Ernesto Rodriguez's Posts (9)

Sort by
http://wikileaks.org/wiki/WikiLeaks:SubmissionsDelete Comment


WikiLeaks accepts classified, censored or otherwise restricted material of political, diplomatic or ethical significance. WikiLeaks does not accept rumour, opinion or other kinds of first hand reporting or material that is already publicly available.

Submitting confidential material to WikiLeaks is safe, easy and protected by law.
We have several methods, but the best for most submissions is:

Click here to securely submit a file online
(bank grade encrypted submission, no logs kept and protected under Swedish and Belgium press secrecy laws)

You can also use secure TOR network
(secure, anonymous, distributed network for maximum security)


Join our chat and we will answer any questions or problems you might have
Our chat is secure and anonymous. Visitors are protected on many layers, they can't see each other,
there is an anti-logging mechanism in place and the server forbids using any potentially dangerous commands that could reveal other user's identity.
Communication is secured with SSL encryption.

Over 100,000 articles catalyzed world-wide. Every source protected. No documents censored. All legal attacks defeated.
Read more…
Emerging Picture of War in Iraq and Afghanistan from Wikileaks Files: DevastatingPDFPrintE-mail
Monday, 26 July 2010 16:11
Share Link:Share Link: BookmarkGoogleYahoo MyWebDel.icio.usDiggFacebookMyspaceRedditMa.gnoliaTechnoratiStumble UponYahoo BookmarksMSN LiveYigg

Wikileaks.org, over the past few months, has released some of the most damning evidence yet against theongoing occuptions in Iraq and Afghanistan.

Collateral Murder (released April 5, 2010)

Collateral Murder is the military's own video of 12 Iraqis being shot and killed from a UShelicopter circling above. No one has been charged in connection withthese killings. However, 22 yr. old Pfc. Bradley Manninghas been held incommunicado on military bases for several months now,suspected of leaking this incriminating video to Wikileaks. World Can'tWait is distributing copies of this harrowing video so that many morepeople in the US see what is being done in their names. For a copy, write to us.

More:

How to Show "Collateral Murder" Outside in Public

Ethan McCord: Memories of “Collateral Murder” - by Someone who was There

Anthony Wagner: Collateral Murder

Message from Iraq Veterans Against the War:

What stands out to us at IVAW is the regular, seemingly commonplaceoccurance of civilian death depicted in the body of Wikileaksdocuments...

In a recent interview on Democracy Now, Wikileaks' founder, Julian Assange put out a call: "We really need the public, other journalists and especially formersoldiers to go through this material and say, 'Look, this connects tothat,' or 'I was there. Let me tell you what really happened. Let metell you the rest of the detail.' And over the next few days, we'll beputting up easier- and easier-to-use search interfaces, the same onesthat our journalistic teams use to extract this data."

These search tools will allow any soldier or veteran to look through thetrove of documents on Wikileaks and find reports of incidents they wereinvolved in to check for their accuracy and provide more details.
IVAW members are answering the call to humanize these 'war incidents.'Right now, we are mobilizing our membership to look through therelevant Wikileaks materials, and provide additional information forthe public.

For more information, see: ivaw.org

To help sift through the evidence released by Wikileaks, go to wardiary.wikileaks.org.

Afghan War Diary (released July 26, 2010)

Wikileaks released 76,000 military records exposing the truth of the unjust, illegitimate war in Afghanistan: revealing hundreds of civiliandeaths, execution squads, other war crimes. They have 15,000 morerecords from Afghanistan that they are holding back for the timebeing. For more on the developing picture emerging, see The Afghanistan War Logs on the Guardian UK and Wikileaks.org (both are being regularly updated). If Wikileaks is down, it may be overloaded. To see the files, go directly to wardiary.wikileaks.org.

Webcast: Anti-War Leaders and Veterans Respond to the WikiLeaks Revelations (recorded August 1, 2010)

Watch recording now: www.livestream.com/worldcantwait

World Can't Wait presents a national webcast of anti-war leaders and veterans responding to the WikiLeaks revelations. What should we doNOW, immediately to end the occupations of Afghanistan & Iraq?

Featuring:

  • Dahr Jamail, journalist, author of "Beyond the Green Zone"
  • Cindy Sheehan, antiwar leader, author, Director, Peace of the Action
  • Josh Stieber, Army veteran of Bravo Company 2-16
  • Matthis Chiroux, Army veteran, Iraq war resister
  • Mike Ferner, President, Veterans for Peace
  • Ray McGovern, former CIA Agent, Veteran Intelligence Professionals for Sanity
  • Elaine Brower, military mother, World Can't Wait
  • Debra Sweet, Director, World Can't Wait

Julian Assange on the Afghan War Logs: "They Show the True Nature of this War"

Democracy Now! July 26th

The New Pentagon Papers: WikiLeaks Releases 90,000+ Secret Military Documents Painting Devastating Picture of Afghanistan War

With independent British journalist Stephen Grey; Pentagon Paperswhistleblower, Daniel Ellsberg; former State Department official inAfghanistan, Matthew Hoh; independent journalist Rick Rowley; andinvestigative historian Gareth Porter.

Democracy Now! July 28th

We spend the hour with Julian Assange, the founder of WikiLeaks, talkingabout the biggest leak in US history: the release of more than 91,000classified military records on the war in Afghanistan.

Democracy Now! August 3rd

Julian Assange Responds to Increasing US Government Attacks on WikiLeaks

Further Coverage:

Watch Julian Assange at press conference July 26.

Kevin Gosztola: Nearly 92,000 Classified Documents Leaked, Expose Truth of Afghan War

Wikileaks files 'may reveal thousands of war crimes' (Independent.co.uk)

US condemns Wikileaks: Julian Assange says "this is the story of the war" (BBC)

Chris Floyd: Leaky Vessels: Wikileaks "Revelations" Will Comfort Warmongers, Confirm Conventional Wisdom

Ray McGovern: WikiLeaks Bombshell Docs Paint Afghan War as Utter Disaster -- Will We FinallyStop Throwing Money and Lives at This Catastrophe?

Jason Ditz: Pentagon Launches ‘Manhunt’ for Document Leaker

Kenneth J. Theisen: Use the WikiLeaks Afghan War Diary to Mobilize Resistance to the U.S. War of Terror

Kevin Gosztola: The Danger of the Wikileaks' Leak: You Might Stop Thinking Like an American

Cindy Sheehan: I Have Become Uncomfortably Numb

Debra Sweet: More War Crimes Exposed - Now, What Do We Do?

Revolution editorial: WikiLeaks: Exposing War Crimes of a Criminal War

Read more…

We Stand With Bradley Manning

We Stand With Bradley Manning

Bradley Manning If Bradley Manning is the sources of any or all of the recentinformation about Afghanistan and/or the "Collateral Murder" videoreleased by Wikileaks, he is a hero. Whether or not he is the leaker,he should be released immediately.

For more background information, see Wikileaks reveals video showing US air crew shooting down Iraqi civilians and Army Intelligence Analyst Charged for Releasing Wikileaks Video: Killers Remain Free

Also see: bradleymanning.org where you can donate to his legal defense.

Join savebradley on Facebook

Write to Bradley with your support:

Inmate Bradley Manning
USMC Base Quantico Brig
3247 Elrod Avenue
Quantico, VA 22134

Sign on to this statement of support:

Bradley Manning is the U.S. soldier held in a USmilitary prison in Kuwait (moved to Quantico VA on July 29, 2010) whohas been arrested and charged with two violations for releasingclassified information (the Wikileaks "Collateral Murder" video) andfacing 54 years in prison. He is being held in isolation from theoutside world – with no contact with his civilian attorneys working todefend him. If the allegations are true, we believe that BradleyManning is a hero for bringing to light the realities of the crimesbeing committed in the U.S. occupation. We call for his immediaterelease and that his attorneys be allowed to talk to him.
Read more…
Before the Protests Tommorrow at Fort HoodPDFPrintE-mail
Saturday, 21 August 2010 19:12
Share Link:Share Link: BookmarkGoogleYahoo MyWebDel.icio.usDiggFacebookMyspaceRedditMa.gnoliaTechnoratiStumble UponYahoo BookmarksMSN LiveYigg

By Emma Kaplan

I am in Killeen, TX at Under The Hood Cafe near the Fort Hood military base tonight. I am down here for the protests happening onSunday being called by the Disobedient.

The Disobedient is made up of Iraq era war vets and others anti- war activists, mainly young people. These protests are going to includevisible non-violent resistance to the 3,000 troop surge being headed toIraq. They are acting to create a situation where the U.S. cannotcontinue this illegitimate and illegal war - that deployments not onlystop but that the military withdraws immediately.

This town is really intense. It is about 100 degrees outside and incredibly humid. There is a whole military culture throughout the townthat is shaped by unthinking allegiance to the military, and anobsession with the American flag. I have been told that Christianfundamentalism has a firm hold on most people. It is also verydepressing with nothing but strip clubs, bars and fast food chains. Themajority of people here are employed by the military. Some local youthtold me that they have heard reactionary people say that the namestands for Kill Each And Every N*****.

I spent the day at Under The Hood Cafe, which is a GI coffeehouse run by anti-war Iraq veterans and others. It was a day of debate anddiscussion, with all of us thinking very deeply about how we can stopthese wars and what should our message be to the people of the world?One Iraq veteran spoke about orders he received to break down the doorsof families and the internal turmoil he went through when he was toldto search an innocent woman's underwear drawer. He got the word “Human”tattooed on his arm after he got out of the military. I talked to ayoung woman who is in her early 20's and did 2 tours of Iraq. She saidthat one of the first things she did when she got out of the militarywas to dye her hair pink. I have a hard time picturing her and any ofthese other people in the military because they have a great deal ofhumanity. She has a lot of urgency to stop these wars and refreshingrefusal to accept the world as it is. She talks about how she wishedthere was some kind of switch you could turn on in people to make themsee the crimes that the military is committing. Many who are here aredealing with pretty heavy PTSD and have trouble sleeping. They talkabout how their bodies have been forever changed by being in themilitary. Those participating in Sunday's action are filled with a deepdesire to tell the truth to people living in this country and people inthe military.

While many wonder, "what is it going to take to wake people," they AREwaking people up. In my opinion, the military is petrified of somethinglike this busting out, particularly on the day they are sending a troopsurge for this war that they have tried to re-brand as ending.

People protesting tomorrow are acting with great determination and aretaking risks to stop these wars much like Julian Assange of WikiLeaksand whoever has been leaking from within the military, as BradleyManning is accused of doing. There is the sense of being very strategicand serious about these actions. I think it's true what Assange says,"courage is contagious." It's contagious when you see it where you getyour coffee, it's contagious when you look at your window and you seemillions in the streets, it's contagious when you decide to be theperson who doesn't look away from the crimes of your government, andit's contagious when you see veterans resisting for the sake ofhumanity like this.

Many more people needing to be acting with this kind of resolve to stopthese wars. The Obama administration is not ending the Iraq war - theyare sending surges of troops to Iraq. They are standing against all whooppose these wars, including the anti-war vets.

Many more people need to hear about what is going on down here, payattention to what's going on in the world and support these protests.This will be the first time in history that Iraq veterans will attemptto stop a deployment. I am very anxious to see what happens and I hopeyou are too. More tomorrow.

Read more…



scalartech12_top1.gif

by John St Clair Akwei
From an article in NexusMagazine April/May 96

fromMindControlForums Website

A lawsuitfiled against the U.S. National Security Agency revealsa frightening array of technologies and programsdesigned to keep tabs on individuals.
.

John StClair Akwei
vs
National Security Agency
Ft George G. Meade, MD, USA
(Civil Action 92-0449)
.

Thefollowing document comprises evidence for a lawsuitfiled at the U.S. Courthouse in Washington, DC, by JohnSt Clair Akwei against the National Security Agency, FtGeorge G. Meade, Maryland (Civil Action 92-0449),constitutes his knowledge of the NSA's structure,national security activities proprietary technologiesand covert operations to monitor individual citizens Ed.



1. THE NSA'SMISSION AND DOMESTIC INTELLIGENCE OPERATION

  • Communications Intelligence (COMINT)
    Blanket coverage of all electronic communications in the US andthe world to ensure national security. The NSA at Ft Meade,Maryland has had the most advanced computers in the world sincethe early 1960s.

    NSA technology is developed and implemented insecret from private corporations, academia and the generalpublic.


  • Signals Intelligence (SICINT)
    The Signals Intelligence mission of the NSA has evolved into aprogram of decoding EMF waves in the environment for wirelesslytapping into computers and track persons with the electricalcurrents in their bodies. Signals Intelligence is based on factthat everything in the environment with an electric current init has a magnetic flux around it which gives off EMF waves.

    TheNSA/DoD [Department of Defense] developed proprietary advanceddigital equipment which can remotely analyze all objects whethermanmade or organic, that have electrical activity.


  • Domestic Intelligence (DOMINT)
    The NSA has records on all US citizens. The NSA gathersinformation on US citizen who might be of interest to any of theover 50,000 NSA agents (HUMINT). These agents are authorized byexecutive order to spy on anyone. The NSA has a permanentnational security anti-terrorist surveillance network in place.This surveillance network is completely disguised and hiddenfrom the public.


    Tracking individuals in the US is easily and cost-effectivelyimplemented with NSA's electronic surveillance network. Thisnetwork (DOMINT) covers the entire US, involves tens ofthousands of NSA personnel, and tracks millions of personssimultaneously . Cost-effective implementation of operations isassured by NSA computer technology designed to minimizeoperations costs. NSA personnel serve in quasi-public positionsin their communities and run cover businesses and legitimatebusinesses that can inform the intelligence community of personsthey would want to track.

    NSA personnel in the community usuallyhave cover identities such as social workers, lawyers andbusiness owners.


  • Individual Citizens OccasionallyTargeted for Surveillance by Independently Operating NSAPersonnel
    NSA personnel can control the lives of hundreds of thousands ofindividuals in the US by using the NSA's domestic intelligencenetwork and cover businesses.

    The operations independently runby them can sometimes go beyond the bounds of law. Long-termcontrol and sabotage of tens of thousands of unwitting citizensby NSA operatives is likely to happen.

    NSA DOMINT has theability to assassinate US citizens covertly or run covertpsychological control operations to cause subjects to bediagnosed with ill mental health.

scalartech12_01.gif

The above symptomshighlight a fraction of the vast array of
Neuro-Electromagnetic Frequency Assaults perpetuated by the Policeand
Military Intelligence Agencies toward
Remote Mind Control Experiments, Behavioral Manipulation andMurder.

2. NSA'SDOMESTIC ELECTRONIC SURVEILLANCE NETWORK

As of the early 1960s, the most advanced computers in the world wereat the NSA, Ft Meade. Research breakthroughs with these computerswere kept for the NSA.

At the present time the NSA hasnanotechnology computers that are 15 years ahead of present computertechnology. The NSA obtains blanket coverage of information in theUS by using advanced computers that use artificial intelligence toscreen all communications, regardless of medium, for key words thatshould be brought to the attention of NSA agents/cryptologists.

These computers monitor allcommunications at the transmitting and receiving ends.

This blanketcoverage of the US is a result of the NSA's Signals Intelligence (SIGINT)mission. The NSA's electronic surveillance network is based on acellular arrangement of devices that can monitor the entire EMF(electromagnetic frequency)spectrum.

This equipment was developed, implemented and kept secretin the same manner as other electronic warfare programs.

  • Signals Intelligence RemoteComputer Tampering
    The NSA keeps track of all PCs and other computers sold in theUS.

    This is an integral part of the Domestic Intelligencenetwork. The NSA's EMF equipment can tune in RF (remotefrequency) emissions frompersonal computer circuit boards (while filtering out emissionsfrom monitors and power sup- plies).

    The RF emission from PCcircuit boards contains digital information in the PC. Coded RFwaves from the NSA's equipment can resonate PC circuits andchange data in the PCs. Thus the NSA can gain wirelessmodem-style entry into any computer in the country forsurveillance or anti-terrorist electronic warfare.


  • Detecting EMF Fields in Humansfor Surveillance
    A subject's bioelectric field can be remotely detected, sosubjects can be monitored anywhere they are.

    With special EMFequipment NSA cryptologists can remotely read evoked potentials(from EEGs). These can be decoded into a person's brain-statesand thoughts. The subject is then perfectly monitored from adistance. NSA personnel can dial up any individual in thecountry on the Signals Intelligence EMF scanning network and theNSA's computers will then pinpoint and track that person 24hours a day.

    The NSA can pick out and track anyone in the US.

scalartech12_02.gif

3. NSA SIGNALSINTELLIGENCE USE OF EMF BRAIN STIMULATION

NSA Signals Intelligence uses EMF Brain Stimulation forRemoteNeural Monitoring (RNM) and Electronic Brain Link (EBL).

EMF BrainStimulation has been in development since theMKULTRA program of theearly 1950s, which included neurological research into radiation(non-ionizing EMF) and bioelectric research and development.

Theresulting secret technology is categorized at the National SecurityArchives as "Radiation Intelligence", defined as,

"information from unintentionallyemanated electromagnetic waves in the environment, not includingradioactivity or nuclear detonation".

Signals Intelligence implemented andkept this technology secret in the same manner as other electronicwarfare programs of the US Government.

The NSA monitors availableinformation about this technology and withholds scientific researchfrom the public. There are also international intelligenceagreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyze electricalactivity in humans from a distance. NSA computer generated brainmapping can continuously monitor all of the electrical activity inthe brain continuously. The NSA records and decode individual brainmaps (of hundreds of thousands of persons) for national securitypurposes. EMF Brain Stimulation is also secretly used by themilitary for brain-to-computer link (in military fighter aircraft,for example).

For electronic surveillance purposes, electrical activity in thespeech center of the brain can be translated into the subject'sverbal thoughts. RNM can send encoded signals to the brain'sauditory cortex, thus allowing audio communications direct to thebrain (bypassing the ears). NSA operatives can use this covertly todebilitate subjects by simulating auditory hallucinationscharacteristic of paranoid schizophrenia.

Without any contact with the subject, Remote Neural Monitoring canmap out electrical activity from the visual cortex of a subject'sbrain and show images from the subject's brain on a video monitor.NSA operatives see what the surveillance subject's eyes are seeing.Visual memory can also be seen. RNM can send images direct to thevisual cortex, bypassing the eyes and optic nerves.

NSA operativescan use this surreptitiously to put images into a surveillancesubject's brain while they are in REM sleep for brain-programmingpurposes.

  • Capabilities of NSA OperativesUsing RNM
    There has been a Signals Intelligence network in the US sincethe 1940s.

    The NSA, Ft Meade has in place a vast two-waywireless RNM system which is used to track subjects andnon-invasively monitor audio-visual information in their brains.This is all done with no physical contact with the subject. RNMis the ultimate method of surveillance and domesticintelligence. Speech, 3D sound and subliminal audio can be sentto the auditory cortex of the subject's brain (bypassing theears), and images can be sent into the visual cortex. RNM canalter a subject's perceptions, moods and motor control.

    Speech cortex/auditory cortex link has become the ultimatecommunications system for the intelligence community. RNM allowsfor a complete audio-visual brain-to-brain link or brain-to-computer link.

scalartech12_03.gif

The above is a simpleflowchart of Nuero-Electromagnetic Frequency Assaults

showing methods thatcan be perpetuated by the Police and Military Intelligence Agencies

toward Remote MindControl Experiments, Behavioural Manipulation and Murder.

4. NATIONALSECURITY AGENCY SIGNALS INTELLIGENCE ELECTRONIC BRAIN LINKTECHNOLOGY

NSA SIGINT can remotely detect, identifyand monitor a person's bioelectric fields.

The NSA's Signals Intelligence has the proprietary ability tomonitor remotely and non-invasively information in the human brainby digitally decoding the evoked potentials in the 30-50 Hz, 5 milliwatt electromagnetic emissions from the brain.

Neuronal activity in the brain creates a shifting electrical patternthat has a shifting magnetic flux. This magnetic flux puts out aconstant 30-50 Hz, 5 milliwatt electromagnetic (EMF) wave.

Containedin the electromagnetic emission from the brain are spikes and patternscalled "evoked potentials". Every thought, reaction, motor command,auditory event and visual image in the brain has a corresponding"evoked potential" or set of "evoked potentials". The EMF emission fromthe brain can be decoded into the current thoughts, images and soundsin the subject's brain.

NSA SIGINT uses EMF-transmitted Brain Stimulation as acommunications system to transmit information (as well as nervoussystem messages) to intelligence agents and also to transmit to thebrains of covert operations subjects (on a non-perceptible level).

EMF Brain Stimulation works by sending a complexly coded and pulsedelectromagnetic signal to trigger evoked potentials (events) in thebrain, thereby forming sound and visual images in the brain's neuralcircuits. EMF Brain Stimulation can also change a person'sbrain-states and affect motor control.

Two-way electronic Brain Link is done by remotely monitoring neuralaudio-visual information while transmitting sound to the auditorycortex (bypassing the ears) and transmitting faint images to thevisual cortex (bypassing the optic nerves and eyes). The imagesappear as floating 2D screens in the brain.

Two-way electronic Brain Link has become the ultimate communicationssystem for CIA/NSA personnel. Remote neural monitoring (RNM,remotely monitoring bioelectric information in the human brain) hasbecome the ultimate surveillance system.

It is used by a limitednumber of agents in the US Intelligence Community.

scalartech12_04.gif

The above is a simpleflowchart of Nuero-Electromagnetic Frequency Assaults

showing methods thatcan be perpetuated by the Police and Military Intelligence Agenciestoward
Remote Mind Control Experiments, Behavioral Manipulation andMurder.

5. [NO HEADINGIN ORIGINAL DOCUMENT]

RNM requires decoding the resonance frequency of each specific brainarea.

That frequency is then modulated in order to imposeinformation in that specific brain area. The frequency to which thevarious brain areas respond varies from 3 Hz to 50 Hz. Only NSASignals Intelligence modulates signals in this frequency band. (SeeTable 1 below)

This modulated information can be putinto the brain at varying intensities from subliminal toperceptible. Each person's brain has a unique set of bioelectricresonance/entrainment frequencies. Sending audio information to aperson's brain at the frequency of another person's auditory cortexwould result in that audio information not being perceived.

The Plaintiff learned of RNM by being in two-way RNM contact withthe Kinnecome group at the NSA, Ft Meade.

They used RNM 3D sound direct to the brain to harass the Plaintifffrom October 1990 to May 1991.

As of 5/91 they have had two-way RNM communications with thePlaintiff and have used RNM to attempt to incapacitate the Plaintiffand hinder the Plaintiff from going to the authorities about theiractivities against the Plaintiff in the last 12 years. The Kinnecomegroup has about 100 persons working 24 hours a day at Ft Meade.

Theyhave also brain-tapped persons the Plaintiff is in contact with tokeep the Plaintiff isolated.

This is the first time ever that aprivate citizen has been harassed with RNM and has been able tobring a lawsuit against NSA personnel misusing this intelligenceoperations method.

scalartech12_05.gif

click above image

6. NSATECHNIQUES AND RESOURCES

Remote monitoring/tracking of individuals in any location, insideany building, continuously, anywhere in the country.

A system forinexpensive implementation of these operations allows for thousandsof persons in every community to be spied on constantly by the NSA.

  • Remote RNM Devices
    NSA's RNM equipment remotely reads the evoked potentials (EEGs)of the human brain for tracking individuals, and can sendmessages through the nervous systems to affect theirperformance. RNM can electronically identify individuals andtrack them anywhere in the US.

    This equipment is on a networkand is used for domestic intelligence operations, governmentsecurity and military base security, and in case of bioelectricwarfare.


  • Spotters and Walk-Bys inMetropolitan Areas
    Tens of thousands of persons in each area working as spottersand neighbourhood/business place spies (sometimes unwittingly)following and checking on subjects who have been identified for covert control by NSA personnel.

    Agents working out of offices can be in constant communicationwith spotters who are keeping track of the NSA's thousands ofsubjects in public. NSA agents in remote offices can instantlyidentify (using~ RNM) any individual spotted in public who is incontact with surveillance subject.


  • Chemicals and Drugs intoResidential Buildings with Hidden NSA Installed and MaintainedPlastic Plumbing lines.
    The NSA has kits for running lines into residential tap waterand air ducts of subjects for the delivery of drugs (such assleeping gas or brainwashing-aiding drugs).

    This is an outgrowthof CIA pharmapsychology (psychopharmacology).


  • Brief Overview of Proprietary USIntelligence/Anti-Terrorist Equipment Mentioned
    Fixed network of special EMF equipment that can read EEGs inhuman brains and identify/track individuals by using digitalcomputers. ESB (Electrical Stimulation to the Brain) via EMFsignal from the NSA Signals Intelligence is used to controlsubjects.

    EMF equipment that gathers information from PC circuit boards bydeciphering RF emissions, thereby gaining wireless modem-styleentry into any personal computer in the country. All equipmenthidden, all technology secret, all scientific researchunreported (as in electronic warfare research).

    Not known to thepublic at all, yet complete and thorough implementation of thismethod of domestic intelligence has been in place since theearly 1980s.

Editor's Note:

I tried ringing MrAkwei to find out what was the out-come, if any, of his court case.He firmly but kindly told me that he could not speak about anythingto do with the case over the phone and hung up. A subsequentconversation of similar length resulted in the information that hedid not wish his address or phone number published with thisarticle.

So, if we hear of any developments, we'll let you know.

Its totallyobvious from the above article that the US NationalSecurity Agency is none other than a covertly runterrorist organization.

Their highly sophisticated technology that is used tomonitor and manipulate the minds of millions of innocentpeople daily, is a blatant expression of the dominatingand authoritarian mentality that exists behind thefacade of our so called democratic society.

George Orwell's "THOUGHT POLICE" is an absolutereality in today's world.

Whether we realize it or not, every individual withinour society is negatively effected by this dictatorshipattitude.

It has to change - It will change - It starts with you!

George Farquhar
Project Freedom


An example of EMF Brain Stimulation

Table 1

Brain Area
BioelectricResonance Frequency
Information Induced Through Modulation
Motor Control Cortex
10 Hz
Motor Impulse co-ordination
Auditory Cortex
15 Hz
Sound which bypasses the ears
Visual Cortex
25 Hz
Images in the brain bypassing the eyes
Somatosensory
9 Hz
Phantom touch sense
Thought Center
20 Hz
Imposed subconscious thoughts

RESOURCES

These publications have only been discovered sinceDecember 1991, after Plaintiff had already notifiedauthorities (Dept of Justice, etc.) of Public Corruption by named NSA employees.

When no action was taken against the NSAemployees, I researched the Intelligence Community electronicsurveillance technology involved and discovered the followingpublications.

  • The Body Electric: Electromagnetismand the Foundation of Life, by Robert Becker, M.D. Monitoringneuroelectric information in the brain ESB. (p. 265,313,318)

  • Cross currents, by Robert Becker.Simulating auditory hallucinations. Remote computer tamperingusing RF emissions from the logic board. (p.70,78,105,174,210,216,220,242,299,303)

  • Currents of Death, by Paul Brodeur.Driving brain electrical activity with external EM;magnetophosphenes; Delgado. (p. 27,93)

  • The Zapping of America, by PaulBrodeur. DoD EM ESB research; simulating auditoryhallucinations.

  • Of Mice, Men and Molecules, by JohnH. Heller 1963 Bioelectricity; probing the brain with EM waves.(p, 110)

  • The Three-Pound Universe, by JudithHooper. CIA EEG research; EEGs for surveillance. (p.29,132,137)

  • In the Palaces of Memory, by GeorgeJohnson. EM emissions from the brain; the brain as an openelectromagnetic circuit.

  • The Puzzle Palace, by James Bamford.Signals Intelligence; most advanced computers in the early'sixties.

  • The US Intelligence Community.Glossary terms at National Security Archives; RadiationIntelligence (information from unintentionally emanatedelectromagnetic energy, excluding radioactive sources).

  • The Search for the "Manchurian Candidate",by John Marks. Electrical or radio stimulation to the brain; CIAR&D in bioelectrics. (p.227)

  • Secret Agenda, by Jim Hougan.National security cult groups.

  • Crimes of the IntelligenceCommunity, by Morton Halperin. Surreptitious entries;intelligence agents running operations against governmentworkers.

  • War in the Age of IntelligentMachines, NSA computer supremacy, complete control ofinformation.

  • Alternate Computers, by Time-LifeBooks. Molecule computers.

  • The Mind, by Richard Restak, M.D.EEG Systems inc.; decoding brain EM emanations, trackingthoughts on a computer. (p. 258)

  • MedTech, by Lawrence Galton.Triggering events in the brain, direct to auditory cortexsignals.

  • Cyborg, by D.S. Halacy, Jr, 1965.Brain-to-computer link research contracts given out by the USgovernment.

  • Psychiatry and the CIA: Victims ofMind Control, by Harvey M. Weinstein M.D. Dr. Cameron; psychicdriving; ultraconceptual communications.

  • Journey Into Madness: The True Storyof Secret CIA Mind Control and Medical Abuse, by Gordon Thomas,Intelligence R&D; Delgado; psychic driving with radio telemetry.(p. 127,276,116,168,169)

  • Mind Manipulators, by Alan Scheflinand Edward M. Opton. MKULTRA brain research forinformation-gathering.

  • The Brain Changers, by Maya Pines.Listening to brain EM emissions. (p.19)

  • Modern Bioelectricity. Inducingaudio in the brain with EM waves; DoD cover-up; EM wave ESB;remote EEGs

  • Magnetic Stimulation in ClinicalNeurophysiology, by Sudhansu Chokroverty. Magnetophosphenes;images direct to the visual cortex.

  • The Mind of Man, by Nigel Calder. USintelligence brain research.

  • Neuroelectric Society Conference,1971. Audio direct to the brain with EM waves; 2-way remoteEEGs.

  • Brain Control, by Elliot S.Valenstein. ESB., control of individuals.

  • Towards Century 21, by C.S. Wallia.Brain Stimulation for direct-to-brain communications (p21)

  • Mind Wars, by Ron McRae (associateof Jack Anderson). Research into brain-to-brain electroniccommunications., remote neural EM detection (PP. 62 106, 136).

  • Mind Tools, by Rudy Rucker. Braintapping; communications with varying biomagnetic fields (p82).

  • US News and World report, January2nd 1984. EM wave brain stimulation; intelligence communityhi-tech (p38).

  • Ear Magazine. Article on extremelylow frequencies radio emissions in the natural environment;radio emissions from the human body.

  • City Paper, Washington DC January17, 1992. Article FCC and NSA "complete radio spectrum"listening posts.

  • Frontiers in Science, by EdwardHutchings Jr 1958 (p48).

  • Beyond Bio Feedback, by Elmer andAlyce Green, 1977 (p118)

  • The Body Quantum, by Fred Alan Wolf

  • Cloning; A Biologist Reports, byRobert Gillmore McKinnell. Ethical review of cloning humans.

  • Hoovers' FBI, by Former agentWilliam Turner. Routines of electronic surveillance work.(p280).

  • July 20th 2019, by Arthur C. ClarkeLIDA; Neurophonics; Brain-computer link.

  • MegaBrain, by Michael Hutchison.Brain stimulation with EM waves; CIA research and informationcontrol. (pp.107,108,117,120,123).

  • The Cult of Information, by TheodoreRosnak, 1986. NSA Directive #145; personal files in computers;computer automated telephone tapping.

  • The Body Shop, 1986 implantation ofan electrode array on the visual cortex for video direct to thebrain; other 1960's research into electronically triggeringPhosphenes in the brain, thus bypassing the eyes.

  • Evoked Potentials, by David Regan.Decoding neuroelectric information in the brain.

Read more…

A victory for privacy!

A victory for privacy!

August 6, 2010 at 6:06 pm by Amy E. Ferrer

Today, the Court of Appeals for the DC Circuit issued a ruling that standsstrongly on the side of privacy and against government intrusion. Fromthe Electronic Frontier Foundation:

The U.S. Court of Appeals for the District of Columbia Circuit today firmly rejected government claims that federal agentshave an unfettered right to install Global Positioning System (GPS)location-tracking devices on anyone’s car without a search warrant. …

“The court correctly recognized the important differences between limited surveillance of public activities possible through visualsurveillance or traditional ‘bumper beepers,’ and the sort of extended,invasive, pervasive, always-on tracking that GPS devices allow,” saidEFF Civil Liberties Director Jennifer Granick. “This same logic appliesin cases of cell phone tracking, and we hope that this decision will befollowed by courts that are currently grappling with the question ofwhether the government must obtain a warrant before using your cellphone as a tracking device.”

“GPS tracking enables the police to know when you visit your doctor, your lawyer, your church, or your lover,” said Arthur Spitzer, LegalDirector of the ACLU-NCA. “And if many people are tracked, GPS datawill show when and where they cross paths. Judicial supervision of thispowerful technology is essential if we are to preserve individualliberty. Today’s decision helps brings the Fourth Amendment into the21st Century.”

Read more…



Monday, 07 June 2010 20:26
Share Link:Share Link: BookmarkGoogleYahoo MyWebDel.icio.usDiggFacebookMyspaceRedditMa.gnoliaTechnoratiStumble UponYahoo BookmarksMSN LiveYigg

Illegal Activity Would Violate Nuremberg Code and Could Open Door to Prosecution

Press release from Physicians for Human Rights
In the most comprehensive investigation to date of health professionals’involvement in the CIA’s “enhanced” interrogation program (EIP),Physicians For Human Rights has uncovered evidence that indicates theBush administration apparently conducted illegal and unethical humanexperimentation and research on detainees in CIA custody.
The apparent experimentation and research appear to have been performed to providelegal cover for torture, as well as to help justify and shape futureprocedures and policies governing the use of the “enhanced”interrogation techniques.
The PHR report, Experiments in Torture: Human Subject Research and Evidence of Experimentation in the ‘Enhanced’ Interrogation Program, is the first to provide evidence that CIA medical personnel engaged inthe crime of illegal experimentation after 9/11, in addition to thepreviously disclosed crime of torture.
This evidence indicating apparent research and experimentation on detainees opens thedoor to potential additional legal liability for the CIA and Bush-eraofficials. There is no publicly available evidence that the Departmentof Justice’s Office of Legal Counsel determined that the allegedexperimentation and research performed on detainees was lawful, as itdid with the “enhanced” techniques themselves.
“The CIA appears to have broken all accepted legal and ethical standards put inplace since the Second World War to protect prisoners from being thesubjects of experimentation,” said Frank Donaghue, PHR’s ChiefExecutive Officer. “Not only are these alleged acts gross violations ofhuman rights law, they are a grave affront to America’s core values.”
Physicians for Human Rights demands that President Obama direct the Attorney Generalto investigate these allegations, and if a crime is found to have beencommitted, prosecute those responsible. Additionally, Congress mustimmediately amend the War Crimes Act (WCA) to remove changes made tothe WCA in 2006 by the Bush Administration that allow a more permissivedefinition of the crime of illegal experimentation on detainees in UScustody.
The more lenient 2006 language of the WCA was made retroactive to all acts committed by US personnel since 1997.
“In their attempt to justify the war crime of torture, the CIA appears to havecommitted another alleged war crime – illegal experimentation onprisoners,” said Nathaniel A. Raymond, Director of PHR’s CampaignAgainst Torture and lead report author. “Justice Department lawyersappear to never have assessed the lawfulness of the alleged research ondetainees in CIA custody, despite how essential it appears to have beento their legal cover for torture.”
PHR’s report, Experiments in Torture, is relevant to present-day national security interrogations, as well as Bush-era detainee treatment policies.
As recently as February, 2010, President Obama’s then director of nationalintelligence, Admiral Dennis Blair, disclosed that the US hadestablished an elite interrogation unit that will conduct “scientificresearch” to improve the questioning of suspected terrorists. AdmiralBlair declined to provide important details about this effort.
“If health professionals participated in unethical human subject research andexperimentation they should be held to account,” stated Scott A. Allen,MD, a medical advisor to Physicians for Human Rights and lead medicalauthor of the report. “Any health professional who violates theirethical codes by employing their professional expertise to calibrateand study the infliction of harm disgraces the health profession andmakes a mockery of the practice of medicine.”
Several prominent individuals and organizations in addition to PHR will file acomplaint this week with the US Department of Health and HumanServices’ Office for Human Research Protections (OHRP) and call for anOHRP investigation of the CIA’s Office of Medical Services.
The PHR report indicates that there is evidence that health professionals engaged inresearch on detainees that violates the Geneva Conventions, The CommonRule, the Nuremberg Code and other international and domesticprohibitions against illegal human subject research andexperimentation. Declassified government documents indicate that:
  • Research and medical experimentation on detainees was used to measure theeffects of large- volume waterboarding and adjust the procedureaccording to the results. After medical monitoring and advice, the CIAexperimentally added saline, in an attempt to prevent putting detaineesin a coma or killing them through over-ingestion of large amounts ofplain water. The report observes: “‘Waterboarding 2.0’ was the productof the CIA’s developing and field-testing an intentionally harmfulpractice, using systematic medical monitoring and the application ofsubsequent generalizable knowledge.”
  • Health professionals monitored sleep deprivation on more than a dozendetainees in 48-, 96- and 180-hour increments. This research wasapparently used to monitor and assess the effects of varying levels ofsleep deprivation to support legal definitions of torture and to planfuture sleep deprivation techniques.
  • Health professionals appear to have analyzed data, based on their observationsof 25 detainees who were subjected to individual and combinedapplications of “enhanced” interrogation techniques, to determinewhether one type of application over another would increase thesubject’s “susceptibility to severe pain.” The alleged research appearsto have been undertaken only to assess the legality of the “enhanced”interrogation tactics and to guide future application of the techniques.
Experiments in Torture: Human Subject Research and Experimentation in the ‘Enhanced’ Interrogation Programis the most in-depth expert review to date of the legal and medicalethics issues concerning health professionals’ involvement inresearching, designing and supervising the CIA’s “enhanced”interrogation program. The Experiments in Torturereport is the result of six months of investigation and the review ofthousands of pages of government documents. It has been peer-reviewedby outside experts in the medical, biomedical and research ethicsfields, legal experts, health professionals and experts in thetreatment of torture survivors.
The lead author for this report was Nathaniel Raymond, Director of the Campaign AgainstTorture, Physicians for Human Rights (PHR) and the lead medical authorwas Scott Allen, MD, Co-Director of the Center for Prisoner Health andHuman Rights at Brown University and Medical Advisor to PHR. They werejoined in its writing by Vincent Iacopino, MD, PhD, PHR Senior MedicalAdvisor; Allen Keller, MD, Associate Professor of Medicine, NYU Schoolof Medicine, Director, Bellevue/NYU Program for Survivors of Torture;Stephen Soldz, PhD, President-elect of Psychologists for SocialResponsibility and Director of the Center for Research, Evaluation andProgram Development at the Boston Graduate School of Psychoanalysis;Steven Reisner, PhD, PHR Advisor on Ethics and Psychology; and JohnBradshaw, JD, PHR Chief Policy Officer and Director of PHR’s WashingtonOffice.
The report was extensively peer reviewed by leading experts in related medical, legal,ethical and governmental fields addressed in the document.
This article originally appeared on the web site of Physicians for Human Rights.
 
Read more…