All Posts (12225)

Sort by

Previous Posts and Evidence-To be used by International World Courts of Justice for the prosecution of crimes against humanity. Direct Violation of the United Nations Article 1 Declaration against torture,Violation of the Geneva Conventions, Violation of the Helsinki Doctrine

.
50 US War Criminals http://afterdowningstreet.org/warcriminalsFrom:v911t@yahoogroups.com [mailto:v911t@yahoogroups.com] On Behalf Of LynnSurgalla
Sent: Wednesday, August 19, 2009 8:21 PM
To: v911t@ya
Continue

Added by ron angell on August 20, 2009 at 6:25am — 1 Comment

Diseased African Monkeys Used to Make Swine Flu Vaccines; DYNACORP Video

The Paperchase TV SERIES-Remember it?ACLUContinue

Added by ron angell on August 20, 2009 at 12:58am — 4 Comments

Woman Convicted in Fake Flu Vaccine Case for her involvement in the distribution of a fake flu vaccine to more than 1000 persons in the Houston area,

http://houston.fbi.gov/dojpressrel/pressrel09/ho081709a.htm Woman Convicted in Fake Flu Vaccine Case Sentenced for Violating ProbationMon, 17 Aug 2009 10:29:21 -0500Martha Denise Gonzales, who was convicted in 2007 and sentenced to afive-year term of probation for her involvement in the distribution of afake flu vaccine to more than 1000 persons in the Houston area, wassentenced to 21 months in feder… Continue

Added by ron angell on August 19, 2009 at 4:10am — No Comments

On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology- Journal of Psycho-Social Studies, 2003.

http://www.globalresearch.ca/index.php?context=va&aid=7123 On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technologyby Carole Smith.Global Research, October 18, 2007Journal of Psycho-Social Studies, 2003."We have failed to comprehend that the result of the technology that originated in the years of the arms race between the Soviet Union and the West, has resulted inContinue

Added by ron angell on August 18, 2009 at 5:45pm — 2 Comments

http://www.thefluecase.com by jame burgermeister of Austria- thank you so much Frau Burgermeister!! Danke, Grazi, Prego, Gracias, thank you, merci

http://www.theflucase.com/ Laws and the Constitution assign to people certain basic civic rights, such as the right to life, the right to free speech, the right to self defence. Another right, is the right to report a crime if there is enough evidence of one.Laws and the Constitution assign to people certain basic civic rights, such as the right to life, the right to free speech, the right to self defence.Flowing from these basic civic… Continue

Added by ron angell on August 18, 2009 at 5:02pm — 5 Comments

MKULTRA: Veterans Sue CIA Over Past Chemical Tests on Soldiers

ACLU MKULTRA: Veterans Sue CIA Over Past Chemical Tests on Soldiers "Saddam Hussein is a man who is willing to gas his own people, willing to use weapons of mass destruction against Iraq citizens." - President Bush, March 22, 2002 (For the record - and so I'm not accused of GOP-style Saddam-baiting - blood tests of the gassed Kurds at Halabja in 1988, conducted by US… Continue

Added by ron angell on August 17, 2009 at 10:00pm — 5 Comments

Evidence of Genocide IN USA 6/12/09 A squad of 150 to 200 cruisers and SUVs came in and practically massacred our people. There was blood everywhere,

Evidence of Genocide IN USA 6/12/09 A squad of 150 to 200 cruisers and SUVs came in and practically massacred our people. There was blood everywhere, --- On Fri, 8/7/09, Ron Angell wrote:From: Ron AngellSubject: 6/12/09 Fw: MNN Are Mohawks going to be invaded-A squad of 150 to 200 cruisers and SUVs came in and practically massacred our people. There was blood everywhere,To: "'FEED - Union of Concerned Scientists'" , OTP.InformationDesk@icc-cpi.int, "katherine friedli" , "Kathernine Friendi… Continue

Added by ron angell on August 17, 2009 at 5:07pm — 1 Comment

Sorry, I used an outdated list and here is the last list I was sent a few days ago- here is the most current list of 950 Tortured in the USA and worldwide-

TO THE INVESTIGATION INTO CIA TORTURE PROGRAMS - our condolences over Representative Schakowsky’s son-in-law’s death, and we sincerely hope that it was not a murder related to this Torture Inquiry. --- On Tue, 8/18/09, MCmailteam International wrote:From: MCmailteam InternationalSubject: TO THE INVESTIGATION INTO CIA TORTURE PROGRAMS - our condolences over Representative Schakowsky’s son-in-law’s death, and we sincerely hope that it was not a murder related to this Torture Inquiry.To: oig.… Continue

Added by ron angell on August 17, 2009 at 4:30pm — 5 Comments

From Dr. Robert Duncan-Project Soul Catcher-An Introduction to Information Warfare Theory, Technologies, and Practice.

From Dr. Robert Duncan-Project Soul Catcher-An Introduction to Information Warfare Theory, Technologies, and Practice.From: R. Duncan
Sent: Thursday, August 13, 2009 8:14 PM
Subject: shielding

Sorry for the multiple post.

Continue

Added by ron angell on August 15, 2009 at 4:03pm — 2 Comments

President Ronald Reagan was on "The Blue List of Death" Google "Red List of Death" Google "Blue List of Death" Rumsfeld, Cheney, Bush Sr are on the Yellow List- (The one's that are doing the murder)

Google "Blue List of Death" President Ronald Reagan was on this list.. carrying out the destruction of the "Red List of Death" and then he himself being tortured and murdered via Electronic Dissolution of Memory From Dr. Robert Duncan-Project Soul Catcher-An Introduction to Information Warfare Theory, Technologies, and Practice.From: R. Duncan
Sent: Thursday, August 13, 2009 8:14 PM
Subject:
Continue

Added by ron angell on August 15, 2009 at 4:00pm — 2 Comments

Rep. Jan Schakowsky (D-Ill.), chair of the House Subcommittee on Oversight and Investigations, told the Huffington Post that the 9/11 secret counterterro

--- On Fri, 8/14/09, Ron Angell wrote: From: Ron AngellSubject: Jan Santowsky's son-in-law was murdered yesterday-MK Ultra CIA torture-Schakowsky's subcommittee has been given the green light to investigate its legality and is already preparing a major document request.To: info.jpxny@vd.ch, otp.informationdesk@icc-cpi.int, uk@un.int, usa@un.int, peru@un.int, "katherine friedli" , "Kathernine Friendi" , "Karoline Astrid" , haarpmindcontrol@gmail.com, "John Allman" , alw@peaceinspace.orgCc: "… Continue

Added by ron angell on August 14, 2009 at 4:30pm — 5 Comments

MIND/ BRAIN READING, BRAIN COPYING, TORTURE, FINANCIAL TERRORIZING AND SLUM-COVERT WAR IN VIETNAM BUSINESS. USING SATELLITE WEAPONS

MIND/ BRAIN READING, BRAIN COPYING, TORTURE, FINANCIAL TERRORIZING AND SLUM-COVERT WAR IN VIETNAM BUSINESS. USING SATELLITE WEAPONS From: Khanh D. Pham <khanh.pham@dakha.com>
Subject: FW: [Torture, Human Rights and Crimes Against Humanity] Mind/ Brain Reading, Brain Copying, Torture and Financial Terrorism in Vietnam business
To: 'ip-libe@europarl.eu.int', 'foreign-press@europarl.europa.eu', 'inta-press@europarl.europa.eu', 'envi-press@europarl.europa.eu', 'indu-press@europarl.eur… Continue

Added by ron angell on August 12, 2009 at 5:30pm — 2 Comments

A California history professor, Kathryn Olmstead, has discovered documents at the Gerald Ford library which were written by Cheney and Rumsfeld

A California history professor, Kathryn Olmstead, has discovered documents at the Gerald Ford library which were written by Cheney and Rumsfeld. http://www.serendipity.li/cia/olson2.htmThey show how far the White House went to conceal information about Olson's death — and his role in preparing anthrax and other biological weapons. ...Cheney and Rumsfeld were given the task of covering up the details of Frank O… Continue

Added by ron angell on August 11, 2009 at 4:00pm — 7 Comments

ABC News 1979 Special: Mission Mind Control (29 mins)- Coffee and water poison in USA

ABC News 1979 Special: Mission Mind Control (29 mins)- Coffee and water poison in USA also chemtrail sprays and tainted food, over the counter drugs, prescription drugs. ABC News 1979 Special: Mission Mind Control (29 mins)
Continue

Added by ron angell on August 11, 2009 at 2:30pm — 4 Comments

Read more…
you can do this ron price- call here ... dial *67 before dialing the number if you wish to hide your identity:http://intelligence.house.gov/Members.aspx?ID=36HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCEINVESTIGATION INTO “CERTAIN CIA PROGRAMS”MAIL: US Capitol Building; Washington, DC 20515-6415TEL: Office: (202) 225-7690 , Toll Free: (877) 858-9040 , FAX: (202) 226-5068Subject: TO THE INVESTIGATION INTO CIA TORTURE PROGRAMS - our condolences over Representative Schakowsky’s son-in-law’s death, and we sincerely hope that it was not a murder related to this Torture Inquiry.To: oig.hotline@usdoj.gov, oigfoia@usdoj.gov, OIGContractingOfficer@usdoj.gov, oigwebmaster@usdoj.gov, askdoj@doj.govCc: nsaarc@nsaarc.net, sadbu@nsa.gov, customercare@nsa.gov, askcaeia@nsa.gov, NIASC@nsa.gov, history@nsa.gov, mepp@nsa.gov, nsapao@nsa.gov, selinux-team@tycho.nsa.govDate: Tuesday, August 18, 2009, 10:08 PM19 August 2009HOUSE PERMANENT SELECT COMMITTEE ON INTELLIGENCEINVESTIGATION INTO “CERTAIN CIA PROGRAMS”MAIL: US Capitol Building; Washington, DC 20515-6415TEL: Office: (202) 225-7690 , Toll Free: (877) 858-9040 , FAX: (202) 226-5068WEB: http://intelligence.house.gov/Members.aspx?ID=36EMAIL: Intelligence.HPSCI@mail.house.gov ,Jan.Schakowsky@mail.house.go,us.rep.schakowsky@mail.house.govFrom Miss Kitty:http://en.wikipedia.org/wiki/United_States_Senate_Committee_on_Armed_Services
Read more…
First of all, psychiatrists are not interested in a patients "experiences" they are only concerned about the symptoms, and allieviating them, so they would not ask anything about mind control technologies or the invasive practise that might render someone sick. I'm being electronically tortured right now, with deep pain and gas, and did at one time experience voices, of which are now controlled with proper use of medication. If you dont' call it schizophrenia, then what does this author suggest we call it?Second, there are probably a good many articles like this out there that are very good, yet what difference do they make? We need to be talking about how to change this situation for people who are experiencing such levels of pain and malaise, fundamentally changing a situation which would require much more than having a change in a psychiatric evaluation.Third, I'm fearful that with this article on people like us there is a tendency to isolate and separate us from all of society, in which people in positions of taking on our claims, doctors, lawyers and such will only look upon us as subjects in which they will come to the conclusion that there is nothing they can do to help us. With the way it is now, you are treated as a patient of a psychiatrist and I don't know what you would be considered if you weren't a patient, maybe they could call us targets, but that open up a whole other way of treating us unfairly.
Read more…
WelcomeIf you are interested in uncovering the truth behind Government conspiracies, Mind Control, Secret Societies, Destructive Corporatism, 9/11, Unreported Health Issues and Covert Military Operations then Wide Eye CinemaVideo Clips:* Who Profits from Israeli Occupation?* Shadow Behind the Throne: NWO Overview* Mike Morgan vs. Goldman Sachs* Radio Interview with Ghis about Health* Humanity’s Expression* Fake Al Qaeda Actors EXPOSED!Health:* Sodium Bicarbonate: A Natural Cancer Treatment* Vaccination 101 with Ghis* 16:9 presents “Dirty Electricity”* Overwhelming Evidence That Autism is Caused by Thimerosal* David Kirby presents: Evidence of Harm* David Ayoub: Vaccines and Childhood IllnessesCorporatism:* The Trap: Fuck You Buddy (2007)* The Power of Nightmares (2004)* William K. Black: This Economic Disaster* The Merchant of Venice (2004)* Israel Palestine: The Other Side of The Story* The Yes Men (2003)False Flag Operations:* Media Monarchy Interviews William Fox* The Passionate Eye: Anthrax War* An Israeli Journalist interviews Ernst Zundel* Zero: An Investigation Into 9/11* The Age of Terror: In the Name of Liberation* Steven Jones: Why Did the WTC Towers Collapse?Secret Societies:* Illuminati, Music Industry & why Mike was Killed* Society (1989)* Arte France presents: Dark Side of the Moon* Common Purpose Linked to World Control* David Icke in Zagreb (Full Interview)* Hollywood Insiders: Fallen AngelsMind Control:* EXPOSED: New Age Channeling* Oprah and Eckhart Tolle’s New Age Revival* Modern Marvels: Torture Devices* Leaked Scientology Orientation Video (cam)* The Boys from Brazil (1978)* National Geographic: CIA Secret Experiments
Read more…

A LIST OF "MY ILLUMINATI VIDEO-COLLECTION:

http://docs.google.com/View?docid=dchsvhps_3fc3k5cff&pageview=1&hgd=1&hl=enAA list of "my" Illuminati video-collection: Important: They are not MINE!, they are just various videos which i find on Googlevideo and upload..(and forgive me for grammar errors in my spelling, trying desperate to translate all this in English... ;) )I Illuminati Five Sense ConspiracyII Illuminati ET/Spiritual ConspiracyIII Matrix Conspiracy/How to stop itPlease watch these videos in the correct chronological order to understand the "Big picture" ...However, I appreciate all of you that use of their time to watch some of these movies, so thanks to all you viewers!IMPORTANT! (2 april 2009)"4-3 Illuminati Five Sense Conspiracy:The men behind Obama (CFR-Nazis/Zionists)": Sorry, but this video was removed by Googlevideo.com during end of mars 2009, but now I've uploaded it once more :) Web-link to this movie here: http://video.google.com/videoplay?docid=-2507630729157000043 (and also further down the page)Illuminati Five Sense Conspiracy:1 Project Paperclip-Nazi-Bush family-connection http://video.google.com/videoplay?docid=45513028143076805622-1 CIA Bush Clinton and global drug traffic http://video.google.com/videoplay?docid=63125223207467955362-2 CIA Bush Clinton and global drug traffic http://video.google.com/videoplay?docid=-4661637688663981032-3 CIA Bush Clinton and global drug traffic http://video.google.com/videoplay?docid=61278018839150362182-4 CIA Bush Clinton and global drug traffic http://video.google.com/videoplay?docid=-69961054450506446203-1 World Intelligence agencies are behind 9/11 http://video.google.com/videoplay?docid=54530578852859835653-2 British Intelligence Mi5 Annie Machon talks http://video.google.com/videoplay?docid=-58653254840039952743-3 British Intelligence Mi5 David Shayler talk http://video.google.com/videoplay?docid=-3053688507762410473-4 Mike Ruppert on CIA's involvement in 9/11 http://video.google.com/videoplay?docid=37460890210085575403-5 Investigator Jim Marrs speech 2006 on 9/11 http://video.google.com/videoplay?docid=-55722000010154116173-6 Alex Jones movie: "Terror Storm" (9/11) http://video.google.com/videoplay?docid=54487112924767482643-7 Mike Ruppert "CIA/MOSSAD involved in 9/11" http://video.google.com/videoplay?docid=-80185240217769797654-1 History Channel on Secret Societies (2001) http://video.google.com/videoplay?docid=-27426082108806305054-2 USA- UN/British Queen/Monarchy- connection http://video.google.com/videoplay?docid=57976489643834383824-3 The men behind Obama (CFR-Nazis/Zionists) http://video.google.com/videoplay?docid=-25076307291570000434-4 Stanleith Monteith on the Shadow Government http://video.google.com/videoplay?docid=-7894699430978738680S4-5 They are creating a facist New World Order http://video.google.com/videoplay?docid=53259803448740986244-6 NWO speeches by mind-controlled puppets http://video.google.com/videoplay?docid=-1013366918995252065and https://www.youtube.com/watch?v=XQGuVFsZ3wE4-7 Who is the Illuminati? Fritz Springmeier http://video.google.com/videoplay?docid=-79771233727312833534-8 The movie "Shadows in motion" - Illuminati http://video.google.com/videoplay?docid=45089876129759611034-9 Aaron Russo -"America: Freedom to Fascism" http://video.google.com/videoplay?docid=-68591742439382317694-10 Alex Jones interviews Aaron Russo http://video.google.com/videoplay?docid=-74314689869608537904-11 Alex Jones movie: "Endgame" Recut http://video.google.com/videoplay?docid=-35057919081522782844-12 Jim Marrs lecture: "Rule By Secrecy" http://video.google.com/videoplay?docid=-7001033573424921364-13 Anthony J Hilder movie: "Illuminazi" http://video.google.com/videoplay?docid=-91824547734691772384-14 Anthony Hilder:911_greatest_lie_ever_sold http://video.google.com/videoplay?docid=30615520929272851155-1 David Icke-Illuminati and the money system http://video.google.com/videoplay?docid=90758231513819224935-2 Euro first,then Amero,soon World Currency http://video.google.com/videoplay?docid=44893114442192846436 Illuminati wants Fema-prisoncamps/martial law http://video.google.com/videoplay?docid=-89961357420216109497-1 Human population reduction plan: Aspartame http://video.google.com/videoplay?docid=5371024506357194937-2 Human population reduction plan: GMF I http://video.google.com/videoplay?docid=-16321225106187118157-3 Human population reduction plan: GMF II http://video.google.com/videoplay?docid=-87247520988841541217-4 Human population reduction: Mc Donalds http://video.google.com/videoplay?docid=-44313437171907970997-5 Human population reduction plan:Fluoride I http://video.google.com/videoplay?docid=47703663768126811977-6 Human population reduction plan:Fluoride II http://video.google.com/videoplay?docid=64733672105456888257-7 Human population reduction plan:FluorideIII http://video.google.com/videoplay?docid=-46260071026254538937-8 Human population reduction plan: AIDS http://video.google.com/videoplay?docid=82269500943879152247-9 Human population reduction plan:Vaccines I http://video.google.com/videoplay?docid=-30439017021907015517-10 Human population reduction plan:Vaccine II http://video.google.com/videoplay?docid=-91259237196698850077-11 Human population reduction plan:Chemtrails http://video.google.com/videoplay?docid=3907748278082324117-12 Human population reduction plan:Cellphones http://video.google.com/videoplay?docid=-85081232676102098887-13 Human population control plan:Microchip I http://video.google.com/videoplay?docid=57623853548753067687-14 Human population control plan:MicrochipII http://video.google.com/videoplay?docid=-83921528842139783457-15 Population reduction/control plan: Summary http://video.google.com/videoplay?docid=-21594101188625708447-16 Dr. Begich on harmful technology I (ELF) http://video.google.com/videoplay?docid=-87392726747932855627-17 Dr. Begich on harmful technology II (ELF) http://video.google.com/videoplay?docid=76395160522622892278-1 The Satanic Vatican-Nazi-USA connection http://video.google.com/videoplay?docid=25705532551102211628-2 Erich Priebke- a nazi protected by vatican http://video.google.com/videoplay?docid=-81750135463063488748-3 Pedophilia in the satanic vatican http://video.google.com/videoplay?docid=90534825884903831828-4 CIA-pedophilia/human sacrifice/satanism I http://video.google.com/videoplay?docid=-91781356139614819868-5 CIA-pedophilia/human sacrifice/satanism II http://video.google.com/videoplay?docid=11289392080889314458-6 Pedophilia in the White House I (Bush Sr) http://video.google.com/videoplay?docid=-32499712957381304608-7 Pedophilia in the White House II (Bush Sr) http://video.google.com/videoplay?docid=58374104071231950908-8 White House -Sex slave program "MK ULTRA" http://video.google.com/videoplay?docid=2921039983949150548-9 MK Ultra victim- Cathy O'brien I http://video.google.com/videoplay?docid=90833237486757934858-10 MK Ultra victim- Cathy O'brien II http://video.google.com/videoplay?docid=-5401266700375326848-11 MK Ultra victim- Cathy O'brien III http://video.google.com/videoplay?docid=3066770951762303758-12 Fritz Springmeier: Mind control/Microchip http://video.google.com/videoplay?docid=72981916534823263408-13 Alex Jones:"Inside Bohemian Grove-Reprise" http://video.google.com/videoplay?docid=-32611513296295122048-14 Alex Jones: "Order of Death" http://video.google.com/videoplay?docid=-54939446504463920559-1 Michael Tsarion, a clip from a NWO lecture http://video.google.com/videoplay?docid=33211054071639633529-2 Michael Tsarion on the Illuminati-interview http://video.google.com/videoplay?docid=6246646476049406099-3 David Icke at BRIXTON ACADEMY 2006 pt. 1-3 http://video.google.com/videoplay?docid=36567748508831542169-4 David Icke at BRIXTON ACADEMY 2006 pt. 2-3 http://video.google.com/videoplay?docid=-51221920449458021009-5 David Icke:Big Brother,the Big Picture 2008 http://video.google.com/videoplay?docid=5507779317366044946EXTRA: Listen to David Icke interview jan. 2009 on what is REALLY going on in Israel/Palestina https://www.youtube.com/watch?v=bgnpKM4S_qI&hl=noDavid Icke: - Illuminati created all Religions for mind control https://www.youtube.com/watch?v=FsndEjU1TdY&hl=nohttps://www.youtube.com/watch?v=hfhP5BS7_Zg&hl=no- on "New Age" (just another mind-control religion) https://www.youtube.com/watch?v=S93QS933Kug&hl=noJordan Maxwell: "Toxic Religion" http://video.google.com/videoplay?docid=-1233470340177165445&ei=5WqbSYazOZuW2gL6ovCNDg&q=%22jordan+maxwell%22+religion&dur=3http://video.google.com/videoplay?docid=-6568311593712012386&ei=5WqbSYazOZuW2gL6ovCNDg&q=%22jordan+maxwell%22+religion&dur=3Illuminati symbolism: https://www.youtube.com/watch?v=9LEljS3ib84&hl=noIlluminati ET/Spiritual Conspiracy:1 Intro http://video.google.com/videoplay?docid=-19535008191425557092-1 Aliens are here- Cover up by government http://video.google.com/videoplay?docid=82539161153987152622-2 Alien/Manmade Ufo's- pics/video captures http://video.google.com/videoplay?docid=-5330992557114770212-3 Moon and Mars-Mystic pics/video captures http://video.google.com/videoplay?docid=-8287436625468884942-4 Movie: UFO The Greatest Story Ever Denied http://video.google.com/videoplay?docid=86244184977072364862-5 Disclousure Project press meeting http://video.google.com/videoplay?docid=4347042313597556512-6 Disclosure Project Witness Testimony I http://video.google.com/videoplay?docid=-86891942783412879772-7 Disclosure Project Witness Testimony II http://video.google.com/videoplay?docid=6129847356354477432-8 William Cooper 1989 - ufo/alien secrecy http://video.google.com/videoplay?docid=3414282627974580013EXTRA: W. Cooper "Behold a Pale Horse" Ufo lecture 91: http://video.google.com/videoplay?docid=-729985813912005672&ei=FHmhSdKELpbA2AKh4OyPDg&q=%22bill+cooper%22&dur=32-9 "The Hour of Our Time"- William Cooper http://video.google.com/videoplay?docid=-23945984005094184502-10 Al Bielek- Intro + Secret technology http://video.google.com/videoplay?docid=23649641316646412082-11 Al Bielek- Nazis, aliens and Mars http://video.google.com/videoplay?docid=19230356582368084632-12 Al Bielek- Illuminati alien technology http://video.google.com/videoplay?docid=40781576819185714782-13 Movie: "Secret Space" http://video.google.com/videoplay?docid=88681584457312224182-14 Al Bielek-more on Illuminati alien tech http://video.google.com/videoplay?docid=82427728269229144222-15 Richard Hoagland-What is on Mars? 2001 http://video.google.com/videoplay?docid=-64740829205815123612-16 Project Camelot- R. Hoagland-Part 1 of 3 http://video.google.com/videoplay?docid=81350043641409445822-17 Project Camelot- R. Hoagland-Part 2 of 3 http://video.google.com/videoplay?docid=-67484242570080436502-18 Project Camelot- R. Hoagland-Part 3 of 3 http://video.google.com/videoplay?docid=26051223524185059073-1 Secret Illuminati alien/military bases http://video.google.com/videoplay?docid=14431775771947284323-2 Barry King on alien/military bases http://video.google.com/videoplay?docid=-27714739273834499933-3 Alien and PLF abductions of humans http://video.google.com/videoplay?docid=82684599926330499113-4 Drawings/Pictures from underground bases http://video.google.com/videoplay?docid=23599785345162183673-5 Bill Hamilton on alien/military bases http://video.google.com/videoplay?docid=-67074971895427314333-6 Phil Schneider:Alien bases/Black budget I http://video.google.com/videoplay?docid=19342255545938971533-7 Phil Schneider:Alien bases/Black budgetII http://video.google.com/videoplay?docid=-6513912718655772313-8 P. Schneider:Alien bases/Black budgetIII http://video.google.com/videoplay?docid=16907997869924383324-1 Reptilian-ET's and other alien races http://video.google.com/videoplay?docid=-33766747475201204424-2 Alex Collier intro - the alien contactee http://video.google.com/videoplay?docid=78001460513947168814-3 Alex Collier 1994 on reptilians and greys http://video.google.com/videoplay?docid=-66080965788055685934-4 Alex Collier 1995 lecture http://video.google.com/videoplay?docid=-6164959479398069714-5 Alex Collier 1996 What's on Moon/Mars? http://video.google.com/videoplay?docid=-8365292457753203742&hl=enEXTRA: Several Whistleblowers/Researchers talking about Reptilians(Draconians): Pt.1 https://www.youtube.com/watch?v=2IwGxh6as-4&hl=noPt.2 https://www.youtube.com/watch?v=vWUeNGMTYHg&hl=no4-6 Stewart Swerdlow:Reptilians/Human history http://video.google.com/videoplay?docid=2653493414052275863&hl=en4-7 Xcon 2004 - Michael Salla - Exopolitics http://video.google.com/videoplay?docid=-1852709611620600975&hl=en4-8 Xcon 2005 - Michael Salla - Exopolitics http://video.google.com/videoplay?docid=-8533702049164050227&hl=en4-9 Michael Salla on aliens (also reptilians) http://video.google.com/videoplay?docid=-5096755361575834396&hl=en4-10 George Green - The Big Picture 1 http://video.google.com/videoplay?docid=-5838486608061413130&hl=en4-11 George Green - The Big Picture 2 http://video.google.com/videoplay?docid=4305564287969995792&hl=en4-12 George Green - The Big Picture 3 http://video.google.com/videoplay?docid=-4887480239996013236&hl=en4-13 Project Camelot interviews George Green1 http://video.google.com/videoplay?docid=-1300559252807577656&hl=en4-14 Project Camelot interviews George Green2 http://video.google.com/videoplay?docid=5841975609368076185&hl=en4-15 Jordan Maxwell -a personal ufo sighting http://video.google.com/videoplay?docid=-5899469261241240032&hl=en5-1 Jordan Maxwell on Aliens and Illuminati http://video.google.com/videoplay?docid=-5486179667070529990&hl=en5-2 Aliens created Humans as a slave race http://video.google.com/videoplay?docid=7137872979120625798&hl=en5-3 Michael Tsarion - Origins of evil http://video.google.com/videoplay?docid=-66742082360431770055-4 The Illuminati-Reptilian connection http://video.google.com/videoplay?docid=1898362786485340141EXTRA: David Icke-Discovery Channel- on Illuminati reptilian hybrids: http://vodpod.com/watch/1397632-david-icke-aliensReptilian statues/art around the world: https://www.youtube.com/watch?v=pbeb2OYUuNc&hl=no5-5 Secret Space, Volume 2,Illuminati 1 of 4 http://video.google.com/videoplay?docid=42659280552540317815-6 Secret Space, Volume 2,Illuminati 2 of 4 http://video.google.com/videoplay?docid=18909891812158587695-7 Secret Space, Volume 2,Illuminati 3 of 4 http://video.google.com/videoplay?docid=53589767538474152455-8 Secret Space, Volume 2,Illuminati 4 of 4 http://video.google.com/videoplay?docid=31766445425894863795-9 Creation of Illuminati Bluebloods http://video.google.com/videoplay?docid=9569601809611431995-10 The reptilian brainstructure in Humans http://video.google.com/videoplay?docid=-56323885198957113955-11 David Icke on Illuminati and bloodlines http://video.google.com/videoplay?docid=17317461843593911955-12 David Icke on Illuminati shapeshifters http://video.google.com/videoplay?docid=47487986244829557865-13 Credo Mutwa interview 1998 on reptilians pt 1 http://video.google.com/videoplay?docid=2272371077475614736pt 2 http://video.google.com/videoplay?docid=-57868093284297780305-14 Satanism-Worshipping of astral entities http://video.google.com/videoplay?docid=-31795634484527999365-15 Arizona Wilder on Illuminati cermonies http://video.google.com/videoplay?docid=-35907867538907834605-16 David Icke - From Prison To Paradise pt. 1 http://video.google.com/videoplay?docid=15020308490237550405-17 David Icke - Secrets Of The Matrix pt. 3A http://video.google.com/videoplay?docid=-6692477420664030032("David Icke - Secrets Of The Matrix pt. 3B" are further down the page in my "Matrix Conspiracy/How to stop it" section)6-1 Stewart Swerdlow-Illuminati/Mind control1 http://video.google.com/videoplay?docid=21802762088839330206-2 The Montauk Project One Mans Story http://video.google.com/videoplay?docid=79907068536863979536-3 Al Bielek- Microchips and mind Control http://video.google.com/videoplay?docid=28014849466768574176-4 Al bielek- Illuminati and abducted kids http://video.google.com/videoplay?docid=-39748063802963591516-5 Stewart Swerdlow-Illuminati/Mind control2 http://video.google.com/videoplay?docid=26880181312456623726-6 Mi6 James Casbolt-Aliens/military bases http://video.google.com/videoplay?docid=81496356456355131856-7 John Kuhles interviews James Casbolt MI6 http://video.google.com/videoplay?docid=-4328658233977764386-8 Stewart swerdlow on Illuminati agenda http://video.google.com/videoplay?docid=1042423949587964296-9 Dr Deagle lecture on Illuminati http://video.google.com/videoplay?docid=90834890040792667606-10 Freeman Perspective with Dr Deagle http://video.google.com/videoplay?docid=37504308912190011396-11 Al bielek -The Big Cosmic Conspiracy http://video.google.com/videoplay?docid=2420019765105253066-12 The secret Illuminati project HAARP 1 http://video.google.com/videoplay?docid=-55328261241267100976-13 The secret Illuminati project HAARP 2 http://video.google.com/videoplay?docid=28240776453826894676-14 The secret Illuminati project HAARP 3 http://video.google.com/videoplay?docid=-35109918749769053936-15 Staged alien invasion/New world religion http://video.google.com/videoplay?docid=3872291715011293801EXTRA: How Illuminati commits murders as global cermonies/rituals towards a NWO state (Diana/JFK/911 etc...)Pt 1 http://video.google.com/videoplay?docid=4087646325082746045&ei=V9mkSdqNM5bA2AKh4OyPDg&q=+%22Illuminati%22&so=1Pt 2 http://video.google.com/videoplay?docid=2924301833863916843&ei=V9mkSdqNM5bA2AKh4OyPDg&q=+%22Illuminati%22&so=1Pt 3 http://video.google.com/videoplay?docid=-4330144102122070931&ei=V9mkSdqNM5bA2AKh4OyPDg&q=+%22Illuminati%22&so=1Matrix Conspiracy/How to stop it:1-1 Alex Collier 2008 - Spiritual teachings http://video.google.com/videoplay?docid=3859153721428502971-2 Michael Tsarion on consciousness I http://video.google.com/videoplay?docid=70183876165600335561-3 Michael Tsarion on consciousness II http://video.google.com/videoplay?docid=-92071064917149072041-4 Stewart Swerdlow - Strenghten your mind 1 http://video.google.com/videoplay?docid=-69774604751718611331-5 Stewart Swerdlow - Strenghten your mind 2 http://video.google.com/videoplay?docid=-50483404762840318461-6 Janet Swerdlow - Strenghten your mind 3 http://video.google.com/videoplay?docid=8887682140077979691-7 David Icke - Secrets Of The Matrix pt. 3B http://video.google.com/videoplay?docid=11335295713470007611-8 David Icke BRIXTON ACADEMY 2006 pt. 3 of 3 http://video.google.com/videoplay?docid=156444708921675682FINALA list, what I believe to be.......The 13 Illuminati Hybrid Bloodline Families (50/50% reptilians/humans - bluebloods) that rules/dictates the world:1. Rothschild (Bauer) -The most powerful family -Here we find the "Pindar" (which means "Penis of the Dragon")-the highest ranking hybrid person in the Illuminati.2. Bruce He reports to the pure-bred Reptilian leader in the inner-earth.3. Cavendish (Kennedy)4. de Medici5. Hanover6. Hapsburg (Habsburg)7. Krupps Although these families are fighting among themselves about world domination, their common goal is a NWO state, consisting of:8. Plantagenet 1. A World central bank 2. A World currency 3. A World army 4. A Microchipped world population (exept themselves)9. Rockefeller10. Romanov11. Sinclair/ St Clair12. Warburg (del Banco)13. Windsor (the German house of Saxe-Coburg-Gothe)(Underneath these 13 families we find Committee of 300 families)A good weblink with more detailed information about the 13 Bloodline families and Committee of 300: http://www.bibliotecapleyades.net/sumer_anunnaki/reptiles/reptiles08.htmRecomended links:Dulce underground alien/military base (DUMB-Deep underground military base)http://www.crowdedskies.com/dulce_papers.htmhttp://www.subversiveelement.com/dulce.htmlJames Casbolthttp://www.jamescasbolt.com/index.htmlAlex Collierhttp://www.bibliotecapleyades.net/esp_andromedacom.htmhttp://www.bibliotecapleyades.net/andromeda/lfa/lfa.htmlhttp://www.galacticdiplomacy.com/Contactees-Collier.htm"Consciousmedia" (watch the free movies)http://www.consciousmedianetwork.com/members.htm"Project Camelot" Bill Ryan and Kerry L. Cassidyhttp://www.projectcamelot.org/David Ickehttp://www.davidicke.com/index.php/Stewart/Janet Swerdlowhttp://www.expansions.com/Recomended books/articles/lectures:Alex Collier"Defending sacred ground" (on internet,free):http://www.exopolitics.org/collier-dsg1.pdfhttp://www.knightspirit.com/Pages/dsg/defending-sacred-ground.htmlAlex Collier 2002 lecturehttp://exopoliticsjournal.com/vol-2/vol-2-2-Collier.htmhttp://exopoliticsjournal.com/vol-2/vol-2-2-Collier.pdfhttp://exopoliticsjournal.com/vol-2/vol-2-3-Collier.htmhttp://exopoliticsjournal.com/vol-2/vol-2-3-Collier.pdfhttp://exopoliticsjournal.com/vol-2/vol-2-4-Collier.htmhttp://exopoliticsjournal.com/vol-2/vol-2-4-Collier.pdfDavid Icke(from http://www.davidickebooks.co.uk/)"The David Icke Guide to the GlobalConspiracy (and how to end it)"Stewart/Janet Swerdlow(from http://www.expansions.com/)"Blue Blood True Blood: Conflict & Creation""Montauk: The Alien Connection""Stewart Says..."Recomended DVD's:Stewart/Janet Swerdlow(from http://www.expansions.com/)"Conspiracy Con 2006 & 2007""Illuminating the Illuminati""Blue Blood True Blood DVD"Other Illuminati- Authors/Researchers of interest: Alex Jones http://www.prisonplanet.com/ http://www.infowars.com/William (Bill) Cooper http://www.thewatcherfiles.com/william_cooper.htmAl Bielek http://www.bielek.com/Jordan Maxwell http://www.jordanmaxwell.com/Michael Salla http://www.exopoliticsinstitute.org/Richard Hoagland http://www.enterprisemission.com/Cathy O'brien http://www.trance-formation.com/Other web-links: http://www.crowdedskies.com/index.htmhttp://www.subversiveelement.com/http://www.bibliotecapleyades.net/inicio.htmEdit this page (if you have permission) |Google Docs -- Web word processing, presentations and spreadsheets.
Read more…
http://www.globalresearch.ca/index.php?context=va&aid=7123On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technologyby Carole Smith.Global Research, October 18, 2007Journal of Psycho-Social Studies, 2003."We have failed to comprehend that the result of the technology that originated in the years of the arms race between the Soviet Union and the West, has resulted in using satellite technology not only for surveillance and communication systems but also to lock on to human beings, manipulating brain frequencies by directing laser beams, neural-particle beams, electro-magnetic radiation, sonar waves, radiofrequency radiation (RFR), soliton waves, torsion fields and by use of these or other energy fields which form the areas of study for astro-physics. Since the operations are characterised by secrecy, it seems inevitable that the methods that we do know about, that is, the exploitation of the ionosphere, our natural shield, are already outdated as we begin to grasp the implications of their use." [Excerpt]


For those of us who were trained in a psychoanalytical approach to the patient which was characterised as patient centred, and which acknowledged that the effort to understand the world of the other person entailed an awareness that the treatment was essentially one of mutuality and trust, the American Psychiatry Association’s Diagnostic Criteria for Schizotypal personality was always a cause for alarm. The Third Edition (1987) of Diagnostic and Statistical Manual of Mental Disorders (DSM) required that there be at least four of the characteristics set out for a diagnosis of schizophrenia, and an approved selection of four could be: magical thinking, telepathy or sixth sense; limited social contact; odd speech; and over-sensitivity to criticism. By 1994, the required number of qualifying characteristics were reduced to two or more, including, say, hallucinations and ‘negative ‘ symptoms such as affective flattening, or disorganised or incoherent speech – or only one if the delusions were bizarre or the hallucination consisted of a voice keeping up a running commentary on the person’s behaviour or thoughts. The next edition of the DSM is not due until the year 2010.

In place of a process of a labelling which brought alienation and often detention, sectioning, and mind altering anti-psychotic medication, many psychoanalysts and psychotherapists felt that even in severe cases of schizoid withdrawal we were not necessarily wasting our time in attempting to restore health by the difficult work of unravelling experiences in order to make sense of an illness. In this way, psychoanalysis has been, in its most radical form, a critic of a society, which failed to exercise imaginative empathy when passing judgement on people. The work of Harry Stack Sullivan, Frieda Fromm-Reichmann, Harold Searles or R.D. Laing - all trained as psychiatrists and all of them rebels against the standard procedures – provided a way of working with people very different from the psychiatric model, which seemed to encourage a society to repress its sickness by making a clearly split off group the carriers of it. A psychiatrist in a mental hospital once joked to me, with some truth, when I commented on the number of carrier bags carried by many of the medicated patients around the hospital grounds, that they assessed the progress of the patient in terms of the reduction of the number of carrier bags. It is too often difficult to believe, however, when hearing the history of a life, that the “schizophrenic” was not suffering the effects of having been made, consciously and unconsciously, the carefully concealed carrier of the ills of the family.

For someone who felt his mind was going to pieces, to be put into the stressful situation of the psychiatric examination, even when the psychiatrist acquitted himself with kindness, the situation of the assessment procedure itself, can be ‘an effective way to drive someone crazy, or more crazy.’ (Laing, 1985, p 17). But if the accounting of bizarre experiences more or less guaranteed you a new label or a trip to the psychiatric ward, there is even more reason for a new group of people to be outraged about how their symptoms are being diagnosed. A doubly cruel sentence is being imposed on people who are the victims of the most appalling abuse by scientific-military experiments, and a totally uncomprehending society is indifferent to their evidence. For the development of a new class of weaponry now has the capability of entering the brain and mind and body of another person by technological means.

Harnessing neuroscience to military capability, this technology is the result of decades of research and experimentation, most particularly in the Soviet Union and the United States. (Welsh, 1997, 2000) We have failed to comprehend that the result of the technology that originated in the years of the arms race between the Soviet Union and the West, has resulted in using satellite technology not only for surveillance and communication systems but also to lock on to human beings, manipulating brain frequencies by directing laser beams, neural-particle beams, electro-magnetic radiation, sonar waves, radiofrequency radiation (RFR), soliton waves, torsion fields and by use of these or other energy fields which form the areas of study for astro-physics. Since the operations are characterised by secrecy, it seems inevitable that the methods that we do know about, that is, the exploitation of the ionosphere, our natural shield, are already outdated as we begin to grasp the implications of their use. The patents deriving from Bernard J. Eastlund’s work provide the ability to put unprecedented amounts of power in the Earth’s atmosphere at strategic locations and to maintain the power injection level, particularly if random pulsing is employed, in a manner far more precise and better controlled than accomplished by the prior art, the detonation of nuclear devices at various yields and various altitudes. (ref High Frequency Active Auroral Research Project, HAARP).

Some patents, now owned by Raytheon, describe how to make “nuclear sized explosions without radiation” and describe power beam systems, electromagnetic pulses and over-the-horizon detection systems. A more disturbing use is the system developed for manipulating and disturbing the human mental process using pulsed radio frequency radiation (RFR), and their use as a device for causing negative effects on human health and thinking. The victim, the innocent civilian target is locked on to, and unable to evade the menace by moving around. The beam is administered from space. The Haarp facility as military technology could be used to broadcast global mind-control, as a system for manipulating and disturbing the human mental process using pulsed radio frequency (RFR). The super-powerful radio waves are beamed to the ionosphere, heating those areas, thereby lifting them. The electromagnetic waves bounce back to the earth and penetrate human tissue.

Dr Igor Smirnov, of the Institute of Psycho-Correction in Moscow, says: “It is easily conceivable that some Russian ‘Satan’, or let’s say Iranian – or any other ‘Satan’, as long as he owns the appropriate means and finances, can inject himself into every conceivable computer network, into every conceivable radio or television broadcast, with relative technological ease, even without disconnecting cables…and intercept the radio waves in the ether and modulate every conceivable suggestion into it. This is why such technology is rightfully feared.”(German TV documentary, 1998).

If we were concerned before about diagnostic criteria being imposed according to the classification of recognizable symptoms, we have reason now to submit them to even harsher scrutiny. The development over the last decades since the Cold War arms race has included as a major strategic category, psycho-electronic weaponry, the ultimate aim of which is to enter the brain and mind. Unannounced, undebated and largely unacknowledged by scientists or by the governments who employ them – technology to enter and control minds from a distance has been unleashed upon us. The only witnesses who are speaking about this terrible technology with its appalling implications for the future, are the victims themselves and those who are given the task of diagnosing mental illness are attempting to silence them by classifying their evidence and accounts as the symptoms of schizophrenia, while the dispensers of psychic mutilation and programmed pain continue with their work, aided and unopposed.

If it was always crucial, under the threat of psychiatric sectioning, to carefully screen out any sign of confused speech, negativity, coldness, suspicion, bizarre thoughts, sixth sense, telepathy, premonitions, but above all the sense that “others can feel my feelings, and that someone seemed to be keeping up a running commentary on your thoughts and behaviour,” then reporting these to a psychiatrist, or anyone else for that matter who was not of a mind to believe that such things as mind-control could exist, would be the end of your claim to sanity and probably your freedom. For one of the salient characteristics of mind-control is the running commentary, which replicates so exactly, and surely not without design, the symptoms of schizophrenia. Part of the effort is to remind the victim that they are constantly under control or surveillance. Programmes vary, but common forms of reminders are electronic prods and nudges, body noises, twinges and cramps to all parts of the body, increasing heart beats, applying pressures to internal organs – all with a personally codified system of comments on thoughts and events, designed to create stress, panic and desperation. This is mind control at its most benign. There is reason to fear the use of beamed energy to deliver lethal assaults on humans, including cardiac arrest, and bleeding in the brain.

It is the government system of secrecy, which has facilitated this appalling prospect. There have been warning voices. “…the government secrecy system as a whole is among the most poisonous legacies of the Cold War …the Cold War secrecy (which) also mandate(s) Active Deception…a security manual for special access programs authorizing contractors to employ ‘cover stories to disguise their activities. The only condition is that cover stories must be believable.” (Aftergood & Rosenberg, 1994; Bulletin of Atomic Scientist). Paranoia has been aided and abetted by government intelligence agencies.

In the United Kingdom the fortifications against any disturbing glimmer of awareness of such actual or potential outrages against human rights and social and political abuses seem to be cast in concrete. Complete with crenellations, ramparts and parapets, the stronghold of nescience reigns supreme. To borrow Her Majesty the Queen’s recent observation: “There are forces at work of which we are not aware.” One cannot say that there is no British Intelligence on the matter, as it is quite unfeasible that the existence of the technology is not classified information. Indeed it is a widely held belief that the women protesting against the presence of cruise missiles at Greenham Common were victims of electro-magnetic radiation at gigahertz frequency by directed energy weapons, and that their symptoms, including cancer, were consistent with such radiation effects as reported by Dr Robert Becker who has been a constantly warning voice against the perils of electro-magnetic radiation. The work of Allen Frey suggests that we should consider radiation effects as a grave hazard producing increased permeability of the blood-brain barrier, and weakening crucial defenses of the central nervous system against toxins. (Becker, 1985, p. 286). Dr Becker has written about nuclear magnetic resonance as a familiar tool in medecine known as magnetic resonance imaging or MRI. Calcium efflux is the result of cyclotronic resonance which latter can be explained thus: If a charged particle or ion is exposed to a steady magnetic field in space, it will begin to go into a circular or orbital, motion at right angles to the applied magnetic field.The speed with which it orbits will be determined by the ratio between the charge and the mass of the particle and by the strength of the magnetic field. (Becker, 1990,p.235) The implications of this for wide scale aggression by using a combination of radar based energy and the use of nuclear resonating are beyond the scope of the writer, but appear to be worth the very serious consideration of physicists in assessing how they might be used against human beings.

Amongst medical circles, however, it has so far not been possible for the writer to find a neuroscientist, neurologist or a psychiatrist, nor for that matter, a general medical practitioner, who acknowledges even the potential for technological manipulation of the nervous system as a problem requiring their professional interest. There has been exactly this response from some of England’s most eminent practitioners of the legal profession, not surprisingly, because the information about such technology is not made available to them. They would refer anyone attempting to communicate mind- harassment as a psychiatric problem, ignoring the crime that is being committed.

The aim here is not to attempt a comprehensive history and development of the technology of mind control. These very considerable tasks - which have to be done under circumstances of the most extreme difficulty - have been addressed with clarity and courage by others, who live with constant harm and threats, not least of all contemptuous labelling. Their work can be readily accessed on the internet references given at the end of this paper. For a well-researched outline of the historical development of electro-magnetic technology the reader should refer to the timeline of dates and electromagnetic weapon development by Cheryl Welsh, president of Citizens against Human Rights Abuse. (Welsh 1997; 2001). There are at least one and a half thousand people worldwide who state they are being targeted. Mojmir Babacek, now domiciled in his native Czech Republic, after eight years of residence in the United States in the eighties, has made a painstakingly meticulous review of the technology, and continues his research. (Babacek 1998, 2002)

We are concerned here with reinforcing in the strongest possible terms:

i) The need for such abuses to human rights and the threats to democracy to be called to consciousness, and without further delay.

ii) To analyse the reasons why people might defend themselves from becoming conscious of the existence of such threats.

iii) To address the urgent need for intelligence, imagination, and information - not to mention compassion - in dealing with the victims of persecution from this technology, and

iv) To alert a sleeping society, to the imminent threats to their freedom from the threat from fascist and covert operations who have in all probability gained control of potentially lethal weaponry of the type we are describing.

It is necessary to emphasise that at present there is not even the means for victims to gain medical attention for the effects of radiation from this targeting. Denied the respect of credulity of being used as human guinea pigs, driven to suicide by the breakdown of their lives, they are treated as insane – at best regarded as ‘sad cases’. Since the presence of a permanent ‘other’ in one’s mind and body is by definition an act of the most intolerable cruelty, people who are forced to bear it but who refuse to be broken by it, have no other option than to turn themselves into activists, their lives consumed by the battle against such atrocities, their energies directed to alerting and informing the public of things they don’t want to hear or understand about evil forces at work in their society.
It is necessary, at this point, to briefly outline a few – one might say the precious few – attempts by public servants to verify the existence and dangers inherent in this field:

  • In January 1998, an annual public meeting of the French National Bioethics Committee was held in Paris. Its chairman, Jean-Pierre Changeux, a neuroscientist at the Institut Pasteur in Paris, told the meeting that “advances in cerebral imaging make the scope for invasion of privacy immense. Although the equipment needed is still highly specialized, it will become commonplace and capable of being used at a distance. That will open the way for abuses such as invasion of personal liberty, control of behaviour and brainwashing. These are far from being science-fiction concerns…and constitute “a serious risk to society.” (“Nature.” Vol 391, 1998.
  • In January 1999, the European Parliament passed a resolution where it calls “ for an international convention introducing a global ban on all development and deployment of weapons which might enable any form of manipulation of human beings. It is our conviction that this ban can not be implemented without the global pressure of the informed general public on the governments. Our major objective is to get across to the general public the real threat which these weapons represent for human rights and democracy and to apply pressure on the governments and parliaments around the world to enact legislature which would prohibit the use of these devices to both government and private organisations as well as individuals.” (Plenary sessions/Europarliament, 1999)
  • In October 2001, Congressman Dennis J. Kucinich introduced a bill to the House of Representatives which, it was hoped would be extremely important in the fight to expose and stop psycho-electronic mind control experimentation on involuntary, non-consensual citizens. The Bill was referred to the Committee on Science, and in addition to the Committee on Armed Services and International Relations. In the original bill a ban was sought on ‘exotic weapons’ including electronic, psychotronic or information weapons, chemtrails, particle beams, plasmas, electromagnetic radiation, extremely low frequency (ELF) or ultra low frequency (ULF) energy radiation, or mind control technologies. Despite the inclusion of a prohibition of the basing of weapons in space, and the use of weapons to destroy objects or damage objects in space, there is no mention in the revised bill of any of the aforementioned mind-invasive weaponry, nor of the use of satellite or radar or other energy based technology for deploying or developing technology designed for deployment against the minds of human beings. (Space Preservation Act, 2002)

In reviewing the development of the art of mind-invasive technology– there are a few outstanding achievements to note:

In 1969 Dr Jose Delgado, a Yale psychologist, published a book: “Physical Control of the Mind: Towards a Psychocivilized Society”. In essence, he displayed in practical demonstrations how, by means of electrical stimulation of the brain which had been mapped out in its relations between different points and activities, functions and sensations, - by means of electrical stimulation, how the rhythm of breathing and heartbeat could be changed, as well as the function of most of the viscera, and gall bladder secretion. Frowning, opening and closing of eyes and mouth, chewing, yawning, sleep, dizziness, epileptic seizures in healthy persons were induced. The intensity of feelings could be controlled by turning the knob, which controlled the intensity of the electric current. He states at the end of his book the hope that the new power will remain limited to scientists or some charitable elite for the benefit of a “psychocivilized society.”

In the 1980’s the neuromagnetometer was developed which functions as an antenna and could monitor the patterns emerging from the brain. (In the seventies the scientists had discovered that electromagnetic pulses enabled the brain to be stimulated through the skull and other tissues, so there was no more need to implant electrodes in the brain). The antenna, combined with the computer, could localize the points in the brain where the brain events occur. The whole product is called the magnetoencephalograph.

In January 2000 the Lockheed Martin neuroengineer Dr John D. Norseen, was quoted (US News and World Report, 2000) as hoping to turn the electrohypnomentalaphone, a mind reading machine, into science fact. Dr Norseen, a former Navy pilot, claims his interest in the brain stemmed from reading a Soviet book in the 1980’s claiming that research on the mind would revolutionize the military and society at large. By a process of deciphering the brain’s electrical activity, electromagnetic pulsations would trigger the release of the brain’s own transmitters to fight off disease, enhance learning, or alter the mind’s visual images, creating a ‘synthetic reality’. By this process of BioFusion, (Lockheed Martin, 2000) information is placed in a database, and a composite model of the brain is created. By viewing a brain scan recorded by (functional) magnetic resonance imaging (fMRI) machine, scientists can tell what the person was doing at the time of recording – say reading or writing, or recognise emotions from love to hate. “If this research pans out”, says Norseen, “you can begin to manipulate what someone is thinking even before they know it.” But Norseen says he is ‘agnostic’ on the moral ramifications, that he’s not a mad scientist – just a dedicated one. “The ethics don’t concern me,” he says, “but they should concern someone else.”

The next big thing looks like being something which we might refer to as a neurocomputer but it need not resemble a laptop – it may be reducible to whatever size is convenient for use, such as a small mobile phone. Arising from a break-through and exploitation of PSI-phenomena, it may be modelled on the nervous-psychic activity of the brain – that is, as an unbalanced, unstable system of neurotransmitters and interacting neurones, the work having been derived from the creation of a copy of a living brain – accessed by chance, and ESP and worked on by design.

On receiving a communication from the writer on the feasibility of a machine being on the horizon which, based on the project of collecting electromagnetic waves emanating from the brain and transmitting them into another brain that would read a person’s thoughts, or using the same procedure in order to impose somebody else’s thoughts on another brain and in this way direct his actions – there was an unequivocal answer from IBM at executive level that there was no existing technology to create such a computer in the foreseeable future. This is at some variance with the locating of a patent numbered 03951134 on the Internet pages of IBM Intellectual Property Network for a device, described in the patent, as capable of picking up at a distance the brain waves of a person, process them by computer and emit correcting waves which will change the original brain waves. Similar letters addressed to each of the four top executives of Apple Inc., in four individual letters marked for their personal attention, produced absolutely no response. This included the ex- Vice President of the United States, Mr Al Gore, newly elected to the Board of Directors of Apple.

Enough people have been sufficiently concerned by the reports of victims of mind control abuse to organise The Geneva Forum, in 2002, held as a joint initiative of the Quaker United Nations Office, Geneva; the United Nations Institute for Disarmament Research; the International Committee of the Red cross, and the Human Rights Watch (USA), and Citizens against Human Rights Abuses (CAHRA); and the Programme for Strategic and International Security Studies, which was represented by the Professor and Senior Lecturer from the Department of Peace Studies at the University of Bradford.

In England, on May 25, 1995, the Guardian newspaper in the U.K. carried an article based on a report by Nic Lewer, the peace researcher from Bradford University, which listed “more than 30 different lines of research into ‘new age weapons’…”some of the research sounds even less rational. There are, according to Lewer, plans for ‘pulsed microwave beams’ to destroy enemy electronics, and separate plans for very-low-frequency sound beams to induce vomiting, bowel spasm, epileptic seizures and also crumble masonry.” Further, the article states, “There are plans for ‘mind control’ with the use of 'psycho-correction messages’ transmitted by subliminal audio and visual stimuli. There is also a plan for ‘psychotronic weapons’ – apparently the projection of consciousness to other locations – and another to use holographic projection to disseminate propaganda and misinformation.” (Welsh, Timeline). Apart from this notable exception it is difficult to locate any public statement of the problem in the United Kingdom.

Unfortunately, the problem of credulity does not necessarily cease with frequent mention, as in the United States, in spite of the number of reported cases, there is still not sufficient public will to make strenuous protest against what is not only already happening, but against what will develop if left unchecked. It appears that the administration believes that it is necessary and justifiable, in the interests of national security, to make experimental human sacrifices, to have regrettable casualties, for there to be collateral damage, to suffer losses in place of strife or war. This is, of course, totally incompatible with any claims to be a democratic nation which respects the values of human life and democracy, and such an administration which tutors its servants in the ways of such barbaric tortures must be completely condemned as uncivilised and hypocritical.

Disbelief as a Defence Mechanism

In the face of widespread disbelief about mind-control, it seems worth analysing the basis of the mechanisms employed to maintain disbelief:

i) In the sixties, Soviet dissidents received a significant measure of sympathy and indignant protest from western democracies on account of their treatment, most notedly the abuse of psychiatric methods of torture to which they were subjected. It is noteworthy that we seem to be able to access credulity, express feelings of indignant support when we can identify with victims, who share and support our own value system, and who, in this particular historical case, reinforced our own values, since they were protesting against a political system which also threatened us at that time. Psychologically, it is equally important to observe that support from a safe distance, and the benefits to the psyche of attacking a split-off ‘bad father’, the soviet authorities in this case, presents no threat to one’s internal system; indeed it relieves internal pressures. On the other hand, recognizing and denouncing a similar offence makes very much greater psychic demands of us when it brings us into conflict with our own environment, our own security, our own reality. The defence against disillusion serves to suppress paranoia that our father figure, the president, the prime minister, our governments - might not be what they would like to be seen to be.

ii) The need to deposit destructive envy and bad feelings elsewhere, on account of the inability of the ego to acknowledge ownership of them - reinforces the usefulness of persons or groups, which will serve to contain those, disowned, projected feelings which arouse paranoid anxieties. The concepts of mind-invasion strike at the very heart of paranoid anxiety, causing considerable efforts to dislodge them from the psyche. The unconscious identification of madness with dirt or excrement is an important aspect of anal aggression, triggering projective identification as a defence.

iii) To lay oneself open to believing that a person is undergoing the experience of being invaded mentally and physically by an unseen manipulator requires very great efforts in the self to manage dread.

iv) The defence against the unknown finds expression in the split between theory and practice; between the scientist as innovator and the society who can make the moral decisions about his inventions; between fact and science fiction, the latter of which can present preposterous challenges to the imagination without undue threat, because it serves to reinforce a separation from the real.

v) Identification with the aggressor. Sadistic fantasies, unconscious and conscious, being transferred on to the aggressor and identified with, aid the repression of fear of passivity, or a dread of punishment. This mechanism acts to deny credulity to the victim who represents weakness. This is a common feature of satanic sects.

vi) The liberal humanist tradition which denies the worst destructive capacities of man in the effort to sustain the belief in the great continuity of cultural and scientific tradition; the fear, in one’s own past development, of not being ‘ongoing’, can produce the psychic effect of reversal into the opposite to shield against aggressive feelings. This becomes then the exaggerated celebration of the ‘new’ as the affirmation of human genius which will ultimately be for the good of mankind, and which opposes warning voices about scientific advances as being pessimistic, unenlightened, unprogressive and Luddite. Strict adherence to this liberal position can act as overcompensation for a fear of envious spoiling of good possessions, i.e. cultural and intellectual goods.

vii) Denial by displacement is also employed to ignore the harmful aspects of technology. What may be harmful for the freedom and good of society can be masked and concealed by the distribution of new and entertaining novelties. The technology, which puts a camera down your gut for medical purposes, is also used to limit your freedom by surveillance. The purveyors of innovative technology come up with all sorts of new gadgets, which divert, entertain and feed the acquisitive needs of insatiable shoppers, and bolster the economy. The theme of “Everything’s up to date in Kansas City” only takes on a downside when individual experience – exploding breast implants, say – takes the gilt off the gingerbread. Out of every innovation for evil (i.e. designed for harming and destroying) some ‘good’ (i.e. public diversion or entertainment) can be promoted for profit or crowd-pleasing.

viii) Nasa is sending a spacecraft to Mars, or so we are told. They plan to trundle across the Martian surface searching for signs of water and life. We do not hear dissenting voices about its feasibility.

Why is it that, when a person accounts that their mind is being disrupted and they are being persecuted by an unseen method of invasive technology, that we cannot bring ourselves to believe them? Could it be that the horror involved in the empathic identification required brings the shutters down? Conversely, the shared experience of the blasting of objects into space brings with it the possibilities of shared potency or the relief that resonates in the unconscious of a massive projection or evacuation – a shared experience which is blessed in the name of man’s scientific genius.

ix) The desire ‘not to be taken in’, not to be taken for a fool, provides one of the most powerful and common defence mechanism against credulity.

Power, Paranoia and Unhealthy Governments

The ability to be the bearer and container of great power without succumbing to the pressures of latent narcissistic psychoses is an important matter too little considered. The effect of holding power and the expectation and the need to be seen as capable of sustaining it, if not exercising it, encourages omnipotence of thought. In the wake of this, a narcissistic overevaluation of the subject’s own mental processes may set in. In the effort to hold himself together as the possessor, container and executor of power, he (or indeed, she) may also, undergo a process of splitting which allows him, along with others, to bear enthralled witness of himself in this illustrious role. This may mean that the seat of authority is vacated, at least at times. The splitting process between the experiencing ego and the perceiving ego allows the powerful leader to alternate his perception of himself inside and outside, sometimes beside, himself. With the reinforcement of himself from others as his own narcissistic object, reality testing is constrained. In this last respect, he has much in common with the other powerful figure of the age, the movie star. or by those, in Freud’s words, who are “ruined by success.”

In a world, which is facing increasing disillusion about the gulf between the public platforms on which governments are elected, and the contingencies and pragmatics of retaining defence strategies and economic investments, the role of military and intelligence departments, with their respective tools of domination and covert infiltration, is increasingly alarming. Unaccountable to the public, protected from exposure and prosecution by their immunity, licensed to lie as well as to kill, it is in the hands of these agents that very grave threats to human rights and freedom lies. Empowered to carry out aggression through classified weapon experimentation which is undetectable, these men and women are also open to corruption from lucrative offers of financial reward from powerful and sinister groups who can utilize their skills, privileged knowledge and expertise for frankly criminal and fascist purposes.

Our information about the psychological profiles of those who are employed to practice surveillance on others is limited, but it is not difficult to imagine the effects on the personality that would ensue with the persistent practice of such an occupation, so constantly exposed to the perversions. One gains little snatches of insight here and there. In his book on CIA mind control research (Marks, 1988), John Marks quotes a CIA colleague’s joke (always revealing for personality characteristics): “If you could find the natural radio frequency of a person’s sphincter, you could make him run out of the room real fast.” (One wonders if the same amusement is derived from the ability to apply, say infra-sound above 130 decibels, which is said to cause stoppage of the heart, according to one victim/activist from his readings of a report for the Russian Parliament.)

Left to themselves, these servants of the state may well feel exempt from the process of moral self-scrutiny, but the work must be dehumanising for the predator as well as the prey. It is probably true that the need to control their agents in the field was an incentive to develop the methods in use today. It is also an effectively brutalising training for persecuting others. Meanwhile the object, the prey, in a bid for not only for survival but also in a desperate effort to warn his or her fellows about what is going on, attempts to turn himself into a quantum physicist, a political researcher, a legal sleuth, an activist, a neurologist, a psychologist, a physiologist – his own doctor, since he cannot know what effects this freakish treatment might have on his body, let alone his mind. There are always new methods to try out which might prove useful in the search to find ways of disabling and destroying opponents – air injected into brains and lungs, lasers to strike down or blind, particle beams, sonar waves, or whatever combination of energies to direct, or destabilise or control.

Science and Scepticism

Scientists can be bought, not just by governments, but also by sinister and secret societies. Universities can be funded by governments to develop technology for unacceptably inhumane uses. The same people who deliver the weapons - perhaps respected scientists and academics - may cite the acceptable side of scientific discoveries, which have been developed by experimenting on unacknowledged, unfortunate people. In a cleaned up form, they are then possibly celebrated as a break-through in the understanding of the natural laws of the universe. It is not implausible that having delivered the technical means for destruction, the innovator and thinker goes on, wearing a different hat, to receive his (or her) Nobel Prize. There are scientists who have refused to continue to do work when they were approached by CIA and Soviet representatives. These are the real heroes of science.

In the power struggle, much lies at stake in being the first to gain control of ultimate mind-reading and mind-controlling technology. Like the nuclear bomb, common ownership would seem by any sane calculations to cancel out the advantage of possession, but there is always a race to be the first to possess the latest ultimate means of mass destruction. The most desirable form is one that can be directed at others without contaminating oneself in the process - one that can be undetected and neatly, economically and strategically delivered. We should be foolish to rule out secret organisations, seeing threat only from undemocratic countries and known terrorist groups.

As consumers in a world which is increasingly one in which shopping is the main leisure activity, we should concern ourselves to becoming alert to the ways in which human welfare may have been sacrificed to produce an awesome new gadget. It may be the cause for celebration for the ‘innovator’, but brought about as the result of plugging in or dialling up the living neuronal processes of an enforced experimentee. If we are concerned not to eat boiled eggs laid by battery hens, we might not regard it morally irrelevant to scrutinise the large corporations producing electronically innovative ‘software.’ We might also be wary about the origins of the sort of bland enticements of dating agencies who propose finding your ideal partner by matching up brain frequencies and ‘bio-rhythms’.

We do not know enough about the background of such technology, nor how to evaluate it ethically. We do not know about its effects on the future, because we are not properly informed. If governments persist in concealing the extent of their weapon capability in the interests of defence, they are also leaving their citizens disempowered of the right to protest against their deployment. More alarmingly, they are leaving their citizens exposed to their deployment by ruthless organisations whose concerns are exactly the opposite of democracy and human rights.

Back in the United Kingdom

Meanwhile, back in England, the Director of the Oxford Centre for Cognitive Neuroscience, Professor Colin Blakemore, also the elective Chief Executive of the Medical Research Council writes to the author that he “... knows of no technology (not even in the wildest speculations of neuroscientists) for scanning and collecting ‘neuronal data’ at a distance.” (Blakemore, 2003, ) This certitude is at distinct variance with the fears of other scientists in Russia and the United States, and not least of all with the fears of the French neuroscientist, Jean-Pierre Changeux of the French National Bioethics Committee already quoted (see page 5). It is also very much at odds with the writing of Dr Michael Persinger from the Behavioural Neuroscience Laboratory at Laurentian University in Sudbury, Ontario, Canada. His article “On the Possibility of Directly Accessing Every Human Brain by Electromagnetic Induction of Algorithms” (1995), he describes the ways that individual differences among human brains can be overcome and comes to a conclusion about the technological possibilities of influencing a major part of the approximately six billion people on this planet without mediation through classical sensory modalities but by generating electromagnetic induction of fundamental algorithms in the atmosphere. Dr Persinger’s work is referred to by Captain John Tyler whose work for the American Air Force and Aerospace programmes likens the human nervous system to a radio receiver. (1990)

Very recently the leading weekly cultural BBC radio review had as one of its guests, the eminent astro-physicist and astronomer royal, Sir Martin Rees, who has recently published a book, “Our Final Century”, in which he makes a sober and reasoned case for the fifty-fifty chance that millions of people, probably in a ‘third-world country’ could be wiped out in the near future through biotechnology and bio-terrorism – “by error or malign release.” He spoke of this devastation as possibly coming from small groups or cults, based in the United States. “…few individuals with the right technology to cause absolute mayhem.” He also said that in this century, human nature is no longer a fixed commodity, that perhaps we should contemplate the possibility that humans would even have implants in the brain.

The other guests on this programme were both concerned with Shakespeare, one a theatre producer and the other a writer on Shakespeare, while his remaining guest was a young woman who had a website called “Spiked”, the current theme of which was Panic Attack, that is to say, Attack on Panic. This guest vigorously opposed what she felt was the pessimism of Sir Martin, regarding his ideas as essentially eroding trust, and inducing panic. This reaction seems to typify one way of dealing with threat and anxiety, and demonstrates the difficulty that a warning voice, even from a man of the academic distinction of Martin Rees, has in alerting people to that which they do not want to hear. This flight reaction was reinforced by the presenter who summed up the morning’s discussion at the end of the programme with the words: “We have a moral! Less panic, more Shakespeare!”

The New Barbarism

Since access to a mind-reading machine will enable the operator to access the ideas of another person, we should prepare ourselves for a new world order in which ideas will be, as it were, up for grabs. We need not doubt that the contents of another’s mind will be scooped up, scooped out, sorted through as if the event was a jumble sale. The legal profession would therefore be well advised to consider the laws on Intellectual Property very judiciously in order to acquit themselves with any degree of authenticity. We should accustom ourselves to the prospect of recognizing our work coming out of the mouth of another. The prospect of wide-scale fraud, and someone posturing in your stolen clothes will not be a pretty sight. The term “personal mind enhancement” is slipping in through the back door, to borrow a term used by the Co-Director of the Center for Cognitive Liberty and Ethics, and it is being done through technologically-induced mental co-ercion – mind raping and looting. In place of, or in addition to, cocaine, we may expect to see ‘mind-enhanced’ performances on “live” television.

The brave new science of neuropsychiatry and brain mapping hopes to find very soon, with the fMRI scanner - this “brand new toy that scientists have got their hands on” - “the blob for love” and “the blob for guilt”, (BBC Radio 4: All in the Mind, 5 March, 2003). Soon we will be able to order a brain scan for anyone whose behaviour strikes us as odd or bizarre, and the vicissitudes of a life need no longer trouble us in our diagnostic assessments. In his recent Reith Lectures for the BBC (2003), Professor Ramachandran, the celebrated neuroscientist from the La Hoya Institute in San Diego, California, has demonstrated for us many fascinating things that the brain can do. He has talked to us about personality disorders and shown that some patients, who have suffered brain damage from head injury, do not have the capacity to recognise their mothers. Others feel that they are dead. And indeed he has found brain lesions in these people. In what seems to be an enormous but effortless leap, the self-styled “kid in a candy store” is now hoping to prove that all schizophrenics, have damage to the right hemisphere of the brain, which results in the inability to distinguish between fantasy (sic) and reality. Since Professor Ramachandran speaks of schizophrenia in the same breath as denial of illness, or agnosia, it is not clear, and it would be interesting to know, whether the person with the head injury has been aware or unaware of the head injury. Also does the patient derive comfort and a better chance at reality testing when he is told of the lesion? Does he feel better when he has received the diagnosis? And what should the psychoanalysts – and the psychiatrists, - feel about all those years of treating people of whose head injuries they were absolutely unaware? Was this gross negligence? Were we absolutely deluded in perceiving recovery in a sizeable number of them?

It is, however, lamentable that a neuroscientist with a professed interest in understanding schizophrenia should seek to provide light relief to his audience by making jokes about schizophrenics being people who are “convinced that the CIA has implanted devices in their brain to control their thoughts and actions, or that aliens are controlling them.” (Reith Lecture, No 5, 2003).

There is a new desire for concretisation. The search for meaning has been replaced by the need for hard proof. If it doesn’t light up or add up it doesn’t have validity. The physician of the mind has become a surgeon. “He found a lump as big as a grapefruit!”

Facing up to the Dread and Fear of the Uncanny

Freud believed that an exploration of the uncanny would be a major direction of exploration of the mind in this century. The fear of the uncanny has been with us for a very long time. The evil eye, or the terrifying double, or intruder, is a familiar theme in literature, notably of Joseph Conrad in The Secret Sharer, and Maupassant’s short story, Le Horla. Freud’s analysis of the uncanny led him back to the old animistic conception of the universe: “…it seems as if each one of us has been through a phase of individual development corresponding to the animistic phase in primitive men, that none of us has passed through it without preserving certain residues and traces of it which are still capable of manifesting themselves, and that everything which now strikes us as ‘uncanny’ fulfils the condition of touching those residues of animistic mental activity within us and bringing them to expression.” (Freud: 1919. p.362)

The separation of birth, and the childhood fear of ‘spooks in the night’, also leave their traces in each and every one of us. The individual experience of being alone in one’s mind – the solitary fate of man which has never been questioned before, and upon which the whole history of civilised nurture is based - is now assaulted head-on. Since growing up is largely synonymous with acceptance of one’s aloneness, the effort to assuage it is the basis for compassion and protection of others; it is the matrix for the greatest good, that of ordinary human kindness, and is at the heart of the communicating power of great art. Even if we must all live and die alone, we can at least share this knowledge in acts of tenderness which atone for our lonely state. In times of loss and mental breakdown, the starkness of this aloneness is all too clear. The best of social and group constructiveness is an effort to allay the psychotic anxieties that lie at the base of every one of us, and which may be provoked under extreme enough conditions.

The calculated and technological entry into another person’s mind is an act of monumental barbarism which obliterates– perhaps with the twiddling of a dial – the history and civilisation of man’s mental development. It is more than an abuse of human rights, it is the destruction of meaning. For any one who is forced into the hell of living with an unseen mental rapist, the effort to stay sane is beyond the scope of tolerable endurance. The imaginative capacity of the ordinary mind cannot encompass the horror of it. We have attempted to come to terms with the experiments of the Nazis in concentration camps. We now have the prospect of systematic control authorised by men who issue instructions through satellite communications for the destruction of societies while they are driving new Jaguars and Mercedes, and going to the opera.

This is essentially about humiliation, and disempowerment. It is a manifestation of rage acted out by those who fear impotence with such dread, that their whole effort is directed into the emasculation and destruction of the terrifying rival of their unconscious fantasies. In this apocalypse of the mind the punitive figure wells up as if out of the bowels of the opera stage, and this phantasmagoria is acted out on a global scale. These men may be mad enough to believe they are creating a ‘psychocivilised world order”. For anyone who has studied damaged children, it is more resonant of the re-enactment from the unconscious, reinforced by a life devoid of the capacity for empathic identification, of the obscenities of the abused and abusing child in the savage nursery. Other people -which were to them like Action Man toys to be dismembered, or Barbie Dolls to be obscenely defiled - become as meaningless in their humanity as pixillated dots on a screen.

Although forced entry into a mind is by definition obscene, an abbreviated assessment of the effects that mind-invaded people describe testifies to the perverted nature of the experiments. Bizarre noises are emitted from the body, a body known well enough by its owner to recognise the noises as extrinsic; air is pumped in and out of orifices as if by a bicycle pump. Gradually the repertoire is augmented - twinges and spasms to the eyes, nose, lips, strange tics, pains in the head, ringing in the ears, obstructions in the throat, pressure on the bowel and bladder causing incontinence; tingling in the fingers, feet, pressures on the heart, on breathing, dizziness, eye problems leading to cataracts; running eyes, running nose; speeding up of heart beats and the raising of pressure in the heart and chest; breathing and chest complaints leading to bronchitis and deterioration of the lungs; agonizing migraines; being woken up at night, sometimes with terrifying jolts ; insomnia; intolerable levels of stress from the loss of one’s privacy. This collection of assorted symptoms is a challenge to any medical practitioner to diagnose.

There are, more seriously, if the afore-going is characterised as non-lethal, the potential lethal effects since the capability of ultrasound and infra-sound to cause cardiac arrest, and brain lesions, paralysis and blindness, as well as blinding by laser beam, or inducing asphyxia by altering the frequencies which control breathing in the brain, epileptic seizure – all these and others may be at the fingertips of those who are developing them. And those who do choose to use them may be sitting with the weapon, which resembles, say, a compact mobile telephone, on the restaurant table next to the bottle of wine, or beside them at the swimming pool.

Finally – if the victims at this point in the new history of this mind-control, cannot yet prove their abuse, it must be asserted that, faced with the available information about technological development – it is certainly not possible for those seeking to evade such claims – to disprove them. To wait until the effects become widespread will be too late.

  • For these and other reasons which this paper has attempted to address, we would call for an acknowledgement of such technology at a national and international level. Politicians, scientists and neurologists, neuroscientists, physicists and the legal profession should, without further delay, demand public debate on the existence and deployment of psychotronic technology; and for the declassification of information about such devices which abuse helpless people, and threaten democratic freedom.
  • Victims’ accounts of abuse should be admitted to public account, and the use of psycho-electronic weapons should be made illegal and criminal,
  • The medical profession should be helped to recognise the symptoms of mind-control and psychotronic abuse, and intelligence about their deployment should be declassified so that this abuse can be seen to be what it is, and not interpreted automatically as an indication of mental illness.


If, in the present confusion and insecurity about the search for evidence of weapons of mass destruction, we conclude that failure to locate them - whatever the truth of the matter –encourages us to be generally complacent, then we shall be colluding with very dark forces at work if we conclude that a course of extreme vigilance signifies paranoia. For there may well be other weapons of mass destruction being developed and not so far from home; weapons which, being even more difficult to locate, are developed invisibly, unobstructed, unheeded in our midst, using human beings as test-beds. Like ESP, the methods being used on humans have not been detectable using conventional detection equipment. It is likely that the signals being used are part of a physics not known to scientists without the highest level of security clearance. To ignore the evidence of victims is to deny, perhaps with catastrophic results, the only evidence which might otherwise lead the defenders of freedom to becoming alert to the development of a fearful new methods of destruction. Manipulating terrorist groups and governments alike, these sinister and covert forces may well be very thankful for the professional derision of the victims, and for public ignorance.

References

Laing, R.D. (1985) : Wisdom, Madness and Folly: The Making of a Psychiatrist. Macmillan, 1985

Welsh, Cheryl (1997): Timeline of Important Dates in the History of Electromagnetic Technology and Mind Control, at:
www.dcn.davis.ca.us/~welsh/timeline.htm

Welsh, Cheryl (2001):Electromagnetic Weapons: As powerful as the Atomic Bomb, President Citizens Against Human Rights Abuse, CAHRA Home Page: U.S. Human Rights Abuse Report: www.dcn.davis.ca.us/~welsh/emr13.htm

Begich, Dr N. and Manning, J.: 1995 Angels Don’t Play this HAARP, Advances in Tesla Technology, Earthpulse Press.

ZDF TV: “Secret Russia: Moscow – The Zombies of the Red Czars”, Script to be published in Resonance, No. 35

Aftergood, Steven and Rosenberg, Barbara: “The Soft Kill Fallacy”, in The Bulletin of the Atomic Scientists, Sept/Oct 1994.

Becker, Dr Robert: 1985,The Body Electric: Electromagnetism and the Foundation of Life, William Morrow, N.Y.

Babacek, Mojmir: International Movement for the Ban of Manipulation of The Human Nervous System: http://mindcontrolforums.com/babacek.htm and go to: Ban of Manipulation of Human Nervous System

“Is it Feasible to Manipulate the Human Brain at a Distance?”
www.aisjca-mft.org/braindist.htm

“Psychoelectronic Threat to Democracy”
http://mindcontrolforums.com/babacek.htm

Nature: “Advances in Neuroscience May Threaten Human Rights”, Vol, 391, Jan. 22, 1998, p. 316; (ref Jean- Pierre Changeux)

Space Preservation Act: Bill H.R.2977 and HR 3616 IH in 107th Congress – 2nd Session: see: www.raven1.net/govptron.htm

Sessions European Parliament:
www.europarl.eu.int/home/default_en.htm?redirected=1

Click at Plenary Sessions, scroll down to Reports by A4 number, click, choose 1999 and fill in oo5 to A4

Delgado, Jose M.R: 1969. “Physical Control of the Mind: Towards a Psychocivilized Society”, Vol. 41, World Perspectives, Harper Row, N.Y.

US News & World Report: Lockheed Martin Aeronautics/ Dr John Norseen; Report January 3/10 2000, P.67

Freud, Sigmund: 1919: Art and Literature:” The Uncanny”. Penguin,
Also “Those Wrecked by Success.”

Marks, John: 1988 :The CIA and Mind Control – the Search for the Manchurian Candidate, ISBN 0-440-20137-3

Persinger, M.A. “On the Possibility of Directly Accessing Every Human Brain by Electromagnetic Induction of Fundamental Algorythms”; In Perception and Motor Skills, June, 1995, vol. 80, p. 791 – 799

Tyler, J.“Electromagnetic Spectrum in Low Intensity Conflict,” in “Low Intensity Conflict and Modern Technology”, ed. Lt. Col. J. Dean, USAF, Air University Press, Centre For Aerospace Doctrine, Research and Education, Maxwell Air Force base, Alabama, June, 1986.

Rees, Martin Our Final Century: 2003, Heinemann.

Conrad, Joseph: The Secret Sharer, 1910. Signet Classic.

Maupassant, Guy de: Le Horla, 1886. Livre de Poche.

Carole Smith is a British psychoanalyst. In recent years she has been openly critical of government use of intrusive technology on non-consenting citizens for the development of methods of state control. Carole Smith
E-mail:
rockpool@dircon.co.uk


Global Research Articles by Carole Smith
Read more…
http://www.thefluecase.com by jame burgermeister of Austria- thank you so much Frau Burgermeister!! Danke, Grazi, Prego, Gracias, thank you, mercihttp://www.theflucase.com/Laws and the Constitution assign to people certain basic civic rights, such as the right to life, the right to free speech, the right to self defence. Another right, is the right to report a crime if there is enough evidence of one.Laws and the Constitution assign to people certain basic civic rights, such as the right to life, the right to free speech, the right to self defense.Flowing from these basic civic rights, is the right to report a crime if there is enough evidence of one, and also the right to see justice done, also in the case of mass vaccinations with the swine flu.On this website you will find the facts and information, you need to report the "swine flu" case to your local law enforcement.One advantage of reporting the crime to your local law enforcement is that they will be obliged to examine the material and so will be much less likely to assist in any forced mass vaccinations, knowing that the act ordered is unlawful.The law of a state is binding not only on a State but also on all individuals inside a State, no matter how high their position in government might be.Any member of government, however senior, who commits an act which constitutes a crime under the law is responsible for it and liable to punishment.When Presidents and Prime Ministers are not obliged to obey the law, it is called a dictatorship or totalitarian government. Don't be afraid to ask for everyone to be held accountable before the law, even the Prime Minister.
Read more…
MKULTRA victims and therapists speak about the need to hold hearings on human experimentation that used children as subjects in behavior modification experiments. MKULTRA has now evolved into MONARCH, the use of nonlethal microwave weapons to induce trauma as a means of behavior modification.MONARCH II 80min video.google.com/videoplay?docid=-2607247316861253984MONARCH III 45min video.google.com/videoplay?docid=-8015266513754477004PLEASE copy links below & VISIT victims organization freedomfchs.comMUSIC: VISION KEEPERsoundclick.com/marshallthomastunecore.com/music/blacktowersongcastmusic.com/profiles/MonarchNewPhoenixREAD THE BOOKS FREE:Monarchnewphoenix.commonarchnewphoenix.orgMonarchnewphoenix.blogspot.commyspace.com/marsboy683facebook.com/people/Marshall_Thomas/547092153 (petition)MKULTRA survivors group: aches-mc.org/TI group: mindjustice.orgFILMS ARE FREE:livevideo.com/video/marsboyvimeo.com/user147823youtube.com/marsboy683spike.com/profile/marsboy683metacafe.com/channels/marsboy/marsboy683.wordpress.comvideo.yahoo.com/people/64118Buy a T-SHIRT, cap, or button.stores.ebay.com/MonarchNewPhoenixcafepress.com/Monarch_marsboymonarch.logosoftwear.comTHE BOOKS/DVD FOR SALE:amazon,createspace, lulu,ebay,iUniversehttp://www.projectcamelot.org/interviews.htmlThe video and audio links below will stream unless they are downloaded.To download, PC users right-click and then select Save As; Mac users option-click.The Google and YouTube links will just stream when clicked.WMV video files are for PCs (Windows) which do not have QuickTime player.MOV or MP4 are for Macs or PCs with QuickTime (and are usually slightly better quality).MP3 audio files should play on any machine, including iPods and similar players.Please report any errors or broken links - many thanks.The interviews are in date order of release. The newest are at the top of the page.IMPORTANT NOTE: For many visitors to our site (but not all), downloads of our videos stop at around the 125 Mb mark. These videos are watchable, but are incomplete. We've been wrestling with this extremely frustrating problem since October but have been unable to find a solution. The bug is at our host's end, but they cannot fix it. We are therefore moving host and will do this as smoothly as possible, as soon as possible.To download our videos completely (if you have been experiencing problems), please go to the Google link and download from there. All the Google links are featured below. These downloads work perfectly. The Google and YouTube videos are also all complete for online viewing. We apologize to all our visitors who have been affected by this.Alternatively, please use Download Accelerator Plus. We were told:Since using Download Accelerator Plus I have had no more problems [with the 125 Mb limit problem]. It's very fast, works every time, it resumes download should there be an interruption, and it is FREE.Google Voice answers nation's callhttp://www.af.mil/news/story_print.asp?id=123163430by John J. KruzelAmerican Forces Press Service8/14/2009 - WASHINGTON (AFNS) -- Google is tinkering with a new service that could transform the way troops on the frontlines communicate with their families on the homefront.Google Voice assigns users a single U.S. phone number that can ring at phones in multiple locations like the home, office or on a cellular device -- all at the same time. Coupled with a feature that stores and transcribes voicemail in e-mail form, Google Voice can relieve some of the technical hassles that come with staying connected."Google Voice can help keep people connected, can help servicemembers worry less about missing a call or not getting in touch with people they need to, and focus more on getting the mission done," said Army Sgt. Dale Sweetnam, who the U.S. Army is loaning to Google for a year to help the company coordinate its military outreach efforts.Sergeant Sweetnam, who spent 13 months deployed in Iraq with Task Force 49, provides Google a window into servicemembers' experiences downrange where keeping contact with family and friends back home competes with the demands of daily military objectives."With the operation tempo of the military and the intense nature of accomplishing a mission, to make communication just one less thing you have to worry about is a great tool," he said in an interview.As Google puts the final touches on Google Voice, the service is available in limited capacity and only by requesting an invitation from the company. But given its recognition that military deployments are often fraught with communication lags, Google is giving priority invites to active members of the military.Earlier this month, the company announced that troops with a .mil e-mail address can visit www.google.com/militaryinvite to sign up for a free Google Voice account.While the service has real-world applicability for many people, Google Voice is an especially useful tool for servicemembers, both deployed and at home."It is often hard or near impossible to receive calls when deployed abroad, due to limited access to phones and time zone differences," Sergeant Sweetnam said in an e-mail. "With Google Voice, you can listen to and read voicemail online, so you can hear messages from family members more often and keep up with what is going on back home."Having one, unchanging phone number could also be a welcome constant in a military career filled with frequent moves. Keeping a single phone number that travels with servicemembers amid permanent changes of station means no more need for new numbers or missed calls to old numbers along the way.An additional kicker is that because Google Voice is free, phone calls between friends and family who live overseas or in another state won't cost a small fortune."Military servicemembers often don't live in the same states and countries as their friends and family or other buddies they met in the military," Sergeant Sweetnam said. "Google Voice helps save money by offering free calls in the continental U.S. and low-priced international calls."
Read more…
Diseased African Monkeys Used to Make Swine Flu Vaccines; Private Military Contractor Holds Key PatentsDiseased African Monkeys Used to Make Swine Flu Vaccines; Private Military Contractor Holds Key Patents

August 5, 2009 by mike
Filed under Government

August 5, 2009

Natural News

by: Mike Adams

To most people, vaccines sound medically harmless. “They’re good for you!” say the doctors and drug companies, but they never really talk about what’s in those vaccines. There’s a good reason for that: If people knew what was really in those vaccines, they would never allow themselves to be injected with them.

Aside from the dangerous ingredients many people already know about (like squalene or thimerosal), one of the key ingredients used in flu vaccines (including the vaccines being prepared for the swine flu pandemic) is the diseased flesh of African Green Monkeys. This is revealed in U.S. patent No. 5911998 - Method of producing a virus vaccine from an African green monkey kidney cell line.

As this patent readily explains, ingredients used in the vaccine are derived from the kidneys of African Green Monkeys who are first infected with the virus, then allowed to fester the disease, and then are killed so that their diseased organs can be used make vaccine ingredients. This is done in a cruel, inhumane “flesh factory” environment where the monkeys are subjected to a process that includes “incubating said inoculated cell line to permit proliferation of said virus.” Then: “harvesting the virus resulting from step (c); and… (ii) preparing a vaccine from the harvested virus.”

Aside from the outrageous cruelty taking place with all this (”incubating” the virus in the kidneys of living monkeys, for example), there’s another disturbing fact that has surfaced in all this: The patent for this process is held not just by the National Institutes of Health, but by another private corporation known as DynCorp.

This, of course, brings up the obvious question: Who is Dyncorp? And why do they hold a patent on live attenuated vaccine production using African Green Monkeys?

DynCorp, it turns out, is a one of the top private military contractors working for the U.S. government. In addition to allegedly trafficking in under-age sex slaves in Bosnia and poisoning rural farmers in Ecuador with its aerial spraying of Colombian coca crops , Dyncorp just happens to be paid big dollars by the U.S. government to patrol the U.S. / Mexico border, near where the H1N1 first swine flu virus was originally detected.

DynCorp also happens to be in a position to receive tremendous financial rewards from its patents covering attenuated live viral vaccine harvesting methods, as described in four key patents jointly held by DynCorp and the National Institutes of Health:

(6025182) Method for producing a virus from an African green monkey kidney cell line

(6117667) Method for producing an adapted virus population from an African green monkey kidney cell line

(5911998) Method of producing a virus vaccine from an African green monkey kidney cell line

(5646033) African green monkey kidney cell lines useful for maintaining viruses and for preparation of viral vaccines

One of the key inventors in these patents now held by DynCorp was Dr. Robert H. Purcell. Who is Dr. Robert Purcell? He’s one of the co-chiefs of the Laboratory of Infectious Diseases of the National Institute of Allergy and Infectious Diseases operating under the National Institutes of Health of the U.S. government.

That office, located at 50 South Drive, Bethesda, MD 20892, is less than 15 miles away from the headquarters of DynCorp.

It’s not too many more miles to Washington D.C., where U.S. government health authorities awarded over $1 billion in swine flu vaccine contracts to pharmaceutical companies. Can you guess which company received one of the largest vaccine manufacturing contracts? Baxter Pharmaceuticals, the very same company using ingredients derived from African Green Monkeys in precisely the way described in the patents held jointly by DynCorp and the NIH. Remember, Baxter is the company that was caught inserting live viruses into vaccine materials distributed to 18 different countries.

Are you following all this?

So far, we have the U.S. government awarding swine flu vaccine manufacturing contracts to a major U.S. vaccine manufacturer (Baxter) that uses vaccine ingredients from African Green Monkeys (sick!), derived from a process covered in a patent invented by U.S. government NIH researchers (Dr. Purcell and others) and now held jointly by the NIH and a private military contractor named DynCorp — the very same company that’s paid to monitor the U.S. / Mexico border where H1N1 swine flu first appeared.

And just today, there’s yet another development in all this: A Tamiflu-resistant strain of swine flu has just been discovered. Care to guess where? On the U.S.-Mexico border.

Once you understand all this, some obvious questions come to mind: Could H1N1 swine flu have been intentionally created and released into the wild (in Mexico) in order to create a windfall of vaccine profits that would financially benefit both the drug companies and the vaccine production patent holders? Because it certainly appears that a grand conspiracy between the NIH, the vaccine makers and private military contractors could have pulled this off.

But wait: Would a private military contractor really resort to such tactics just to make money?

Decide for yourself. Dyncorp has already been accused of crimes against humanity and genocide .

Click here for the full story from Natural News

Read more…
--- On Fri, 8/7/09, Ron Angell wrote:STATE SECRET PROTECTION ACT OF 2009From: Ron AngellSubject: STATE SECRET PROTECTION ACT OF 2009To: constitutionalsdemocrcacy@democracy.orgDate: Friday, August 7, 2009, 2:10 PMSTATE SECRET PROTECTION ACT OF 2009=======================================================================HEARINGBEFORE THESUBCOMMITTEE ON THE CONSTITUTION,CIVIL RIGHTS, AND CIVIL LIBERTIESOF THECOMMITTEE ON THE JUDICIARYHOUSE OF REPRESENTATIVESONE HUNDRED ELEVENTH CONGRESSFIRST SESSIONONH.R. 984__________JUNE 4, 2009__________SerialNo. 111-14__________Printed for the use of the Committee on the JudiciaryAvailable via the World Wide Web: http://judiciary.house.gov----------STATE SECRET PROTECTION ACT OF 2009-VIP Download PDF and LOOK AT PGS 88-100 !!ABC News 1979 Special: Mission Mind Control (29 mins)- Coffee and water poison in USA also chemtrail sprays and tainted food, over the counter drugs, prescription drugs.ABC News 1979 Special: Mission Mind Control (29 mins)
U.S. GOVERNMENT PRINTING OFFICE50-070 PDF WASHINGTON : 2009For sale by the Superintendent of Documents, U.S. Government PrintingOffice Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800;DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP,Washington, DC 20402-0001COMMITTEE ON THE JUDICIARYJOHN CONYERS, Jr., Michigan, ChairmanHOWARD L. BERMAN, California LAMAR SMITH, TexasRICK BOUCHER, Virginia F. JAMES SENSENBRENNER, Jr.,JERROLD NADLER, New YorkWisconsinROBERT C. ``BOBBY'' SCOTT, Virginia HOWARD COBLE, North CarolinaMELVIN L. WATT, North Carolina ELTON GALLEGLY, CaliforniaZOE LOFGREN, California BOB GOODLATTE, VirginiaSHEILA JACKSON LEE, Texas DANIEL E. LUNGREN, CaliforniaMAXINE WATERS, California DARRELL E. ISSA, CaliforniaWILLIAM D. DELAHUNT, Massachusetts J. RANDY FORBES, VirginiaROBERT WEXLER, Florida STEVE KING, IowaSTEVE COHEN, Tennessee TRENT FRANKS, ArizonaHENRY C. ``HANK'' JOHNSON, Jr., LOUIE GOHMERT, TexasGeorgia JIM JORDAN, OhioPEDRO PIERLUISI, Puerto Rico TED POE, TexasMIKE QUIGLEY, Illinois JASON CHAFFETZ, UtahLUIS V. GUTIERREZ, Illinois TOM ROONEY, FloridaBRAD SHERMAN, California GREGG HARPER, MississippiTAMMY BALDWIN, WisconsinCHARLES A. GONZALEZ, TexasANTHONYD. WEINER, New YorkADAM B. SCHIFF, CaliforniaLINDA T. SANCHEZ, CaliforniaDEBBIE WASSERMAN SCHULTZ, FloridaDANIEL MAFFEI, New YorkPerry Apelbaum, Majority Staff Director and Chief CounselSean McLaughlin, Minority Chief of Staff and General Counsel------Subcommittee on the Constitution, Civil Rights, and Civil LibertiesJERROLD NADLER, New York, ChairmanMELVIN L. WATT, North Carolina F. JAMES SENSENBRENNER, Jr.,ROBERT C. ``BOBBY'' SCOTT, Virginia WisconsinWILLIAM D. DELAHUNT, Massachusetts TOM ROONEY, FloridaHENRY C. ``HANK'' JOHNSON, Jr., STEVE KING, IowaGeorgia TRENT FRANKS, ArizonaTAMMY BALDWIN, Wisconsin LOUIE GOHMERT, TexasJOHN CONYERS, Jr., Michigan JIM JORDAN, OhioSTEVE COHEN, TennesseeBRADSHERMAN,CaliforniaSHEILA JACKSON LEE, TexasDavid Lachmann, Chief of StaffPaul B. Taylor, Minority CounselC O N T E N T S----------JUNE 4, 2009PageTHE BILLH.R. 984, the ``State Secret Protection Act of 2009.............. 4OPENING STATEMENTSThe Honorable Jerrold Nadler, a Representative in Congress fromthe State of New York, and Chairman, Subcommittee on theConstitution, Civil Rights, and Civil Liberties................ 1The Honorable F. James Sensenbrenner, Jr., a Representative inCongress from the State of Wisconsin,and RankingMember,Subcommittee on the Constitution, Civil Rights, and CivilLiberties...................................................... 17The Honorable John Conyers, Jr., a Representative in Congressfrom the State of Michigan, Chairman, Committee on theJudiciary, and Member, Subcommittee on the Constitution, CivilRights, and Civil Liberties.................................... 18WITNESSESThe Honorable Patricia M. Wald, retired Chief Judge, U.S. CourtoF Appeals for the District of ColumbiaOral Testimony................................................. 21Prepared Statement............................................. 24The Honorable Asa Hutchinson, Senior Partner, Hutchinson LawGroupOral Testimony................................................. 29PreparedStatement............................................. 31Mr.Andrew Grossman, Senior Legal Policy Analyst, The HeritageFoundationOral Testimony................................................. 55Prepared Statement............................................. 57Mr. Ben Wizner, National Security Project Staff Attorney,American Civil Liberties UnionOral Testimony................................................. 83Prepared Statement............................................. 85APPENDIXMaterial Submitted for the Hearing Record........................ 111STATE SECRET PROTECTION ACT OF 2009----------THURSDAY, JUNE 4, 2009House of Representatives,Subcommittee on theConstitution,Civil Rights, and Civil Liberties,Committee on the Judiciary,Washington, DC.The Subcommittee met, pursuant to notice, at 2:09 p.m., inroom 2141, Rayburn House Office Building, the Honorable JerroldNadler (Chairman of the Subcommittee) presiding.Present: Representatives Nadler, Conyers, Delahunt,Johnson, Sensenbrenner, Franks, and King.Staff Present: Heather Sawyer, Majority Counsel; and PaulTaylor, Minority Counsel.Mr. Nadler. This hearing of the Subcommittee on theConstitution, Civil Rights, and Civil Liberties will come toorder.Today's hearing will examine the state secrets privilege.The Chair recognizes himself for 5 minutes for an openingstatement.Today, the Subcommittee examines legislation that I haveintroduced, alongwith the distinguished Chairman of the fullCommittee, with Representative TomPetri, and with severalother Members of the Committee, that would codify uniformstandards for dealing with claims of the state secretsprivilege by the government in civil litigation.In the last Congress, we had an oversight hearing on thestate secrets privilege and a hearing on this legislation. Thebill was reported favorably to the full Committee.Our experience has demonstrated the destructive impact thatsweeping claims of privilege and secrecy can have on ourNation. In order for the rule of law to have any meaning,individual liberties and rights must be enforceable in ourcourts. Separation-of-powers concerns are at their highest withregard to secret executive branch conduct, and the governmentsimply cannot be allowed to hide behind unexamined claims ofsecrecy and become the final arbiter ofits own conduct.Yet, claims of secrecy have been used to conceal mattersfrom Congress even though Members have the security clearancenecessary to be briefed in an appropriately secure setting.That has been the case with respect to the use of torture, withthe use of illegal spying on Americans, and other matters oftremendous national importance.And let me add here that this issue is perhaps the mostimportant issue, in my judgment, this Committee will face,because this Committee is charged with enforcing civil rightsand civil liberties under our Constitution. And there is anancient maxim of law that says there is no right without aremedy. And if the government violates your rights, if itkidnaps you, it tortures you, it deliberately burns down yourhouse, it wiretaps you without a warrant, whatever, how do youenforce your right against the government?Well, theAdministration could criminally prosecute its ownmembers who have done so; that isunlikely. Congress couldexercise oversight; that is hit or miss. Or the victim can suein tort, he can sue the government for illegal wiretapping, forkidnapping, for intentional infliction of mental distress, forassault, whatever.But if the government can eliminate that lawsuit on thepleadings simply by coming into court and using the magicincantation of the words ``state secrets,'' and say, ``Thiscase should be dismissed because we say, in our unexaminedassertion, that trying the case would necessitate therevelation of state secrets, case dismissed,'' then there is norecourse to the courts and there is no enforcement of rights.And rights without a remedy are illusory and we have no rights.Therefore, we must put some limits on this use of the statesecret doctrine.The same pattern ofresorting to extravagant state secretsclaims has been evident in the courts. While theBushadministration did not invent the use of the state secretsprivilege to conceal wrongdoing, it certainly perfected theart. The state secrets privilege has been abused by priorAdministrations to protect officials who have behaved illegallyor improperly or simply in an embarrassing manner, rather thanto protect the safety and security of the Nation.The landmark case in the field, U.S. v. Reynolds, is aperfect case in point. The widows of three civilian engineerssued the government for negligence stemming from a fatal aircrash. The government refused to produce the accident report,even refusing to provide it to the court to review, claiming itwould reveal sensitive state secrets that would endangernational security. The Supreme Court concurred without everlooking behind the government'sunsupported assertion thatnational security was involved.Half a century later, thereport was found, nowdeclassified, online by the daughter of one of the engineers,and it clearly revealed no state secrets. It clearly could havebeen made available in a form that would have enabled thosefamilies to vindicate their rights in court. It did, however,reveal that the crash was caused by government negligence,which I suspect was the real reason for the invocation, or theinvention in that case, of the state secrets doctrine.Protecting the government from embarrassment and civilliability, not protecting national security, was the realreason for withholding the accident report. Yet these familieswere denied justice because the Supreme Court never lookedbehind the government's false claim to determine whether it wasvalid.Similarly, in the Pentagon Papers case,then-SolicitorGeneral Erwin Griswold warned the Supreme Court thatpublication of the information wouldpose a grave and immediatedanger to national security. Eighteen years later, heacknowledged that he had never seen, quote, ``any trace of athreat to the national security,'' unquote, from thepublication of the information and further admitted that,quote, ``The principle concern is not with national securitybut rather with government embarrassment of one sort oranother,'' close quote.It is important to protect national security, and sometimesour courts have to balance the need for individual justice withnational security considerations. Congress has in the pastbalanced these important, albeit sometimes competing, demands.In the criminal context, we enacted the Classified InformationsProcedure Act. In FISA, we set up procedures for the courts toexamine sensitivematerials. Through the Freedom of InformationAct, we sought to limit any withholding of information from thepublic whom the government is supposed to serve.We can and should do the same in civil cases. Our system ofgovernment and our legal system have never relied on takingassurances at face value. The courts and the Congress have aduty to look behind what this Administration or anyAdministration says to determine whether or not thoseassurances are well-founded.Presidents and other government officials have been knownnot to tell the truth on occasion, especially when it is intheir interest to conceal something. The founders of thisNation knew that there needed to be checks in each branch ofthe government to prevent such abuses from taking the place.Or, in the words of the Ninth Circuit in the recent Jeppesendecision, ``The executive cannot be its own judge.'' To allowthat--and these are now my words--to allow that is to abandonall the protections against tyranny that ourFounding Fathersestablished.Courts have a duty to protect national security secrets,but they also have a duty to make an independent judgment as towhether state secrets claims have any merit. When thegovernment itself is a party, the court cannot allow it tobecome the final arbiter of its own case. The purpose of thislegislation is to ensure that the correct balance is struck.I would just add that I am extremely disappointed that theDepartment of Justice has declined to provide a witness todiscuss this very important issue at this hearing. I have metwith the Attorney General, and I understand that a review ofthis policy is currently under way. Nonetheless, the Departmentcontinues to go into court while this review is under way andtake positions that areremarkably similar to positions takenby the last Administration.While I greatly appreciate the Attorney General'swillingness to work with us, I believe that it should bepossible to send someone to provide us with theAdministration's views and to answer our questions to theextent that they are able. I hope this is not a sign of thingsto come.I look forward to the testimony of our witnesses.I would now recognize the distinguished Ranking minorityMember, the gentleman from Wisconsin, Mr. Sensenbrenner, forhis opening statement.[The bill, H.R. 984, follows:][GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]Mr. Sensenbrenner. Thank you, Mr. Chairman.The state secrets privilege is a longstanding legaldoctrine the Supreme Court most recently described in a casecalled U.S. v. Reynolds. In that case, the court made it clearthat if the court,after giving appropriate deference to theexecutive branch, determines that public disclosure ofinformation would harmnational security, the court is obligedto either dismiss the case or limit the public disclosure ofnational security information as necessary.Under this doctrine, people with legitimate claims are notdenied access to court review. Rather, the doctrine allowsjudges to personally review any sensitive information. Whilethis doctrine may occasionally disadvantage someone suing incourt, it is vital to protecting the safety of all Americans.The roots of the state secrets privilege extend all the wayback to Chief Justice Marshall, the author of Marbury v.Madison, who held that the government need not provide anyinformation that would endanger public safety.In the modern era, Congress debated the issue of the statesecrets privilege under Federal law in the1970's butultimately chose to maintain the status quo, including elementsof the privilege put in place by the Supreme Courtin itsReynolds decision. The Fourth Circuit Court of Appeals recentlyemployed the doctrine in affirming the dismissal of the case,including that the state secrets privilege has a firmfoundation in the Constitution.Not surprisingly, the privilege has played a significantrole in the Justice Department's response to civil litigationarising out of our counterterrorism efforts following 9/11.The state secrets doctrine remains strongly supported bytoday's Supreme Court. Even in its Boumediene decision grantinghabeas litigation rights to terrorists, Justice Kennedy, in hismajority opinion, acknowledged the government's legitimateinterest in protecting sources and methods of intelligencegathering and stated, ``We expect the district court will useitsdiscretion to accommodate this interest to the greatestextent possible,'' while citing the Reynolds state secrets caseImentioned earlier in doing so.I oppose any efforts, including this bill, that invite thecourts to deviate from the sound procedures they currentlyfollow to protect vital national security information. H.R. 984would preclude judges from giving weight to the executivebranch's assessment of national security. And it wouldauthorize courts not to use ex parte proceedings in conductinga review of privileged claims. And it would prevent courts frombeing able to dismiss a case when the government cannot defenditself without using privileged information.The Obama administration is clearly not enamored with theapproach of this legislation and has adhered in court to thedoctrine as asserted by the previous Administration in at leastthree cases already. Accordingto The Washington Post editorialpage, the Obama administration's position on state secretsmakes it hard to distinguish fromits predecessor. AnthonyRomero, the executive director of the ACLU, has written thatthe new Administration has embraced policies held over from theBush era, including the use of the state secrets claim.Last Congress, legislation essentially the same as H.R. 984was cosponsored in the Senate by Senators Joe Biden and HillaryClinton, who are now President Obama's Vice President andSecretary of State. But this year, President Obama, VicePresident Biden, and Secretary of State Clinton have gonesilent on the bill. When asked about it recently, the VicePresident's communications director said, quote, ``No commenton this one here.''http://mcvictimsworld.ning.com/profiles/blogs/abc-news-1979-special-missionABC News 1979 Special: Mission Mind Control (29 mins)- Coffee and water poison in USA also chemtrail sprays and tainted food, over the counter drugs, prescription drugs.ABC News 1979 Special: Mission Mind Control (29 mins)
Read more…

The layman's truth in a nutshell

An email that was sent to me that I want to shareBegin forwarded message:> From: kim stirling> Date: 18 April 2009 19:59:34 BST> Subject: The layman's truth in a nutshell>> The layman's truth in a nutshell (or the bigger picture) by Joe> Stirling>> The NWO (New World Order) is very real and a serious threat to your> future. Don't take my word for it, do your own research via the best> websites recommended here. All of these humanitarian, academic,> professional people have done the research for you. I wrote an article> more than two years ago called "Freemasonry is a criminal> organisation" it was published all over the Internet. Guess what? not> one person has disputed this or even defended Freemasonry. I will> continue to help and educate you.>> Top of the pyramid is the Zionist Mafia (aka The Illuminati). The> English dictionary says "Zionism: movement to found and support a> Jewish homeland in Israel" Do not take this out of context as there> are lots of good Jewish people who are totally against the Zionist> plans, checkout http://www.jewsagainstzionism.com/ The NWO is> something the Satanic Zionist Mafia have been planning for centuries.> They control almost everything and they do this through The> Bilderberg, (secret meetings by corrupt leaders), the CFR (Council on> Foreign Relations), The Trilateral Commission, Royal Families (see 13> Satanic Bloodlines) and all the way down to dodgy shadow governments,> CIA, FBI, MI5, MI6, Military, NHS, Police, Local Councils, their> Media, etc. They use extremely evil tactics to destroy anything good> or anything thats a threat to their evil plans. They use their MCDs> (Mind Controlled Drones), and DEWs (Directed Energy Weapons). They> also use low level ignorant foot soldiers within all Religions, Secret> Societies, Gangs, Debating Groups, etc. Incidentally, only affiliated> members (+ a few ignorants) get gongs from the Queen of Crooks. (fact)>> Here is some of the the main tactics that they use on unsuspecting> victims and their own members. They use the members of all secret> societies and religious cults (and ordinary religions) to carry out> collective Gang-Stalking (where they psychologically terrorise their> chosen victims), Mobbing (where a mob of them get very close to their> chosen victim in shops and car parks, etc) Gas-lighting (where they> sow seeds-lies into people's heads), Brighting (where they blind their> victims with their car headlights on full beam, even on sunny days),> Stasi tactics (the East German evil in the community during the second> World War), Mind Control via MK-Ultra> http://en.wikipedia.org/wiki/Mk_ultra and Monarch Programing at> http://educate-yourself.org/ This site also covers all of the topics> listed above. These tactics are all done stealthily and most people> don't know or see these invisible terrorists within every community.> See Les Dove's brilliant article called "The Torture Report" at> http://www.lesdove.blogspot.com/>> Security..... every law abiding person should become an independent> policeman, journalist, investigator or whistle-blower. Get yourself a> small hand held "FLIP" video-cam (its about the size of a mobile> phone) its really simple (and fast to start) and will record for about> one hour (costs £60-£70) Also get yourself a Digital Voice Recorder> approx. £30-£50. You should watch and document the activities of> people you suspect of being a member of these criminal networks. You> can even set them up as they would do to you. A Freemason (and all> other secret societies and religious cult members) is a person who> knowingly destroys innocent (law abiding) people's lives for self> gain. Every MCD is an active terrorist and will follow orders as soon> as instructed. Their minds have been hijacked and they are controlled> by fear. Their Masonic handlers can flick their psychological switches> anytime. MCDs have to develop multi personalities to try to help> themselves cope. They will be ex-communicated by their pretend> brothers and sisters and their lives destroyed if they don't perform.> There are some really deranged MCDs who realise that they are above> the law, they are the most dangerous. One of their initiation rules> is to become a prolific liar for the brotherhood. (fact)>> Checkout this about mind control and unanswered questions about the> inside job of 911,> http://freedom4um.com/cgi-bin/readart.cgi?ArtNum=18651&Disp=0 sourced> from www.rense.com Also search for Alex Jones's "The Obama Deception"> buy it or get it on YouTube (best quality)> https://www.youtube.com/watch?v=eAaQNACwaLw or read this mind blowing> article "A Conspiracy Too Monstrous To Conceive" at> http://www.henrymakow.com/000166.html Do your research on "Masonic> Theatre" (911 was classic MT), the NWO's G20 summit was their stage> and coincidentally they own the media. Did you fall for it? Were you> impressed? We have all been duped again, big time.>> Fact. Masonic charity only helps Masonic charity. Most lower> Freemasons are not aware of the evil inner core of Freemasonry.>> Here are some of the other good Scottish guys/groups exposing the> truth for you at www.ljpr.info or www.sacl.info or> http://petercherbi.blogspot.com and my own website with all of the> other good guys (world-wide) at www.joestirling.com>> More facts for you.... If you mug someone, you go to jail. If a Banker> mugs you, he gets rewarded?> The Government makes us feel guilty about our carbon footprint while> they agree to build new runways?> Masonic controlled CCTV only works when it's in their favour,> otherwise the CCTV wasn't working that day.> Corruption and closed doors or transparency and true democracy? it's> your choice. Fight for your FR33DOM, now, today.>> I have tried to keep this brief as there is much more to add. Get> focused, I/we are trying to help us all to "STOP THIS MADNESS" by> these devil worshipping ZIONIST NUTTERS ! It just doesn't have to be> like this. Don't be foolish as hatred, revenge or riots are not the> answer. If you don't trust your lawyer, judge, doctor, police,> politician, etc. Get them to sign a DOT (declaration of truth) that> they are not a member of any secret society, society with secrets,> religious cults, etc. Please forward this information to everyone you> care about. Do your own research and blog, website, flyers, truth> groups, expose them. We all must do our bit or they win.>> The immediate answer....... Give us a public register of all> Freemasons. This will comprehensively prove if it's a good or criminal> organisation. It will also reveal who are the NWO/ Illuminati's> foot-soldiers. Get rid of the secret societies, it's ridiculous that> we continue to ignore them. Their very sophisticated networks control> all organised crime and illegal drugs. If someone you know says its> just conspiracy or made up nonsense, then they are obviously part of> the problem. Here are some quotes from www.rense.com>> "If we don't believe in freedom of expression for people we despise,> we don't believe in it at all." -- Noam Chomsky>> "Economic crises have been produced by us for the goyim by no other> means than the withdrawal of money from circulation." - Protocols of> Zion>> "Every time we do something you tell me America will do this and will> do that . . . I want to tell you something very clear: Don't worry> about American pressure on Israel. We, the Jewish people, control> America, and the Americans know it." - Israeli Prime Minister, Ariel> Sharon, October 3, 2001>>--~--~---------~--~----~------------~-------~--~----~LEGAL JUDICIAL POLITICAL REFORMERShttp://www.ljpr.infoMasonic judges OUT Juries IN
Read more…

implants

the government will not help us,this was planed by them,doctors are under a gag law,thedoctors who have gone aginst them come up missing or dead.a paramedite told me he could do it with a dremal(small grinder )and lactos.?If I spelled it right,we need to come up with a doctor or nurse who is on our side,if some one will remove it I will go first,I talked to a nuroligist who allso told me an amteur could do it but a doctor should,I want it out.
Read more…
Google "Blue List of Death" President Ronald Reagan was on this list.. carrying out the destruction of the "Red List of Death" and then he himself being tortured and murdered via Electronic Dissolution of MemoryFrom Dr. Robert Duncan-Project Soul Catcher-An Introduction to Information Warfare Theory, Technologies, and Practice.From: R. Duncan
Sent: Thursday, August 13, 2009 8:14 PM
Subject: shielding

Sorry for the multiple post.

Look up the materials that the stealth bomber uses to deflect and absorb RADAR energy. Has anyone tried combinations of Teflon, cellophane, etc? High di-electric constant material should help reduce some of the effects usingpassive shielding techniques. Since the military’s system uses adaptivebeamforming technologies, passive shielding will have its limitations. It willadapt to find the maximum entry overtime. More sophisticated methods of activejamming with alterations in the magnetic flux and the expected spectralabsorption lines for the ions of interest would be far more effective.

My book is getting close to completion. Would anyone care to proof read it before it goes to the editor and publisher?

download?mid=1%5f8992304%5fADPFtEQAAVeISoa%2fXAQbGWN0oAI&pid=2.2&fid=Inbox&inline=1

An Introduction to Information Warfare Theory, Technologies, and Practice.

Engineering Intelligence and Designing Gods

Book Contents

Preface.......................................................................................................................................... 13

Introduction by Noam Chomsky and Ray Kurzweil................................................................... 14

Chapter 1 Enemy of theState...............................................................................................14

Chapter 2 Advanced Sensors and Systems forBio-Communications................................. 15

RADAR..................................................................................................................................... 16

Doppler RADAR.................................................................................................................................................................. 17

Signal to Noise Ratio, Gain, and Sensitivity at a Distance Parameters.................................................................. 23

Full Spectrum Radar and Multiresolution Wavelets................................................................................................. 24

Adaptive filtering........................................................................................................................................................... 26

Phased Locked Loops................................................................................................................................................... 27

Phased Arrays and Multi-dynamic RADAR.............................................................................................................. 28

Heterodyning High Frequencies into Low Frequency Sidebands......................................................................... 29

Reflection, Absorption, and Scatter............................................................................................................................ 30

Passive and Active Sensing......................................................................................................................................... 30

Adaptive Beam Forming and Electronic Scanning.................................................................................................... 31

Holography and Interferometry.................................................................................................................................. 32

Electronic Warfare and Radio Frequency Interference........................................................... 34

Directed Energy Weapons........................................................................................................ 34

Communication Warfare........................................................................................................... 36

NSA Encoding and Decoding Techniques..................................................................................................................... 36

Imaging...................................................................................................................................... 40

Spectrograms........................................................................................................................................................................ 41

Magnetic Nuclear Resonance............................................................................................................................................ 41

Electron Spin Resonance.................................................................................................................................................... 41

Scintillation of Organic Molecules Using Free Radicals and Spin Probes................................................................. 41

Viewable Scintillation of Ion Density............................................................................................................................... 42

Ion and Electron Cyclotron Resonance........................................................................................................................... 42

Using Doppler to Scan Ion Current Density with Frequency Spread......................................................................... 42

Filtering, Identification of Signatures, and Tracking Algorithms............................................ 43

Chapter 3 Modes of NeuronInfluence.................................................................................44

Directed Energy........................................................................................................................ 44

Energy Wave Shaping........................................................................................................................................................ 46

Thermal Elastic Expansion.................................................................................................................................................. 47

Thermal Catalytic Reaction Speeds.................................................................................................................................. 48

Heating...................................................................................................................................... 48

Stored Waveform Inverse Fourier Transform (SWIFT).......................................................... 48

The Diode Effect....................................................................................................................... 49

Neurotransmitter Release........................................................................................................ 49

Electron Cyclotron Current Driving......................................................................................... 51

Ion Cyclotron Resonance, Ion Heating.................................................................................... 51

Magnetic Induction................................................................................................................... 52

Quasi-Static High Voltage Electric Fields................................................................................ 52

Ultrasonic energy...................................................................................................................... 53

Colloidal Vibration Potential.............................................................................................................................................. 53

Kinetic Elastic Expansion................................................................................................................................................... 53

Direct under skull electrical probes......................................................................................... 53

Genetic Engineering and TSS Chemical Division Research for the “psi” Gene.................... 53

Chapter 4 Wet and Dry NeuralNetworks............................................................................54

Information Theory................................................................................................................... 54

Data → Information → Knowledge → Wisdom → Enlightenment............................................................................. 54

Memetics and the Mating of Minds......................................................................................... 55

Super Intelligence..................................................................................................................... 55

The Global Brain Project.......................................................................................................... 55

Hive Minds and Swarm Theory of Information........................................................................ 55

Integrated Intelligent Systems................................................................................................. 55

Centralized and Distributed Intelligence................................................................................. 56

The Global Brain Project..................................................................................................................................................... 56

Cybernetic Hive Minds....................................................................................................................................................... 56

Human Networks................................................................................................................................................................. 56

Super-Intelligence................................................................................................................................................................ 57

Cognitive Entities, Networks, and Society of Minds................................................................................................ 57

Harvesting Human Minds and Other Wet Nets........................................................................................................ 58

Think Tanks (Brainstorming)........................................................................................................................................ 58

Organizational Behaviors.............................................................................................................................................. 60

Network Structures........................................................................................................................................................ 60

Hierarchies and Classism.................................................................................................................................................... 60

Structure, Importance, Relevance, and Meaning............................................................................................................ 61

Defining Human Cognition and the Sense of Self..................................................................... 61

Computational Equivalence and the Conscious Universe....................................................... 62

Chapter 5 NeuralProgramming...........................................................................................63

AutoCorrelograms.................................................................................................................... 64

Mapping.................................................................................................................................... 64

Self-organizing unsupervised learning / reinforcement learning / neurodynamic programming............................. 65

Classification and Brain Printing Identification.............................................................................................................. 65

Port Scanning.................................................................................................................................................................. 66

Brute force hacking........................................................................................................................................................ 67

Compression................................................................................................................................................................... 67

Cataloguing............................................................................................................................... 69

Personality Segmentation................................................................................................................................................... 69

Loyalty Affinities and Belief System Classification.................................................................................................. 69

Personality Simulations................................................................................................................................................. 69

Creating Cogs in the Machine...................................................................................................................................... 69

Data-mining Anomalies...................................................................................................................................................... 70

Counter Terrorism.......................................................................................................................................................... 70

Counter Intelligence....................................................................................................................................................... 70

Censorship and Information Flow Controls............................................................................................................... 70

Cognitive Configurations.......................................................................................................... 71

Virtual Neurons......................................................................................................................... 71

Transformations between Machine and Human Knowledge Storage...................................... 72

Integrating the Internet with Wet and Dry Neural Networks.................................................. 72

Adding Non-biological Sensors to Human Perception............................................................. 72

Chapter 6 Applications..........................................................................................................73

Self Directed Evolution............................................................................................................. 73

Autonomous Modification, “Free Will”, Deterministic Reprogramming, and ‘Bit Twiddling’................................ 73

Diagnostics and Monitoring...................................................................................................... 74

Efficient Communications......................................................................................................... 75

Universal Translators.......................................................................................................................................................... 75

Telepathy and Psychophony............................................................................................................................................ 75

Distributed Knowledge Management...................................................................................... 75

Self Organizing Adaptable Reconfiguration and Swarm Theory................................................................................. 75

Dream Harvesting – Utilizing Down Cycles.................................................................................................................... 76

Beaming and ‘Transporter’ Technology.......................................................................................................................... 76

Enhanced Human Performance................................................................................................ 77

Over-clocking the common fundamental Human Algorithms....................................................................................... 77

Forced Sleep and Adrenaline Boosts............................................................................................................................... 77

Memory Enhancement........................................................................................................................................................ 77

Intelligence and knowledge enhancements..................................................................................................................... 78

Extra Senses and Psi-borgs(Cybernetic biological computer entities)........................................................................ 80

Mood Management............................................................................................................................................................. 81

Enhancing Biological Sensors........................................................................................................................................... 81

Silicon Immortality............................................................................................................................................................... 81

Virtual Heaven and Hell................................................................................................................................................. 81

Crime and Punishment.............................................................................................................. 82

Automating Justice and Preventing Crimes.................................................................................................................... 82

Correctional Alternatives................................................................................................................................................... 83

“Behavioral Training”, Brainwashing, psychic driving and programming............................................................ 83

Secret Prisons................................................................................................................................................................. 83

Big Brother, Aliens, and the Voice of God................................................................................................................. 85

Cultural Engineering and Cultural Normalization.................................................................... 85

Accelerated Education........................................................................................................................................................ 87

Directed Evolution............................................................................................................................................................... 88

Productivity of Society....................................................................................................................................................... 89

Entertainment Applications...................................................................................................... 89

Ego trip.................................................................................................................................................................................. 89

Memory implants................................................................................................................................................................. 90

Virtual vacations.................................................................................................................................................................. 90

Shared interactive movie and music creation.................................................................................................................. 90

Virtual sex.............................................................................................................................................................................. 90

Electromagnetic Psychoactive Drugs and Altered Conscious States......................................................................... 91

War Gaming.......................................................................................................................................................................... 91

Sensing of desires and fulfilling them.............................................................................................................................. 92

Medical Applications................................................................................................................ 92

A New Medical Instrument that Spin Tags and Monitors Free Radicals................................................................... 92

Accelerated Healing............................................................................................................................................................ 92

Anit-Depression medication, Cure for Post Traumatic Stress Syndrome................................................................... 92

Cure for Loneliness and Broken Hearts........................................................................................................................... 92

Behavioral Modification to Quit Smoking, Lose Weight, Exercise Motivation......................................................... 93

Analgesics and Sensitization............................................................................................................................................. 93

Monitoring of seizures, heart activity.............................................................................................................................. 93

Diagnostics through Pain Sharing.................................................................................................................................... 93

Empathy Creation................................................................................................................................................................ 93

Universal Translator...................................................................................................................................................... 94

Replace Ritalin and many psychoactive pharmaceuticals............................................................................................. 95

Drug Rehabilitation............................................................................................................................................................. 95

Sobriety signal..................................................................................................................................................................... 95

Replace dying brain cells with virtual ones..................................................................................................................... 95

Cures for Blindness and Deafness.................................................................................................................................... 95

Muscular sclerosis (MS), Seizures, Bi-polar, Schizophrenia Cures............................................................................. 96

Bionics and spinal injuries................................................................................................................................................. 96

Biological Cloning and Mental Cloning........................................................................................................................... 97

Immortality............................................................................................................................................................................ 97

Military applications.................................................................................................................. 97

Spying/ESPionage/Remote Viewing................................................................................................................................. 97

Control of enemy................................................................................................................................................................. 98

Control of politics................................................................................................................................................................ 98

Control of civilians opinions.............................................................................................................................................. 99

Remote control soldiers...................................................................................................................................................... 99

Reading of vitals................................................................................................................................................................ 100

Enhanced human performance........................................................................................................................................ 100

Faster reaction times......................................................................................................................................................... 100

Psi-borg extra senses........................................................................................................................................................ 100

EEG control of robotic machines..................................................................................................................................... 101

Current Uses........................................................................................................................... 101

Silencing Dissenters and Government Whistle Blowers............................................................................................. 101

Brain print assassinations........................................................................................................................................... 101

Remote Lobotomies and Remotely Induced Schizophrenia.................................................................................. 102

Finding the outlying thinkers..................................................................................................................................... 105

Controlling Mass Media................................................................................................................................................... 105

Controlling Religions........................................................................................................................................................ 105

Acquiring Black Mail on Politicians............................................................................................................................... 105

Assassinating with plausible denial targets in the US and abroad........................................................................... 105

Controlling World Politics................................................................................................................................................ 106

Controlling Financial Markets......................................................................................................................................... 106

Collapsing Economies like the Former Soviet Union or the United States.......................................................... 106

Cheating at Gambling Games...................................................................................................................................... 106

Brain bugs - Spying, Espionage, and Sabotage............................................................................................................ 106

Human Robots and Psi-Borg Slaves............................................................................................................................... 106

Creating Alter Personalities – Dr. Jekyll and Mr. Hyde.......................................................................................... 106

Passing/failing Polygraphs and Brain Printing fMRI Truth Detectors................................................................ 107

Stress Conditioning..................................................................................................................................................... 107

Remote Interrogations – No-Touch Torture and Mind Probing................................................................................ 108

Dream Programming and Memory Probing.................................................................................................................... 109

Evolving Mind Virus Weapon Effectiveness................................................................................................................ 109

Directed Evolution............................................................................................................................................................. 110

Eugenics, Genocide, and the Silent Holocaust........................................................................................................ 110

Menticide and Silent Warfare..................................................................................................................................... 111

Intelligent Design......................................................................................................................................................... 111

Human animals and machines with souls................................................................................................................. 112

Chapter 7 Hacking Computer and BiologicalSystems..................................................... 113

History of Mind Hacking........................................................................................................ 113

Mind Hacking and The Enemy Within................................................................................... 114

Cognitive and Perception Warfare......................................................................................... 115

Cognitive Modeling and Reverse Engineering the Brain..................................................... 115

Mind Viruses........................................................................................................................... 120

Genetic Algorithms and Directed Evolution.................................................................................................................. 121

Human Experimentation, Brain Knapping, and Food for Thought....................................................................... 121

Malicious Payloads........................................................................................................................................................... 122

Replacing Personalities............................................................................................................................................... 123

Protected Memory, Partitioning, and Cognitive Containment......................................................... 123

Infinite Looping................................................................................................................................................................. 124

Demons............................................................................................................................................................................... 124

Crashing the Operating System Through Error Amplification.............................................. 124

Zombification and Remote Control Attacks........................................................................... 125

Scalable Enslavement and Zombification Strategies.................................................................................................... 126

Spiders................................................................................................................................................................................. 126

Bots...................................................................................................................................................................................... 127

Intelligent Agents.............................................................................................................................................................. 127

Brute Force Hacking – Master/Slave Roles.......................................................................... 127

Queuing Executables - Subliminal and Hypnosis................................................................... 128

Logic and Memory Buffer Overflow....................................................................................... 128

Denial of Service Attacks....................................................................................................... 129

Trojan Horses......................................................................................................................... 130

Triggers and Triggered Payloads...................................................................................................................................................... 131

Personality Overlays.................................................................................................................................................... 131

Psycho-bombs.............................................................................................................................................................. 132

Programmed Assassins............................................................................................................................................... 132

Terrorists....................................................................................................................................................................... 134

Pleasure/Pain principles.......................................................................................................... 134

Spoofing................................................................................................................................... 136

Social Engineering, Identity Theft, and Doppelgangers............................................................................................. 137

Authority, Privilege, Access, and Role Level Hacking................................................................................................ 138

White Noise Generators, Jammers, and scramblers............................................................. 138

Phreaking and mobile phone cloning...................................................................................... 139

Phishing and Brain Scanning – Finding hosts......................................................................... 139

Co-Processor Usurpation....................................................................................................... 139

Inserting Secret Hooks in Device Drivers............................................................................ 140

Worms , Memetic Viruses, and Psychotronic Viruses........................................................... 140

Ghosting the Sensor Systems................................................................................................. 140

Cloaking and Stealth Technologies........................................................................................ 140

Hacking the Variables of Belief Systems............................................................................... 141

Dictionary Attack.............................................................................................................................................................. 141

Purging and Altering Memory......................................................................................................................................... 141

Electronic Dissolution of Memory --- E.D.O.M....................................................................................................... 142

Thought filtering and suppression................................................................................................................................. 142

Hacking Decision Trees.................................................................................................................................................... 144

Psychographic Mapping............................................................................................................................................. 144

Game Theory................................................................................................................................................................. 144

John Nash Equilibriums............................................................................................................................................... 145

Reflashing the BIOS, Infecting Boot Sectors, Substitution of Operating System Files........ 146

Hacking Input Output Ports – The 5 Senses and Motor Cortex.......................................... 148

Spyware................................................................................................................................... 152

Stealing Passwords.................................................................................................................. 154

Key Stroke Loggers........................................................................................................................................................... 154

Soul Catchers and Recording the Entire Life of Every Human.............................................................................. 154

Memory Probing..................................................................................................................... 156

Bi-directional Associative Memory (BAM) Probing................................................................................................... 156

Self Destruct Algorithms........................................................................................................ 157

Suicide bombers / Psycho-bombs................................................................................................................................... 157

Suicide through torture and depression signals........................................................................................................... 158

Amplification of destructive behaviors and addiction pathways.............................................................................. 158

Shutting down and Stressing the Subsystems........................................................................ 158

Heart Failure, blood clots, and Strokes.......................................................................................................................... 159

Secondary and tertiary diseases caused by prolonged stress.............................................................................. 159

Spooking to death............................................................................................................................................................. 160

Context Switching................................................................................................................... 162

Emotional Control.............................................................................................................................................................. 162

Handles, Handlers, and Proxies............................................................................................. 162

Invoking Defensive Algorithms then Redirecting a Counter Attack.................................... 162

Terrorists and Proxy Agent Provocateurs..................................................................................................................... 162

Psycho-Bombs................................................................................................................................................................... 162

Trip Wires and Detection Algorithms.................................................................................... 162

Van Eck Hacking and TEMPEST standards.......................................................................... 163

Network Analyzers and Packet Sniffers................................................................................. 164

Echelon for the mind......................................................................................................................................................... 164

Wireless hacking – electronic warfare, signal and communication intelligence.................... 164

AntiVirus Software.................................................................................................................. 165

Encryption and Protocols........................................................................................................ 165

Firewalls.................................................................................................................................. 165

Thought Stream Filtering.................................................................................................................................................. 167

Trace route and multi levels of indirection............................................................................ 168

Disrupting Human Networks.................................................................................................. 168

Plants and Agent Provocateurs...................................................................................................................................... 169

Hacking the Hackers.............................................................................................................. 170

Scarecrow Effect and Decoys.......................................................................................................................................... 170

Usurping the Eye Tracking Virtual Interface Controls and Audio Commands........................................................ 171

Chapter 8 Resistance is Futile - Counter ResistanceTechniques.................................... 173

Alice in Wonderland................................................................................................................ 174

Wizard of Oz – ‘The Kubark Manual’.................................................................................... 175

Angels and Demons Script............................................................................................... 175

Sleeping Beauty – The Script for sleeper agents and disposable CIA assets....................... 181

Snow White and the Seven Dwarfs................................................................................................................................ 182

The A, B, C’s of Enhanced Interrogation and Torture.......................................................... 182

False Confessions for Staged Courts and Media Events............................................................................................ 190

Brainwashing...................................................................................................................................................................... 191

Neural Linguistic Programming and Psychic Driving.................................................................................................. 192

Plausible Deniability................................................................................................................ 192

GasLighting........................................................................................................................................................................ 193

Framing (Setting up a target to be disposed of)........................................................................................................... 193

Scripts and Dirty Tricks.................................................................................................................................................... 194

The Art of War and the Art of Deception..................................................................................................................... 196

Tricks, Illusions, and the Psychology of Magic........................................................................................................... 197

Chapter 9 Designing Gods - Active DoD, NSA, and CIASystems................................... 198

Global Communication Warfare – code name “Gabriel................................................. 199

Biometric Recognition And Identification Network – B.R.A.I.N................................................... 200

Remote Hypnotic Intra-cerebralControl ---- R.H.I.C.................................................................. 202

Mentally Integrated Neuron Duplicator ---- M.I.N.D.................................................................... 202

Artificial Linguistic Internet Computer Entity ---- A.L.I.C.E.......................................................... 203

The Ghost in the Machine and Demons of Destruction.............................................................................................. 206

Thought And Memory Interface ---- T.A.M.I.............................................................................. 207

Common Human Routines Inference Software TechnologyC.H.R.I.S.T................................... 208

Silent Assassination Through Adapting Networks ---- S.A.T.A.N.................................................. 208

Death Doctors and Angels of Death.............................................................................................................................. 209

Voodoo Doll: No-touch torture subprograms............................................................................................................... 210

Mind Games - Psychic Warfare Training................................................................................ 223

Project “Noah’s Ark”......................................................................................................... 229

Chapter 10 The Politics and Ethics of Controlling HumanBeings................................... 230

Legal Issues............................................................................................................................ 232

The Costs and Benefits.................................................................................................................................................... 233

Appendix of Formulas and Calculations.................................................................................. 234

Other Methods of Spying and Sabotage.................................................................................... 235

Index........................................................................................................................................... 237

CD packet containing viral code, port scanners, Back Orifice, and many other hacking utilities and codesamples........................................................................................................................................247

Chapter 11 About theauthor................................................................................................248

Chapter 12 Review Quotes:...................................................................................................249

Read more…
7 August 2009 "Mailteam works"--victims work trends Proverbs Warning Against Enticement 1-8 Listen, my son, to your father's instruction and do not forsake your mother's teaching. 1-9 They will be a garland to grace your head and a chain to adorn your neck. 1-10 My son, if sinners entice you, do not give in to them. 1-11 If they say, "Come along with us; let's lie in wait for someone's blood, let's waylay some harmless soul; 1-12 let's swallow them alive, like the grave, and whole, like those who go down to the pit; (Secret Mind Control weapons abuses and tortures are to : wait for victims blood, waylay their harmless soul; swallow victims alive, like the grave, and whole, like those who go down to the pit.) 1-13 we will get all sorts of valuable things and fill our houses with plunder; 1-14 throw in your lot with us, and we will share a common purse"-- 1-15 my son, do not go along with them, do not set foot on their paths; (God asks everyone, do not support mind control weapons abuses and tortures) 1-16 for their feet rush into sin, they are swift to shed blood. 1-17 How useless to spread a net in full view of all the birds! 1-18 These men lie in wait for their own blood; they waylay only themselves! 1-19 Such is the end of all who go after ill-gotten gain; it takes away the lives of those who get it. Warning Against Rejecting Wisdom 1-20 Wisdom calls aloud in the street,she raises her voice in the public squares; 1-21 at the head of the noisy streets she cries out,in the gateways of the vity she makes her speech; (would you not believe that Wisdom had already called out to stop mind control weapons abuses and tortures? and victims have been following her call, and urged government to investigate such crime immediately?) 1-22 How long will you simple ones love your simple ways? How long will mockers delight in mockery and fools tate knowledge? 1-23 If you had responded to my rebuke, I would have poured out my heart to you and made my thoughts known to you. 1-24 But since you rejected me when I called and no one gave heed when I stretched out my hand, 1-25 Since you ignored all my advoice and would not accept my rebuke, (please don't reject to help victims and don't ignore victims complaint) 1-26 I in turn will laugh at your disater; I will mock when calamity overtakes you-- 1-27 When calamity overtakes you like a storm,when disaster sweeps over you like a whirlwind,when distress and trouble overwhelm you. 1-28"Then they will call to me but I will not answer;they will look for me but will not find me. 1-29 Since they hated knowledge and did not choose to fear the Lord, 1-30 Since they would not accept my advice and spurned my rebuke, 1-31 they will eat the fruit of their ways.and be filled with the fruit of their schemes. 1-32 For the waywardness of the simple will kill them.and the complacency of fools will destroy them; (Please don't be so waywardness in supporting mind control weapons abuses and tortures, please don't be complacency to covert mind control weapons abuses and tortures) 1-33 but whoever listens to me will live in safety and be at ease, without fear of harm. (1) Online supporting Online Petition: Ban Mind Control/Directed Energy Weapons abuse and torture http://criminaljustice.change.org/actions/view/ban_mind_controldirected_energy_weapons_abuse_and_torture My Cause: Ban Mind Control/Directed Energy Weapons abuse and torture http://apps.facebook.com/causes/282055/58123679?m=6d54c0aa My Group: Peacepink (Ban mind control/directed energy weapons abuse and torture) http://www.facebook.com/group.php?gid=76416668535 My Page: Peacepink (Ban mind control/directed energy weapons abuse and torture) http://www.facebook.com/pages/Peacepink/85893742927 (2) FAX TO REPRESENTATIVE JAN SCHAKOWSKY ALL VICTIMS ARE REQUESTED TO SEND THIS LETTER BY FAX TO REPRESENTATIVE JAN SCHAKOWSKY - CHAIRWOMAN OF THE US HOUSE OF REPRESENTATIVES - SUBCOMMITTEE ON INVESTIGATIONS ( COMMITTEE ON INTELLIGENCE) Fax: 202-226-6890 Dear Ms Schakowsky: Thank you for your efforts to initiate hearings on Capitol Hill to expose publicly-funded wrongdoing that is able to be concealed by the abuse of official secrecy, for example any wrongdoing perpetrated by employees of the any of the intelligence agencies, in what they imagine or claim is the national interest. I hope that the terms of reference of any hearings that you are successful in initiating will be broad enough to encompass what are nowadays widely called "Organised Stalking", and "Electronic Harassment" or "Electromagnetic Harassment". I trust that you find the term "Organised Stalking" (OS) self-explanatory. It describes aptly a substantial subset of the unlawful activities of FBI staff-members, conducted under the codename COINTELPRO during the days of Edgar J Hoover. Official statistics show that about 8% of those who complain nowadays of stalking offences, complain of multiple stalkers working as organised teams, not just single stalkers working alone. "Electromagnetic Harassment" (EH) refers to the harming of persons from a distance with anti-personnel, electromagnetic directed energy weapons. Please confirm that you will use your best endeavours to ensure that terms of reference for any hearings are not drawn so narrowly as to prevent the hearings from taking evidence from victims of these particular two types of wrongdoing. There are a great many citizens available who would like their day in court, where they would testify to being abused themselves, with either OS or EH, and in many cases both techniques in tandem. There are compelling reasons for suspecting that such wrongdoing is being financed in part by public funding of perpetrators who enjoy the protection of official secrecy. YOUR FULL NAME ADDRESS TEL CITIZENSHIP PASSPORT NO. The Above Letter Was Drafted By John Allman, (3) Please send your TORTURE AND ABUSE CASES to Judge Claude Bridel - "Justice de Paix du District de Nyon" (Switzerland) – in support of Katherine Friedli Judge Claude Bridel - info.jpxny@vd.ch , Katherine Friedli Katherine.friedli@yahoo.com (European Torture Case #52) Here is the link to our over 950 DIRECTED ENERGY AND NEUROLOGICAL WEAPONS, AND ORGANISED STALKING, TORTURE, DEGRADATION AND MUTILATION VICTIMS' CASE SUMMARIES FOR YOU TO WITNESS, RECORD AND OPPOSE - http://www.freedrive.com/folder/177784 OR http://www.mydrive.ch username – johnfinch password - TORTURECASES (4) Derrick Robinson INTERVIEW WITH DR. KIMBERLI Recently, Derrick Robinson did an interview with Kimberli Ridgway, D.N.H. who has a Talkshoe program called "Peace Meditations" that I thought you all would like to hear. I guess I did ok, although the audio on my end needed to be louder. http://www.talkshoe.com/talkshoe/web/audioPop.jsp?episodeId=242130&cmd=apop (5) Intelligence Committee Launches Full CIA Investigation Schakowsky Subcommittee Tapped to Investigate CIA Program & Congressional Notification WASHINGTON, DC (July 17, 2009) – Rep. Jan Schakowsky, D-IL, Chairwoman of the House Intelligence Subcommittee on Investigations & Oversight, issued the following statement to announce a full investigation into certain CIA programs and the Congressional notification process. “The House Intelligence Committee will move forward with a full investigation that will explore certain CIA programs and the core issue of how the committee is kept informed. My subcommittee will take the lead on significant portions of the investigation; we will explore instances where the Congress was not informed in a timely way and situations in which laws may have been broken. “This investigation will seek to review the process for notifying Congress and the Committee’s role to oversee the intelligence community. It is very important for us to set the record straight going forward that the Congress wants to be, and needs to be, able to conduct its oversight function. “We want to look very closely at every aspect of the notification process and various programs. If it is determined by this investigation that the Vice President of the United States ordered Congress not to be told there is reason to believe that is a significant violation of the National Security Act, we’ll follow that thread where it takes us and determine if there’s reason to refer to the issue to the Justice Department or clarify the laws regarding notification. “Currently, we’re collecting necessary documents from the appropriate agencies to proceed with our investigation. In the near future I hope to develop a timetable and soon after we’re going to begin our investigation with hearings.” Telephone Chicago - (773) 506-7100 M-Th 8:30-5:30 CST Fri. 8:30-5:00 CST Evanston - (847) 328-3409 M-Th 8:30-5:30 CST Fri. 8:30-5:00 CST Washington - (202) 225-2111 M-F 9-6 EST Fax Chicago - (773) 506-9202 Evanston - (847) 328-3425 Washington DC - (202) 226-6890 Postal Mail In Chicago 5533 Broadway, Chicago, IL 60640 In Evanston 820 Davis Street, Suite 105, Evanston, IL 60201 In Washington, D.C. 2367 Rayburn House Office Building, Washington, DC 20515 Email: http://www.house.gov/schakowsky/contact.shtml (6) More Human Rights organization we should contact John Humphrey Centre For Peace And Human Rights http://jhcentre.org/dnn/Default.aspx?base (7) PERSONAL SECURITY TEAM AND CRISIS INTERVENTION COMMITTEE--From USA Derrick Robinson Lately, due to some situations that have arisen in our community, some have expressed interest in starting a personal security - as in bodyguard - team. we are also interested in seriously developing a Crisis Intervention Team. (Hopefully, this time we can make a go of it!). Those interested in participating in one or both of these activities, please contact: Derrick Robinson Email: derrickcrobinson@gmail.com Phone: 513-337-9632 Eric Griffin Email: howrealareyou@yahoo.com Phone: 702-372-9052 Marc Burnell Email: burnellmarc@yahoo.com Phone: 202-528-2752 (8) TI ACTIVISM TALKSHOE PROGRAM FOR SUNDAY, AUG. 2 Featured for Aug 2/09 talkshoe will be target and Canadian author Victoria Jones (Vicky). The title of her book is "Useless eaters: puppets of the New World Order". When Vicky's son committed suicide in 1998, she needed to find out what had been slowly destroying their lives for so long. She spent the next 10 years trying to find the answers to what she knew to be true, but could never prove. This book is a result of her search. This book touches on many topics that affect everyone with the focus on the Illuminati and the NWO. Contained in her book are excerpts from TI emails in our community plus TI testimonial letters about this crime and how it has affected them. Phone Number: (724) 444-7444 Call ID: 54307 Time: 7PM Eastern, 4PM Pacific time or for those who wish to listen on their computer http://www.talkshoe.com/tc/54307 (9) TI KATHERINE MOORE SPEAKS OUT IN WASHINGTON, DC The following is a speech given by Florida TI Katherine Moore, former vice-mayor of Wilmington, NC at the recent TK & JP Music Fest for Families, U.S. Capitol, Washington, D.C., July 19, 2009. Go Katherine! https://www.youtube.com/watch?v=aalzQWpuYrE (10) ELIZABETH ADAMS' JULY 25, 2009 TAPING - BY WANDA DABLIN I flew into San Francisco at 9:00 am and was picked up by Christine Harris (TI – 1yr), what a brilliant woman and of course she had a heart of gold like every other TI I have had the honor of meeting. There was 6 other TI’s present besides Elizabeth Adams and myself; Bruno, Cathy, Christine, Star, Richard and Dee. We got a late start but I was able to participate in one full taping of the show. We discussed what type of harassment is most devastating to each one of us at this time. I spoke about police harassment and sleep deprivation. I also had a chance to say a few words about the great group of TI’s that meet in the Los Angeles area once a month for support and activism. Before I had to leave, Elizabeth announced she was going to schedule a couple more tapings in September. I promised to attend and bring many more TI’s with me. One thing all TI’s can be thankful for during this nightmare is the fact that we all have met some wonderful, wonderful, people! (10) ELIZABETH ADAMS' TV TAPING SUMMARY BY BRUNO On Saturday, July 25, 2009, at 12:00pm at Berkeley Community Media in Berkeley, California, there was a special taping of Elizabeth Adams' TV show "America Needs to Know" in the large studio. 8 TIs were present: Elizabeth, Wanda Dablin from LA who has formed an LA TI group, Cathy Meadows, M.A., Clinical Psychology, who has discussed OS/EH on several TruthBrigade Radio shows, Dee Hardin, Christine Lynn Harris, a couple of other TIs, one of them new to our meetings, and myself. One of us has been targeted for 37 years! Elizabeth brought pizza for us to eat while the studio was being set up and during the breaks. Richard in Marin who couldn't be there because he was working called in to wish us all well. One of us was very late in arriving due to very unusual traffic delays. One of us expressed that the one thing she won't let the perps take away from her is her body -- "this body is mine!" It was expressed that some perps are mind controlled, and that some people who appear to be perps are strongly mind controlled TIs. The best thing is to not react to the things perps do to antagonize us so they don't learn how to push our buttons to get us to act aggressively. Many feel police are participants in their harassment -- the point was made that not all police are involved -- in some cases police are targeted as well, and all cross-sections of society participate, being recruited by a variety of means. Workplace mobbings, poisonings, and a consensus mainstream media is controlled, were discussed. V2K/induced sounds were discussed -- one of us was successful in capturing such sounds on a recorder. The point was made that some very advanced technology is involved, as well as decoying, making it difficult for us to determine exactly what is going on and where it's coming from. The point was made that the harassment is coordinated in such a way that when the victim accurately describes what they are experiencing, it makes them appear mentally ill in order to discredit them -- a form of gaslighting. It was expressed that EH is hate gone high-tech -- to end the harassment we as a society need to end the hate. Wanda said that their LA group recently had an event where their members distributed over 1000 OS/EH flyers -- she said it made them feel really great! After the taping we hung around for a while and viewed a brief segment of what had been taped that day. The total time spent together at the studio was about 6 hours. Some of us had to leave early, after the first taping. Most of the remainder of us were still full from the pizza and so didn't go to a nearby restaurant as originally planned, and so we departed. For reference Elizabeth is producing a television show entitled "America Needs to Know" being broadcast as one hour episodes on Berkeley community television beginning in July. She is scheduling ongoing taping sessions for TIs to tell their stories. Dress professionally. We don't have to worry if we make a mistake because these are not live but just tapings and Elizabeth will edit them down into one-hour episodes, editing out any mistakes or non-credible sounding stuff. Still we should focus on sounding credible throughout so Elizabeth has as much material to work with as possible. Since we don't have any experts on this technology we're just going to discuss our personal experiences as victims. We'll appear on her show and discuss our targeting much as we do at the support meetings, on the conference calls, etc. You can choose whether or not you want to be on camera. Those who want to go public will be seated in front of the camera and those who wish to remain anonymous will be seated behind the camera so only their voices will be heard. We want to get as many different TIs as possible so we don't have to re-use TIs in subsequent tapings. More information about Elizabeth's television show is appended below. To participate in her ongoing tapings please contact Elizabeth directly at the contact info below. Or if you just want to be in the audience for moral support or to just observe you're welcome to attend. This is our chance to let the world know about our targeting and gain experience discussing this stuff! Bruno Marchesani ***************************************************************** ATTN: TI'S NEAR & FAR ... SCHEDULED: "IN STUDIO TAPINGS" BERKELEY COMMUNITY MEDIA HAS 2 PRODUCTION STUDIOS ON LOCATION 1) LARGE STUDIO HOLDS AN AUDIENCE OF APPX 100 2) EXPRESS STUDIO - NO AUDIENCE - SMALL ... ALL TI'S ARE WELCOMED TO BE ON THE PANEL! YOUR FACE DOES NOT HAVE TO BE SEEN YOU CAN SPEAK BY MICROPHONE FROM THE AUDIENCE! --------------------------- TO MAIL ME PERSONAL STUFF ELIZABETH ADAMS c/o STORAGE MART 2743 SAN PABLO AVE OAKLAND, CA 94612 PLEASE NOTE: EVEN THOUGH I'M MOVING MY FURNITURE OUT I WILL STILL USE STORAGE MART'S POSTAL SERVICE MAIL BOXES TO RECEIVE MY PERSONAL MAIL FOR AT LEAST ONE MORE MONTH OTHERWISE TI'S TAKE CARE . . . SO TO SEE YOU HERE . . . AND MAY GOD BLESS US ALL "SPECIAL THANKS" TO LOCAL TI'S HERE IN THE SAN FRANCISCO/SAN JOSE BAY AREA FOR SUPPORTING WITH YOUR EFFORTS ON THE PANEL OF AMERICA NEEDS TO KNOW FOR ALL TI'S NATIONWIDE & INTERNATIONALLY! THANK YOU ALL BEST REGARDS TO ALL ELIZABETH ADAMS http://www.organizedcrimewaves.com http://www.nationalcaresociety.org ocwinfo@yahoogroups.com America Needs To Know Help TV 510-776-8838
Read more…
(11)a neuroscientist talks about her work using electromagnetics to change moral thinking and the Pentagon's interest in it. http://blog.ted.com/2009/07/rebecca_saxe_at.php Rebecca Saxe at TEDGlobal 2009: Running notes from Session 5 Rebecca Saxe talked about "the problem of other minds." One of the most complicated things the mind does is try to comprehend what other people are thinking. But the problem she researches is not what you might think -- not "why is it so hard to know other minds?" but: How is it so easy to know other minds? One snapshot of a stranger diving into the ocean or holding a baby allows you to guess what other people are thinking or feeling -- joy, or thrill. The brain, the machine we use to think, is made of the same pieces as other animals' brains are made of, and even sea slugs have them. But how is it that the particular network of pieces we humans in particular have allows us to think about other peoples' thoughts so easily? We have a special reasoning module called the right tempero-parietal junction that is what we use to think about other peoples' thoughts. How do we learn to predict actions? It takes time for human children to learn this ability. 5-year-olds can understand that other people have false beliefs. 3-year-olds don't understand this. The same goes for the ability to make moral judgment based on what is (or is not) known about peoples' intentions. But even in adulthood, people differ on this ability. Saxe tries to explain how these differences come about with fascinating experiments. Adults are given a version of the experiment given to the kids, involving a jar of sugar that is labeled "poison." People disagree about how much blame people should get when they do something intentionally wrong -- givng a co-worker sugar, but believing that the sugar is poison -- and doing something by accident -- giving people poison that they think is sugar -- that is wrong. Saxe wanted to know if we can change this function, and it turns out that we can. We can do so using a magnetic pulse to disorganize the function of the neurons in the region responsible for this type of thinking. The magnetic pulse, which is powerful enough to shoot a quarter into the air, causes an involuntary twitch in the hand when applied through the skull. When this pulse is applied to people who are making a moral judgment, people come to believe that accidents are less OK, and actions done with actual intent to harm is more OK. In a brief Q&A, Chris Anderson asked about the dangers of such technology. Is Saxe talking to the Pentagon about this technology? Saxe said, "They're calling, but I'm not talking to them." It's not any danger (yet), because there's no way for this technology to work without the person knowing that the brain interference is happening. Will this research make any impacts on education? Saxe says that is the hope. By exploring this field, we'll understand how human brains do distinctly human things. (12) Holt Calls for Next Church Committee on CIA Congressman Calls for Broad Inquiry Into Intelligence Agency By Spencer Ackerman 7/27/09 6:00 AM http://washingtonindependent.com/wp-content/uploads/2009/07/rushholtpic_300.jpg Rep. Rush Holt (D-N.J.) (rushholt.com) After years of examining CIA operations of dubious legality, an important member of the House intelligence committee is exploring an option that many in the intelligence community view with apprehension: a comprehensive investigation of all intelligence-community operations over years and perhaps even decades. The model is the famous Church and Pike committees of the 1970s, which exposed widespread CIA lawlessness; created the modern legal and congressional oversight structures for intelligence; and cleaved the history of the CIA into before- and after- periods. http://washingtonindependent.com/wp-content/uploads/2008/08/nationalsecurity.jpg Illustration by: Matt Mahurin Rep. Rush Holt (D-N.J.), a progressive who sits on the House Permanent Select Committee on Intelligence and chairs a special oversight panel that helps write the intelligence budget, has been increasingly comfortable talking about a new “Church committee.” He floated the idea in an interview with TWI on July 14, again to the Newark Star-Ledger the next day, and even attempted to discuss the Church committee’s precedents for congressional oversight with Lou Dobbs on CNN on July 20. “I’d like to see something on the scope of the Church committee,” Holt told TWI in a Friday phone interview. The congressman said that it had been a “few decades” since Congress took a comprehensive inquiry into the intelligence community’s impact on “the relationship between the individual and her or his government, as well as the role that the U.S. plays in other countries around the world, outside of declared military activities.” Holt said he did not have a concrete proposal prepared for the creation of such an investigation, and was at the stage of seeing what colleagues and members of the intelligence community made of such a move. “There’s agreement with the idea,” he said. “An awful lot of people have not really thought about how many unanswered questions there are or unresolved issues there are out there about how we do intelligence in the United States.” He declined to name any members of congress with whom he has discussed such an investigation, but said they were members of the House intelligence committee and the oversight panel he chairs. “Are we close to commissioning a study in the way I’m conceiving it? No, not yet,” he said. A House Republican aide, who requested anonymity, was unaware of Holt’s early feelers, raising questions about whether Holt’s envisioned inquiry would have Republican support. And a spokesman for Rep. Silvestre Reyes (D-Texas), the House intelligence committee chairman, did not return a request for comment. Many in the intelligence world and on the right view the committee investigations led by Sen. Frank Church (D-Idaho) and Rep. Otis Pike (D-N.Y.) as representing an apex of progressive congressional attempts to geld the intelligence community. Empaneled in response to a New York Times article by Seymour Hersh in 1974 reporting widespread surveillance of U.S. citizens, the investigations unearthed other abuses, such as repeated CIA assassination attempts on foreign heads of state. It resulted in the passage of laws like the Foreign Intelligence Surveillance Act to prevent warrantless domestic surveillance and the creation of standing committees in Congress to oversee intelligence activities. Some conservatives view the investigations as an example of congressional overreach. “I think they undermined our capabilities in some respects,” former Vice President Dick Cheney told his biographer, Stephen F. Hayes. Holt said that he is “not talking about upsetting the applecart, I’m talking about analyzing the full applecart” of intelligence activities. He rejects the idea that such a comprehensive investigation necessarily entails eroding U.S. intelligence capabilities. “Is giving your kid a test in school an inhibition on his free learning?” Hold said. “Sure, there are some people who are happy to let intelligence agencies go about their business unexamined. But I think most people when they think about it will say that you will get better intelligence if the intelligence agencies don’t operate in an unexamined fashion.” But over the past several years, the intelligence committees and official commissions have peered into intelligence matters repeatedly. In 2002 and 2003, an unprecedented joint House-Senate intelligence committee investigation looked into intelligence work on al-Qaeda before the Sept. 11 attacks, work that the 9/11 Commission took as a point of departure. A panel created by the Bush administration examined intelligence work on weapons of mass destruction. The Senate intelligence committee, from 2004 to 2007, undertook a multi-tiered look at intelligence failures preceding the invasion of Iraq. At the moment, the Senate intelligence committee is conducting a study into the CIA’s interrogation and detention practices after 9/11, and the House intelligence committee on which Holt serves is examining recent revelations of a shuttered CIA program believed to be tied to strengthening assassinations capabilities. Holt said that such inquiries still left a host of unexamined activities. “There’s a lot to look at, [and] not just who told what to whom, or the treatment of detainees or [renditions], or interrogation, or domestic surveillance or national security letters or on and on and on,” he said. “Church looked at everything since the OSS,” referring to the Office of Strategic Services, the World War II-era predecessor of the CIA. “The recommendations of the Church committee, in large part, have been eroded, ignored or violated since then. The world situation has evolved, and the technologies, methodology and organizations of the intelligence community have evolved, [and] also the look back then, in a sense, has been forgotten by some.” Representatives from the CIA and the Office of the Director of National Intelligence did not return messages seeking comment. Steven Aftergood, an intelligence policy analyst with the Federation of American Scientists, said that in some respects it was surprising that no one had proposed a Church committee-like investigation. “It’s the shoe that has not dropped yet,” Aftergood said. “The Church committee was established following a series of revelations of disturbing intelligence community activities. To a remarkable extent the series of events precipitating the Church committee has been replicated in recent months and years. The famous December 1974 Seymour Hersh front-page story in The New York Times talking about domestic surveillance [presaged] the December 2005 [James Risen and Eric Lichtblau] story in The New York Times about domestic surveillance.” Aftergood said that a new Church committee was “overdue,” and disputed the characterization of the 1970s congressional investigations as weakening U.S. intelligence. “While to some people in the intelligence business the name of Frank Church is a dirty word, it’s also true that the structures that emerged from the Church committee benefited intelligence by introducing stability and predictability into intelligence policy,” Aftergood said. “The idea that this was a disaster or an assault on intelligence is shortsighted to the point of misunderstanding. The Church committee yielded the framework that the U.S. intelligence community needed to grow and to regain at least in some measure the confidence of the public and the rest of the government.” Along those lines, Holt said that he’s heard representatives of the intelligence community say, in “breathtaking honesty and self-awareness,” that a thorough investigation might enable them to better do their jobs. “In a representative democracy, there is a very important role for the legislative branch to help the CIA and the intelligence community determine and understand their proper role and give them the tools and the latitude to carry out” lawful intelligence activities. URL http://washingtonindependent.com/52637/holt-calls-for-next-church-committee-on-cia (13 ) URBAN DICTIONARY http://www.urbandictionary.com/ Recently, a TI referred me to this site, the Urban Dictionary that has definitions for "Organized Stalking" and "Gangstalking". I just thought you all would like to see this. I didn't find a listing for the electronic harassment/torture that we are familiar with. 1. Organized Stalking A system of organized psychological terror tactics used against a person who has become an enemy of an individual or a government. Subtle but effective techniques of stalking by multiple individuals and psychological intimidation and manipulation are used to slowly but surely drive the target to make complaints to authorities who will see the complaints as bogus because of the methods used against the target. As a result, the target gets labelled as mentally ill. There are as many stalking tactics as there are targets as the multistalkers will tailor the stalking to the individuals habits and individual personality. Some common examples or organized stalking are: following the target on foot, by car and public transportation, crowding the target's space in a public place, murmuring insults under the breath so only the target can hear, sitting in the car outside the target's residence, starting "fights" in public with the target, doing "skits" on the street which involves information only the target should know but has been found out via surveillance of the target, stealing and vandalism of the target's possesions. 2. Organized Stalking “Organized Stalking is a form of terrorism used against an individual in a malicious attempt to reduce the quality of a persons life so they will: have a nervous break-down, become incarcerated, institutionalized, experience constant mental, emotional, or physical pain, become homeless, and/or commit suicide. This is done using well-orchestrated accusations, lies, rumors, bogus investigations, setups, framings, intimidation, overt or covert threats, vandalism, thefts, sabotage, torture, humiliation, emotional terror and general harassment. It is a “ganging up” by members of the community who follow an organizer and participate in a systematic “terrorizing” of an individual.” -Mark M. Rich Organized stalking is a crime against humanity. This is the first of several definitions of "Gang Stalking" listed at that site. 1. Gang Stalking 1. What is gang stalking? Gang stalking is a form of community mobbing and organised stalking combined. Just like you have workplace mobbing, and online mobbing, which are both fully recognised as legitimate, this is the community form. Gang stalking is organised harassment at it's best. It the targeting of an individual for revenge, jealousy, sport, or to keep them quite, etc. It's a psychological attack that can completely destroy a persons life, while leaving little or no evidence to incriminate the perpetrators." primary targets are woman, minorities, dissidents, whistle blowers, etc To get some revenge we had Joe stalked, mobbed and harassed 24/7, the gang stalking never stopped. We had him followed, cut off, we bugged his house, made that guy think he was going loco, crazy. We really messed with him till he was broken. (14) MISSOURI LEGISLATURE PASSES LAW RE: INVOLUNTARY MICROCHIPPING FIRST REGULAR SESSION HOUSE BILL NO. 550 95TH GENERAL ASSEMBLY INTRODUCED BY REPRESENTATIVES GUEST (Sponsor), RUESTMAN, McGHEE, PACE, SCHAAF AND SANDER (Co-sponsors) . 1069L.01I D. ADAM CRUMBLISS, Chief Clerk To amend chapter 537, RSMo, by adding thereto one new section relating to actions for damages for coerced subcutaneous implantation of an identification device. Be it enacted by the General Assembly of the state of Missouri, as follows: Section A. Chapter 537, RSMo, is amended by adding thereto one new section, to be known as section 537.043, to read as follows: 537.043. 1. As used in this section, the following terms shall mean: (1) "Identification device", any item, application, or product that is passively or actively capable of transmitting personal information, including but not limited to, devices using radio frequency technology or any electronic device used to track, harass, or download information without permission; (2) "Person", an individual, business association, partnership, limited partnership, corporation, limited liability company, trust, estate, cooperative association, or other entity; (3) "Personal information" , includes any of the following data elements to the extent they are used alone or in conjunction with any other information used to identify an individual: (a) E-mail, internet protocol, or web site address; (b) Date of birth; (c) Driver's license number or Missouri identification card number; (d) Any unique personal identifier number contained or encoded on a driver's license or identification card issued; (e) Bank, credit card, or other financial institution account number; (f) Any unique personal identifier contained or encoded on a health insurance, health benefit, or benefit card or record issued in conjunction with any government-supporte d aid program; (g) Religion; (h) Ethnicity or nationality; (i) Photograph; (j) Fingerprint or other biometric identifier; (k) Social Security number; (l) Any other unique personal identifier; (4) "Require, coerce, or compel", includes physical violence, threat, intimidation, retaliation, the conditioning of any private or public benefit or care on consent to implantation, including employment, promotion, or other employment benefit, or by any means that causes a reasonable person of ordinary susceptibilities to acquiesce to implantation when he or she otherwise would not, but does not include legitimate medical uses for which the patient or his or her guardian or parent has consented; (5) "Subcutaneous" , existing, performed, or introduced under or on the skin. 2. A person shall not require, coerce, or compel any other individual to undergo the subcutaneous implanting of an identification device. 3. Any person who violates the provisions of subsection 2 of this section may be assessed an initial civil penalty of no more than ten thousand dollars and no more than one thousand dollars for each day the violation continues until the deficiency is corrected. That civil penalty may be assessed and recovered in a civil action brought in any court of competent jurisdiction. The court may also grant a prevailing plaintiff reasonable attorney's fees and litigation costs, including but not limited to, expert witness fees and expenses as part of the costs. 4. A person who is implanted with a subcutaneous identification device in violation of the provisions of subsection 2 of this section may bring a civil action for actual damages, compensatory damages, punitive damages, injunctive relief, any combination of those, or any other appropriate relief. 5. Additionally, punitive damages may also be awarded upon proof of the defendant's malice, oppression, fraud, or duress in requiring, coercing, or compelling the plaintiff to undergo the subcutaneous implanting of an identification device. 6. An action brought under this section shall be commenced within three years of the date upon which the identification device was implanted. 7. If the victim was an incompetent, a dependent adult, or minor when the implantation occurred, actions brought under this section shall be commenced within three years after the date the plaintiff, or his or her guardian or parent, discovered or reasonably should have discovered the implant, or within eight years after the plaintiff attains the age of majority, whichever date occurs later. 8. The statute of limitations shall not run against an incompetent, a dependent adult, or minor plaintiff simply because a guardian ad litem has been appointed. A guardian ad litem's failure to bring a plaintiff's action within the applicable limitation period will not prejudice the plaintiff's right to do so. 9. A defendant is estopped from asserting a defense of the statute of limitations when the expiration of the statute is due to conduct by the defendant inducing the plaintiff to delay the filing of the action, or due to threats made by the defendant causing duress upon the plaintiff. 10. For purposes of implantation only, any interested person may file a petition for an order or judgment declaring an incompetent or minor free from the control of a parent or guardian who is requiring or preventing implantation of an identification device. The court shall consider that petition in light of applicable law with respect to the best interests of the incompetent or minor. 11. Any restitution paid by the defendant to the victim shall be credited against any judgment, award, or settlement obtained under this section. 12. The provisions of this section shall be liberally construed so as to protect privacy and bodily integrity. 13. Actions brought under this section are independent of any other actions, remedies, or procedures that may be available to an aggrieved party under any other law. 14. The provisions of this section shall not in any way modify existing statutory or case law regarding the rights of parents or guardians, the rights of children or minors, or the rights of dependent adults. (15) A suggestion letter from Bob Levin on how to explain explain DEW and COINTELPRO to your doctor Dear Dr. A Maria has a number of problems for which she needs treatment, but when she sees you, she is not given time to discuss them. You examine her and then leave before she can discuss her medical problems with you. I have thus called your office to explain her needs to your assistants, but they say that she must discuss them with you. Since she is not given time to discuss her needs with you during an office visit, she is getting no medical treatment for some of her urgent needs. I will thus list and attempt to explain her medical needs here. Please take time to discuss them with her and arrange for necessary treatment. 1. Mammogram Maria has a lump in her breast, which you detected on examination at her last visit. You ordered a mammogram, but she was unable to get a routine mammogram because she had a previous mammogram in March. She needs an order for a diagnostic mammogram. When I requested this from your assistant, I was told that you did not find a lump and thus could not order a diagnostic mammogram. Maria can feel a lump. She thus should have an order for a diagnostic mammogram. Maria is at extreme risk of cancer as the result of long term, continuous exposure to electromagnetic energy produced by attacks from directed energy weapons in long term experiments being conducted on her without her consent. 2. Gastroenterologist referral In my letter to you of June 1, I explained that since her abdominal surgery, Maria has remained very ill. She can eat very little. She has lost a great deal of weight. She has symptoms of very serious gastrointestinal problems, but she has been unable to get any diagnosis and appropriate treatment. She is gravely concerned about her present condition. She needs a referral to a gastroenterologist. Meanwhile, she needs anti-spasmodic medication. 3. Medical reports We have been trying for months to get the medical report of surgery in April by Dr. B. Your assistant said that you had not received this report from Dr. B after his office said that they had sent it to you twice. After they sent it the third time, you assistant told me twice that she would mail a copy to Maria, but we have not received it. She would like to get a copy of this report when she is at your office today. Maria requested that each of her previous doctors forward her medical records to you. She sent them the signed form provided by ABC HMO for transfer of medical records, but you told her that you have received no medical records. What else can we do to get records if the offices do not respond to written requests and to phone calls? Maria particularly wants to see the reports of two surgeries by Dr. B; the report of the last mammogram; and blood tests showing that she is anemic. 4. Pain caused by electromagnetic attacks Maria and I are both under continuous attack by electromagnetic directed energy weapons (DEW). We have no way of stopping these attacks since we have no way of proving who is responsible for them. We are in touch with hundreds of other people who share this same experience. The electromagnetic attacks greatly aggravate Maria’s arthritis condition. Her knees are badly swollen. She is almost unable to use her hands at times. She suffers extreme pain from the combination of arthritis and electromagnetic attacks. Dr. C prescribed Tylenol with codeine #4, two per day. Vicodin is also effective. You have prescribed a milder medication, 40 per month. Your prescription is not at all adequate to control Maria's pain. She needs stronger pain medication, not just for normal arthritis pain but for the torture of constant electromagnetic attacks. If you want additional information and explanation about these attacks and why the victims have no remedy to stop them, I will be more than happy to provide it if you will agree to take the time to read it. I can prove to you that what is happening to us now is consistent with past government agency programs of painful and sometimes deadly experiments on involuntary human subjects. These have been carried out secretly by government agencies since the 1940's. This is thoroughly proven, documented fact. It is not open to question or doubt. Although this proven truth is available to the general public, it seems to be unknown to the medical profession. The history of US government crimes is not taught in medical schools. Uninformed physicians thus assume that people are delusional if they believe they are being harmed by federal agencies. These physicians are unaware of the overwhelming, unquestionable evidence that US government agencies have in fact been engaged for many decades in harmful experiments on involuntary subjects and in secret wars of harassment and crime against innocent citizens. The covert wars are known as “COINTELPRO operations.” COINTELPRO operations consist of constant harassment and crimes for which no protection is available from police. Local police are fully aware of these federal government programs, but they refuse to interfere with them. The present programs combine DEW attacks with COINTELPRO operations. I can provide detailed descriptions and explanations of COINTELPRO operations if you will take time to read them, but I am keeping this as short as possible so that you will at least know the medical conditions for which your patient needs treatment. The truth about the past experiments and the COINTELPRO wars has been proven to the public only after it is too late to prevent the drastic harm that has been done to the victims. The truth about government agency responsibility for the present experiments on Maria and me and on hundreds of others will be proven at sometime in the future, maybe in 20 years, but as of now, we have no way to stop the DEW attacks and the accompanying COINTELPRO operations. The only thing that can be done for now is to provide medication to relieve as much of the pain as possible. 5. Tranquilizer. anti-depressant, and sleeping medication COINTELPRO operations are designed to produce extreme tension and depression in a targeted person, who must continue to suffer the emotional and psychological consequences of these operations year after year with no possible remedy available. After decades of extreme psychological and physical abuse, Maria is at the breaking point. She needs tranquilizers, anti-depressants and sleeping medication. You have prescribed a medication, which your assistant said could be used as both a tranquilizer and sleeping medication. It makes Maria too sleepy to use it during the day to control stress. She needs something like Valium to deal with stress without making her sleepy. She needs a separate sleeping medication to try to get her through the night. She asked for tranquilizers to help her deal with daily stress, but she needs more than tranquilizers to help her cope with a life of continuous torture. She should also be given an anti-depressant. Physicians, who don't believe the proven truth about these government agency crimes, suggest psychiatric treatment, assuming the problems are only imaginary, but they won't take the time to look at evidence offered by a patient to prove that what is happening today perfectly matches the proven truth of past government agency crimes. They simply close their mind to provable truth and let their patients suffer the consequences of their ignorance on this subject and their choice to close their minds to the past proven truth. I hope that your mind is open to proof of truth. If you want proof of the reality of the same government horrors that Maria and I now experience, I have 50,000 pages of documentation from reliable sources such as US Senate Committee investigations, which have proved the truth and reality of government agency COINTELPRO operations and about decades of severely harmful government agency experiments on involuntary subjects. Examples of the latter are the Atomic Energy Commission’s radiation experiments and the CIA's mind control experiments. I would be happy to provide you with as much evidence as you are willing to review. Alternately, since this information is available to the public, you can easily find proof of the truth for yourself by doing Google searches, which will produce the following information: “COINTELPRO” 227,000 references “Atomic Energy Commission radiation experiments" 108,000 reference "CIA mind control experiments" 109,000,000 references At the time the CIA and AEC experiments were being conducted, the involuntary subjects of the experiments had no way to prove the truth. Decades later, the truth was fully proven, but it was too late to benefit the involuntary subjects, who had suffered or died with no remedies available to them during the time that the experiments were being conducted. Decades from now, when the truth about the DEW experiments of today is thoroughly proven, it will then be too late to matter to Maria and me and to the hundreds of other present involuntary subjects of these experiments. What we can prove to you today is that US government agencies have, for decades past, been doing the same things that are now being done to us and to the hundreds of other present involuntary subjects of DEW experiments. So I am saying that before you assume that Maria’s problems are unreal and suggest psychiatric treatment, it is your responsibility to look at the evidence proving the truth and the reality of similar past government experiments on involuntary subjects like us and the reality of government COINTELPRO wars such as we now experience.. It should not be difficult to believe that US government agencies are continuing to do today the same things that they have been proven responsible for doing throughout past decades. Thank you for your attention to these matters of extreme concern to Maria and to me. If you would be interested in further information on the above subjects, please let me know. Sincerely yours, Bob S (16) Your Brain Will Eventually Be Used Against You Published on 07-19-2009 http://www.blacklistednews.com/news-4891-0-14-14--.html Source: IO9 Although every lie detector ever built has proved unreliable, scientists continue to search for that magic machine that will reveal dishonesty. Now two Harvard neuroscientists have hit on a "pre-crime" technique that reveals intent to lie before it happens. While some people already think that brain-imaging lie detectors are a scam, others remain convinced that they're the wave of the future. A recent study by Joshua Greene and Joseph Paxton at Harvard University shows that the skeptics might be right. Paxton and Greene bet their subjects money based on guessing a coin flip. While those who had to record their responses in advance had average success, those who didn't have to tell their guess until after they knew the result had a high success rate, indicating they were lying. More interestingly, those people who were even interested in lying showed brain activity when just offered the opportunity to cheat, while those who were more honest showed no difference in their brain activity regardless of the opportunity to cheat. Over time, Greene and Paxton were able to predict whether certain volunteers would lie at all. They expect that their machine could be developed not just to determine whether someone was lying or had lied, but if they were interested in doing so or would in the future. You always knew your brain would eventually betray you. The question is, how useful is this information really? Doesn't everyone want to lie sometimes, including people who are honest? Truthfulness Requires No Act of Will for Honest People [via Harvard] (17) The story of the International Criminal Court and Prosecutor Luis Moreno-Ocampo. http://video.pbs.org/video/1182396986/program/1154485580#
Read more…
14 Aug 2009 "mailteam works"--victims work trends (1) USA patent number: 6587729 Please find attached above an American patent for a weapon designed to torment persons with voices in their heads which they are unable to shut off. It should be needless to point out to you that voices are the principal symptom of schizophrenia, and terrified persons who go the authorities are very easy to label 'paranoid schizophrenics' because of their complaints. (2) Help USA victim RAMONA LOPEZ Hello Fellow TI's, Another fellow TI named Ramona Lopez needs some encouragement and 1or 2 roommates. I have spoken to her and with her consent am passing her phone number along to all of you. Ramona has told me that she is anemic (iron deficency) and has thyroid (iodine deficency). These deficencies cause a host of other problems in the body and mind including memory loss, insomnia,depression and fatigue. When calling please encourage Ramona to hydrate and nourish herself and to take her iron and thyroid medication. She does not have any fellow TI's in the same city that she lives in so she needs all the ecouragement she can get. Ramona does not have long distance on her phone right now only a calling card with a short amount of time left on it. I am planning to go visit her this month to have lunch. Ramona is a very nice lady who needs a friend. Her number is 805-553-9354. Thank You, Erica Gilmore Hi Bob, I'm still a prisoner in this complex. It seems unbeleivable that this can occur in plain sight. I was abused sexually a few days ago. I don't look the same my face and body have been changed or altered. I'm being tortured as I write this e-mail. I'm not able to get too far without the torture. I have inercom in my apartment. I hear and listen to perps talk all day and night; its a nightmare. I'm actually, a prisoner and a slave for sex. These man are filthy and evil I fear for my family and grandchildren. I get tortured horribly everyday and night now. I feel as if I am dying now. I no longer have a car; these perps made sure my car got impounded by Thousand Oaks Police Dept and I didn't have the money to pay for the fees of $1600.00; the car was no loner worth $1600.00. You know how they operate. Being without transportation make me more vulnerable to their abuse; I'm like a sitting duck. I simply cannot believe the degree of evil I find myself in. They often contaminate my food with cinicals and toxins. They now steal my money, therefore, leaving me without groceries. If anyone attempt to visit me; they can't get in the gate; my phone calls are intercepted and i don't get incoming calls. I don't know what to do Bob except ask you to keep my information active to other TI's. I now have come to the realization that I have been abused under hypnosis and perhaps under an unaltered mind. people have stolen my youth and now I fear for my daughters. If I have been abused in this way by these gang of perverts, I can only imagine what they are capable of doing to a young beautiful young women. I'm burning badly now; these people are now trying to kill me with the directed energy weapons. I'm at their mercy now all I can do is rely on other to get my story out to the public. These perps are all about programing and sexual abuse. Please give my phone number to TIs 805-553-9354. I feel very isolated my only communication is with the perpts now. I despise these people and their tactics with all my essences. God bless, Ramona Lopez I have spoken with Ramona by telephone on several occasions and found her to be a completely lucid and intelligent Human Rights & Environmental activist who was doing her best to help the people in her local community and the larger International Community on these issues. Her reports of NAZI-type attacks on herself & her family are consistent with the millions of other reports by Human Rights, Animal Rights, Peace, Environmental, Organic Foods, Clean Energy, Disarmament & Indigenous Peoples Rights, & other Anti-Corporate-Crime Activists about the SILENT HOLOCAUST (Domestic & International Corporate-Criminal Warfare against Civilian Populations) which has escalated heavily during the past deacade. Lynn Surgalla (3) MASS PETITION write to:- The International Criminal Court:- OTP.InformationDesk@icc-cpi.int, jelena.vukasinovic@icc-cpi.int, otp.informationdesk@icc-cpi.int, Ms Navanethem Pillay - the United Nations High Commissioner For Human Rights dexrel@ohchr.org, civilsocietyunit@ohchr.org, niu@ohchr.org, gmagazzeni@ohchr.org, Press-Info@ohchr.org, webmanager@ohchr.org, InfoDesk@ohchr.org, tb-petitions@ohchr.org, ngochr@ohchr.org , registry@ohchr.org, urgent-action@ohchr.org,CP@ohchr.org, ldolci-kanaan@ohchr.org, jjflores@ohchr.org, ungeneva.ngoliaison@unog.ch, President Obama:- The White House, 1600 Pennsylvania Avenue NW, Washington, DC 20500, USA TEL Comments: 202-456-1111, Switchboard: 202-456-1414, FAX: 202-456-2461 president@whitehouse.gov,comments@whitehouse.gov, barack_obama@obama.senate.gov, Robert_Gibbs@Obama.Senate.gov, bill_burton@obama.senate.gov, tommy_vietor@obama.senate.gov, info@barackobama.com, legal@barackobama.com , media@barackobama.com, info@barackobama.com, Vice-President Biden:- The White House, 1600 Pennsylvania Avenue NW, Washington, DC 20500, USA TEL Comments: 202-456-1111, Switchboard: 202-456-1414, FAX: 202-456-2461 vice_president@whitehouse.gov,senator@biden.senate.gov,elizabeth_alexander@biden.senate.gov, sean_mcpherson@biden.senate.gov , Secretary Of State Clinton:- info@hillaryclinton.com, Senator_Clinton@clinton.senate.gov, senator@clinton.senate.gov,webmail@clinton-iq.senate.gov,lorraine_voles@clinton.senate.gov,Philippe_Reines@Clinton.Senate.gov,hwolfson@gloverparkgroup.com, howard_wolfson@clinton.senate.gov, josh_albert@clinton.senate.gov, laurie_rubiner@clinton.senate.gov, The Council Of Europe, Secretary-General Terry Davis:- terry.davis@coe.int,Katie.STEPHENS@coe.int ,private.office@coe.int ,bureau.bruxelles@coe.int, bureau.paris@coe.int, EU Vice-President For Justice, Freedom, Security, Mr Franco Frattini:- franco.frattini@ec.europa.eu, Organisation Of Security And Cooperation In Europe:- info@osce.org, press@osce.org, quest@osce.org, Ec President Jose Manuel Barroso:- sg-web-president@ec.europa.eu, leonor.ribeiro-da-silva@ec.europa.eu, Mr Javier Solana, High Representative For The Common Foreign And Security Policy, Secretary-General Of The Council Of The European Union:- presse.cabinet@consilium.europa.eu, Council Of The European Union:- press.office@consilium.europa.eu, The Council On Foreign Relations:- president@cfr.org ,cmassey@cfr.org, nyao@cfr.org, communications@cfr.org, aschmemann@cfr.org, sweeks@cfr.org, mbrouwer@cfr.org, lkrapf@cfr.org, nsinha@cfr.org, napelian@cfr.org, sdoolin@cfr.org, membership@cfr.org, fellowships@cfr.org, meetings@cfr.org, knash@cfr.org, dcmeetings@cfr.org, national@cfr.org, bgude@cfr.org, pdorff@cfr.org, webmaster@cfr.org, The Department Of Defense:- foia@whs.mil,foia@dia.mil,Intelligence.HPSCI@mail.house.gov, DIA-PAO@dia.mil, staffing@dia.mil, FOIA@dia.mil, JMIC@dia.mil, sea0131@dia.mil, sea0132@dia.mil, sea0102@dia.mil, ig_hotline@dia.mil, nav.ig.hotlines@navy.mil, hotline@dodig.osd.mil,mla.saf.st.assignments@pentagon.af.mil, Chris.Peat@heavens-above.com, webmaster@jnlwp.com, 88abw.pa@wpafb.af.mil, securitythreats@dhs.gov, 88abw.pa@wpafb.af.mil; Alan.Ashworth@Brooks.af.mil; Gerema.Randall@wpafb.af.mil; George.Page@Brooks.af.mil; Jacque.Garcia@Brooks.af.mil; The Attorney General Of The USA:- U.S. Department of Justice, 950 Pennsylvania Avenue, NW, Washington, DC 20530-0001 TEL Switchboard: - 202-514-2000, TEL Office of the Attorney General: - 202-353-1555 AskDOJ@usdoj.gov, inspector.general@usdoj.gov, The Secretary Of The Department Of Homeland Security:- U.S. Department of Homeland Security, Washington, D.C. 20528, USA TEL Operator: 202-282-8000, TEL Comment: 202-282-8495 , FAX: 202-401-4708 civil.liberties@dhs.gov, foia@hq.dhs.gov, stfoia@hq.dhs.gov, http://contact.dhs.gov/Default.aspx The ACLU:- executive_director@aclu.org, media@dcaclu.org, action@aclu.org,rvann@acluct.org, rjudd@acluct.org, ssoutar@acluct.org,acluofillinois@aclu-il.org, aclu@aclu-md.org, info@aclu-mass.org, support@aclu-mn.org, info@aclu-nj.org, info@nyclulhv.org, e-d@nyclu-crc.org, wro@nyclubuffalo.org, director@cnyclu.org, info@gvclu.org, info@aclupa.org, info@aclupgh.org, info@acluvt.org, acluva@acluva.org, , tnelson@aclu-mn.org, ACLUOnline@aclu.org, paige@aclunv.org,wmathews@aclu.org, aclufl@aclu.org, nyaclu@aclu.org,caaclu@aclu.org, mtrimble@nyclu.org, (4) President's Surveillance Program (PSP) 10 July 2009 http://www.usdoj.gov/oig/special/s0907.pdf Preface (U) Title III of the Foreign Intelligence Surveillance Act Amendments Act of 2008 required the Inspectors General (IGs) of the elements of the Intelligence Community that participated in the President's Surveillance Program (PSP) to conduct a comprehensive review of the program. The IGs of the Department of Justice, the Department of Defense, the Central Intelligence Agency, the National Security Agency, and the Office of the Director of National Intelligence participated in the review required under the Act. The Act required the IGs to submit a comprehensive report on the review to the Senate Select Committee on Intelligence, the Senate Committee on the Judiciary, the House Permanent Select Committee on Intelligence, and the House Committee on the Judiciary. (U) In response to Title III requirements, we have prepared this unclassified report on the PSP, which summarizes the collective results of our reviews. Because many aspects of the PSP remain classified, and in order to provide the Congressional committees the complete results of our reviews, we also prepared, and have bound separately, a classified report on the PSP. The individual reports detailing the results of each IG's review are annexes to the classified report . Glenn A. Fine Inspector General Department of Justice S. Heddell Acting Inspector General Department of defense Patricia A. Lewis Acting Inspector General Intelligence Agency National Security Agency George Ellard Inspector General National Security Agency Roslyn A. Mazer Inspector General Office of the Director of National Intelligence More details : http://www.usdoj.gov/oig/special/s0907.pdf (5) NYC Meeting at Main Library Day: Wednesday, August 12 Time: Gathering between 6:30- 7:00pm. Meeting from 7:00pm - until, depending on attendance and issues. Location: Front steps of the New York City Public Library, 5th Ave. between 40th and 41st Streets. We will continue monthly meetings on the second Wednesday of every the Month until further notice. Contacts: Timothy R. White: 718-601-2073 Denise S Pompl: 917-273-2200 (6) People who are completely paralyzed due to illness or trauma are getting help communicating with a new technology that connects their brains to a computer. Scott Pelley reports.http://www.cbsnews.com/video/watch/?id=5228109n&tag=contentBody;housing Other videos you may interest https://www.youtube.com/watch?v=Iu4-7tJ4y38&feature=channel_page https://www.youtube.com/watch?v=4X6_9GoTRdg The New Phoenix Program 1,2, & 3 (1st 15 min are the same) http://video.google.com/videoplay?docid=3106090846619588331 http://video.google.com/videoplay?docid=8307025850020812294 http://video.google.com/videoplay?docid=-4361536536898115029 To see other videos Marshall Gregory Thomas please go to www.youtube.com/marsboy683
Read more…
A California history professor, Kathryn Olmstead, has discovered documents at the Gerald Ford library which were written by Cheney and Rumsfeld.http://www.serendipity.li/cia/olson2.htmThey show how far the White House went to conceal information about Olson's death — and his role in preparing anthrax and other biological weapons. ...Cheney and Rumsfeld were given the task of covering up the details of Frank Olson's death. At the time, Rumsfeld was White House Chief of Staff to President Gerald Ford. Dick Cheney was a senior White House assistant.The documents uncovered by Professor Olmstead include one that states "Dr Olson's job was so sensitive that it is highly unlikely that we would submit relevant evidence".In another memo, Cheney acknowledges that "the Olson lawyers will seek to explore all the circumstances of Dr Olson's employment, as well as those concerning his death. In any trial, it may become apparent that we are concealing evidence for national security reasons and any settlement or judgement reached thereafter could be perceived as money paid to cover up the activities of the CIA".Frank Olson's family received US$750,000 to settle their claims against the US government.The Frank Olson Murder

olsen2.jpgFrank Olson was an American citizen, born in 1910 and murdered in New York City in 1953 by the CIA. Here's an outline of the case:

Fort Detrick is the U.S. Army's biowarfare facility, founded in 1943. Frank Olson was one of the first scientists to work there. From the final years of World War II through the Korean War and up to the present time scientists at Fort Detrick developed biological weapons including anthrax.

Following the end of World War II the U.S. conducted "Operation Paperclip", which scoured Germany for Nazi scientists who could be useful. It found some who had conducted experiments on prisoners in Dachau and other Nazi concentration camps, including one Kurt Blome. He was among the defendants in the Nuremberg War Trials, and would have been convicted and hanged but for American intervention. In return for agreeing to provide information to the Americans about his experiments in Dachau, and advice in the development of their own germ warfare program, an acquittal was arranged, and he escaped the gallows.

Frank Olson and Kurt Blome (who had become a protegé of the Americans) later met at Camp King in Germany in the early 1950s when Olson made several visits there to participate in "Operation Artichoke", in which the U.S. Army and the CIA experimented with the use of drugs (including LSD) in interrogation. Olson was present during brutal interrogations by the Americans of Soviet prisoners and suspected double agents, some of whom died under torture. Olson was deeply disturbed by what he had seen.

In the summer of 1953 Olson travelled again to Europe. In Berlin in August he witnessed several brutal interrogations involving torture and the use of drugs. On his return to the U.S. he confided to a friend and colleague at Fort Detrick, Norman Cournoyer, that he was disgusted with what the CIA was doing and was determined to leave.

In November 1953 Olson attended a meeting of a group of CIA agents at a country retreat where they discussed their work. Olson was suspected by the CIA of being a security risk. He was given a drink laced with LSD and when well under the influence of the drug he was subjected to interrogation using Artichoke techniques, probably a very unpleasant experience.

A week later Olson was staying in Room 1018A at the Hotel Statler in New York City under the supervision of a CIA doctor, Richard Lashbrook. The manager of the hotel, Armond Pastore, heard a thump outside and went out to find Olson dying on the pavement, having fallen from the 13th floor. The manager later found that a phone call had been made from Room 1018A to a number in Long Island and the caller had said only, "Olson's gone."

The CIA maintained that Olson had leapt through the closed window to his death. However, an autopsy conducted forty years later on the exhumed corpse revealed an injury to the skull most likely caused by a blow to the head and no evidence of any cuts to the body from broken glass. It seems that Olson, exactly as recommended in a CIA assassination manual, was struck on the head (possibly while drugged) and thrown from the window to his death thirteen floors below.

Olson was working at Fort Detrick during the Korean War and some have speculated that the U.S. developed germ weapons which it used against Korean and Chinese soldiers and civilians. If so then Olson would probably have known about this. The CIA believed that there was the risk that Olson would reveal what he knew about the activities of the CIA during the Korean war and about its brutal experiments in interrogation techniques, so he was murdered.

The fact that Frank Olson had died shortly after being given LSD in a CIA experiment came out in 1975 as a consequence of President Ford's Rockefeller Commission investigation into the CIA's domestic activities. Further investigation was called for, but in a White House memo advisers to President Ford stated that this would risk revealing state secrets (probably meaning, in part, the use by the U.S. of germ warfare in Korea); further investigation was suppressed and the whole matter covered up. The names of those White House advisers were Dick Cheney, current U.S. Vice-President, and Donald Rumsfeld, current Secretary of Defense. They have never been questioned as to what they knew about Olson's death.http://www.serendipity.li/cia/olson2.htm

http://www.google.com/#hl=en&q=gilead+sciences+tamiflu+rumsfeld&aq=f&oq=&aqi=&fp=azWfBBCvguAhttp://www.google.com/#hl=en&ei=J4eBSsCYIJaBtweHpvjVCg&sa=X&oi=spell&resnum=0&ct=result&cd=1&q=gilead+sciences+World+health+organization&spell=1&fp=azWfBBCvguAhttp://www.dailymail.co.uk/news/article-1205705/GMTV-host-Andrew-Castle-lost-daughter-swine-flu-drug.html
Read more…
A California history professor, Kathryn Olmstead, has discovered documents at the Gerald Ford library which were written by Cheney and Rumsfeld.http://www.serendipity.li/cia/olson2.htmThey show how far the White House went to conceal information about Olson's death — and his role in preparing anthrax and other biological weapons. ...Cheney and Rumsfeld were given the task of covering up the details of Frank Olson's death. At the time, Rumsfeld was White House Chief of Staff to President Gerald Ford. Dick Cheney was a senior White House assistant.The documents uncovered by Professor Olmstead include one that states "Dr Olson's job was so sensitive that it is highly unlikely that we would submit relevant evidence".In another memo, Cheney acknowledges that "the Olson lawyers will seek to explore all the circumstances of Dr Olson's employment, as well as those concerning his death. In any trial, it may become apparent that we are concealing evidence for national security reasons and any settlement or judgement reached thereafter could be perceived as money paid to cover up the activities of the CIA".Frank Olson's family received US$750,000 to settle their claims against the US government.The Frank Olson Murder

olsen2.jpgFrank Olson was an American citizen, born in 1910 and murdered in New York City in 1953 by the CIA. Here's an outline of the case:

Fort Detrick is the U.S. Army's biowarfare facility, founded in 1943. Frank Olson was one of the first scientists to work there. From the final years of World War II through the Korean War and up to the present time scientists at Fort Detrick developed biological weapons including anthrax.

Following the end of World War II the U.S. conducted "Operation Paperclip", which scoured Germany for Nazi scientists who could be useful. It found some who had conducted experiments on prisoners in Dachau and other Nazi concentration camps, including one Kurt Blome. He was among the defendants in the Nuremberg War Trials, and would have been convicted and hanged but for American intervention. In return for agreeing to provide information to the Americans about his experiments in Dachau, and advice in the development of their own germ warfare program, an acquittal was arranged, and he escaped the gallows.

Frank Olson and Kurt Blome (who had become a protegé of the Americans) later met at Camp King in Germany in the early 1950s when Olson made several visits there to participate in "Operation Artichoke", in which the U.S. Army and the CIA experimented with the use of drugs (including LSD) in interrogation. Olson was present during brutal interrogations by the Americans of Soviet prisoners and suspected double agents, some of whom died under torture. Olson was deeply disturbed by what he had seen.

In the summer of 1953 Olson travelled again to Europe. In Berlin in August he witnessed several brutal interrogations involving torture and the use of drugs. On his return to the U.S. he confided to a friend and colleague at Fort Detrick, Norman Cournoyer, that he was disgusted with what the CIA was doing and was determined to leave.

In November 1953 Olson attended a meeting of a group of CIA agents at a country retreat where they discussed their work. Olson was suspected by the CIA of being a security risk. He was given a drink laced with LSD and when well under the influence of the drug he was subjected to interrogation using Artichoke techniques, probably a very unpleasant experience.

A week later Olson was staying in Room 1018A at the Hotel Statler in New York City under the supervision of a CIA doctor, Richard Lashbrook. The manager of the hotel, Armond Pastore, heard a thump outside and went out to find Olson dying on the pavement, having fallen from the 13th floor. The manager later found that a phone call had been made from Room 1018A to a number in Long Island and the caller had said only, "Olson's gone."

The CIA maintained that Olson had leapt through the closed window to his death. However, an autopsy conducted forty years later on the exhumed corpse revealed an injury to the skull most likely caused by a blow to the head and no evidence of any cuts to the body from broken glass. It seems that Olson, exactly as recommended in a CIA assassination manual, was struck on the head (possibly while drugged) and thrown from the window to his death thirteen floors below.

Olson was working at Fort Detrick during the Korean War and some have speculated that the U.S. developed germ weapons which it used against Korean and Chinese soldiers and civilians. If so then Olson would probably have known about this. The CIA believed that there was the risk that Olson would reveal what he knew about the activities of the CIA during the Korean war and about its brutal experiments in interrogation techniques, so he was murdered.

The fact that Frank Olson had died shortly after being given LSD in a CIA experiment came out in 1975 as a consequence of President Ford's Rockefeller Commission investigation into the CIA's domestic activities. Further investigation was called for, but in a White House memo advisers to President Ford stated that this would risk revealing state secrets (probably meaning, in part, the use by the U.S. of germ warfare in Korea); further investigation was suppressed and the whole matter covered up. The names of those White House advisers were Dick Cheney, current U.S. Vice-President, and Donald Rumsfeld, current Secretary of Defense. They have never been questioned as to what they knew about Olson's death.http://www.serendipity.li/cia/olson2.htm

Read more…