring the influence of ultrasound on brain function and begin using transducer phased arrays to examine the influence of focused ultrasound on intact brain circuits. We will also be investigating the use of capacitive micromachined ultrasonic transducers (CMUTs) for use in brain stimulation. Finally, to improve upon spatial resolution, we will examine the use of acoustic metamaterials and hyperlenses to study how subdiffraction limited ultrasound influences brain wave activity patterns.

How can this technology be used to provide our nation’s Warfighters with strategic advantages? We have developed working and conceptual prototypes in which ballistic helmets can be fitted with ultrasound transducers and microcontroller devices to illustrate potential applications as shown below. We look forward to developing a close working relationship with DARPA and other Department of Defense and U.S. Intelligence Communities to bring some of these applications to fruition over the coming years depending on the most pressing needs of our country’s defense industries.

Above illustrations show a ballistic helmet fitted with four ultrasound transducers (left) and another functional prototype for achieving human brain stimulation using a single element transducer (bottom-right), as well as a list of potential applications relevant to the defense industry. (Image: Tyler Lab)

Above illustrations show a ballistic helmet fitted with four ultrasound transducers (left) and another functional prototype for achieving human brain stimulation using a single element transducer (bottom-right), as well as a list of potential applications relevant to the defense industry. (Image: Tyler Lab)

Read more…

 

Synthetic Telepathy,, Brain-Computer-Interaction, Mind Control whith nano implants

Moore on:  www.mindcontrol.se  and  www.cyberbrain.se

Scientists Successfully Implant Chip That Controls The Brain Allowing Thoughts, Memory And Behavior To Be Transferred From One Brain To Another Brain

Microcircuits The Interface between Neurons and Global Brain Function

Thoughts, Memory And Behavior To Be Transferred From One Brain ToAnother Brain Scientists Successfully Implant Chip That Controls The Brain Allowing Thoughts, Memory And Behavior To Be Transferred From One Brain ToAnother Brain

In a scene right out of a George Orwell novel, a team of scientists working in the fields of “neural engineering” and “Biomimetic MicroElectronic Systems” have successfully created a chip that controls the brain and can be used as a storage device for long-term memories. In studies the scientists have been able to record, download and transfer memories into other hosts with the same chip implanted. The advancement in technology brings the world one step closer to a global police state and the reality of absolute mind control.

brain eye neuron nano

More terrifying is the potential for implementation of what was only a science fiction fantasy – the “Thought Police” – where the government reads people’s memories and thoughts and then rehabilitate them through torture before they ever even commit a crime based on a statistical computer analysis showing people with certain types of thoughts are likely to commit a certain type of crime in the future.

We already pre-emptively invade nations and torture alleged terrorist suspects with absolutely no due process of law, so the idea of pre-emptively torturing a terrorist suspect before hand to prevent them from committing an act of terrorism in the future really isn’t that far fetched of an idea.

Perhaps a less sensational example, than those I just depicted out of own of Orwell’s famous dystopian novels would be using the technology as it is depicted the modern day Matrix movies, in which computer programs are uploaded into people’s brains allowing them to instantly learn how to perform a wide variety of tasks.

That is exactly the example that Smart Planet uses in their write-up on the USC press release.

 

Microcircuits The Interface between Neurons and Global Brain Function

-Synthetic Telepathy-

 

The experience of synthetic telepathy “Artificial Telepathy” is really not that extraordinary. It’s as simple as receiving a cell-phone call in one’s head.

Indeed, most of the technology involved is identical to that of cell-phone technology. Satellites link the sender and the receiver. A computer “multiplexer” routes the voice signal of the sender through microwave towers to a very specifically defined location or cell. The “receiver” is located and tracked with pinpoint accuracy, to within a few feet of actual location. But the receiver is not a cell phone. It’s a human brain.

posthuman_in_water

Out of nowhere, a voice suddenly blooms in the mind of the target. The human skull has no “firewall” and therefore cannot shut the voice out. The receiver can hear the sender’s verbal thoughts. The sender, in turn, can hear all of the target’s thoughts, exactly as if the target’s verbal thoughts had been spoken or broadcast. For this reason, the experience could be called “hearing voices” but is more properly described as synthetic telepathy “artificial telepathy”.

Now, if synthetic telepathy “artificial telepathy” were entirely voluntary, like a conversation between friends sitting across the world, it might be kind of fantastic. One could talk back and forth with one’s friend, exchanging verbal thoughts exactly as if speaking on the phone, but without ever using one’s voice or mouth. It’s a completely silent, subvocal form of speech. Between lovers, this would be beautiful.

The problem is that artificial telepathy provides the perfect weapon for mental torture and information theft. It provides an extremely powerful means for exploiting, harassing, controlling, and raping the mind of any person on earth. It opens the window to quasi-demonic possession of another person’s soul.

When used as a “nonlethal” weapons system it becomes an ideal means for neutralizing or discrediting a political opponent. Peace protestors, inconvenient journalists and the leaders of vocal opposition groups can be stunned into silence with this weapon…

 

mind control

Microcircuits The Interface between Neurons and Global Brain Function

 

Civilian, military and multidisciplinary brain experiments for developing synthetic (artificial) telepathy.

 

 

What is the pay off, for governments, to get the wiring diagram (blueprint) of the human brain?

 

What risks are scientists and governments prepared to take to “win” the ultimate race and challenge of mankind?

 

What consequences will this breakthrough/paradigm in science have for human integrity, identity, and autonomy?

 

How many human lives/families/children is the government prepared to sacrifice to compete in this emerging technology?

 

 

Sweden, europe, a so called democratic nation, is not capable of

 

  • maintaining human right conventions
  • avoid people being exposed to illegal research with brain-computer-interface avoid people being exposed to mind control experiments with brain-computer-interfaces
  • avoid many years of physical and psychological violence (torture) exercised through brain-computer-interface
  • avoid that patients are injected with bioelectronics implants, without informed consent, when visiting Swedish, european hospitals.

 

The government solves the problems with illegal research by using their institutions/gatekeepers to cover up for all horrible mistakes and research.

 

The institution of Psychiatry health care system, and their manual for mental disorder (DSM), acts as guards for the ever-increasing number of people who have their lives exterminated by illegal research with multimedia-brain techniques and never-ending-learning-systems.

 

The government itself says that they have no insight of abusing the research area brain-computer-interface for remote illegal data collecting from the human brain. The government doesn’t react to information about this topic, and written letters are not answered despite several reminders.

 

The future and emerging technology, to achieve a computer-brain, is far from being completed. Even if the research pace is extremely high and scientists develop faster than “Moores Law”, it still remains about 20 years before all necessary research on humans is done.

 

The perception of being a human will, when the brain’s neural code is copied to a computer, changed. Computer-brain interface and the new network technology will make the perception of self consciousness transparent. Man’s thoughts are no longer private.

 

mind control

The expertise must be enforced to admit that it is the same people who are responsible for both diagnosing mentally illness and implanting brain implants into people’s heads. And that they, by doing so, exterminate human lab rats for life-long copying procedures.

 

We, the people and the public media, have the right to be informed about the names of the scientists involved in this grotesque and illegal research instead of having more people killed.

 

Experimenting with brain implants to extract information about the brain has been going on in Sweden, europe, USA  for more than half a century.

 

Please help all victims to reveal facts in this topic before more victims are dying due to this illegal research area.

Mind Control,The Mind Uploading (reverse engineering the brain) – Targeted Individuals Europe


Not yet published research materials in interdisciplinary brain research and development of computer-brain interface must therefore be attributed to an unknown number of defenseless experimental subjects, many with families whose lives are destroyed in a wild orgy of computer abuse.This is to copy the cognitive behaviors and human perception in the development of quantum physics.Try The items have no options or informed consent, served as on-line research materials on aging.

 

Read more…

 

 

SATELLITE »MIND CONTROL« – BIOELECTRIC WEAPON

 

SOME INFORMATIONS

Moore on  www.cyberbrain.se

and  www.mindcontrol.se

“The events at the international political scene, in the last few years, confirm that the concept of remote control of human brain is a matter of negotiations. In January 1999 the European Parliament passed a resolution where it calls for an international convention introducing a global ban on all developments and deployments of weapons which might enable any form of manipulation of human beings.”

MIND CONTROL WEAPON

The term “Mind control” basically means covert attempts to influence the thoughts and behavior of human beings against their will (or without their knowledge), particularly when surveillance of an individual is used as an integral part of such influencing and the term “Psychotronic Torture” comes from psycho (of psychological) and electronic. This is actually a very sophisticated form of remote technological torture that slowly invalidates and incapacitates a person. These invisible and non-traceable technological assaults on human beings are done in order to destroy someone psychologically and physiologically. Actually, as par scientific resources, the human body, much like a computer, contains myriad data processors. They include, but are not limited to, the chemical-electrical activity of the brain, heart, and peripheral nervous system, the signals sent from the cortex region of the brain to other parts of our body, the tiny hair cells in the inner ear that process auditory signals, and the light-sensitive retina and cornea of the eye that process visual activity. We are on the threshold of an era in which these data processors of the human body may be manipulated or debilitated.

Definition of psychotronic (psycho-physical) weapons
Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means (techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden, forced influences on the psyche of a person for the purpose of modifying his onsciousness, behavior and health for what is desired in the way of influencing aspects of control…” This is not only dangerous, this is deadly!”

 

images-26hfrthfrh.jpg

The First phase is the harassment/surveillance program.
They use Echelon, Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs, homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family, friends. The isolation is needed to have access to the person to conduct many of the experiments on them.
The second phase is the assaults of Directed Energy Weapons.
After a victim becomes isolated from everyone in the world. The victim now having feelings of regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During this time many have been implanted with microchips. Many begin experiencing extreme pain to their head. Some hear voices. Then pain is delivered to various other parts of their bodies. The pain is delivered by Directed Energy Weapons.
Directed Energy Weapons.
Some of the weapons were known as non-lethal weapons. They use such weapons as extremely low frequency Elf electromagnetic weapons (which has been used in mind control), acoustics, harmonics (which have been used as a mind control technique), ultrasound, microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic energy beam can be used to induce “considerable agitation and muscular activity” or “induce muscular weakness and lethargy” this weapon is know as Ultra High Frequency EM. Psychological warfare tactics are being used against unsuspecting citizens to destroy their jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to utterly destroy a person, very often resulting in a person taking his or her own life, or ending up in a mental hospital. This has been taking place for years and nothing is ever said about it. Nothing is ever written about it. Some people also experience electronic harassment. This is extremely distressing, painful and invasive, and feels like one’s mind and body is undergoing constant rape, 24 hours a day, 7 days a week. The technology used to do this is unknown, but hundreds of victims report the same physical sensations and experiences. Many take their lives in an attempt to escape the horror. The technology involves the use of electromagnetic waves of various frequencies to achieve different results. Some frequencies will make a person tired, while others may cause confusion or memory loss. “Electronic harassment” or e-harassment is a catch-all term used to describe a group of circumstances which a large number of people are currently experiencing in common.

 

Saturday, Februar 19, 2011

matrix-1111.jpg

PSYCHOTRONIC WEAPONS  BRAIN MANIPULATION FROM A DISTANCE

In October 2010, the congressman Denis J. Kucinich introduced in the American Congress A bill, obliging the American president to get engaged in the negotiations aimed at the ban of space based weapons. In this bill the definition of a weapon system includes: any other unacknowledged or as yet undeveloped means inflicting death or injury on, od damaging or destroying, a person(or the biological life, bodily health, mental health, or physical and economic well-being of a person) through the use of land-based, sea-based,or space-based systems using radiation, electromagnetic, psychotronic, sonic, laser, or other energies directed at individual persons or targeted populations or the purpose of information war, mood management, or mind control of cush persons or populations. As in all legislative acts quoted in this article the bill counts with sound, light or electromagnetic stimulation of human brain.Psychotronic fweapons remain, at least for a layman uninformed of secret military research, in the sphere of science fiction, since so far none of the published scientific experiments was presented in the way which would allow for its replication.

That it is feasible to manipulate human behavior with the use of subliminal, either sound or visual, messages is now generally known. This is why in most of the countries the use of such technologies, without consent of the user, is banned. Devices using light for the stimulation of the brain show another way how the light flashing in certain frequencies could be used for the manipulation of human psychic life. As for the sound, a report on the device transmitting a beam of sound waves, which can hear only persons at whon the beam of sound waves is targeted, appeared last year in the world newspapers.

The beam is formed by a combination of sound and ultrasound waves which causes that a person targeted by this beam hears the sound inside of his head. Such a perception could easily convince the human being that it is mentally ill. The acts presented in this article suggest that with the develpment of technology and knowledge of the functioning of human brain new ways of manipulation of human mind keep emerging. One of them seem to be the electromagnetic energy.

neurons.jpgNeurons

 

BRAIN-MACHINE INTERFACE

Robert Asher, Sandia National Laboratories
June 2002,Arlington, Virginia

Increasingly, the human is being asked to take in multisensory inputs, to make near-instantaneous decisions on these inputs, and to apply control forces to multitask and control machines of various sorts. The multitasking, multisensor environment stresses the human, yet, more and more s/he being asked to operate in such an environment. As an example, the visionary project on uninhabited combat vehicles discusses an increased workload in piloting combat vehicles. DARPA has a brain-machine interface program about to start. This program has as its goal human ability to control complex entities by sending control actions without the delay for muscle activation. The major application for this program is control of aircraft. The intent is to take brain signals and use them in a control strategy and then to impart feedback signals back into the brain.

images-171.jpg

The DARPA program could be extended to include a broader range of potential impact by including the possibility of other applications: learning and training, automobile control, air traffic control, decision-making, remote sensing of stress, and entertainment. Learning and training might be implemented as information coded into brain signals and then input into the person. Air traffic control in increasingly busy skies can use such capability: the controller has multiple inputs from multiple aircraft. These can be input into his brain in a 3-D aspect and an alertness signal used to “wake him up” when his attention drifts beyond acceptable limits. Not only intellectual data might be passed from one person to another without speaking, but also emotional and volitional information.

warrior1.jpg

Decisionmaking may become more precise as emotional, fatigue, and other cognitive states can be appraised prior to making a critical decision. The potential impact on automobile safety is great. The driver can have quicker control of his automobile (Fig. E.15), allowing for safer driving while reducing the car-to-car spacing on congested highways. This would help alleviate highway congestion and the need for more highways. Furthermore, it would allow for safer driving as driver attention can be measured and the driver “alerted” or told in some manner to pay attention to his or her driving when attention wanders beyond safe margins. It can allow for detection of driver impairment so that the vehicle may be made either not to start or to call emergency.

Direct connection into the brain could yield a revolution in entertainment, as people may be “immersed,” MATRIX-style, into the midst of a movie or educational show. Can you imagine the impact of being immersed in a fully 3-D audio-visual simulation of the battle of Gettysburg?

Hands-off control of an automobile through a device for reading and implanting brain waves.

Role of Converging Technologies

Nano. The brain-machine interface effort will require nanotechnologies in order to make the required experimental measurements and to implement the devices for both receiving brain electromagnetic signals and transmitting signals back into the brain.

Bio. This is a highly biological, neuroscience effort, which requires detailed understanding and measurements of the brain’s electromagnetic activity. It requires a significant measurement protocol.

Cogno. This effort by its very nature will directly affect the cognitive aspects of the individual by externally applied electromagnetic fields by implanting information for the individual. Thus, this effort can lead to increased learning and other cognitive results.

Transforming Strategy to Reach the Vision

To achieve these goals, enter a partnership with DARPA to fund additional technologies and applications that would enhance the brain-machine interface effort. Work should be focused on the goals of using the technologies for cognitional aspects, understanding memory, and learning brain function to be able to design devices to increase their capabilities.

Estimated Implications

This effort would yield a technological revolution, in applications from computers to entertainment. It would give the United States a global competitive advantage while yielding solutions to specific domestic problems such as air traffic control and highway safety in increasingly crowded environments. It will revolutionize education. This effort will yield devices that may be applied to a number of activities and be sufficiently small as to be wearable in a car or at home.

EUROPA – TARGETED INDIVIDUALS

minieu.png

186240_100002366850591_281572_n.jpg

The human mind has never been a simple project. Because of its complexity and plasticity, it has yet not been completely understood. Under the dark ages of brain research, scientists have nevertheless learned how to stimulate and partially control the human brain’s responses. At any time it has been done, it has caused pain and suffering for the owner of the brain: the human subject.

Backed up by the “best” scientists, sponsored by the military and the secret service, thousands of individuals have their lives destroyed in the quest of developing technologies that are not science fiction anymore.

The human brain, is seen as a computer where information can be downloaded and from where information can be uploaded. Cloning the individual’s brain and nervous system is the only hope today’s scientists have to understand the human brain and develop advanced artificial intelligence and synthetic telepathy, allowing people to communication by thought, not speech. The European and World countries governments, faced with this “challenge” are unable to protect their citizens against the greatest possible violations of their human rights. There are no excuses whatsoever for researchers to destroy people’s and entire families lives. Under the secrecy of “national security”, they violate human rights conventions and every universal human right a human being is born with, going deep into the very consciousness of the person that is affected.

Many human rights campaigners from around the world have spent years working on countless books, videos, websites, rallies and symposiums which highlight these matters. These include efforts by prominent persons like Dr Nick Begich, Dr Rauni Kilde (ex chief medical officer for Finland) and well known author Gloria Naylor. To date, all of it has been ignored by the criminally owned/controlled media. However, most importantly, there has been open condemnation of these methods by major political entities and I ask you to focus on these…

1. The United Nations – UNIDIR – (The UN Institute for Disarmament Research) officially recognised a range of weapons (both lethal and non-lethal), including the ones previously listed, and recommended that they ALL be banned as weapons of potential mass destruction. Naturally, the press releases and media guides that they issued on this matter were totally ignored by the mainstream media. This media treachery is the reason the public is unaware of the dangers.

2. The European Parliament – In January 1999, the European Parliament passed a resolution where it calls ” for an international convention introducing a global ban on all development and deployment of weapons which might enable any form of manipulation of human beings. It is our conviction that this ban can not be implemented without the global pressure of the informed general public on the governments. Our major objective is to get across to the general public the real threat which these weapons represent for human rights and democracy and to apply pressure on the governments and parliaments around the world to enact legislature which would prohibit the use of these devices to both government and private organisations as well as individuals.” (Plenary Sessions/ EuroParliament, 1999)

3. US Federal politician Dennis Kucinich – In October 2001, Congressman Dennis J. Kucinich introduced a bill to the House of Representatives which, it was hoped would be extremely important in the fight to expose and stop psycho-electronic mind control experimentation on involuntary, non-consensual citizens. The Bill was referred to the Committee on Science, and in addition to the Committee on Armed Services and International Relations. In the original bill a ban was sought on ‘exotic weapons’ including electronic, psychotronic or information weapons, chemtrails, particle beams, plasmas, electromagnetic radiation, extremely low frequency (ELF) or ultra low frequency (ULF) energy radiation, or mind control technologies. Despite the inclusion of a prohibition of the basing of weapons in space, and the use of weapons to destroy objects or damage objects in space, there is no mention in the revised bill of any of the aforementioned mind-invasive weaponry, nor of the use of satellite or radar or other energy based technology for deploying or developing technology designed for deployment against the minds of human beings. [the original Bill was called The Space Preservation Act, 2001 (HR 2977) it was reintroduced as The Space Preservation Act, 2002 (HR 3616 )]. Kucinich’s efforts mirrored similar attempts made some years earlier by ex astronaut, Sen. John Glenn.

4. US Federal politician Jim Guest - recently wrote to all members of the US legislature asking for help for the countless victims of electronic harassment/torture (agency black operations being secreted from congressional scrutiny thus allowing corrupt officers to frame/torture innocents). To date, nothing concrete has come of this approach.

5. French National Bioethics Committee – In January 1998, an annual public meeting of the French National Bioethics Committee was held in Paris. Its chairman, Jean-Pierre Changeux, a neuroscientist at the Institut Pasteur in Paris, told the meeting that “advances in cerebral imaging make the scope for invasion of privacy immense. Although the equipment needed is still highly specialized, it will become commonplace and capable of being used at a distance. That will open the way for abuses such as invasion of personal liberty, control of behaviour and brainwashing. These are far from being science-fiction concerns.and constitute “a serious risk to society.” (“Nature.” Vol 391, 1998)

satelit.jpg

SATELLITE SPIES – THE SHOCKING TRUTH

TECHNOLOGY
ACTUAL CRIMINAL USE
POTENTIAL GOOD USE
ECHELON SATELLITES
satellite/computer monitoring of all telecommunications worldwide) To intercept conversations, emails etc. To steal ideas and harass targets (writers, whistleblowers etc).To monitor and stop terrorists and other criminals
AUDIO-VISUAL SATELLITES
(Allowing 24/7 surveillance of anyone, even in their homes) To gather blackmail-friendly material; to oppress targets and other citizens; to feed results to media/political criminals.To monitor and stop terrorists and other criminals
INTERACTIVE TRANSECTOR DEVICE (Sat-based – Pat US #4893815
16-1-90 L. Rowan. To spy on political targets etc by finding, locking onto and tracking those victims so as to terrorise/torture them To monitor and stop terrorists and other criminals
METHODS OF ALTERING CONSCIOUSNESS
(Sat-based – Pat US #5123899, 23/6/92 J. Gall + Pat US #5289438, 22/2/94 J. Gall) To alter targets moods by stimulating the brain to exhibit certain rhythms (angry, sad, sleepy etc); EEG cloning/feedback To help the emotionally distressed
BRAIN WAVE ANALYSERS (Remote neural monitoring & electronic brain linking, via sat – Pat US #6011991, 1/4/00
A. Mardirossian) To read the minds of targets; to rob, rape, terrorise and oppress completely yet covertly. Experiments in mind control, AI & cloning are also carried out To help interrogate criminals
NEUROPHONES
(Sat-based – Pat US #3393279 16/7/68 P. Flanagan + Pat US #3647970 7/3/72 P. Flanagan) To make the target hear voices via the laser/MW/R.wave direction of sound that’s been converted to electrical impulse to go straight to the targets brain To communicate with the deaf, stroke victims etc
NOTE: Alone, or in conjunction with subliminal and visual technologies, as well as role playing etc, these technologies can be used for trickery including apparent schizophrenic episodes, paranormal or “alien” encounters and much more.

Matrix.jpg

DIRECTED ENERGY PROFESSIONAL SOCIETY

These Directed Energy (DE) internships are concerned with the research, development and testing of high energy laser and high power microwave components, systems and effects at Federal laboratories and universities at sites around the country. Most of these positions are made possible by funding from the High Energy Laser Joint Technology Office.
Internship Qualifications
These paid summer internship positions are available for currently enrolled undergraduate and graduate students at U.S. colleges and universities. Positions are open to U.S. citizens only. The disciplines include but are not limited to these:

brain-trap-33.jpg

• science – physics, chemistry
• engineering – electrical, optical, chemical, mechanical, and materials
• mathematics and computer science

Position Descriptions
Generally, interns will work for the summer in a laboratory or university under the tutelage of full time researchers. Work may include experimental, theoretical, or computer modeling and simulation, depending on the position. Specific work assignments, hours and pay will vary.
Organizations
The organizations below are expected to offer these internships in 2012. Advertising for open positions will begin in December 2011.

• 711 Human Performance Wing – Texas

• Air Force Institute of Technology – Ohio

• Air Force Research Laboratory – Hawaii, New Mexico

• Army Research Laboratory- Maryland

• Naval Postgraduate School – California

• Naval Research Laboratory (satellite) – Washington, D.C., Florida

• US Army Space and Missile Defense Command – Alabama

INTERMITTENT VORTICITY, POWER SPECTRAL
SCALING AND DYNAMICAL MEASURES ON RESTING
BRAIN MAGNETIC FIELD FLUCTUATIONS

A Pilot Study
Arnold J. Mandell, Karen A. Selz, Tom Holroyd, Linsay Rutter
and Richard Coppola

NIMH Core MEG Laboratory and Cielo Institute
Supported in part by the Fetzer-Franklin Trust, DARPA
(Microelectronics) and the Space and Naval Warfare Center

matrix-111.jpg

The Eyes Closed, Resting Record

The time dynamics of global brain electromagnetic field activity, recorded in humans as continuous, eyes closed resting MEG (and EEG) records, are regarded by some as reflections of physiologically and psychologically relevant, emergent macroscopic behavior of nonlinearly coupled, cooperative brain systems (Basar et al., 1983; Bucolo et al., 2003; Chen et al., 2003; Friedrich et al., 1989; Haken, 2 1996; Mandell, 1983a). Others, more involved in neuronal current source localization studies of task or state-related magneto-encephalographic records (Cornwell et al., 2008; Fife et al., 2002; Garolera et al., 2007; Nolte et al., 2004) have treated the globally distributed, spontaneous neuronal current generated, brain magnetic field activity as “…high-ranked (leading eigenvalued) background activity… interfering magnetic fields generated from (not relevant) spontaneous brain activities…intrinsic brain noise…” (Sekihara et al., 1996; Sekihara et al., 2008; Sekihara et al., 2006). Covariance matrix-derived beamformers from several minutes of the eyes-closed resting record have been used in “prewhitening techniques”, adding noise in order to get around linear dependency in the matrix if it is too low dimensional and to minimize interfering low dimensional intrinsic brain magnetic field noise (Sekihara et al., 2008; Zumer et al., 2007; Zumer et al., 2008).

Another view of spontaneous magnetic field fluctuations have been
influenced by studies of spatial (neuroanatomical) brain localization using concomitant fMRI techniques. They have suggested the existence of spontaneous, regional, above baseline activity in the normal eyes closed, resting state. This activity is particularly pronounced in medial
prefrontal, parietal and both posterior and anterior cingulate, and is suppressed during goal-directed behavior (Damoiseaus et al., 2006; Griecius et al., 2003; Gusnard & Raichle, 3 2001). Activity in this “network” has been labeled “default activation” by Raichle (Raichle ME et al., 2001). The many second time scale of fMRI imaging demonstrated density variations that were characteristic for the normal eyes closed, resting condition (Biswal et al., 1995). Importantly, the spontaneous activity in the resting state also appears to involve neural network activity across several time scales (Honey et al., 2007).

In two state, task-no task, experimental designs, the resting activity, “default activation, ” has been speculated to reflect spontaneous, task unrelated, images and thoughts (Greicius & Menon, 2004; Greicius et al., 2004; Raichle ME et al., 2001; Vincent et al., 2007).
These transient mental events in the eyes closed, resting condition have also been called “daydreaming” (Singer, 1966 ), “task-unrelated-thoughts,” TUTs(Giambra, 1989), “unrest at rest”(Buckner & Vincent, 2007), “wandering minds,” and “stimulus independent thought”, SITs (Gilbert et al., 2007). Psychologists that have studied inner life subjectively, William James (James, 1902) and Sigmund Freud (Freud, 1914/1955 among many others, have focused on these autonomously arising transient streams of free associations and imagery. James analogized them to the turbulent eddies of the hydrodynamic flow of consciousness which he believed these transients to be among the universal properties of the conscious human brain. Examinations of a subject’s spontaneous 4 internal activity as exteriorized by the psychoanalytic instruction, “…say everything that comes to your mind…” has been central to the practice of psychoanalysis for over a Century {Fenichel, 1945 #8190). It appears that the ostensibly resting “default brain activity” in the “default network” persists in monkeys through anesthesia-induced changes in states of consciousness (Vincent et al., 2007). This result is consistent with a several decade history of research using priming, evoked potentials and task recovery paradigms to demonstrate implicit, working memorial events that occur during even surgical anesthesia (Jordon et al., 2000). The implied relationship between 2-5 second epochs of MEG activation such as that seen below in Fig. 5 as intermittent helical vortices (we call them strudels) and TUT or SIT-like subjective phenomena must remain entirely speculative.

images-13.jpg

General Premise and Hypothesis
It is the underlying premise of this pilot study of intrinsic brain magnetic field fluctuations that they manifest signatory patterns in transformations and measures which can discriminate among global brain states. We examine this premise by partially isolating and qualitatively and quantitatively characterizing 12.5, 54, 180 or 240 seconds of eyes closed, resting spontaneous magnetic field activity in ten resting controls and ten medicated schizophrenic probands. From our previous 5 work in brain-related physiological systems (Mandell, 1979; Mandell, 1983b; Mandell, 1987; Mandell et al., 1982; Mandell & Selz, 1993), a more specific hypothesis is suggested:

Compared with controls, magnetic field fluctuations in schizophrenic patients will demonstrate relatively higher values for indices of emergent dynamical structure and relatively lower values for a variety of measures reflecting the dynamical entropy “used up” in their formation (Mandell & Selz, 1997c; Selz & Mandell, 1991; Selz et al., 1995; Smotherman et al., 1996).

A MEG Derived Data Series: Symmetric Sensor Difference Sequences, ssds(i)
Ten normal controls and ten age- and sex-matched schizophrenic proband subjects (see Subjects below) were studied in the National Institutes of Mental Health’s Core MEG Laboratory in Bethesda, MD. A 275 channel, superconducting quantum interference device (SQUID radial gradiometer system from CTF Systems Inc. Port Coquitlam, BC, Canada (Anninos et al., 1986; Cohen, 1972; Rutter et al., 2009; Weinberg et al., 1984) was used in data collection (see Magnetoencephalographic Data Collection below).

6 Our approach to MEG-derived signals abrogates source orientation localization and inverse problem tools such as leadfield matrices (Dale & Sereno, 1993; Hamalainen et al., 1993), adaptive synthetic aperture magnetometer, SAM, beamformer techniques, or projection onto Talairached MRI image reconstructed volumes (Dalal et al., 2008; Dalal et al., 2004). For these approaches to this data set, see Rutter et al (Rutter et al., 2009). In their study of spontaneous activity in the eyes closed, resting state, they found a statistically significant decrement in the amplitudes of MEG recorded posterior regional gamma (30-70Hz+) activity in schizophrenic patients compared with normal controls (Rutter et al., 2009). In that study as well as these, a high pass, 0.6 Hz, as well as 60, 120, 180 and 240 Hz notch filters were routinely applied to the individual sensor records before the computation of the sensor pair ssds(i), (the difference between the two sensor). It is our presupposition that the “…spontaneous activity… all over the brain…” (Sekihara et al., 2008) reflects global and neurophysiologically meaningful patterns of complex neuronal activity-generated magnetic field fluctuations in interaction with MEG SQUID sensors (Barone A & G., 1982; Braiman & Wiesenfeld, 1994). A magnetic flux applied to the SQUID magnetometer, gives rise to a circulating current, which in turn modulates the inductance of the autonomously oscillatory Josephson junctions (Landberg et al., 1966; Levi et al., 1977). The great sensitivity of the SQUID devices permits measuring changes in magnetic field associated with even a single flux quantum.

7 If a constant biasing current is maintained in the SQUID device, it is the voltage which is modulated by changes in phase at junctions. Phase at Josephson junctions is sensitive to the quanta of magnetic flux. We dismiss a common generalization of many MEG practitioners that most or all local polarities of the intrinsic magnetic field noise “cancel out.” In the context of the somewhat analogous magnetic dynamo problem: “…given a flow in a conducting fluid, will a small seed magnetic field amplify exponentially with time…” (Finn & Ott, 1988)–we show below that ssds(i)s do– it was argued that the magnetic flux loops nonuniformly stretch and fold into themselves manifesting only partial cancellation and diffuse fine scale oscillations, in a process which can be quantified by a fractional cancellation exponent (Ott et al., 1992) and measures made on temporal-spatial intermittency.

In addition, if some currents run parallel to magnetic fields, which is expected to be the case with poorly localized, multiple neocortical neuronal sources, the magnetic field lines may follow a variety of dynamical shapes in which the magnetic pressure gradient is balanced by the magnetic tension. For example, there may not be any Lorentz force, J x B = 0, leading to a measurable field configuration without any net electrical current at all. We thus don’t infer a particular neuronal current source (or event) for the data series. Characterizing the fluctuations allows the elucidation of patterns in the brain’s global magnetic field flux dynamics without reference to anatomical location (Clarke, 1994).

8 example, we find a common dynamical pattern often involves intermittently appearing, multiple time scale helical vortices. We call them unwindable strudels lest they lead to the brain being called a critically loaded sand pile that spawns avalanches (Beggs & Plenz, 2005; Levina et al., 2007)). In comparison with the several second time resolution of fMRI, the MEG’s superior temporal resolution, ~ 1 ms, combined with its “underdetermined” weaknesses with respect to specific brain localization when used alone (Hamalainen et al., 1993; Im et al., 2005; Lee et al., 2007; Sarvas, 1987; Uutela et al., 1998), suited our goal of characterizing magnetic field (rather than inferred neuronal) properties of what has been called intrinsic physiological brain noise (Nagarajan et al., 2006; Sekihara et al., 1997; Sekihara et al., 2005). The use of ssds(i) exploits the hemispheric symmetry of the human brain (Geschwind, 1970) and serves several purposes:
(1) It imposes a natural gauge (distance serves as a traveling, local normalization procedure; (3) The ssdi(i) reduces the penetrance of electromagnetic field correlates of blink, cough, and movement as well as the cardiac and respiratory artifacts that both symmetric sensors generally share; (4) Using ssds(i) instead of the raw MEG time series tends to cancel the symmetrically shared generic MEG (and EEG) Δ, Θ, α, β, and γ modes, as well as other patterns of bihemispheric covariance; (5) Advantageous from the magnetic field point of view is the fact that using ssds(i) makes issues of 9 neuronal current source location moot; ; the spatial sensitivity profile of the ssds(i) considered as a virtual sensor typically covers a large volume of the brain. The techniques similar to that used here of paired sensor difference series, ssds(i), have been used to reduce or remove the mean and double or more the higher moments in analyses of nonstationary neural membrane conductance noise

(Conti et al., 1980; DeFelice, 1977; Sigworth, 1981).

naval.jpg

NAVAL – research laboratory experiments (NRL) Florida

DARPA FUTURE – HISTORICAL

Behavior PROTECTING HUMAN ASSETS Bio-Silico Interface

Brain technology ENHANCED HUMAN PERFORMANCE Energy transduction

Cell & Tissu ENHANCED SYSTEM PERFORMAMCE Geonomisc &
Engieneering Proteomics

Pentagon report investigated lasers
that put voices in your head
February 18, 2008
by Lisa Zyga

synthetictelepathy2-1024x727.jpg

A recently unclassified report from the Pentagon from 1998 has revealed an investigation into using laser beams for a few intriguing potential methods of non-lethal torture.Some of the applications the report investigated include putting voices in people’s heads, using lasers to trigger uncontrolled neuron firing, and slowly heating the human body to a point of feverish confusion – all from hundreds of meters away.

A US citizen requested access to the document, entitled “Bioeffects of Selected Non-Lethal Weapons,” under the Freedom of Information Act a little over a year ago. There is no evidence that any of the technologies mentioned in the 10-year-old report have been developed since the time it was written
The report explained several types of non-lethal laser applications, including microwave hearing, disrupted neural control, and microwave heating. For the first type, short pulses of RF energy (2450 MHz) can generate a pressure wave in solids and liquids. When exposed to pulsed RF energy, humans experience the immediate sensation of “microwave hearing” – sounds that may include buzzing, ticking, hissing, or knocking that originate within the head. Studies with guinea pigs and cats suggest that the mechanism responsible for the phenomenon is thermoelastic expansion.
Exposure to the RF pulses doesn´t cause any permanent effects, as all effects cease almost immediately after exposure ceases.

As the report explains, tuning microwave hearing could enable communicating with individuals from a distance of up to several hundred meters.
The report explains:

The phenomenon is tunable in that the characteristic sounds and intensities of those sounds depend on the characteristics of the RF energy as delivered… Because the frequency of the sound heard is dependent on the pulse characteristics of the RF energy, it seems possible that this technology could be developed to the point where words could be transmitted to be heard like the spoken word, except that it could only be heard within a person´s head.

In one experiment, communication of the words from one to ten using ´speech modulated´ microwave energy was successfully demonstrated. Microphones next to the person experiencing the voice could not pick up these sounds. Additional development of this would open up a wide range of possibilities.” The report predicts that communicating at longer distances would be possible with larger equipment, while shorter range signals could be generated with portable equipment. Putting voices in people´s heads could cause what the report calls “psychologically devastating” effects. The technology might even allow for communicating with an individual hostage surrounded by captors, although this would require “extreme directional specificity. With another weapon, electromagnetic pulses could be used to disrupt the brain´s functioning, although this technology was still in the theoretical stages at the time.

Brain-Control.jpg

Under normal conditions, all brain structures function with specific rhythmic activity depending on incoming sensory information.
Sometimes, the brain synchronizes neuronal activity in order to focus on a specific task, but the degree of neuronal synchronization is highly controlled. However, under certain conditions (such as physical stress or heat stroke), more areas of the brain can fire in a highly synchronized manner, and may begin firing uncontrollably. The report describes a method for replicating this highly synchronized neuron firing across distances of several hundred meters. High-voltage (100 kV/m) electromagnetic pulses lasting for one nanosecond could trigger neurons to fire, disrupting the body´s controlled firing activity. Short-term effects may include loss of consciousness, muscle spasms, muscle weakness, and seizures lasting for a couple minutes. These high-voltage pulsed sources, which would require an estimated frequency of 15 Hz, exist today.

Another form of non-lethal torture described in the report is microwave heating. By raising the temperature of the body to 41°C (105.8°F), humans can experience sensations such as memory loss and disorientation, and exhibit reduced aggression. According to the report, humans can survive temperatures up to 42°C (107.6°F), at which time prolonged exposure can result in permanent brain damage or death. The microwave heating technique was tested on a Rhesus monkey, where a 225 MHz beam caused an increase in the animal´s body temperature.

Depending on the dosage level, the temperature increase occurred within a time of 15 to 30 minutes. After the beam was removed, the animal´s body temperature decreased back to normal.

The report suggests the technique could be useful for controlling crowds or in negotiations. While the investigations reveal intriguing techniques for non-lethal torture, the report does not mention plans for carrying out specific experiments or studies in the future.

Vaccine Implants

Implants are now smaller than a hair’s width and are injected with vaccine and flu shots. Millions have had this done unknowingly. These ‘biochips’ circulate in the bloodstream and lodge in the brain, enabling the victims to hear ‘voices’ via the implant.

Fluoride and selenium enable people to ‘hear voices’. ELF waves create disturbances in the biological processes of the body and these can be activated in the population once the diseases are introduced into the body from the chemtrails. Fluoride disables the willpower section of the brain, impairing the left occipital lobe.Some chemtrails have been analyzed and shown to be creating cleavages in spacial perceptions, blocking the interaction of various amino-acids that relate to higher-consciousness and to increase dopamine in the brain producing a listless, spaced-out state of lower reactive mind.

PENTAGON – Flu Vaccine Use to Modify Human Behavior

The Pentagon currently wants to “realistically replicate human behavior and frailties” to improve cyberwarfare tactics.The human brain is one of the most complex organs known to man. To successfully model human populations it is vital that the computer models can successfully account for how an individuals brain would respond in specific situations in a sensory environment.

images-16.jpg

DARPA – nanotechnology

con1b.jpg

1.Military Defense Robotics

Machines Will Rise: Becoming Self Aware
The Department of Defense is building robots for the Pentagon. It has been seen as a move that could advance AI research and move the Defense robotics industry into the New Age. As viewed in our Exoskeleton section one of the leading manufactures in the exoskeleton arena is a company called Cyberdyne Technologies. Industry experts are already predicting that when the soldier steps out of this unit the exoskeleton will be able to operate autonomously.

images-15.jpg

2.NANO SOLDIERS

A New Industrial Revolution
In January 2000, U.S. President Bill Clinton requested a $227-million increase in the government’s investment in nanotechnology research and development, which included a major initiative called the National Nanotechnology Initiative (NNI). This initiative nearly doubled America ‘s 2000 budget investment in nanotechnology, bringing the total invested in nanotechnology to $497 million for the 2001 national budget. In a written statement, White House officials said that “nanotechnology is the new frontier and its potential impact is compelling.” About 70 percent of the new nanotechnology funding will go to university research efforts, which will help meet the demand for workers with nanoscale science and engineering skills. The initiative will also fund the projects of several governmental agencies, including the National Science Foundation , the Department of Defense , the Department of Energy , the National Institutes of Health , NASA and the National Institute of Standards and Technology. Much of the research will take more than 20 years to complete, but the process itself could touch off a new industrial revolution. Nanotechnology is likely to change the way almost everything, including medicine, computers and cars, are designed and constructed. Nanotechnology is anywhere from five to 15 years in the future, and we won’t see dramatic changes in our world right away.

Brain-gate.jpg

A Short History of Nanotechnology

1959
Feynman gives after-dinner talk describing molecular machines building with atomic precision
1974
Taniguchi uses term “nano-technology” in paper on ion-sputter machining
1977
Drexler originates molecular nanotechnology concepts at MIT
1981
First technical paper on molecular engineering to build with atomic precision STM invented
1985
Buckyball discovered
1986
First book published
AFM invented
First organization formed
1987
First protein engineered
First university symposium
1988
First university course
1989
IBM logo spelled in individual atoms
First national conference
1990
First nanotechnology journal
Japan’s STA begins funding nanotech projects
1991
Japan”s MITI announces bottom-up “atom factory”
IBM endorses bottom-up path
Japan’s MITI commits $200 million
Carbon nanotube discovered
1992
First textbook published
First Congressional testimony
1993
First Feynman Prize in Nanotechnology awarded for modeling a hydrogen abstraction tool useful in nanotechnology
First coverage of nanotech from White House
“Engines of Creation” book given to Rice administration, stimulating first university nanotech center
1994
Nanosystems textbook used in first university course
US Science Advisor advocates nanotechnology
1995
First think tank report
First industry analysis of military applications
Feynman Prize in Nanotechnology awarded for synthesis of complex three-dimensional structures with DNA molecules
1996
$250,000 Feynman Grand Prize announced
First European conference
NASA begins work in computational nanotech
First nanobio conference
1997
First company founded: Zyvex
First design of nanorobotic system
Feynman Prize in Nanotechnology awarded for work in computational nanotechnology and using scanning probe microscopes to manipulate molecules
1998
First NSF forum, held in conjunction with Foresight Conference
First DNA-based nanomechanical device
Feynman Prize in Nanotechnology awarded for computational modeling of molecular tools for atomically-precise chemical reactions and for building molecular structures through the use of self-organization
1999
First Nanomedicine book published
First safety guidelines
Congressional hearings on proposed National Nanotechnology Initiative
Feynman Prize in Nanotechnology awarded for development of carbon nanotubes for potential computing device applications and for modeling the operation of molecular machine designs

2000
President Clinton announces U.S. National Nanotechnology Initiative
First state research initiative: $100 million in California
Feynman Prize in Nanotechnology awarded for computational materials science for nanostructures and for building a molecular switch
2001
First report on nanotech industry
U.S. announces first center for military applications
Feynman Prize in Nanotechnology awarded for theory of nanometer-scale electronic devices and for synthesis and characterization of carbon nanotubes and nanowires
 

fgn.jpg

2002
First nanotech industry conference
Regional nanotech efforts multiply
Feynman Prize in Nanotechnology awarded for using DNA to enable the self-assembly of new structures and for advancing our ability to model molecular machine systems
2003
Congressional hearings on societal implications
Call for balancing NNI research portfolio
Drexler/Smalley debate is published in Chemical & Engineering News
Feynman Prize in Nanotechnology awarded for modeling the molecular and electronic structures of new materials and for integrating single molecule biological motors with nano-scale silicon devices
2004
First policy conference on advanced nanotech
First center for nanomechanical systems
Feynman Prize in Nanotechnology awarded for designing stable protein structures and for constructing a novel enzyme with an altered function
2005
At Nanoethics meeting, Roco announces nanomachine/nanosystem project count has reached 300 Feynman Prize in Nanotechnology awarded for for designing a wide variety of single molecular functional nanomachines and for synthesizing macromolecules of intermediate sizes with designed shapes and functions
2006
National Academies nanotechnology report calls for experimentation toward molecular manufacturing
Feynman Prize in Nanotechnology awarded for work in molecular computation and algorithmic self-assembly, and for producing complex two-dimensional arrays of DNA nanostructures

2007
Feynman Prize in Nanotechnology awarded for construction of molecular machine systems that function in the realm of Brownian motion, and molecular machines based upon two-state mechanically interlocked compounds
2008
Technology Roadmap for Productive Nanosystems released
Protein catalysts designed for non-natural chemical reactions
Feynman Prize in Nanotechnology awarded for work in molecular electronics and the synthesis of molecular motors and nanocars, and for theoretical contributions to nanofabrication and sensing
2009
An improved walking DNA nanorobot
Structural DNA nanotechnology arrays devices to capture molecular building blocks Design ‘from scratch’ of a small protein that performed the function performed by natural globin proteins Organizing functional components on addressable DNA scaffolds Feynman Prize in Nanotechnology awarded for experimental demonstrations of mechanosynthesis using AFM to manipulate single atoms, and for computational analysis of molecular tools to build complex molecular structures
2010
DNA-based ‘robotic’ assembly begins
Feynman Prize in Nanotechnology awarded for work in single atom manipulations and atomic switches, and for development of quantum mechanical methods for theoretical predictions of molecules and solids
2011
First programmable nanowire circuits for nanoprocessors
DNA molecular robots learn to walk in any direction along a branched track
Mechanical manipulation of silicon dimers on a silicon surface

Military Nanotechnology
Dangers, Preventive Arms Control, and
Challenges to the International System
Jürgen Altmann
Experimentelle Physik III Universität Dortmund Germany Conference Understanding Complex Systems University of Illinois, Champaign-Urbana IL, USA 15-18May-2006

NSTC, USA, 1999
1. Nanotechnology(NT)
Analysis and engineering of systems atnanometres(10-9m) size range: between about 0,1nm(atom) and several 100nm(larger molecule).

2.MolecularNanotechnology
Mechanosynthesis: molecular machine takes atoms/molecules from surroundings, fits mechanically together and lets bonds work
Concepts Associated with MolecularNT
– Mobile nano-robots
– (Super-)human artificial intelligence
– Automatic research, development, construction
– Modified/improved organs, bodies; cyborgs
– Sense/control brain contents, download to software
– Outer space: mining of asteroids, colonies

3.(European concept different)

images-23.jpg

Promises of Nanotechnology/Converging Technologies
extremely small, extremely powerful computers, linked everywhere
clean production
clean energy
lighter, more efficient vehicles
longer-duration materials
prosthetic implants, targeted drug delivery, tissue regeneration

Risks/Ethical Problems of Nanotechnology/Converging Technologies
health, environment -at present mainly nanoparticles
fewer jobs
‘nanodivide’
privacy
genetic manipulation of plants, animals, humans
implants, body manipulation

Efforts for NT
Europe
Japan
USA
Rest of world
-each about $ 800 million government funding per year

Military Nanotechnology:
Potential Applications and Preventive Arms Control
Jürgen Altmann
London/New York: Routledge, 2006

brain-wawe1.jpgBrain Waves

With revolutionary changes in nanotechnology (NT) now on the horizon, many countries have started major research and development (R&D) programmes, which are mainly civilian. Often overlooked are military R&D programmes – in particular those of the US government. This is the first systematic and comprehensive presentation of the potential military applications of NT.

In ten to twenty years, these applications may include extremely small computers, robots, missiles, satellites, launchers and sensors. They may also provide lighter and stronger materials for vehicles and weapons, implants in soldiers’ bodies, metal-free firearms, autonomous fighting systems, and smaller chemical and biological weapons. These potential uses raise strong concerns. This assessment is made from a viewpoint of
international security, considering the new criteria of dangers for arms control and the international law of warfare, dangers for stability through potential new arms races and proliferation, and dangers for humans and society. Some military applications, such as computers, will be so close to civilian uses that limits are impractical. Others, such as sensors for biological- warfare agents, may contribute to stronger protection against terrorist attacks and better verification of compliance with arms-control treaties.For preventive limitation of these new technologies, specific approaches are proposed that balance positive civilian uses and take into account verification of compliance, with a view to international peace and security, not national military strength. This book will be of great interest to scholars of military technology, non-lethal weapons, disarmament and security studies in general.

Nato-2.jpg

NATO
179 STCMT 05 E – THE SECURITY IMPLICATIONS OF NANOTECHNOLOGY

Lothar IBRÜGGER (Germany)
III. MILITARY USES OF NANOTECHNOLOGY
13. While most of the debate over NT focuses on its prospects for informatics and medicine, potential military applications of NT lack proper public attention, despite the fact that NT is becoming increasingly important for military strategists. The funding of military NT makes up a substantial share of total NT funding.
14. The United States is the leader in military R&D of NT. Indeed, the US military has been engaged in this field since the 1980s, focusing on ultra-submicron electronics and scanning-probe microscopy. In 1996, NT was established as one of six strategic research areas for defence. Accordingly, between 25 and 30% of the US National Nanotechnology Initiative funding has gone to the US Department of Defence (DoD) since NNI’s establishment in 2000. In 2005, the DoD is due to receive $276 million for NT, while the Department of Homeland Security will receive an extra $1 million for this purpose, accounting for approximately 28% of the total US NT budget. The US military R&D is focusing on the development of miniature sensors, high-speed processing, unmanned combat vehicles, improved virtual-reality training, and enhancement of human performance.
15. The UK Ministry of Defence (MOD) is also engaged in military R&D of NT,and allocates approximately £1.5 million per annum to this purpose. However, the MOD considers NT development in the United Kingdom as being driven by commercial, rather than military imperatives. NT related expenditure accounts for 0.35% of the annual UK defence scientific research budget and is substantially smaller than that of the Department of Trade and Industry. Sweden has invested €11 million over 5 years in military NT R&D. The European Union had budgeted €65 million in 2004-2006 to enhance the European industrial potential in the field of security research. Even though this does not specifically mention NT, some of the areas might contain NT implications.
16. Most of military NT is still in R&D level. According to Dr. Jürgen Altmann, one of the most prominent researchers of military NT, it will take between 5 and 20 years or more for the applications of this research to arrive. One can expect that NT-based soldier-worn systems will be introduced in the mid-term future. In 2002, the Institute for Soldier Nanotechnology (ISN) was created at the Massachusetts Institute of Technology (MIT), with a five-year grant of $50 million from the US Army. The goal of this research centre is to greatly enhance the protection and survival of the infantry soldier, using NT to create a bulletproof battle suit. US army planners are hoping to lighten the load that soldiers carry into battle. These systems could also monitor the state of health of the wearer, improve stamina and reaction, ease or even heal injuries, improve communication abilities, and increase soldiers’ protection against biological or chemical weapons.

neurons1-300x225.jpg

17. Potentially, NT could dramatically improve warfare technology. Lighter,stronger, heat resistant nanomaterials could be used in producing all kinds of weapons, making military transportation faster, strengthening armour and saving energy. Qualities of nanomaterials can be used for better camouflage.
18. A significant breakthrough in electronics, encouraged by NT, could result in the creation of smaller but very powerful computers, very small sensors and other devices that could be used by the military in a number of ways.Information could be stored and analysed more efficiently, intelligence and surveillance capabilities could be increased considerably by using nanosensors, precision of projectiles could reach extreme accuracy, communication systems could become much more sophisticated, as well as virtual reality systems for training. Tiny sensors or even nanocomputers could be embedded in various military items, munitions, projectiles or uniforms, thus making them “smart”. Some more futuristic visions even foresee development of autonomous fighting robots and military use of artificial intelligence, enabled by the development of NT.
19. It is debatable whether NT could bring significant changes to nuclear weapons, as the laws of physics would still require a critical mass of uranium or plutonium. NT, however, might be used to improve arming or triggering systems of nuclear weapons. On the other hand, Dr. André Gsponer, Director of the Geneva-based Independent Scientific Research Institute, argues that NT can actually contribute to miniaturisation and safety of nuclear bombs, by offering heat- and radiation- resistant materials. Furthermore, NT might be used to create the fourth-generation nuclear weapon, i.e. a low-yield “clean” fusion-fuelled nuclear bomb, which would contain no, or very little, fissionable material. These nukes could potentially be used in earth-penetrating missiles.
20. The potential for NT innovations in chemical and biological weapons is particularly disquieting, as NT can considerably enhance the delivery mechanisms of agents or toxic substances. The ability of nanoparticles to penetrate the human body and its cells could make biological and chemical warfare much more feasible, easier to manage and to direct against specific groups or individuals. Dr. Sean Howard, in his work on NT security implications, has even called the threat of chemical and biological warfare a “real nano goo”.
21. On the other hand, NT offers tools to effectively and profoundly strengthen homeland security policies, aimed at fighting the proliferation of biological and chemical weapons. Sensitive, selective and inexpensive NT-based sensors and materials could detect and bind components of chemical, biological or radiological weapons on the atomic or molecular level, thanks to the large surface/volume ratio of nanoparticles or of nanoporous material (JA). This is very important, as some agents can be lethal even in minuscule quantities. Chemical and biological defence systems with nanosensors could be placed in public places, such as schools or government buildings, public transportation systems, military assets, and border-crossing sites. Finally, nanomaterials could also be used to decontaminate places or individuals affected by chemical or biological weapons.

 

images-21.jpg

Nanotechnology in Europe

“Nanoscience and nanotechnologies: an action plan for Europe 2005-2009”.

This plan highlights the following nanotechnology areas:
nanoelectronics, including nanomanufacturing and nanoinstrumentation
nanobiotechnology and nanomedicine, including diagnostics, targeted
drug delivery and regenerative medicine
_ nanomaterials, nanoparticle technology
_ health and environmental risks of nanotechnology

 

Read more…

i was wondering

Why are we such a weak network ? It seems that the electronic info rolls out in posts all the time but where is the human contact? We need each other , for many of us we're all each other has. Why aren't we communicating more on how we are getting by, keeping in touch, giving advice and support in the blogs section. I would love for us to have more personal blogs we can support each other with.

For me lately its just been coming to terms with how many people are involved in this harassment. Mine is huge. It seems a large number of people in society have sold their souls to the devil or something. Alot of the general public and officials are involved. This is mind-blowing to me. I couldnt do this to my worst enemy - them!!!

Please keep up the contact so we can support each other and share stories.

Read more…

Neuroimmunology

"Neuroimmunology is a field combining neuroscience, the study of the nervous system, and immunology, the study of the immune system. Neuroimmunologists seek to better understand the interactions of these two complex systems during development, homeostasis, and response to injuries. A long-term goal of this rapidly developing research area is to further develop our understanding of the pathology of certain neurological diseases, some of which have no clear etiology. In doing so, neuroimmunology contributes to development of new pharmacological treatments for several neurological conditions. Many types of interactions involve both the nervous and immune systems including but not limited to the physiological functioning of the two systems in both health and disease, malfunction of either and or both systems that leads to disorders, and the physical, chemical, and environmental stressors that affect the two systems on a daily basis."We should note that with HSR deals directly with environmental manipulation in the studies and addresses this directly.http://en.wikipedia.org/wiki/Neuroimmunology#Neurodevelopmental_disorders
Read more…

In  Pt. 2 of youtube footages, Dr Michael Persinger actually said the mind control technology is able to do mass mind control i.e. satellites, tv & radio, and it might have already happened.

Discovery Channel Ultrascience Mind Control
https://peacepink.ning.com/video/discovery-channel-ultrascience    Pt.1/2
https://peacepink.ning.com/video/discovery-channel-ultrascience-1 Pt.2/2  (in the finishing part, it said mass mind control might have already happened)

Read more…

The Signals Intelligence mission of the NSA

The following information was evidence provided in a civil suit against the federal government in the case Akwei v. NSA (92-0449). John St. Clair Akwei is a former National Security Agency employee and whistle-blower who exposed the use of neural monitoring to spy on individuals. The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies.

(Source)

How The National Security Agency (NSA) Illegally And Unconstitutionally Harasses Law-Abiding Americans Everyday. How, you ask? Quite simply, actually. It’s done by EMF or ELF Radio Waves, and a technology known as “Remote Neural Monitoring”. Haven’t you ever wondered about that ringing in your left ear? Well, here are the reason(s). And just why should the NSA do this, you ask? To silence any who who dare to speak out against them or any other agency, or the Government or simply to think for themselves, and “outside the box”, if you will. Think not? Then, read on……….

Blanket coverage of all electronic communication in the U.S. and the world to ensure national security. The NSA at Ft. Meade, Maryland has had the most advanced computers in the world since the early 1960′s. NSA technology is developed and implemented in secret from private corporations, academia, and the general public.

Signals Intelligence (SIGINT)

The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies. Signals Intelligence is based on the fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves. The NSA/DoD has developed proprietary advanced digital equipment which can remotely analyze all objects whether man-made or organic that have electrical activity.

Domestic Intelligence (DOMINT)

The NSA has records on all U.S. citizens. The NSA gathers information on U.S. citizens who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent National Security Anti-Terrorist surveillance network in place. This surveillance network is completely disguised and hidden from the public.

Tracking individuals in the U.S. is easily and cost-effectively implemented with the NSA’s electronic surveillance network. This network (DOMINT) covers the entire U.S., involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously. Cost effective implementation of operations is assured by NSA computer technology designed to minimize operations costs. NSA personnel serve in Quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track. N.S.A. personnel in the community usually have cover identities such as social workers, lawyers and business owners.

Individual citizens occasionally targeted for surveillance by independently operating NSA personnel.

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA’s domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.

NSA’s domestic electronic surveillance network

As of the early 1960′s the most advanced computers in the world were at the NSA, Ft. Meade. Research breakthroughs with these computers were kept for the NSA. At the present time the NSA has nanotechnology computers that are 15 years ahead of present computer technology. The NSA obtains blanket coverage of information in the U.S. by using advanced computers that use artificial intelligence to screen all communications, irregardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists. These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the U.S. is a result of the NSA’s Signals Intelligence (SIGINT) mission. The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF spectrum. This equipment was developed, implemented, and kept secret in the same manner as other electronic warfare programs. With this technology NSA personnel can non-obtrusively tap into any communication device in existence. This includes computers, telephones, radio and video-based devices, printers, car electronics, and even the minute electrical fields in humans (for tracking individuals).

Signals Intelligence Remote Computer Tampering

The NSA keeps track of all PCs and other computers sold in the U.S. This is an integral part of the Domestic Intelligence network. The NSA’s EMF equipment can tune in RF emissions from personal computer circuit boards (while filtering out emissions from monitors and power supplies). The RF emission from PC circuit boards contains digital information in the PC. Coded RF waves from the NSA’s equipment can resonate PC circuits and change data in the PC’s. Thus the NSA can gain wireless modem-style entry into any computer in the country for surveillance or anti-terrorist electronic warfare. Radio and Television signals can be substituted at the receiving end with special EMF equipment. Replacing signals in Radios and Televisions is another outgrowth of the NSA’s Signals Intelligence (SIGINT) mission.

Detecting EMF Fields in Humans for Surveillance.

A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance. NSA personnel can dial up any individual in the country on the Signals lntelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S.

NSA Signals Intelligence Use of EMF Brain Stimulation

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra program of the early 1950′s, which included neurological research into “radiation” (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as “Radiation Intelligence,” defined as “information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation.” Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret. The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in die brain continuously. The NSA records aid decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In military fighter aircraft, for example.) For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia. Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain-programming purposes.

Capabilities of NSA operatives using RNM

There has been a Signals Intelligence network in the U.S. since the 1940′s. The NSA, Ft. Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brain. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech and 3D sound, and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears) and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods, and motor control. Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.

National Security Agency Signals Intelligence Electronic Brain Link Technology

NSA SigInt can remotely detect, identify and monitor a person’s bioelectric fields. The NSA’s Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz, .5 milliwatt electro-magnetic emissions from the brain. Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called “evoked potentials.” Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials.” The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain. NSA SigInt uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level). EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control. Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain). Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community. RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in That specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band. An example of EMF Brain Stimulation:

Brain Area Bioelectric Resonance Frequency Information Induced Through Modulation
Motor Control Cortex 10 HZ Motor Impulse Co-ordination
Auditory Cortex 15 HZ Sound which bypasses the ears
Visual Cortex 25 HZ Images in the brain, bypassing the eyes
Somatosensory Cortex 09 HZ Phantom Touch Sense
Thought Center 20 HZ Imposed Subconscious Thoughts

This modulated information can be put into the brain at varying intensities from subliminal to perceptible. Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived. The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to 5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to authorities about their activities against the Plaintiff in the last twelve years. The Kinnecome group has about 100 persons working 24-hours-a-day at Ft Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.

NSA Techniques and Resources

Remote monitoring/tracking of individuals in any location. inside any building, continuously, anywhere in the country. A system for inexpensive implementation of these operations allows for thousands of persons in every community to be spied on constantly by the NSA.

Remote RNM Devices

a) NSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals and can send messages through the nervous system to affect their performance.
b) [Information missing from original]
c) RNM can electronically identify individuals and track then anywhere in the U.S. This equipment is on a network and is used for domestic intelligence operations, government security, and military base security, and in case of bioelectric warfare.

Spotters and Walk-Bys in Metropolitan Areas

a) Tens of thousands of persons in each area working as spotters and neighborhood/business place spies (sometimes unwittingly) following and checking on subjects who have been identified for covert control by NSA personnel.
b) Agents working out of offices can be in constant communication with Spotters who are keeping track of the NSA’s thousands of subjects in public.
c) NSA Agents in remote offices can instantly identify (using RNM) any individual spotted in public whom is in contact with surveillance subject.

Chemicals and Drugs into Residential Buildings with hidden NSA-lnstalled and maintained plastic plumbing lines.

a) The NSA has kits for running lines into residential tap water and air ducts of subjects for the delivery of drugs (such as sleeping gas or brainwashing aiding drugs). This is an outgrowth of CIA pharmapsychology.

Brief Overview of Proprietary U.S. Intelligence/Anti-Terrorist Equipment Mentioned.

Fixed network of special EMF equipment that can read EEGs in human brains and identify/track individuals by using digital computers. ESB (Electrical Stimulation to the Brain) via EMF signal from the NSA Signals Intelligence is used to control subjects.
EMF equipment that gathers information from PC circuit boards by deciphering RF emissions thereby gaining wireless modem-style entry into any personal computer in the country.
All equipment hidden, all technology secret, all scientific research unreported (as in electronic warfare research).
Not known to the public at all, yet complete and thorough implementation of this method of domestic intelligence has been in place since the early 1980′s.
 

 

“We are rapidly entering the age of no privacy, where everyone is open to surveillance at all times: where there are no secrets from the government” ~ William O. Douglas (U.S. Supreme Court Justice)

Read more…
"Articles on ethics in social research can often seem somewhat thin on
the ground. Although volumes are dedicated to a wide variety of issues
within research practice, ethics tends to be overlooked. As
sociologists we must consider whether there is a reason for this.
Writing on ethics is surely one of the least popular activities a
sociologist can do, for it is a subject which carries with it an aura
of moralising which sits uncomfortably with us. After all, we all, as
sociologists and researchers, have clear codes of what constitutes
ethical behaviour to which we all adhere. This work is not, therefore,
an attempt to describe a moral platform but to consider internet
research through the lens of established paradigms in social research.
Of late there has been a rising interest in what has come to be
referred to as online ethnography. This is considered to be a variant
of traditional ethnomethodological techniques, utilising a spectrum of
observational and other qualitative methods to examine the ways in
which meaning is constructed in online environments and gleans much of
its’ analytical framework from derivations of conversation analysis.
This work considers a slightly different variant of this in looking at
the applicability to studies of internet interaction of the model of
research pursued by Erving Goffman. In "Behaviour in Public
Places"(1963) and "Relations in Public"(1971), Goffman’s concern is
with social relationships, social order and public life. His analysis
centres on the complex interrelation between the public and the
private, which is used here to illuminate the nature and forms of
online interaction. The questions which I hope to use Goffman’s
analysis to open up for debate are those which are fundamental to the
use of internet media in any research context. Can we justifiably
regard online interactions on bulletin boards, mailing lists and in
chat rooms as "public status" or do they constitute, as others may
argue, a form of private conversation which is embedded within a public
space? Or does the fact of private conversations occurring constitute
these arenas as private spaces into which we, as researchers, are
intruding? What are the natures and forms of intrusion online? And
finally, and most significantly, what is the status of text in a world
where the self is invested in the act of textual creation and no other?
These issues clearly have considerable ramifications for a
consideration of what would constitute a code of ethics in the age of
information, and the establishment of such a code is particularly
pressing now, when debate on the nature and forms of electronic life,
in both on and off-line arenas, increasingly takes its cue from a moral
panic over privacy and intrusion in the electronic age.

Firstly, however, we need to examine some contextual and theoretical
considerations concerning the applicability of the use of a Goffmanian
framework of analysis to online interaction. The key distinguishing
feature of online behaviour is that it occurs solely through text and
the exchange of text. Thus all "fronts", "settings" and "vehicles for
conveying signs" of self can only be that which can be rendered in
text. This is, some may argue, a fundamentally different proposition
from the forms of embodied communication and intercorporeal self
production (Crossley, 1995) which are investigated by Goffman. For
Goffman, like Austin, language (speech) is performative, which is to
say, it does something. "Each utterance presupposes, and contributes to
the presuppositions of, a jointly inhabitable mental world"(Goffman,
1983). The truth of this assertion is nowhere more evident than in the
case of online environments where utterances are all we can use to
produce self. Yet in "Relations in Public"(1971), for example, language
is given no privileged status as a means of constructing reality.
Rather it is grouped along with embodied acts as a form of
communicative or social ritual, one which reflexively affirms/creates
social orders and relationships. However, the specific conception of
speech as a form of ritual act is precisely what makes Goffman’s
perspective so valuable to a consideration of internet communication,
for this new arena raises serious questions about the nature of textual
communication and issues a challenge to old ways of thinking.

We are accustomed, howsoever erroneously (Foucault, 1979) to regarding
written language as the product of a single autonomous author. Writing
is privileged within Western culture as a an expression of, rather than
a constitution of, a single conscious self, as the views, opinions,
subj ectivity and experiences of a person. Thus we tend to see text as
autonomous, produced in isolation and on a conscious level, apart from
the co-ordination of interaction. As Giddens contends, textual creation
and interpretation "occurs without certain elements of the mutual
knowledge involved in co-presence within a setting, and without the
co-ordinated monitoring which co-present individuals carry on as part
of on-going talk"(1990: p.100). In short then, texts are located within
a realm defined by autonomy and distance from the mechanics of
co-present production of self. It is this conception that textual
interaction in electronic environments challenges and it does so
through forcing a redefinition of key elements in the debate, namely
those of co-presence, of means of co-ordination, and of producing self.

In online environments and in considerations of the nature of
cyberspace the self is systematically problematised. It has become an
article of faith amongst cyberspace commentators that the cyber-self is
an infinitely flexible creation of an autonomous individual. From the
concealment of aspects of stigmatised identity, through to the idea of
gender as an elective, through postmodernist fantasies of the
elimination of the embodied–self and a retreat into cyberspace, the
recurring theme is that of agency in the production of online selves.
In accounts of internet interaction the self is seen as an article of
individual genius, the creation solely of its’ controller, a creature
apart from and uninfluenced by the social world. This stance, then,
depends upon a philosophical commitment to a transcendent self, a
commitment which is outside the remit of an ethnographical perspective.
In Goffman’s terms the self may be seen as a reflexive constitution by
and of the social world. The cyber-self, no less than its embodied
counterpart, may be argued to be produced through ritual, through the
practices and relations which constitute the intersubjective fabric of
the online social world. "Self.." argues Goffman " is not an entity
half concealed behind events, but a changeable formula for managing
oneself during them" (1974:573). It is "a code that makes sense out
of…the individual’s activities and provides a basis for organizing
them" (1971:366). If this is so in everyday life, it can b e no less
true of interaction in online environments. It is simply that the
signifying resources available to a particular construction and
presentation of self are qualitatively different.

In "Relations in Public"(1971) Goffman delineates eight areas or
territories of the self, which we attempt to control in interaction
with others. These territories range from the body itself and its
covering (the sheath), through personal possessions, to the information
preserve, the set of facts about ourselves, biographical details and so
forth which we reveal or conceal according to the situation. It is
through control of these territories, the placement of individuals
within the spaces of the territories in relation to the self, that we
define our relations to others, the social world formed out of the
nexus of these relations, and therefore ourselves. What emerges from
the relocation of social interaction in the online environment is a
curious tension between intensification of control over the territories
of the self and its dissolution.

On the one hand we can attempt to present self in any terms of our
choosing, and the lack of visible evidence and of biographical and
situational information increases the chances of "passing", diminishing
the potential for a contradiction of self claims. We gain control over
our information preserves in this process. Yet even here one’s gain is
another’s loss, as aspects of identity and self claims may be
appropriated by others. Sherri Turkle (1986), for example, has spoken
of the profound sense of unease she felt upon being confronted with an
avatar which carried her name, her sense that an aspect of herself had
been reified and removed from her.

Moreover, it can be argued that at the same time we lose control over
the dissemination of the self we present. It is the conversational
preserve, which Goffman defines as including "the right of a set of
individuals once engaged in talk to have their circle protected from
entrance and overhearing by others" (1971:64) which is most violated in
this. The offence of overhearing is, in Goffman’s scheme, that of
encroachment, of taking from an individual information not intended to
be overheard, the penetration of a territory defined as own by the
speaker, and the defilement of same through the process of intrusion.

Thus we have arranged the elements of Goffman’s analysis which are of
most application to the analysis of online interaction, namely, the
territories of self; the notion of self as an intersubjective
construction of social interaction; public and private spaces as the
production of interaction; ritual as social reality; and interaction as
ritual. The question to which we now turn is that of the implications
of this stance for the ethics of social research online. Our starting
point must be a consideration of the status of online interaction,
whether as public or private. Whether internet communicative forms are
regarded as public or as private clearly has considerable ramifications
for how we may treat the wealth of sociological "data" which scrolls
before our eyes when we log on. Here it is the problematic notion of
text which must be anatomised. If we treat online texts, whether on web
sites, distributed through mailing lists, or as exchanges in chat rooms
as texts per se, then it is evident that our only responsibilities as
researchers lie in issues of intellectual property rights. However, if
these texts are seen as interaction then the situation is somewhat
different. In seeing textual production online as a form of self
presentation and production which occurs within co-present,
co-ordinated spaces of interaction we divorce the text from the
subjectivity of the "author", aligning it instead as interactive
ritual. Thus we are considering, not the expression of individual
personalities, but the strategic means and forms of interaction within
the media. The data is therefore, by implication, a product not of
individual agency but of social ritual, in much the same manner as the
pedestrian behaviour studied by Goffman may be considered to be
separate from the will of any specific observed individual. In this
instance, as Homan (1991:46) has argued, the data takes the form of an
insight which is not peculiar to any specific individual and therefore
does not attach a need to obtain informed consent from the participants.

If we are observing interactional ritual in this way, does it then
follow that we may liken our research online to the position of a
researcher who stands in a public place and observes the behaviour of
those within it? Sociology has long accepted that public behaviours are
a legitimate object for research insofar as such research focuses upon
the forms of interaction, rather than the acts of any individual. Hence
it is acceptable to observe the behaviour of people at town meetings,
in churches, pedestrian behaviour in the streets and shops without
needing to obtain informed consent. The reasons for this may partly
reside in the difficulty of obtaining informed consent in these
situations (a difficulty which is not applicable to online
environments, where an obvious means to communicate the fact of a study
in progress readily presents itself), but mainly centre on the lack of
necessity for it. Thus behaviour in public places is a legitimate
object of scrutiny for the social researcher, whereas that in private
is not, unless consent is given.

As Homan(1991)has argued, whether a space is public or private is
always relative to the definitions of those who occupy it and this is
particularly true of internet communities, where ther e are/were no
pre-existing cultural understandings of the nature of the media to
appeal to or be guided by in defining the situation. Two areas may be
considered to be revealing in this context, the views of the users as
expressed through the conceptual and verbal apparatuses of the
environments, and the actions of the internet community in the case of
"lurkers".

The ways in which electronic environments are described constitute a
conceptual apparatus, a tool for defining the spaces which we occupy
when online. As Correll (1997)demonstrated in the case of the Lesbian
cyber cafe upon which she conducted an ethnographic study, the creation
and maintenance of physical spaces is one of the key rituals in the
organisation of interaction. In a space where setting can only be
evoked textually, patrons of the cyber cafe used descriptions of
physical artefacts to organise the spaces of interaction, to define
relationships to each other and create/ maintain a social order(Correll
:1997). When we consider this in relation to spaces of online
interaction in general it can be seen that descriptions of place serve
to reflexively create arenas as public spaces. The diffusion of
references to town halls, town pumps, villages and cafes all give ample
testimony to an overriding definition of electronic forums as public
status. These spaces, then, are communal spaces, and this implies that
the interaction which occurs within them is also public and thus falls
within the remit of an observational sociology which is directed at
understanding behaviour in public spaces, whether on or off-line.

This idea is further supported by the actions of community participants
with regard to "lurkers" or non-contributors. Lurking is at the very
least tolerated in online environments and as Correll (1997) has
pointed out lurkers often receive a warm welcome from communities when
changing status to participant and acknowledging their previous
activities. Such a tolerance may only be regarded as intelligible from
the stance that internet interactions occur within a public arena and
are therefore matters for public consumption. If we imagine an
interaction in the offline world where one party listened attentively
but did not make his/her presence known to the others taking part, we
can only construe this in terms of "eavesdropping&quo t;. Th is
definition would be contingent upon our understanding of the
conversation as being private and therefore of the information being
divulged as the preserve only of those co-present when it was revealed.

However, this comparison reveals a problem, namely the definition of
co-presence as applied to internet communities. Although real time
interactions over IRC must be exempted from this, since there is a
temporal dimension involved in communication through that media, on
mailing lists, web sites and to some extent in MUDs and on bulletin
boards, the community to which we address ourselves is one that extends
beyond the confines of the immediately co-present. Our posts to a BBS
for example, may be replied to hours or days after we have produced
them. We address ourselves in these environments, therefore, to the
community as a whole, rather than those logged in at the time. A
researcher may be a part of this community, whether as a researcher or
simply in his/her own right as an individual and is thus amongst the
addressed in receiving this ritual of interaction.

However, it must be acknowledged that, just as Goffman saw private
spaces as existing within public ones, so in online spaces individuals
can delineate a private arena into which others transgress at their
peril. Through an exposition of the rituals and procedures by which
public spaces may be transformed into private ones, Goffman demon
strates that public and private are far from monolithic definitions to
guide action. Rather all such definitions are locally produced and are
therefore relative to the individual communal structures within which
they are rendered meaningful. In online interaction it is acknowledged
that some spaces are private to the specific community of users. Thus
Mitra has referred to online ghettos and the gradual fracturing of
internet life into multiple communities which share little in terms of
a common culture or over-riding definition of themselves as
"Netizens"(Hauben, 1997). Moreover, and to complicate matters,
Correll’s research has indicated that the use of public forums for
"private" engagements is widespread, with individuals often "breaking
off" to form enclaves of private conversation. So how do we, as
researchers, distinguish between interactions which are intended for
the entire community of Net users, to which we might with validity be
said to belong; those focused on a specific community, such as the
ethnic groups studied by Mitra; and those directed at the maintenance
of a private space between individuals? Only an engagement with the
frameworks of meaning and relevance of the individual communities as
revealed through the forms and rituals of interaction can yield an
understanding of these issues.

The above discussion, I hope, exposes some of the complexities surround
ing the issue of electronic interaction online and points the way to a
discussion of the key issues which we, as researchers, face when
venturing online. As always with matters of such complexity, any
discussion inevitably raises more questions than it answers. Can the
sociological researcher who participates in an electronic community
leave his/her sociological subjectivity behind, or is, as Homan has
suggested, the condition of being a sociologist an ontological state
which cannot be divorced from the self of the researcher? How can we
have an informed and informing ethnomethodological account of
cyberspace when it itself is distinguished by a schism between identity
and avatar? Who or what can give informed consent to participation in
research in a world where an adult presenting avatar may be the
construct of a child? Upon what terms and with reference to what means
are online selves produced? Such questions have no easy answers, for
the nature of online life is such that many of the main tenets of
social life are, if not undermined at least rendered problematic and
therefore available for reinterpretation. These are, however, issues
which cry out for debate if sociology is to acquire a meaningful and
informed understanding of social life online. If this article has
sketched out a framework for the consideration of these issues and the
resources available for their discussion, it has done what I intended."


Bibliography

Correll, Shelley (1995)"The Ethnography of an Electronic Bar: The
Lesbian Cafe" pp. 270-298 in "The Journal of Contemporary Ethnography"
Vol. 24 No. 3 October 1995

Crossley, Nick (1995)"Body techniques, agency and intercorporeality: On
Goffman’s Relations in Public" Sociology Vol. 29 No. 1 February 1995
pp. 133-149

Foucault, Michel "What is an author?" 1979 Reproduced in Bocock, R and
Thompson, K "Social and Cultural Forms of Modernity" Polity Press,
Cambridge 1992

Giddens, Anthony(1990) "Social Theory and Modern Sociology" Polity, Cambridge

Goffman, Erving (1963) "Behaviour in Public Places: Notes on the Social
Organization of Gatherings" Free Press/ MacMillan , New York

Goffman, Erving (1969)"The Presentation of Self in Everyday Life" Penguin, Harmondsworth

Goffman, Erving (1971)"Relations In Public: Microstudies of the Public Order" Penguin, Harmondsworth

Goffman, Erving (1974) "Frame Analysis: An Essay on the Organization of Experience" Harper and Row, New York.

Goffman, Erving (1983) "Felicity’s Condition" American Journal of Sociology 89 (1) pp.25-51

Hauben, M and Hauben, R (1997)"Netizens: On the History and Impact of
Usene t and the Internet" 1997 IEEE Computer Society Press, California

Homan, Roger (1991) "The Ethics of Social Research" Longman, Essex

Jordan, Tim (1999)"Cyberpower: The Culture and Politics of Cyberspace and the Internet" Routledge, London

Mitra, Ananda (1997) "Virtual Commonality: Looking for India on the
Internet" pp 55-79 in Jones, S (ed.) "Virtual Culture: Identity and
Communication in Cybersociety", Sage, London 1997

Turkle, Sherry (1996) " Life on the Screen: Identity in the Age of Internet" Phoenix, London



http://www.cybersociology.com/files/6_2_ethicsinonlineethnog.html
Read more…

Pentagon

Could Soldiers Be Prosecuted for Thought Crime? By Sharon Weinberger April 21, 2008 | 1:00 pm | Categories: Army and Marines, DarpaWatch, Science! The Pentagon’s Defense Advanced Research Projects Agency is funding a number of technologies that tap into the brain’s ability to detect threats before the conscious mind is able to process the information. Already, there is Pentagon-sponsored work on using the brain’s pattern detection capabilities for enhanced goggles and super-fast satellite imagery analysis. What happens, however, when the Pentagon ultimately uses this enhanced capability for targeting weapons? This question has led Stephen White to write a fascinating article exploring the implications of a soldiers’ legal culpability for weapons that may someday tap into this "pre-conscious" brain activity. Like the Minority Report notion of "pre-crime," where someone is convicted for contemplating a criminal act they haven’t yet acted upon, this article raises the intriguing question of whether a soldier could be convicted for the mistake made by a pre-conscious brain wave. One of the justifications for employing a brain-machine interface is that the human brain can perform image calculations in parallel and can thus recognize items, such as targets, and classify them in 200 milliseconds, a rate orders of magnitude faster than computers can perform such operations. In fact, the image processing occurs faster than the subject can become conscious of what he or she sees. Studies of patients with damage to the striate cortex possess what neuropsychologists term “blindsight,” an ability to predict accurately where objects are positioned, even when they are placed outside these patients’ field of vision. The existence of this ability suggests the operation of an unconscious visual perception system in the human brain. These blindsight patients often exhibit “levels of accuracy well beyond the performance of normal observers making judgments close to the threshold of awareness,” particularly with regard to locating ‘unseen’ objects. The speed of visual recognition varies depending on its degree of the perceived object’s multivalence; ambiguous objects take more time to process. If neuralinterfaced weapons were designed to fire at the time of recognition rather than after the disambiguation process, a process that would likely need to occur for the pilot to differentiate between combatants and protected persons, the pilot firing them presumably would lack criminal accountability for the act implicit in willful killing. Because of the way brain-interfaced weapons may interrupt the biology of consciousness, reasonable doubt may exist as to whether an actor performed a conscious act in the event of a contested incident. It’s not just legal analysts who recognize this issue. After reading my article on "Luke’s Binoculars" — DARPA’s brain-tapping binos program — one neuroscientist raised an obvious concern: Psychopathy is linked to bypassing the inhibitory control mechanisms of prefrontal cortex, and do we really want psychopathic soldiers?" Tags: Body = Weapon, DarpaWatch, Science! Post Comment | Permalink
Read more…

http://www.nytimes.com/2008/11/13/fashion/13psych.html?_r=1&pagewanted=all

Dr. Bell, whose study was published in the journal Psychopathology, said that it does not suggest all people participating in mind-control sites are delusional, and that a firm diagnosis of psychosis could only be done in person.

For people who say they are the target of mind control or gang stalking, there may be enough evidence in the scientific literature to fan their beliefs. Many sites point to MK-ULTRA, the code name for a covert C.I.A. mind-control and chemical interrogation program begun in the 1950s.

Recently the sites have linked to an article published in September in Time magazine, “The Army’s Totally Serious Mind-Control Project,” which described a $4 million contract given to the Army to develop “thought helmets” that would allow troops to communicate through brain waves on the battlefield.   CHECK IT OUT !

Read more…

Too quiet around town

Two weeks ago today I went to the Burlington Free Press here in Burlington, Vermont with quite a disclosure that I put together.  It ended up in the hands of the police and created quite a stir. .. they probably would like to find out more of what's going on.   Last Friday I went again with  even more of a disclosure that I haven't yet told the ti community about - trying to decide the best approach to take.  I know e v e r y t h i n g  about what's going on and took it to the newspaper with a copy to the FBI  and this afternoon will go to the Vermont State Attorney General's office.

 

The big shots at SRI International aka Stanford Research Institute are threatening me to the max and I expect the worst because they have EVERYTHING to lose.  Everything I've now told the world needed to be said and brought out into the open.  This isn't about national security - it's the greatest b.s. hoax ever carried out by an entire military - industrial - complex.  These crimes cannot continue - Vermonters are no fools and have a strong survival instinct; and I am keeping my fingers crossed that it's all going to come home to roost for these hot shots in Menlo Park, CA and a bunch of others.  I hope they won't get away with this much longer.  I also hope that I survive, but what I've written is damaging to say the very least.

Last night nano devices networked  straight up from the stomach center point - esophagus - trachea were kept tightened so much so as to partially close off the trachea for restricted breathing.  At this time, as I write this, I am getting death threats to keep my mouth shut and the only reason I'm not saying more is because I'm waiting a few days to see what the backlash is.   It's too quiet around town with no one saying a work. The FBI is dead silent which can mean one of two things - write me off as insane and lock me away - except that the journalists at the newspaper know and they are not going to keep what I had to say quiet even if they don't print it.  The cat is out of the bag.   The only other alternative is to shut down these black budget multi-million dollar disgusting operations and have a major investigation.

 

With their 'illumination pen' to point of influence at the display screen they are tweaking my Adam's apple to mimic a lump in the throat or death.   Either way, I'm going to be just fine.  I don't fear death.  I am keeping my fingers crossed for all of us.

Read more…

MINDGUARD AGAINST MIND CONTROL (SHIELDING)

9143022494?profile=original

MindGuard is a program for Amiga and Linux computers that protects your mind by actively jamming and/or scrambling
psychotronic mind-control signals and removing harmful engrammic pollutants from your brain. It also has the ability
to scan for and decipher into English specific signals so you can see exactly Who wants to control you and what They
are trying to make you think.

http://zapatopi.net/mindguard/

Read more…

Results

For all helmets, we noticed a 30 db amplification at 2.6 Ghz and a 20 db amplification at 1.2 Ghz, regardless of the position of the antenna on the cranium. In addition, all helmets exhibited a marked 20 db attenuation at around 1.5 Ghz, with no significant attenuation beyond 10 db anywhere else.

Conclusion

The helmets amplify frequency bands that coincide with those allocated to the US government between 1.2 Ghz and 1.4 Ghz. According to the FCC, These bands are supposedly reserved for ''radio location'' (ie, GPS), and other communications with satellites (see, for example, [3]). The 2.6 Ghz band coincides with mobile phone technology. Though not affiliated by government, these bands are at the hands of multinational corporations.

It requires no stretch of the imagination to conclude that the current helmet craze is likely to have been propagated by the Government, possibly with the involvement of the FCC. We hope this report will encourage the paranoid community to develop improved helmet designs to avoid falling prey to these shortcomings.

 

http://berkeley.intel-research.net/arahimi/helmet/

 

LIM SC : I used aluminium sheet meant for heat insulator for roofing to shield Microwave attacks, I think it worked.  Anyone else who find it effective too ?  Please share your experience  or experiment summary.

Read more…