The US began to fund research into decoding the brain as well as other neurological research…

The US began to fund research into decoding the brain as well as other neurological research. President George H.W. Bush declared the 1990s “The Decade of the Brain”.95 At the same time, funding for computer to human interface poured into universities and Defense Advanced Research Projects Agency (DARPA) stepped up their research and development. In the universities, the field became “cognitive science” and within DARPA, the term “augmented cognition” was born.96

Bibliotecapleyades

Annonser

wilson advokat

Advokatens brev

WILSON LAW CENTER LLC

Jonathan O. Wilson, Attorney at Law

P.O. Box 1102

Morrison, Colorado 80465

(720) 219-8366

Fax: (303) 697-1189

Jon.wilson.law@hotmail.com

http://www.WilsonLawCenter.com

March 31, 2008

Sen. Patrick Leahy

433 Russell Senate Office Bldg

United States Senate

Washington, DC 20510

Dear Senator:

I represent Freedom from Covert Harassment and Surveillance, an organization with

several hundred members around the country and internationally who have reason to

believe they are targeted with various non-lethal weapons. These targeted individuals

suffer physical and psychological symptoms as a result of the remote manipulation. We

seek your office’s assistance in initiating hearings and a fact-finding congressional

inquiry into the government agencies and/or private companies that are targeting citizens.

Many citizens are desperate to be freed from the disturbing, intrusive and oppressive

targeting.

Evidence supports the conclusion that weapons exist that could be used against

individuals, based on U.S. Patent and Trademark Office filings, public releases by

agencies, and other technologies that indicate the level of technological sophistication.

The weapons are believed to be based on electromagnetism, microwaves, sonic waves,

lasers and other types of directed energy, and were characterized as “psychotronic” in

Rep. Dennis Kucinich’s draft of House Resolution 2977, the Space Preservation Act of

2001. Furthermore, it is undeniable that government agencies have tested citizens without

permission in the past; for example, the CIA’s human experimentation discussed in

Orlikow v. U.S., 682 F.Supp. 77 (D.D.C. 1988)

diethylamide discussed in

chemical experimentation as discussed in

Congress, 2d Session, S. Prt. 103-97 (Dec. 8, 1994).

complaining of being targeted, including people with post-graduate degrees and a lifetime

of achievements, and the similarities in symptoms tend to outweigh a dismissive response

based on charges of anecdotal evidence or group paranoia.

Several plaintiffs or groups of plaintiffs have filed suits in the past levying similar

charges of directed weaponry, but, to my knowledge, all have been dismissed due to

immunity and state secret defenses, and the lack of evidence of a direct link to agencies

or companies. It is difficult to legally prove targeting by psychotronic weapons when the

1

perpetrators operate from remote, unseen locations and therefore the targeting can be

dismissed as delusional. Given the wide scope of alleged targeting, there is a certain risk

of sounding too conspiratorial, however, common denominators such as physical

symptoms and medical reports, surveillance scenarios, harassment techniques, and more

can be readily established.

Freedom from Covert Harassment and Surveillance will gladly provide your office, and

any legislator and investigator, reports from targeted individuals documenting instances

of targeting, medical documentation, and recordings. This firm will provide research and

investigation results upon request as well. We will diligently work with anyone willing to

help. Please carefully consider convening hearings and an inquiry and collaborating with

other legislators in an effort to uncover and stop this inhumane practice.

Very truly yours,

Jonathan Wilson

, secretly administered lysergic acid

United States v. Stanley, 483 U.S. 669 (1987), and militaryCongressional Committee Report 103-97, 103dLastly, the sheer numbers of peopleAttorney for Freedom from Covert Harassment and Surveillance

 

Direct Human Brain -AI – Interface System technologies

Read about: IRPT 

Direct Human Brain – AI -Interface System technologies

© by Gina Rydland
published: 29.11.08Lack of factual information creates a naive conception of the development process of technologies sanctioned as safe to use, clouding the public debate and undermining sufficient grounds for government decision making. Securing human rights and safety when testing and implementing safe-to-use technologies demands access to more specialized and accurate knowledge than today’s global political, military and industrial climate permits.Rigorous monitoring by government ministries and committees, human rights organizations, and the public is an essential tool to secure against abuse and violation of human rights. Brain and body (non) invasive technologies represents new opportunities for manipulation and control and should be addressed in proper foras. Foras inside the military and industry have long since been established, but little has been done to bring an accurate and deeper description of relevance out to the public. The industry mainly address the public as consumers, which is rooted in the very nature and goal of military-industrial research and development, failing to emphasize security issues involving public health and environment.

Moving into the area of direct human brain – AI – interface systems, information available is at best sketchy. However, obscure signals within public research and development shows that a variety of sponsors are making development of such technologies not only feasible but operational without public knowledge and debate. The schedule for releasing [less] advanced human brain – AI – interface technologies meant for the public market may seem uncertain. Examples include the following: Diagnostics and treatment of psychiatric disorders and diseases rooted in the brain or physical or mental trauma; the learning process, behavior, education and communication; and, enhancement of brain functions, intelligence and capacity.

The details of today’s practical applications and the liability of the direct human brain – AI – interface system in use for intelligence needs remain non-disclosed. The road to a global, fully operational and economically viable DHB – AI – IS (Direct Human Brain – AI – Interface System) is likely to be a continuing challenge for many decades. The discovered potentials outweigh the time and resources used for research and development, making it a high priority. An intelligence acquisition and surveillance system based on a fully operational direct human brain – AI – interface technology will reshape military warfare, intelligence communication and operations.

The precautionary principle will never be sufficient to protect individuals or society from harm when the military industry pushes for further development of DHB – AI – IS. The only reliable way to develop safe-to-use technologies is, unfortunately, to run full scale tests on place and in realtime situations.

Inside the military industry, monitoring of professional and technical aspects during a development process is highly organized. In contrast, control and mapping of the effects on environment, society, health, and individuals during full scale implementation is too complicated, demanding vast resources, leaving an incomplete overview.

The public means to supervise and control how law and ethics is practiced inside classified research and development projects involving human experimentation is non-existent. A broader cooperation and a more open dialogue between representatives from military industries and intelligence, government, human rights organizations and the public needs to be established to protect the individual and society from harm in the process of development.

The potential negative effects of the DHB – AI – IS on humans and environment demands trained personnel to provide advice and information on several levels of society. To the victims, psychological and medical help, economical support and the provision of a lawyer, is decisive. This type of specializing in regards to DHB – AI – IS technologies is yet to be established inside the public domain.

The present situation leaves no hope of an immediate solution where law is able to protect humans or society against experiments conducted in classified research projects.

IRPT works for a broader understanding and openness regarding these issues to, at least, be able to help and support victims of research and development of DHB – AI – IS technologies. Acknowledgement from government resulting in new legislations and drastic actions to ensure the safety of humans and the environment is of vital importance.

 

Updated: 11.12.2008

 

 

 

 

Peter Mooring – about horrible human rights violations by secret services.

Peter Mooring on the web
Peter Mooring on the web is a blog about horrible human rights violations by secret services. Using gang stalking techniques and hi-tech electronic weapons (directed energy weapons) every year thousands of people all over the world are tortured and murdered, most of them never knowing what happened. Those who know often suffer horrendous (electronic) torture.
See also: STOPEG foundation

READ ABOUT PEOPLE COOKING:
The people cookers – Cooking people like a microwave oven cooks meat, or here
Electronic harassment and electronic torture list – February 26, 2009

ELECTRONIC WEAPONS (DIRECTED ENERGY WEAPONS):
Probably the most horrible consequence of these weapons based on radio waves is that you can NOT protect yourself, your children, your loved ones anymore. You can no longer say: stay in this room, you are safe here. Attackers simply look and cook/burn through walls, with intensities that can be deadly. Police cannot protect you, security services cannot protect you. That is why these weapons must be banned, not tomorrow but NOW.
See also: www.peoplecooker.com, STOPEG foundation

<!– comment by sUpriyadisw to optimal SEO

Torture and murder without evidence (2) – educate yourself

–>


Published on Sunday, June 3rd, 2007 at 9:48 pm

(Update June 3, 2007)

It is very important for everybody (!) to have some knowledge of existence and effects of hitech electro-magnetic weapons (often called DEW) and related privacy violating devices.

These weapons and devices:

  • are very real and are used almost everywhere
  • can cause almost any kind of ‘normal wound’, like headaches, burns, heartattack. Cause permanent damage to the body (destroy DNA), cause/stimulate cancer/tumors
  • can be used for mind control and mind reading
  • can be used to torture and murder from a distance and through walls
  • can influence almost anything including e.g. the results of sport events by zapping a 100 meters runner during the start

This is NOT science fiction but the real world. These weapons and devices are simply the result of the weapons race. He who has the best weapons wins. In your kitchen there is a microwave oven. This is almost a, very frightening, weapon. Thousands of people are tortured and murdered using hitech DEWs (Directed Energy Weapons), like microwave weapons, every year. Almost none of them having a clue what is actually happening to them. Targets are not only physically murdered but also commit suicide out of desperation or turn into psychiatric patients.

(From link [1] below) ‘The apparent intents here are twofold – primarily socio-political control of troublemakers, the silencing of whistleblowers and other conscientious objectors and the continued test development of DEW on civilian nonconsensual human subjects. I am a former defense (US Navy) employee myself, and I strongly suspect personal vendettas and favors are a real factor in our selection for harassment. Solid proof of wrongdoing has been minimal due to the intelligence (spy) methods, the Security Classification of these ‘Special Operations’ and the very nature of Directed Energy Weapons themselves. These devices are deliberately designed and used – so as not to leave evidence. Each victim has an individual story but also has a noted consistency in the abuse modus operandi and of the terrible health problems that affect all casualties of EMF/DEW irradiation.’

A limited list of how these devices are used for torture:

 

Attack type Description
Head beam Used to give you a headache feeling. Can be extremely painfull. If hit very hard recovery takes weeks.
Electric shower Used to burn a large area of your body, e.g. your back. Does not feel to go very deep. After a few days you have a feeling your whole back is burning (extreme sunburn). Attack can be reduced somewhat by metal shielding.
Knife Feels like a person is cutting you with a sharp knife. If feels as if going deep into your body. Attack can be reduced somewhat by metal shielding.
Bullet Feels like you are hit by a bullit. You have the feeling this really penetrates your body. I guess this what they describe as a dual zap. The first creates a passage in your body so the second beam can enter really deep. Attack can be reduced somewhat by metal shielding.
Punch Feels like you have been kicked over and over in your side. They zap your right side or left side at the positions of your kidneys. This is an extremely painfull feeling. It takes a very long time to recover from this … if you recover. This is some kind of ultrasound that is not stopped by metal shielding. The only thing that reduces the effect somewhat is water very close to your body. This can be used to prevent you from doing sports (another attempt to breaking your resistance).
Stomach Feels like something is hitting your stomach/belly. The contents of your stomach/belly begin to bubble. May be this is the same effect as punch(?). .
Eyes You are zapped in your left or right eye or both eyes. They target both eyes or the outer corners of one of your eyes. After a zap there is instant heavy pain from your eyes and your vision is blurred. In addition the white in your eye(s) will be blood wired. They may do this to show that they are in control. Again this is a means to prevent you from doing your normal things in life, like your work. Also, they may zap your eye(s) before you go out e.g. to pick up your child from school, so other people will notice your extremely red eyes. Picture shows the effect of a hit after a few minutes. Another effect is zapping that will make your eyes wet, like tears are coming out.dewhit_eye_20070603214500.jpg
Reduced muscle & bone functioning They beam your leg so it won’t feel good when jogging. They beam your hands/fingers to prevent you from writing, playing your musical instrument etc. One effect is you will have reduced strength in your fingers. You can feel the beam by moving your legs, hands.

In general, you have not much possibilities to protect yourself. You cannot walk around in a metal/water shield and function as a human being. Most attacks are very effective and it appears to be relatively easy to hit you anywhere anytime. There is a short term effect of pain and damage of body cells. Exposure for a long time to high intensity radiation is very dangerous for your health. Amounts add up, thus total radiation = radiation of day X1 + radiation of day X2, etc. Too much radiation destroys your DNA and gives you tumors and stimulates cancers (you can imagine the health hazard of high energy radiation compared to a mobile phone). Ultrasonic harressment will cause almost immediately tissue damage.

Why do governments keep quiet about these high tech weapons and the fact that they are being used at large scale? Most important, a government is not in control of what is happening. Every country has its elite controlling its interests by private security services. The diffence between e.g. Russia and the United States is that in Russia there is a single elite controling everything while in the United States there are multiple powerful elite groups tolerating each other and working together to maintain their positions. These groups organized themselves in a way that can be compared with the maffia, they are everywhere, infiltrated at all levels. If 1 out of 20 persons is part of these groups then they are your neighbours, your co-workers, they may be your friends, etc. Who controls what is published and printed in the newspapers? Who controls your mail, phone and internet. Still think you live in a democracy? In a broader context all this is related to the world order (total control by the mostly western elite) and yes this is a plot against all citizens of the world. Just look what the US and NATO are doing at the moment.

These extemely powerful weapons and devices are here to stay and are becoming cheaper and cheaper to manufacture and obtain. You may think that for these weapons the same applies as for conventional weapons, so who cares? Wrong! These new weapons and devices can harm through walls, and cause damage that is almost impossible to distinghuish from normal wounds and disease. That is a big difference compared to conventional weapons. If your neighbour is a part of the big criminal family trying to control our lives then maybe you are zapped a heart attack just because you play piano in the weekends and nobody will know the difference (the problem is caused not only by these high tech weapons but also by the psychopats controlling them).

In your local computer store you can buy a mouse that is controlled by your brain, just by thinking of it. Mind control and mind reading devices are at a very advanced stage. When you are in your bed sleeping they can put a device on the other side of the wall playing some kind of movie. When you wake up you think you dreamt this. Scanning your brain is also possible at relative great distances. Scans are compared and linked to known ‘thoughts’. The mind reading equipment can ‘predict’ your thoughts 0.45 seconds before e.g. you speak the words. Scary enough?

So how can you tell the difference? How do you distinghuish between a normal headache and a headache caused by these new weapons? Do you still rely on the expertise of your doctor? Maybe he is involved? The answer to these questions is education: Educate yourself by reading about this subject.

P.S. Yes, there is more and it is about weather control systems, another result of the weapons race, he who controls the weather wins. Start your search with: HAARP.

Read more (if links do not work, try again later. Some of these sites are too close to the truth …):

About weapons:

Dutch government investigation on non-lethal weapons and DEWs:

In Dutch:

Filed under: Politics |
You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.

Related Posts

2 Responses to “Torture and murder without evidence (2) – educate yourself”

  1. […] Torture and murder without evidence (2) – educate yourself: 229 comments […]1 | Peter Mooring on the web » Best spammed blog: Torture and murder without evidence (2) – educate yourself April 10th, 2007 at 10:42 pm
  2. […] Torture and murder without evidence (2) – educate yourself […]2 | Peter Mooring on the web » Groepstalking (gangstalking) April 28th, 2007 at 1:28 pm

Leave a Reply

Name (required)

Mail (will not be published) (required)

Website

XHTML: You can use these tags: <a href=”” title=””> <abbr title=””> <acronym title=””> <b> <blockquote cite=””> <cite> <code> <del datetime=””> <em> <i> <q cite=””> <strike> <strong>

Gang stalking = Organized murder

Gang stalking, often accompanied by electronic harassment/electronic torture, is used to cause the physical or mental death of the target. It is premeditated murder, and the ones participating are murderers. Gang stalking is also called organized stalking but it is better to call it organized murder.

See also:
Secret service: fear for the truth to be revealed!(17) – Gang stalkers and people cookers are murderers, the crimes they commit belong to the worst crimes in history

Three characteristics of secret services

Secret services mainly consists of murderers and child abusers, in fact most secret services personnel are carefully selected psychopaths. Psychopaths are unable to experience remorse for what happens to their victims. Keep that in mind while reading the three main characteristics of secret services agents (including directors of these services):

  • 1. Commit beyond imagination horrible crimes
    The main reason why they commit these crimes is that normal people will say: No, this cannot be true, I cannot believe anyone would commit such horrible crimes. To all normal people I say: Start believing it is true, this is not a movie, secret services agents really are the sickest creatures on this planet!
  • 2. Only care about themselselves
    They don’t care about other people, about children, they only care about themselselves. For example they set up children to stalk a target. They do not care if the child gets attacked or traumatized. They failed as a human being themselves, so they don’t care if they destroy lives of other people and children.
  • 3. Are excellent liars
    They have been made accomplices to murder one and know that they have to cover up or go to jail the rest of their miserable lives, in fact their lives are one big lie. They just lie their way through life without winking.

Finally, there is one major thing you must know about secret services agents:

They are all afraid for the truth as the truth will jail them for life

This makes it in effect very easy to deal with these bastards: the next time secret services agents ask you to do things for them just say: NO.

Never co-operate with secret services.
The first thing they do is turn you
into a murderer
(by making you accessory to their crimes)

See also:
Secret service: fear for the truth to be revealed!(15) – start independent investigations so they can be brought to justice and jailed
Psychopaths

Sorry, no more enemies

In the past, elite and secret services managed to expand and control because of the existence of enemies like communism. But now, 2009, there are no enemies left. The last enemy, communism, disappeared with the fall of the Berlin Wall. The people of the world evolved into decent persons, but the elite and secret services did not. They are still the same murderers they once were and can only maintain themselves by fighting enemies, by stealing and murdering.

So what to do if there are no enemies left? You create enemies! At world level, Iraq was created the enemy, now Iran, etc. At state level secret services have a continuous need for new agents. They cannot put an ad in the newspaper because they are all murderers and what they need is new murderers. So now without enemies left, almost random normal people are put on elimination lists and pointed terrorist, psycho, pedophile, etc. while they are not. These almost random normal people are mentally and/or physically murdered and in this process new agents are recruited.

It is ironic that most people recruited are lower class and in fact are used to keep their own kind (the lower class people) poor and uneducated so they can easily be used by the elite and secret services for all kinds of dirty work.

See also:
Secret service: fear for the truth to be revealed!(21) – normal people are murdered to keep the system running (the sick system needs blood to survive and expand) – part 2

Thou shall not kill

On January 29, 2009, at the World Economic Forum in Davos, Switzerland, when talking about the Israel Gaza attack, Turkish Prime Minister Recep Tayyip Erdogan said to Israel President Shimon Peres:
‘You killed people’, adding that the Sixth Commandment says, ‘Thou shall not kill’.

This was a very brave thing to say. Most governments and political leaders have degenerated considering common people puppets, expendable. But we are all human beings mr. Peres. mr. Bush, mr. Obama (he ordered rocket fire recently that killed 20+ civilians already), mr. Blair, mr. Brown, mr. Balkenende, etc. How would you feel if your children, your family, your friends are murdered. I believe mr. Erdogan also meant to say that you are the ones that have chosen the wrong path in life. That you all failed as human beings and that you all are responsible for the deaths of thousands and thousands of common people every year. Murdered by you, because you want money, oil, territory, for free instead of paying for it, or want things that belong to others. I believe mr. Erdogan meant to say you are all thiefs and murderers.

See also:
This is not about protection of Israel, this is about murder of innocent people

<!–

Best wishes for 2009
to all good people in de world!

//–>A people zapper is a hitech weapon that is used to torture and murder without evidence – Peter Mooring
http://www.peoplezapper.com/?p=7

Never in history there have been such powerful (electronic) weapons that can be used to monitor, incapacitate, torture and murder, all without evidence. The ones owning and exploiting this technology wil rule the world if we do not stop them, not tomorrow but NOW – Peter Mooring
http://www.petermooring.nl/blog/, http://www.stopeg.com/

Probably the most horrible consequence of these (electronic) weapons based on radio waves is that you can NOT protect yourself, your children, your loved ones anymore. You can no longer say: stay in this room, you are safe here. Attackers simply look and cook/burn through walls, with intensities that can be deadly. Police cannot protect you, security services cannot protect you. That is why these weapons must be banned, not tomorrow but NOW – Peter Mooring
http://www.petermooring.nl/blog/, http://www.stopeg.com/

Using gang stalking techniques and hi-tech electronic weapons (directed energy weapons) every year thousands of people all over the world are tortured and murdered, most of them never knowing what happened. Those who know often suffer horrendous (electronic) torture – Peter Mooring
http://www.stopeg.com/

Make no mistake about it: The fact that organized stalking and electronic harassment has become common, and is not prosecuted by the justice system of any country, means that constitutional rule of law is dead. When citizens can be targeted for years and decades without law enforcement acting to stop the crimes, you have no rule of law, you have the rule of the jungle – Eleanor White
http://www.raven1.net
ORGANIZED STALKING: A TARGET’S VIEW

The streets of the NATO nations have been taken over by networks of informants who Gang Stalk people on behalf of the financial elite, who own & control governments. All NATO governments are fully complicit in the harassment which includes the use of military-grade Directed Energy Weapons. This is part of the creation of a worldwide corporate-fascist dictatorship known as the New World Order. – Mark Rich
http://www.thehiddenevil.com

This BRAIN FINGER PRINTING TECHNOLOGY is being used on millions of Americans, without their knowledge or consent. REMOTE NEURAL MONITORING/MANIPULATION of the human brain is the greatest threat the population of this planet has ever faced – James F. Marino
http://www.9-11themotherofallblackoperations…com/

Gang stalkers and people cookers are murderers – Peter Mooring
http://www.petermooring.nl/blog/?p=98

The normal people at war with the mentally ill (the murderers and psychopaths) – Peter Mooring
http://www.petermooring.nl/blog/?p=86


”The mind has no firewall” -The human body, much like a computer, contains myriad data processors. They include, but are not limited to, the chemical-electrical activity of the brain, heart, and peripheral nervous system, the signals sent from the cortex region of the brain to other parts of our body, the tiny hair cells in the inner ear that process auditory signals, and the light-sensitive retina and cornea of the eye that process visual activity.[2] We are on the threshold of an era in which these data processors of the human body may be manipulated or debilitated. Examples of unplanned attacks on the body’s data-processing capability are well-documented.

”The Mind Has No Firewall”
Army article on psychotronic weapons

>>> The following article is from the US military publication Parameters, subtitled ”US Army War College Quarterly.” It describes itself as ”The United States Army’s Senior Professional Journal.” [Click here to read a crucial excerpt.]

 

”The Mind Has No Firewall” by Timothy L. Thomas. Parameters, Spring 1998, pp. 84-92.

The human body, much like a computer, contains myriad data processors. They include, but are not limited to, the chemical-electrical activity of the brain, heart, and peripheral nervous system, the signals sent from the cortex region of the brain to other parts of our body, the tiny hair cells in the inner ear that process auditory signals, and the light-sensitive retina and cornea of the eye that process visual activity.[2] We are on the threshold of an era in which these data processors of the human body may be manipulated or debilitated. Examples of unplanned attacks on the body’s data-processing capability are well-documented. Strobe lights have been known to cause epileptic seizures. Not long ago in Japan, children watching television cartoons were subjected to pulsating lights that caused seizures in some and made others very sick.

Defending friendly and targeting adversary data-processing capabilities of the body appears to be an area of weakness in the US approach to information warfare theory, a theory oriented heavily toward systems data-processing and designed to attain information dominance on the battlefield. Or so it would appear from information in the open, unclassified press. This US shortcoming may be a serious one, since the capabilities to alter the data- processing systems of the body already exist. A recent edition of U.S. News and World Report highlighted several of these ”wonder weapons” (acoustics, microwaves, lasers) and noted that scientists are ”searching the electromagnetic and sonic spectrums for wavelengths that can affect human behavior.”[3] A recent Russian military article offered a slightly different slant to the problem, declaring that ”humanity stands on the brink of a psychotronic war” with the mind and body as the focus. That article discussed Russian and international attempts to control the psycho-physical condition of man and his decisionmaking processes by the use of VHF-generators, ”noiseless cassettes,” and other technologies.

An entirely new arsenal of weapons, based on devices designed to introduce subliminal messages or to alter the body’s psychological and data-processing capabilities, might be used to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the various sensory and data-processing systems of the human organism. In both cases, the goal is to confuse or destroy the signals that normally keep the body in equilibrium.

This article examines energy-based weapons, psychotronic weapons, and other developments designed to alter the ability of the human body to process stimuli. One consequence of this assessment is that the way we commonly use the term ”information warfare” falls short when the individual soldier, not his equipment, becomes the target of attack.

 

Information Warfare Theory and the Data-Processing Element of Humans

In the United States the common conception of information warfare focuses primarily on the capabilities of hardware systems such as computers, satellites, and military equipment which process data in its various forms. According to Department of Defense Directive S-3600.1 of 9 December 1996, information warfare is defined as ”an information operation conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries.” An information operation is defined in the same directive as ”actions taken to affect adversary information and information systems while defending one’s own information and information systems.” These ”information systems” lie at the heart of the modernization effort of the US armed forces and other countries, and manifest themselves as hardware, software, communications capabilities, and highly trained individuals. Recently, the US Army conducted a mock battle that tested these systems under simulated combat conditions.

US Army Field Manual 101-5-1, Operational Terms and Graphics (released 30 September 1997), defines information warfare as ”actions taken to achieve information superiority by affecting a hostile’s information, information based-processes, and information systems, while defending one’s own information, information processes, and information systems.” The same manual defines information operations as a ”continuous military operation within the military information environment that enables, enhances, and protects friendly forces’ ability to collect, process, and act on information to achieve an advantage across the full range of military operations. [Information operations include] interacting with the Global Information Environment . . . and exploiting or denying an adversary’s information and decision capabilities.”[4]

This ”systems” approach to the study of information warfare emphasizes the use of data, referred to as information, to penetrate an adversary’s physical defenses that protect data (information) in order to obtain operational or strategic advantage. It has tended to ignore the role of the human body as an information- or data-processor in this quest for dominance except in those cases where an individual’s logic or rational thought may be upset via disinformation or deception. As a consequence little attention is directed toward protecting the mind and body with a firewall as we have done with hardware systems. Nor have any techniques for doing so been prescribed. Yet the body is capable not only of being deceived, manipulated, or misinformed but also shut down or destroyed–just as any other data-processing system. The ”data” the body receives from external sources–such as electromagnetic, vortex, or acoustic energy waves–or creates through its own electrical or chemical stimuli can be manipulated or changed just as the data (information) in any hardware system can be altered.

The only body-related information warfare element considered by the United States is psychological operations (PSYOP). In Joint Publication 3-13.1, for example, PSYOP is listed as one of the elements of command and control warfare. The publication notes that ”the ultimate target of [information warfare] is the information dependent process, whether human or automated . . . . Command and control warfare (C2W) is an application of information warfare in military operations. . . . C2W is the integrated use of PSYOP, military deception, operations security, electronic warfare and physical destruction.”[5]

One source defines information as a ”nonaccidental signal used as an input to a computer or communications system.”[6] The human body is a complex communication system constantly receiving nonaccidental and accidental signal inputs, both external and internal. If the ultimate target of information warfare is the information-dependent process, ”whether human or automated,” then the definition in the joint publication implies that human data-processing of internal and external signals can clearly be considered an aspect of information warfare. Foreign researchers have noted the link between humans as data processors and the conduct of information warfare. While some study only the PSYOP link, others go beyond it. As an example of the former, one recent Russian article described offensive information warfare as designed to ”use the Internet channels for the purpose of organizing PSYOP as well as for `early political warning’ of threats to American interests.”[7] The author’s assertion was based on the fact that ”all mass media are used for PSYOP . . . [and] today this must include the Internet.” The author asserted that the Pentagon wanted to use the Internet to ”reinforce psychological influences” during special operations conducted outside of US borders to enlist sympathizers, who would accomplish many of the tasks previously entrusted to special units of the US armed forces.

Others, however, look beyond simple PSYOP ties to consider other aspects of the body’s data-processing capability. One of the principal open source researchers on the relationship of information warfare to the body’s data-processing capability is Russian Dr. Victor Solntsev of the Baumann Technical Institute in Moscow. Solntsev is a young, well-intentioned researcher striving to point out to the world the potential dangers of the computer operator interface. Supported by a network of institutes and academies, Solntsev has produced some interesting concepts.[8] He insists that man must be viewed as an open system instead of simply as an organism or closed system. As an open system, man communicates with his environment through information flows and communications media. One’s physical environment, whether through electromagnetic, gravitational, acoustic, or other effects, can cause a change in the psycho-physiological condition of an organism, in Solntsev’s opinion. Change of this sort could directly affect the mental state and consciousness of a computer operator. This would not be electronic war or information warfare in the traditional sense, but rather in a nontraditional and non-US sense. It might encompass, for example, a computer modified to become a weapon by using its energy output to emit acoustics that debilitate the operator. It also might encompass, as indicated below, futuristic weapons aimed against man’s ”open system.”

Solntsev also examined the problem of ”information noise,” which creates a dense shield between a person and external reality. This noise may manifest itself in the form of signals, messages, images, or other items of information. The main target of this noise would be the consciousness of a person or a group of people. Behavior modification could be one objective of information noise; another could be to upset an individual’s mental capacity to such an extent as to prevent reaction to any stimulus. Solntsev concludes that all levels of a person’s psyche (subconscious, conscious, and ”superconscious”) are potential targets for destabilization.

According to Solntsev, one computer virus capable of affecting a person’s psyche is Russian Virus 666. It manifests itself in every 25th frame of a visual display, where it produces a combination of colors that allegedly put computer operators into a trance. The subconscious perception of the new pattern eventually results in arrhythmia of the heart. Other Russian computer specialists, not just Solntsev, talk openly about this ”25th frame effect” and its ability to subtly manage a computer user’s perceptions. The purpose of this technique is to inject a thought into the viewer’s subconscious. It may remind some of the subliminal advertising controversy in the United States in the late 1950s.

 

US Views on ”Wonder Weapons”: Altering the Data-Processing Ability of the Body

What technologies have been examined by the United States that possess the potential to disrupt the data-processing capabilities of the human organism? The 7 July 1997 issue of U.S. News and World Report described several of them designed, among other things, to vibrate the insides of humans, stun or nauseate them, put them to sleep, heat them up, or knock them down with a shock wave.[9] The technologies include dazzling lasers that can force the pupils to close; acoustic or sonic frequencies that cause the hair cells in the inner ear to vibrate and cause motion sickness, vertigo, and nausea, or frequencies that resonate the internal organs causing pain and spasms; and shock waves with the potential to knock down humans or airplanes and which can be mixed with pepper spray or chemicals.[10]

With modification, these technological applications can have many uses. Acoustic weapons, for example, could be adapted for use as acoustic rifles or as acoustic fields that, once established, might protect facilities, assist in hostage rescues, control riots, or clear paths for convoys. These waves, which can penetrate buildings, offer a host of opportunities for military and law enforcement officials. Microwave weapons, by stimulating the peripheral nervous system, can heat up the body, induce epileptic-like seizures, or cause cardiac arrest. Low-frequency radiation affects the electrical activity of the brain and can cause flu-like symptoms and nausea. Other projects sought to induce or prevent sleep, or to affect the signal from the motor cortex portion of the brain, overriding voluntary muscle movements. The latter are referred to as pulse wave weapons, and the Russian government has reportedly bought over 100,000 copies of the ”Black Widow” version of them.[11]

However, this view of ”wonder weapons” was contested by someone who should understand them. Brigadier General Larry Dodgen, Deputy Assistant to the Secretary of Defense for Policy and Missions, wrote a letter to the editor about the ”numerous inaccuracies” in the U.S. News and World Report article that ”misrepresent the Department of Defense’s views.”[12] Dodgen’s primary complaint seemed to have been that the magazine misrepresented the use of these technologies and their value to the armed forces. He also underscored the US intent to work within the scope of any international treaty concerning their application, as well as plans to abandon (or at least redesign) any weapon for which countermeasures are known. One is left with the feeling, however, that research in this area is intense. A concern not mentioned by Dodgen is that other countries or non-state actors may not be bound by the same constraints. It is hard to imagine someone with a greater desire than terrorists to get their hands on these technologies. ”Psycho-terrorism” could be the next buzzword.

 

Russian Views on ”Psychotronic War”

The term ”psycho-terrorism” was coined by Russian writer N. Anisimov of the Moscow Anti-Psychotronic Center. According to Anisimov, psychotronic weapons are those that act to ”take away a part of the information which is stored in a man’s brain. It is sent to a computer, which reworks it to the level needed for those who need to control the man, and the modified information is then reinserted into the brain.” These weapons are used against the mind to induce hallucinations, sickness, mutations in human cells, ”zombification,” or even death. Included in the arsenal are VHF generators, X-rays, ultrasound, and radio waves. Russian army Major I. Chernishev, writing in the military journal Orienteer in February 1997, asserted that ”psy” weapons are under development all over the globe. Specific types of weapons noted by Chernishev (not all of which have prototypes) were:

A psychotronic generator, which produces a powerful electromagnetic emanation capable of being sent through telephone lines, TV, radio networks, supply pipes, and incandescent lamps.

An autonomous generator, a device that operates in the 10-150 Hertz band, which at the 10-20 Hertz band forms an infrasonic oscillation that is destructive to all living creatures.

A nervous system generator, designed to paralyze the central nervous systems of insects, which could have the same applicability to humans.

Ultrasound emanations, which one institute claims to have developed. Devices using ultrasound emanations are supposedly capable of carrying out bloodless internal operations without leaving a mark on the skin. They can also, according to Chernishev, be used to kill.

Noiseless cassettes. Chernishev claims that the Japanese have developed the ability to place infra-low frequency voice patterns over music, patterns that are detected by the subconscious. Russians claim to be using similar ”bombardments” with computer programming to treat alcoholism or smoking.

The 25th-frame effect, alluded to above, a technique wherein each 25th frame of a movie reel or film footage contains a message that is picked up by the subconscious. This technique, if it works, could possibly be used to curb smoking and alcoholism, but it has wider, more sinister applications if used on a TV audience or a computer operator.

Psychotropics, defined as medical preparations used to induce a trance, euphoria, or depression. Referred to as ”slow-acting mines,” they could be slipped into the food of a politician or into the water supply of an entire city. Symptoms include headaches, noises, voices or commands in the brain, dizziness, pain in the abdominal cavities, cardiac arrhythmia, or even the destruction of the cardiovascular system.

There is confirmation from US researchers that this type of study is going on. Dr. Janet Morris, coauthor of The Warrior’s Edge, reportedly went to the Moscow Institute of Psychocorrelations in 1991. There she was shown a technique pioneered by the Russian Department of Psycho-Correction at Moscow Medical Academy in which researchers electronically analyze the human mind in order to influence it. They input subliminal command messages, using key words transmitted in ”white noise” or music. Using an infra-sound, very low frequency transmission, the acoustic psycho-correction message is transmitted via bone conduction.[13]

In summary, Chernishev noted that some of the militarily significant aspects of the ”psy” weaponry deserve closer research, including the following nontraditional methods for disrupting the psyche of an individual:

ESP research: determining the properties and condition of objects without ever making contact with them and ”reading” peoples’ thoughts

Clairvoyance research: observing objects that are located just beyond the world of the visible–used for intelligence purposes

Telepathy research: transmitting thoughts over a distance–used for covert operations

Telekinesis research: actions involving the manipulation of physical objects using thought power, causing them to move or break apart–used against command and control systems, or to disrupt the functioning of weapons of mass destruction

Psychokinesis research: interfering with the thoughts of individuals, on either the strategic or tactical level

While many US scientists undoubtedly question this research, it receives strong support in Moscow. The point to underscore is that individuals in Russia (and other countries as well) believe these means can be used to attack or steal from the data-processing unit of the human body.

Solntsev’s research, mentioned above, differs slightly from that of Chernishev. For example, Solntsev is more interested in hardware capabilities, specifically the study of the information-energy source associated with the computer-operator interface. He stresses that if these energy sources can be captured and integrated into the modern computer, the result will be a network worth more than ”a simple sum of its components.” Other researchers are studying high-frequency generators (those designed to stun the psyche with high frequency waves such as electromagnetic, acoustic, and gravitational); the manipulation or reconstruction of someone’s thinking through planned measures such as reflexive control processes; the use of psychotronics, parapsychology, bioenergy, bio fields, and psychoenergy;[14] and unspecified ”special operations” or anti-ESP training.

The last item is of particular interest. According to a Russian TV broadcast, the strategic rocket forces have begun anti-ESP training to ensure that no outside force can take over command and control functions of the force. That is, they are trying to construct a firewall around the heads of the operators.

 

Conclusions

At the end of July 1997, planners for Joint Warrior Interoperability Demonstration ‘97 ”focused on technologies that enhance real-time collaborative planning in a multinational task force of the type used in Bosnia and in Operation Desert Storm. The JWID ‘97 network, called the Coalition Wide-Area Network (CWAN), is the first military network that allows allied nations to participate as full and equal partners.”[15] The demonstration in effect was a trade fair for private companies to demonstrate their goods; defense ministries got to decide where and how to spend their money wiser, in many cases without incurring the cost of prototypes. It is a good example of doing business better with less. Technologies demonstrated included:[16]

Soldiers using laptop computers to drag cross-hairs over maps to call in airstrikes

Soldiers carrying beepers and mobile phones rather than guns

Generals tracking movements of every unit, counting the precise number of shells fired around the globe, and inspecting real-time damage inflicted on an enemy, all with multicolored graphics[17]

Every account of this exercise emphasized the ability of systems to process data and provide information feedback via the power invested in their microprocessors. The ability to affect or defend the data-processing capability of the human operators of these systems was never mentioned during the exercise; it has received only slight attention during countless exercises over the past several years. The time has come to ask why we appear to be ignoring the operators of our systems. Clearly the information operator, exposed before a vast array of potentially immobilizing weapons, is the weak spot in any nation’s military assets. There are few international agreements protecting the individual soldier, and these rely on the good will of the combatants. Some nations, and terrorists of every stripe, don’t care about such agreements.

This article has used the term data-processing to demonstrate its importance to ascertaining what so-called information warfare and information operations are all about. Data-processing is the action this nation and others need to protect. Information is nothing more than the output of this activity. As a result, the emphasis on information-related warfare terminology (”information dominance,” ”information carousel”) that has proliferated for a decade does not seem to fit the situation before us. In some cases the battle to affect or protect data-processing elements pits one mechanical system against another. In other cases, mechanical systems may be confronted by the human organism, or vice versa, since humans can usually shut down any mechanical system with the flip of a switch. In reality, the game is about protecting or affecting signals, waves, and impulses that can influence the data-processing elements of systems, computers, or people. We are potentially the biggest victims of information warfare, because we have neglected to protect ourselves.

Our obsession with a ”system of systems,” ”information dominance,” and other such terminology is most likely a leading cause of our neglect of the human factor in our theories of information warfare. It is time to change our terminology and our conceptual paradigm. Our terminology is confusing us and sending us in directions that deal primarily with the hardware, software, and communications components of the data-processing spectrum. We need to spend more time researching how to protect the humans in our data management structures. Nothing in those structures can be sustained if our operators have been debilitated by potential adversaries or terrorists who–right now–may be designing the means to disrupt the human component of our carefully constructed notion of a system of systems.

 

——————————————————————————–


NOTES

1. I. Chernishev, ”Can Rulers Make `Zombies’ and Control the World?” Orienteer, February 1997, pp. 58-62.

2. Douglas Pasternak, ”Wonder Weapons,” U.S. News and World Report, 7 July 1997, pp. 38-46.

3. Ibid., p. 38.

4. FM 101-5-1, Operational Terms and Graphics, 30 September 1997, p. 1-82.

5. Joint Pub 3-13.1, Joint Doctrine for Command and Control Warfare (C2W), 7 February 1996, p. v.

6. The American Heritage Dictionary (2d College Ed.; Boston: Houghton Mifflin, 1982), p. 660, definition 4.

7. Denis Snezhnyy, ”Cybernetic Battlefield & National Security,” Nezavisimoye Voyennoye Obozreniye, No. 10, 15-21 March 1997, p. 2.

8. Victor I. Solntsev, ”Information War and Some Aspects of a Computer Operator’s Defense,” talk given at an Infowar Conference in Washington, D.C., September 1996, sponsored by the National Computer Security Association. Information in this section is based on notes from Dr. Solntsev’s talk.

9. Pasternak, p. 40.

10. Ibid., pp. 40-46.

11. Ibid.

12. Larry Dodgen, ”Nonlethal Weapons,” U.S. News and World Report, 4 August 1997, p. 5.

13. ”Background on the Aviary,” Nexus Magazine, downloaded from the Internet on 13 July 1997 from http://www.execpc.com/vjentpr/nexusavi.html, p.7.

14. Aleksandr Cherkasov, ”The Front Where Shots Aren’t Fired,” Orienteer, May 1995, p. 45. This article was based on information in the foreign and Russian press, according to the author, making it impossible to pinpoint what his source was for this reference.

15. Bob Brewin, ”DOD looks for IT `golden nuggets,’” Federal Computer Week, 28 July 1997, p. 31, as taken from the Earlybird Supplement, 4 August 1997, p. B 17.

16. Oliver August, ”Zap! Hard day at the office for NATO’s laptop warriors,” The Times, 28 July 1997, as taken from the Earlybird Supplement, 4 August 1997, p. B 16.

17. Ibid.


——————————————————————————–


Lieutenant Colonel Timothy L. Thomas (USA Ret.) is an analyst at the Foreign Military Studies Office, Fort Leavenworth, Kansas. Recently he has written extensively on the Russian view of information operations and on current Russian military-political issues. During his military career he served in the 82d Airborne Division and was the Department Head of Soviet Military-Political Affairs at the US Army’s Russian Institute in Garmisch, Germany.

 

[see the article on the Parameters portion of the Army Website.]

National Security is the reason cited for not stopping mind control satellite surveillance technology.

National Security is the reason cited for not stopping mind control satellite surveillance technology. Yet the information permeates the internet in various presentations. Most group crime worldwide is mind control theater conducted by the United States. The U.S. has not ratified the Geneva Conventions Protocol I & II, and has not joined the International Criminal Court. Nor has it fully ratified the Convention Against Torture or the Convention Against Genocide. The reason is Satellite Surveillance Technology involves mind control, torture, group criminal acts and genocidal Crimes Against Humanity

Echelon

Echelon

2. NSA’S DOMESTIC ELECTRONIC SURVEILLANCE NETWORK

As of the early 1960s, the most advanced computers in the world were at the NSA, Ft Meade. Research breakthroughs with these computers were kept for the NSA. At the present time the NSA has nanotechnology computers that are 15 years ahead of present computer technology. The NSA obtains blanket coverage of information in the US by using advanced computers that use artificial intelligence to screen all communications, regardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists.

 

These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the US is a result of the NSA’s Signals Intelligence (SIGINT) mission. The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF (electromagnetic frequency) spectrum.

 

This equipment was developed, implemented and kept secret in the same manner as other electronic warfare programs.

  • Signals Intelligence Remote Computer Tampering

    The NSA keeps track of all PCs and other computers sold in the US. This is an integral part of the Domestic Intelligence network. The NSA’s EMF equipment can tune in RF (remote frequency) emissions from personal computer circuit boards (while filtering out emissions from monitors and power sup- plies).

     

    The RF emission from PC circuit boards contains digital information in the PC. Coded RF waves from the NSA’s equipment can resonate PC circuits and change data in the PCs. Thus the NSA can gain wireless modem-style entry into any computer in the country for surveillance or anti-terrorist electronic warfare.

  • Detecting EMF Fields in Humans for Surveillance

    A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance. NSA personnel can dial up any individual in the country on the Signals Intelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours a day.

     

    The NSA can pick out and track anyone in the US.

 

 

 

3. NSA SIGNALS INTELLIGENCE USE OF EMF BRAIN STIMULATION

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKULTRA program of the early 1950s, which included neurological research into radiation (non-ionizing EMF) and bioelectric research and development.

 

The resulting secret technology is categorized at the National Security Archives as ”Radiation Intelligence”, defined as,

”information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation”.

Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the US Government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyze electrical activity in humans from a distance. NSA computer generated brain mapping can continuously monitor all of the electrical activity in the brain continuously. The NSA records and decode individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for brain-to-computer link (in military fighter aircraft, for example).

For electronic surveillance purposes, electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex, thus allowing audio communications direct to the brain (bypassing the ears). NSA operatives can use this covertly to debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia.

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves.

 

NSA operatives can use this surreptitiously to put images into a surveillance subject’s brain while they are in REM sleep for brain-programming purposes.

  • Capabilities of NSA Operatives Using RNM

    There has been a Signals Intelligence network in the US since the 1940s. The NSA, Ft Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brains. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech, 3D sound and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears), and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods and motor control.

    Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.

The above is a simple flowchart of Nuero-Electromagnetic Frequency Assaults

showing methods that can be perpetuated by the Police and Military Intelligence Agencies

toward Remote Mind Control Experiments, Behavioural Manipulation and Murder.

 

 

4. NATIONAL SECURITY AGENCY SIGNALS INTELLIGENCE ELECTRONIC BRAIN LINK TECHNOLOGY

 

NSA SIGINT can remotely detect, identify and monitor a person’s bioelectric fields.

The NSA’s Signals Intelligence has the proprietary ability to monitor remotely and non-invasively information in the human brain by digitally decoding the evoked potentials in the 30-50 Hz, 5 milliwatt electromagnetic emissions from the brain.

Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 Hz, 5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called ”evoked potentials”. Every thought, reaction, motor command, auditory event and visual image in the brain has a corresponding ”evoked potential” or set of ”evoked potentials”. The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain.

NSA SIGINT uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level).

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control.

Two-way electronic Brain Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes). The images appear as floating 2D screens in the brain.

Two-way electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote neural monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system.

 

It is used by a limited number of agents in the US Intelligence Community.