Sunday, September 27, 2015

Canadian Police State - Fusion Centers - Data Mining - Loss of Sovereignty

Beyond looking for keywords set off in sent emails or words used in conversations on phone calls, CSIS and CSE have access to technology very similar to the CIA and the NSA. The NSA and the CIA use extremely sophisticated software like this:,, and to comb through mounds of data to find statistically significant patterns from all of the data they get from all over the internet. Some of the major contributors of data and information are companies like Facebook, Twitter, Google, MicrosoftYahooLinkedIn and Apple.  They also have access to the databases of the U.S. government's files. The CIA and the NSA can also access every Canadian citizen's data. See more about PROMIS software hereherehere and here how this was possible a long time ago. There was problems with the United States and Israel at that time. Nothing has changed.

Essentially PROMIS was a precursor to the three software companies I list above and is the brainchild of the PRISM surveillance program.

To learn more about big data go here. Once a target has been recognized, the information is passed along to what is known as a fusion center. (See here for how the United States and Canada are working together in their fusion centers, intelligence agencies, and national police forces.)

This is where the informant society and organized stalking comes into play. This model is based highly on the East German Stasi government.

All of this spying is has reached a pinnacle with political eugenics and Transhumanism. You have to realize that the United States government's intelligence community, DARPA, and Raytheon BBN Technologies were involved in the creation of the internet. This means the internet was set up for spying, intelligence, and data gathering right from the beginning. They have the potential to gather data from numerous sources on the internet, especially counter intelligence websites like the ones shown herehere and here. Also, see here for more about Judas goats and political dissidents. It is important to remember, that the main targets of the East German STASI were those that they deemed to be political dissidents.

Except it is much, much worse...

In May 25, 2007, the U.S. Director of National Intelligence Michael McConnell authorized the National Applications Office (NAO) of the Department of Homeland Security to allow local, state, and domestic Federal agencies to access imagery from military intelligence Reconnaissance satellites and Reconnaissance aircraft sensors which can now be used to observe the activities of U.S. citizens. (This is in the United States, but, all of the links below will show you how close the relationship is between Canada and the USA.) The satellites and aircraft sensors will be able to detect chemical traces, and identify objects in buildings and "underground bunkers", and will provide real-time video at much higher resolutions than the still images produced by programs such as Google Earth. See here and here for more.

In other words, these people have access to technology that can find oil and mineral deposits underground with up to 99% accuracy, (this is called earth-penetrating tomography, Interferometry, see also Earth's Field NMR, Nuclear Magnetic Resonance, and Electron Paramagnetic Resonance.) See here for an example using space-based radar, see here and here for more about satellite terrorism. 

Along with satellites and radar, the process of weaponizing nanotechnology and brain-computer interface technology has begun, just as this political activist says here. These technologies allow them to read your mind and thoughts, influence your behavior and track you around the globe. See here and here for more about this.

They have access to the EEG readouts of your brainwaves and brain states to know what you are thinking, and the ability to see out of your eyes and hear out your ears. This is called Total Information Awareness, meaning the goal is to have access to every piece of information on this planet. (See here for more about being hooked up to a supercomputer with artificial intelligence at the NSA and the CIA, and here for why Edward Snowden is a fake.) 

Like I said, they can also influence your behavior. They can put thoughts in your head and hook you up to another individual's brain. When engaging in the latter, if an individual changes the EEG of his or her brain,  that individual can change the EEG of another brain that they are hooked up to. Or in other words, two brains can effectively become one.

BUT IT GETS EVEN WORSE! They can also shoot you with space-based weapons. (See herehere and here for more.)

See Below for More About the Loss of Canada's Sovereignty to the
Ideology of Zionism, the State of Israel and the United States: 

Sunday, September 20, 2015

RCMP + CSE + CSIS = Stasi (Oh, I Almost Forgot, They Already Took "Canada" Out Of The Name Of Our Most Important Spy Agency)

Yes, believe it. The coup has been happening for years. After you read my blog, you will see who is behind it. So, my headline should actually read the RCMP + CSE + CSIS = Zionist Stasi.

The Stasi was East Germany's dreaded secret police. They spied on ordinary East Germans, tapped their phones, intercepted their mail, assessed their 'reliability', used informants, kept dossiers on persons of interest and ordinary citizens alike.

The hated Stasi fell with the Berlin Wall but they live on - in today's RCMP, the Royal Canadian Mounted Police, Trudeau's personal security apparatus. Today the RCMP, in conjunction with our official spy agencies, CSE and CSIS, and the Canadian Border Service Agency, operate a domestic spying network called the Integrated National Security Enforcement Team, INSET.

And just whose security is INSET enforcing? Yours? Mine? Canada's? Hardly. Don't be naive. They're the taxpayer-funded security service for them, just like the CBC news. Look at some of the awful information on this blog, why doesn't the CBC report it?

When dealing with a state secret police agency, they're never entitled to the benefit of the doubt. Never.  They're thugs who operate in the shadows, in service not to the country but to powerful, immensely wealthy interests.

Relevant links:

RCMP Targets Muslim Extremists, But Gives Zionist Terrorists Free Pass

There Is No Canada - CSIS

Mind Control and Augmented Cognition: Hooked Up to a Supercomputer with Artificial Intelligence at the NSA and CIA

Torture, Slander and Organized Stalking

Domestic Terrorism Silent Rape And Murder - Brain Chips, Nanotechnology and Psychotronics

Download STASI book

Homeland Security and the Alternative Media Agenda

Zionism Like Racism --- Has To Go...

Israel and the Bombing of the U.S.S. Liberty

Canada-Israel: The Other Special Relationship

Canada & Stephen Harper: Always Stand Behind Israel?

The Israel You Don't Hear About in the Media - MUST SEE VIDEOS

The Israel That You Rarely Hear About in the Media Part 2

A Collection of Posts About Israel

Who Really Makes Up the 1%?

Is Zionism / Jewish Nationalism a Political Cult?

Which Group of People are Most Likely To Be Terrorists? The Answer May Surprise You

Collection of Posts About Israel and the "So-Called" Jews

Activist Reveals Hidden Military Ties Between Canada and Israel

Download STASI book

Here is a book to download with Stasi tactics.  For the additional information that they leave out, please see here, here and here.

Saturday, September 19, 2015

Symptoms of Electronic Radiation Exposure

Please see hereherehere and here before reading what is written below.

Radiation is a very common form of harassment.  It is important to realize that phased array radar is a form of directed radio frequency, so it can be used as a resonance weapon. This also goes for microwaves. In fact, evidence exists that the United States military knew of harmful world scale effects of radar very early on, that radar could be used as a weapon against humans. Hints of this include the story of how the original microwave oven was invented based on military radar technology, as a man named Percy Spencer identified in the 1940s that radar would warm soldier's bodies and melt candy bars in their pockets (proof of world scale effects identified early on). While he was not the first to notice it, this inspired him to investigate further ultimately creating the first microwave oven for the purpose of food heating by attaching a high-density electromagnetic field generator to an enclosed metal box (basically radar parts).

High exposure to radiation can cause tumors, brain disorders and brain damage,  Autism, Aspergers Syndrome, Alzheimer's disease, mental illness, tremors, headaches, cataracts, seizures, heart attacks or even death. The results of an attack by a high energy device can be lethal, they can kill or at the least disable a human being or other animals. Most radiation harassment is usually done over long periods of time, ranging from days to years, in order to induce harm.

Attacks from high energy radar and microwave weapons leave blisters, cause internal bruising and/or bleeding, stimulate cancer, cause cataracts, encourage tumors to grow, generate boils, or leave red patches on the skin.

Other symptoms may include but are not limited to: muscle twitching, headache, eye irritation, bleeding eyes, dizziness, nausea, skin rash, facial swelling, weakness, fatigue, pain in joints and/or muscles, buzzing/ringing in ears, skin numbness, abdominal pressure and pain, abdominal bloating, chest pressure and pain, breathing difficulty, irregular heartbeat, sexual stimulation and hearing voices, irrational or different thoughts in your own internal voice, paralysis, balance problems, body and/or muscle spasms, convulsions, confusion, depression or manic states, severe coldness in arms, hands, fingers, legs, feet, toes or face, difficulty in concentrating, seizure, sleep disturbances, and memory difficulties.

Directed harmful high energy weapons can also be used to destroy electronic devices and cause severe interference in computers and alarm systems which can allow forced entry or destruction of vital data.

Friday, September 18, 2015

Microwave Detection And Remote Mind Control Technology

Before you read the article below, see here, here, here, here and here.

Microwave Detection And Remote
Mind Control Technology

There had been an ongoing controversy over health effects of electromagnetic fields (EMF) for years (e.g., extremely low frequency radiation and the Navy's Project Seafarer; emissions of high power lines and video display terminals; radar and other military and industrial sources of radio frequencies and microwaves, such as plastic sealers and molders.) Less is known of Department of Defense (DOD) and Central Intelligence Agency (CIA) interest in anti-personnel applications of the invisible energies. The ability of certain parameters of EMF to cause health effects, including neurological and behavioral disturbances, has been part of the military and CIA arsenal for years.

Capabilities of the energies to cause predictable and exploitable effects or damages can be gleaned from discussion of health effects from environmental exposures. Interestingly, some scientists funded by the DOD or CIA to research and develop invisible electromagnetic weapons have voiced strong concern (perhaps even superior knowledge or compensatory to guilt) over potentially serious consequences of environmental exposures.

Eldon Byrd who worked for Naval Surface Weapons, Office of Non-Lethal Weapons, was commissioned in 1981 to develop electromagnetic devices for purposes including "riot control," clandestine operations and hostage removal. In the context of a controversy over reproductive hazards to Video Display Terminal (VDT) operators, he wrote of alterations in brain function of animals exposed to low intensity fields. Offspring of exposed animals "exhibited a drastic degradation of intelligence later in life... couldn't learn easy tasks... indicating a very definite and irreversible damage to the central nervous system of the fetus." With VDT operators exposed to weak fields, there have been clusters of miscarriages and birth defects (with evidence of central nervous system damage to the fetus). Byrd also wrote of experiments where behavior of animals was controlled by exposure to weak electromagnetic fields. "At a certain frequency and power intensity, they could make the animal purr, lay down and roll over."

Notorious Jose Delgado, advocate of a psycho-civilized society through mind control, no longer implants electrodes in the brains of mental patients and prisoners; he now induces profound behavioral changes (hyper-activity, passivity, etc.) by exposing animals to precisely tuned EMFs. He has also written of genetic damage produced by weak EMF fields, similar to those emitted by VDTs. Invariably, brain tissue damage and skeletal deformation was observed in new born chicks that had been exposed. He was concerned enough to check emissions from the appliances in his kitchen.

Ross Adey induces calcium efflux in brain tissue with low power level fields (a basis for the CIA and military's "confusion weaponry") and has done behavioral experiments with radar modulated at electroencephalogram (EEG) rhythms. He is understandably concerned about environmental exposures within 1 to 30 Hz (cycles per second), either as a low frequency or an amplitude modulation on a microwave or radio frequency, as these can physiologically interact with the brain even at very low power densities.


Microwave health effects is a juncture where Department of Defense and environmental concerns collide and part ways.

Security concerns, according to Sam Koslov of Defense Advanced Research Projects Agency (DARPA), first prompted U.S. study of health effects of low intensity (or non-thermal) microwaves. At times, up to 70-80% of the research was funded by the military. From 1965 to 1970, a study dubbed Project Pandora was undertaken to determine the health and psychological effects of low intensity microwaves, the so-called "Moscow signal" registered at the American Embassy in Moscow. Initially, there was confusion over whether the signal was an attempt to activate bugging devices or for some other purpose. There was suspicion that the microwave irradiation was being used as a mind control system. CIA agents asked scientists involved in microwave research whether microwaves beamed at humans from a distance could affect the brain and alter behavior. Dr. Milton Zarat who undertook to analyze Soviet literature on microwaves for the CIA, wrote: "For non-thermal irradiations, they believe that the electromagnetic field induced by the microwave environment affects the cell membrane, and this results in an increase of excitability or an increase in the level of excitation of nerve cells. With repeated or continued exposure, the increased excitability leads to a state of exhaustion of the cells of the cerebral cortex."

Employees first learned of the irradiation ten years after Project Pandora began. Before that, information had been parcelled out on a strict "need to know" basis, which excluded most employees at the compound. Due to secrecy, and probably reports like Dr. Zaret's, Jack Anderson speculated that the CIA was trying to cover up a Soviet effort at behavior modification through irradiation of the U.S. diplomats, and that the cover up was created to protect the CIA's own mind control secrets.

Finally, an unusually large number of illnesses were reported among the residents of the compound. U.S. Ambassador Walter Stoessel developed a rare blood disease similar to leukemia; he was suffering headaches and bleeding from the eyes. A source at the State Department informally admitted that excessive radiation had been leaking from his telephone; an American high frequency radio transmitter on the roof of the building had, when operating, induced high frequency signals well above the U.S. safety standard through the phones in the political section, as well as in lines to Stoessel's office. No doubt, National Security Agency or CIA electronic devices also contributed to the electromagnetic environment at the embassy, although values for these were never released, as they are secret. Stoessel was reported as telling his staff that the microwaves could cause leukemia, skin cancer, cataracts and various forms of emotional illness. White blood cell counts were estimated to be as high as 40% above normal in one third of the staff, and serious chromosome damage was uncovered.

The Soviets began research on biological effects of microwaves in 1953. A special laboratory was set up at the Institute of Hygiene and Occupational Diseases, Academy of Medical Sciences. Other labs were set up in the U.S.S.R. and in Eastern Europe that study both effects of microwaves and low frequency electromagnetic radiation.

Years ago, in the halls of science, complaints could be heard that Soviet experiments regarding bio-effects couldn't be duplicated due to insufficient details in their scientific literature, although, according to one DOD official, 75% of the U.S. papers on the subject carried insufficient parameters for duplication. Scientists even questioned, with McCarthy like sentiments, whether the Soviets were attempting to frighten or disinform with false scientific reporting of bio-effects. It was unthinkable, according to cruder scientific theory, that non-thermal levels of microwaves could cause harm. Impetus for a study of such effects came not from concern for the public, but rather in the military and intelligence community's suspicion of the Soviets, and their equally strong interest in developing exploitable anti-personnel effects - an interest that continues unabated today.

The CIA and DOD "security" concerns metamorphosized into research and development of invisible weapons capable of impacting on health and psychological processes. In fact, due to the finding of startling effects, DARPA's security became even tighter, and a new code name - "Bizarre" - was assigned to the project.

Military Disinformation

Scientist Allen Frey of Randomline, Inc. was always more interested in low intensity microwave hazards: thermal effects were known. During Project Pandora, the Navy funded such projects of his, as how to use low average power intensities, to: induce heart seizures; create leaks in the blood brain barriar, which would allow neurotoxins in the blood to cross and cause neurological damage or behavioral disorders; and how to produce auditory hallucinations or microwave hearing, during which the person can hear tones that seem to be coming from within the head or from directly behind it.

In 1976, the Defense Intelligence Agency (DIA) released a report in which they attributed the results of Dr. Frey's studies to the Soviets. According to Dr. Frey, who acknowledges that his work was misattributed, he had thought up the projects himself. The DIA, but not the CIA, is allowed to use "mirror imaging" and "net assessment" in their reports, ie., respectively, the attribution of one's own motives and weapons capabilities to "the other side", in this case, the Soviets. It follows, that there is nothing to prevent them from releasing a report prepared in this manner, and thus muddy the water of decision making, pervert public opinion, stoke up congressional funding or enlist the support of naive scientists to counter "the threat". There was strong convern over CIA disinformation abroad, leaking back to the home front, through the American press, but apparently the DIA, at least on some issues, can dish it up with impunity.

Dr. R.O. Becker, twice nominated for the Nobel prize for his health work in bio-electromagneticsm, was more explicit in his concern over illicit government activity. He wrote of "obvious applications in covert operations designed to drive a target crazy with "voices." The 1976 DIA report also credits the Soviets with other capabilities, stating, "Sounds and possibly even words which appear to be originating intercranially can be induced by signal modulations at very low power densities." Dr. Sharp, a Pandora researcher at Walter Reed Army Institute of Research, some of whose work was so secret that he couldn't tell his boss, conducted an experiment in which the human brain has received a message carried to it by microwave transmission. Sharp was able to recognize spoken words that were modulated on a microwave carrier frequency by an "audiogram", an analog of the words' sound vibrations, and carried into his head in a chamber where he sat.

Dr. James Lin of Wayne State University has written a book entitled, Microwave Auditory Effects and Applications. It explores the possible mechanisms for the phenomenon, and discusses possibilities for the deaf, as persons with certain types of hearing loss can still hear pulsed microwaves (as tones or clicks and buzzes, if words aren't modulated on). Lin mentions the Sharp experiment and comments, "The capability of communicating directly with humans by pulsed microwaves is obviously not limited to the field of therapeutic medicine."

What is frightening is that words, transmitted via low density microwaves or radio frequencies, or by other covert methods, might be used to create influence. For instance, according to a 1984 U.S. House of Representatives report, a large number of stores throughout the country use high frequency transmitted words (above the range of human hearing) to discourage shoplifting. Stealing is reported to be reduced by as much as 80% in some cases. Surely, the CIA and military haven't overlooked such useful technology.

Dr. Frey also did experiments on reduction of aggression. Rats who were accustomed to fighting viciously when their tails were pinched, accepted the pinching with relative passivity when irradiated with pulsed microwaves in the ultra high frequency rage (UHF) at a power density of less than 1,000 microwatts/cm^2. He has also done low intensity microwave experiments degrading motor coordination and balance. When asked about weapons applications of his work, he answered by referring to himself as "just a biological theorist", and his work for the Navy, "basic medical research."

Lies Before Congress

In 1976, George H. Heilmeier, director of Defense Advances Research Projects Agency (DARPA) responded to a mailgram to President Ford from Don Johnson of Oakland, paraphrasing Johnson's concern, and assuring him that the DARPA sponsored Army/Navy Pandora experiments were "never directed at the use of microwaves as a surveillance tool, nor in a weapons concept." Don Johnson lingered in the memory of one DOD official who sponsored microwave research in the 1970s. Johnson was enigmatically described as "brilliant... schizophrenic... he knew too much... a former mental patient... buildings where work was done." (Scientists who have disagreed with the DOD on health effects of microwaves and on the U.S. exposure standard, have received scant more respect and have had their funding cut.)

The next year, Heilmeier elaborated in a written response to an inquiry before Congress. "...This agency [DARPA] is not aware of any research projects, classified or unclassified, conducted under the auspices of the Defense Department, now ongoing, or in the past, which would have probed possibilities of utilizing microwave radiation in a form of what is popularly known as 'mind control.' We do not foresee the development, by DARPA of weapons using microwaves and actively being directed toward altering nervous system function or behavior. Neither are we aware of any of our own forces... developing such weapons..."

Lies Exposed

Finally, memoranda were released that rendered the goals of Pandora transparent. Richard Cesaro, initiator of Pandora and director of DARPA's Advanced Sensor program, justified the project in that "little or no work has been done in investigation of the subtle behavioral changes which may be evolved by a low-level electromagnetic field." Researchers had long ago established that direct stimulus of the brain could alter behavior. The question raised by radio frequencies - microwaves or radio frequencies of the UHF or VHF band - was whether the electromagnetic could have a similar effect at very low levels. Pandora's initial goal: to discover whether a carefully constructed microwave signal could control the mind. In the context of long term, low-level effects: Cesaro felt that central nervous system effects could be important, and urged their study "for potential weapons applications." After testing a low-level modulated microwave signal on a chimpanzee, and within approximately a week causing stark performance decrements and behavioral disorganization. Cesaro wrote, "the potential of exerting a degree of control on human behavior by low-level microwaves seems to exist." On the basis of the primate study, extensive discussions took place and plans were made to extend the studies to humans.

According to a former DOD security analyst, one such microwave experiment with human subjects took place at Lorton Prison in the early 1970s. He said that such research (in a weapons context) has occurred on behavioral effects of microwaves since 1976. He also asked, "Why are you so concerned about then? What about now? They can call anyone a terrorist. Who are they using it on now?"

Behavioral Effects

In June, 1970, a government think tank, Rand Corporation, published a report by R.J. MacGregor, entitled "A Brief Survey of Literature Relating to Influence of Low Intensity Microwaves on Nervous Function." After noting that the U.S. microwave guideline in effect in 1970 for the public, 10,000 microwatts/^2 (now the industrial and military "guideline"), is proscribed from consideration of the rate that thermal effects are dissipated, the author, a specialist in modeling neural networks, states that scientific studies have consistently shown that humans exhibit behavioral disturbances when subjected to non-thermal levels of microwaves, well below this level. The symptoms that MacGregor lists for those humans exposed more or less regularly at work or in the living environment are insomnia, irritability, loss of memory, fatigue, headache, tremor, hallucination, autonomic disorders and disturbed sensory funtioning. He reports that swelling and distention of nerve cells have been produced at intensities as low as 1,000 microwatts/cm^2 (the current U.S. guideline for the public).

In a companion Rand paper, June, 1970, entitled "A Direct Mechanism for the Direct Influence of Microwave Radiation on Neuroelectric Function," MacGregor sets forth the idea that the electrical component of microwave radiation induces transmembrane potentials in nerve cells and thereby disturbs nervous function and behavior.

Microwaves penetrate and are absorbed more deeply so that they can produce a direct effect on the central nervous system. With smaller wave lengths the principal absorption occurs near the body surface and causes peripheral or "lower" nervous system effects.

Dr. Milton Zaret who analysed neurological effects for the CIA during Project Pandora (he is now one of the few doctors willing to take the government on by testifying on behalf of plaintiffs filing claims for microwave health damage), wrote that, "receptors of the brain are susceptible and react to extremely low intensities of microwave irradiation if this is delivered in accordance with appropriate "coding." Coding is reported to be influenced by the character of the signal so as to be a function, for example, of the shape and amplitude of the pulse or waveform.

Remotely Reinforcing Specific Brain Rhythms

Dr. Ross Adey, formerly of the Brain Research Center at University of Southern California, Los Angeles, now at Loma Linda University Medical School, Loma Linda, California, was among the first of the Pandora researchers. His work is more precise in inducing specific behavior, rather than merely causing disorganization or decrements in performance -that is, apart from his studies on inducing calcium efflux in brain tissue, which causes interference with the fucntioning of the brain and is one basis of "confusion weaponry."

More specifically, Adey's thesis is that if the electroencephalogram (EEG) has informational significance, one can induce behavioral changes if one imposes environmental fields that look like EEG. During Adey's career, he has correlated a wide variety of behavioral states with EEG, including emotional states (e.g., stress in hostile questioning), increments of decision making and conditioning, correct versus incorrect performance, etc., and he has imposed electromagnetic fields that look like EEG, which has resulted in altered EEG and behavior.

In published accounts of Adey's work, he has shown that it is possible to apply low biologic frequencies by using a radio frequency carrier modulated at specific brain frequencies. He demonstrated that if the biological modulation on the carrier frequency is close to frequencies in the natural EEG of the subject, it will reinforce or increase the number of manifestations of the imposed rhythms, and modulate behavior.

The conditioning paradigm: animals were trained through aversion to produce specific brain wave rhythms; animals trained in a field with the same rhythm amplitude modulated on it, differed significantly from control animals in both accuracy and resistance to extinction (at least 50 days versus 10 in the controls). When the fields were used on untrained animals, occurrence of the applied rhythm increased in the animals' EEG.

Dr. Adey is an accomplished scientist, which leads one to believe the significance of this experiment goes beyond mere reinforcement of the animal's brain waves. Did the rhythms that he chose to apply have special significance with relation to information processing or conditioning? The 4.5 theta rhythm that he applied was the natural reoccuring frequency that he had measured in the hippocampus during a phase of avoidance learning. The hippocampus, as Adey wrote in an earlier paper, "...involves neural processes connected with consolidation of memory traces. It relates closely to the need for focusing attention, and the degree to which recapitulation of past experience is imposed." One might add, to ensure survival.

Does it follow that an EEG modulated carrier frequency can be used to enhance human avoidance learning? You bet, provided the same careful procedures are followed with humans as were with animals, the same result would accrue. Recall again the goals of Pandora - to discover whether a carefully constructed electromagnetic signal could direct the mind.

The obvious question becomes, how many and with how much accuracy can behavioral states or "frames of mind" be intentionally imposed, that is, apart from the certain technological capability to promote disorganization and degradation of perception and performance through use of the fields.

In fact, many components of learning or conditioning including affect (i.e., "feeling" or emotional states) can be imposed through use of the fields from a distance. E.g., behavioral arousal, orienting reflex, subliminal stress (alarm reaction without realization of the contextual significance), so-called levels of consciousness, inhibition of cerebral functions, which would render one more susceptible to suggestion or influence, and so on. All components necessary to produce behavioral conditioning, including ways to provide contextual significance, can be applied from a distance (i.e., without direct brain contact, as was necessary in older behavior modification experiments.)


The end of Project Pandora may have signified the end of research into the cause of effects of the varying frequencies registered at the American embassy in Moscow - some known to be due to CIA and National Security Agency equipment, but interest in microwave and biological frequency weapons did not wane. Indeed, there are indications of applications. As we have seen, research that began in response to a security concern, transformed almost overnight into a search for weapons applications, while cloaked in disinformation about the Soviets. What types of weapons?

There Are Three Possibilities:

(1) that microwaves, perhaps modulated with low biological frequencies, are used from a distance to cause performance decrements and disorganization by interfering with neuro-electric function; or by causing central nervous system effects, subjective feelings of ill health, or health syndrome associated with periodic exposures at intensities below 10,000 microwatts/cm^2;

(2) that microwaves are used to create organ specific effects, e.g., tissues with less blood circulation, like the gall bladder, lens of the eye, etc., can compensate less to increased heating; heart disfunctions can be caused; lesions or necrosis of internal tissues can be induced without a subject necessarily feeling heat, and symptoms might manifest later, at certain frequencies, slight heating or "hot spots" can be created at the center of the head; there is an ongoing Navy contract to find parameters to disrupt human metabolic functions; or

(3) that they are used in an interdisciplinary approach to remote conditioning by creating information processing effects, as Dr. Adey's work shows, or to induce "feeling" or "emotional" elements of cognition, such as excitatory reactions, subliminal stress, behavioral arousal, enhanced suggestibility by inhibition of higher functions, or various other EEG or behavioral effects.

There are strong indications that microwaves have been used to cause the decrements. There is no question but that the U.S. military and the CIA know the behavioral or psycho-active significance of applied biological rhythms and other frequencies, as this was part of the thrust of their work during Pandora. Inducing emotion or feelings through use of electromagnetic fields, and then sychronizing the feelings with words (symbolic of ideas) would be an effective way to induce preferences or attitude change, because it would mirror natural thought processes. The question seems less whether conditioning through use of covert technology is possible, than whether there has been a policy choice to use it. If the results of their research are used as part of a system that can condition behavioral responses from a distance, it is a secret that they hold close like a baby.

Richard Helms wrote of such a system in the mid-1960s while he was CIA Plans Director. He spoke of "sophisticated approaches to the 'coding' of information for transmittal to population targets in the 'battle for the minds of men'..." and of "an approach integrating biological, social and physical-mathematical research in attempts... to control behavior." He found particularly notable, "use of modern information theory, automata theory, and feedback concepts... for a technology for controlling behavior... using information inputs as causative agents." Due to Project Pandora, it is now known that applied biological (and other) frequencies can also be used as direct "information inputs" (e.g., of feeling or emotion) and to reinforce brain rhythms associated with conditioning and information processing. One way to get such a signal into a human may be through use of a high frequency carrier frequency. Results of research into information processing, unconscious processes, decision making, memory processes and evoked brain potentials would likely be expolited or integrated in an interdisciplinary system.

Covert technological influence is not so foreign to the American way of life as one may think. It was reported in a 1984 U.S. House of Representatives hearing that high frequency audio transmissions are applied, for instance, in some department stores to prevent theft (one East Coast department store chain was reported to have saved $600,000 over a nine-month period), and in some grocery stores with the result that employee induced cash shortages significantly decreased and employees are better mannered. In other words, as Helms wrote of, verbal messages are delivered at frequencies above human hearing. Technology for commercial applications is relatively sophisticated (one studio uses a "layered" approach and 31 channels in preparing tapes; some employ a "dual coding" approach, integrating scientific knowledge of information processing modes of the two brain hemispheres, and others use techniques where a consumer is spoken to as a three year old child.)

If industry uses indetectable audio transmissions to meet security concerns, it seems that the military and CIA would exploit the same technology and would have developed much more sophisticated technology for applications. The public's conception of "subliminals" is naive compared to capabilities.

It seems reasonable to conclude that to the extent that such an approach exists to manipulate behavior, "defensive" applications would consist of applying it wherever a potential threat exists or to counter a threat. For instance, Central America is an area where those in officialdom keenly feel the "threat of Soviet domination." If there is technology available that could conceivably influence Central Americans toward the Soviets, then the U.S. would use the same kind of technology to "even the score."

The same is true within the U.S.; if covert technological influence might be had against Americans, the same feared technology would be applied to counter the threat. Special security risks might include peace groups, whom are felt to be threatened by Soviet influence (a big security concern in Western Europe and in the U.S.), progressives, or any group or individual felt to pose a challenge to U.S. goals subsumed under the rubric of "national security interest."

Given the nature and dubious goals of lumbering military inertia, and circuitous CIA "mirror logic", leads one to the conclusion that "defending" against possible or actual attempts to manipulate behavior means moving to the offensive, and perhps, having the "edge" with applications. Possible or actual threats, according to tenets of military and intelligence craft, means "the other side" has the technology if the United States does. Also, it would be too difficult to monitor behavior altering transmissions and to defend against them. Short of exposing such technology there would be no way to defend except by having one's own "system" (of behavioral patterns consisting of a set of signals signifying "yes" and "no," or "good" feeling and "bad" feeling that can be linked to ideas).

Recall that apart from Project Pandora, the CIA spent decades during MKULTRA and related projects, devising operational techniques to surreptitiously influence and affect behavior. Workable invisible weapons are too useful for arms control talks, and don't readily lend themselves to proofs of use or "verification" processes. Additionally, the importance of finding ways to circumvent dissent may have been one of the most significant lessons of Vietnam.

Over the counter audio aside, the military has studied and considered for usefulness in a warfare and psychological warfare context a wide range of biologicals or pharmacological substances. In the memo referred to above, Helms wrote that the U.S. is five years ahead of the Soviets in pharmacological agents producing behavioral effects. Some of these substances would increase susceptibility to influence if incorporated in the multidisciplinary approach he wrote of. For difficult subscribers, perhaps in foreign parts, there are substances that have psychological or psychobiological effects ranging from subtle through devastating, and that cause increased susceptibility to conditioning. Some of these substances are similar to ones which are recognized by neurotoxicologists or behavioral toxicologists as occupational hazards; some are variations of substances used experimentally in laboratories to produce selective damage in certain neuronal tracts.

Many substances needn't be injected or orally ingested, as they may be inhaled or applied with "skin transferral agents," i.e. chemicals like the popular industrial solvent, dimethylsulphoxide (DMSO), which can, in fact, enhance the applied substance's effect. For instance, some compounds cause damage that produces increased sensitivity to stimulus, distraction (or flooding of thought associations), and enhance susceptibility to influence. I.e., a state where automatic parallel information processing, which usually takes place outside of awareness, and interferes with conscious or more intentional limited channel processing. While causing acute mental symptoms wouldn't be the goal in groups, producing mild distraction, an ego weakened blurring between the sense of "I" and "you", would enhance some kinds of conditioning and promote suggestibility; then, perhaps transmitted "thought associations," "the voice of God", "lucky advice" or whatever, can more easily get through and have an effect.

A side effect of lowered resistance to sub-threshold stimulus might be that some would become aware of illicit influence (even under normal circumstances there is a wide variation in sensitivity among individuals to sub-threshold stimulus; normal individuals whom psychology terms "reducers" are much more sensitive in this way; actually, most schizophrenics are extreme reducers, and therefore, much more aware of stimulus that others aren't cognizant of). Convenient to the agencies involved in covert influence, is that among primary syptoms of schizophrenia or mental illness are ideas that one is being influenced by "transmissions" (e.g. radio frequencies), "voices" or even telepathy; unless complaints about covert psychological weapons are well organized, they would tend to be discounted as indicative of mental imbalance.

There are many ways to create temporary or permanent staes that increase receptivity to suggestion and/or conditioning. It is interesting to note that scientific studies have correlated exposure to electromagnetic fields alone with mental hospital admissions and worsening of symptoms of mental patients, even as an etiological factor in the onset of mental illness. (A marker disease for exposure to microwaves is damage behind the lens of the eye; a disproportionate number of persons so damaged also suffer from mental disease or neurological impairment.)

The CIA is also interested in neuropeptides; these have profound effects when administered within a conditioning paradigm.

Specific Targets

Weapons against whom? Safe to say, in order to enlist the aid of scientists, the military and CIA would act true to form, that is, to motivate and overcome reluctance due to dictates of conscience, they would evoke a serious security risk, like the Soviets, during initial phases of development. In fact, on the "unclassified" face of it, a number of reports have openly suggested use of "microwaves" against "terrorists".

Los Alamos National Laboratory, now under supervision of University of California, prepared a report for Federal Emergency Management Agency (FEMA) setting forth that use of microwave radiation on terrorists could kill them, stun them or at least modify their behavior by changing their "perceptions." At this point the cloak is donned, and the report continues: "There are reports of Eurasian communist countries performing research with combined fields of signals from several different microwave frequencies to produce at least perceptual distortions in humans."

Cable News Network recently aired a report on electromagnetic weapons and showed an official document that was a contingency plan to use electromagnetic weapons against terrorists. It wasn't made clear who the terrorists were or what the contingency was. Prior to the news show, however, reports had surfaced, the source a DOD medical engineer, that in the content of conditioning, microwaves and other modalities had regularly been used against Palestinians.

It makes sense that the Palestinians would be targeted as a group for experimental purposes and to meet strategic goals. For instance, to exacerbate discord between political factions, a "bad feeling" (biologically uncomfortable or threatening) would simply be associated through use of sound with the idea of the "other" faction. It is an easy psychological trick to induce negative attribution (where a "bad feeling" is caused to be misattributed to something in our environment): feeling, followed close in time with information input will color a thought, and become a conditioned emotional response (CER) if repeated. An excitatory autonomic reation requires a cognitive appraisal or "labelling" of the inducing cause. Both the autonomic reaction and the labelling can be transmitted from a distance using electromagnetic fields, like radio frequencies or microwaves and "sound."

Specific frequencies at low intensities can predictably influence sensory processes. Feeling: pleasantness - unpleasantness, strain - relaxation, and excitement - quiescence, can be created with the fields. Negative feelings and avoidance are strong biological phenomena and relate to survival. Feelings are the true basis of much "decision-making" and often occur as sub-threshold impressions. Anger and other negative feelings are easy to cause to be displaced, and most people believe in the "truthfulness" of their feelings. Ideas including names can be synchronized with the the feelings that the fields can induce.

Greenham Common

Rather than belabor the obvious, for when DOD develops a weapon it can be said with certainty that it will be tested and, if possible, where it would be useful to meet their goals; another example will put motives and, at least, one type of application in more realistic perspective.

Women peace activists have kept an ongoing vigil at the periphery of the U.S. Air Force base at Greenham in England since 1981. They are protesting build-up of nuclear weapons. The U.S. Cruise missiles, which are nuclear warheads small enough to be mounted on the back of a truck called a launcher vehicle, arrived at the base in March, 1984. Since then the women in the encampment and members of the Cuisewatch network have insured that when the launcher vehicle and its convoy are taken out into the British countryside, the "dispersal exercises" aren't as secret as the military intended them to be. The women of the network, non-violent activists, have been subjected to intense harassment in an effort to be rid of their presence.

In the Fall of 1984, things changed dramatically; many, if not most of the women began suffering illness; and, simultaneously, the massive police and military presence at the base virtually disappeared, and new and different antenna were installed at the base. In a report prepared by Rosalie Bertell, commissioner for International Commission of Health Professionals for Human Rights, a non-governmental organization based in Geneva, Switzerland, the unusual patterns of illness ranged from "severe headaches, drowsiness, menstrual bleeding at abnormal times or post-menopausal, to bouts of temporary paralysis, faulty speech coordination and in one case apparent circulatory failure requiring hospitalization."

Other symptoms documented by peace activist Kim Bealy, who coordinates investigations into reports of illness at specific places around the base, included; vertigo, retinal bleeding, burnt face (even at night), nausea, sleep disturbances and palpitations. Psychological symptoms included lack of concentration, disorientation, loss of memory, irritability and a sense of panic in non-panic situations. The symptoms have virtually all been associated in medical literature with exposure to microwaves and most listed can be induced through low intensity or non-thermal exposures.

Measurements were taken around the base by members of Electronics for Peace and by others. Strong signals, up to one hundred times the normal background level were detected on a number of occasions. In fact, signals ten times stronger than those felt to be emanating from normal base transmitting systems were found.

The strongest signals generally appeared in the areas where the women said that they suffered ill effects. For instance, they were found to cover the women's encampment near the "green gate" (gates to the base are designated by color), but stopped abruptly at the edge of the road leading to the gate. The strength of the signals were also found to reflect the activity of the women: e.g., they increased rapidly when the women started a demonstration. Visitors to the encampment, both men and women, reported experiencing the same types of symptoms and the same pattern of variation as the Greenham women. It may be revealing that British personnel who guard the perimeter of the base work very short shifts (two hours at a time) and only for two weeks.

What else has been used against the women of Greenham Commons? If high frequency verbal transmissions are used in U.S. department stores and have a significant effect in meeting their security goals, it seems likely that the military would also exploit the same technology. What would such a message tell the women? "There is something wrong with this place, 'I' want to get out of here, 'I' don't like it here..." Perhaps auditory transmissions would be simultaneous with the transmissions that were making them feel unwell.

In a review prepared by National Bureau of Standards, Law Enforcement Standards Laboratory, for Nuclear Defense Agency, Intelligence and Security Directorate, use of low intensity microwaves was considered for application as a "psychological deterrent." The report stated, "...microwave radiation has frequently been cited as being responsible for non-thermal effects in integrated central nervous system activity. The behavioral consequences most frequently reported have been disability, listlessness and increased irritability." The report fails to mention just as frequently cited low intensity microwave health effects as chromosome damage; congenital birth defects; autonomic nervous system disregulation, including disruption of bio-cycles; impaired immune function; brain damage and other neurological abnormalities, including leaks in the blood brain barrier and depletion of some neurotransmitters; among a host of other health impairments not to be taken lightly.

A reckless form of biological and psychological control has been perpetuated whether the source of the symptoms of the Greenham Commons is radar surveillance aimed at the women, or if there is conscious application of the microwaves as a "deterrent" or a means to drive the women away. Calculated efforts were also directed at preventing or eroding community support. In the summer of 1985, women planning to visit the camp had to be notified that long term health effects might ensue for women who were pregnant or intended to be. As activist Kim Bealy put it, "It would now appear that we are protecting the missiles by killing people slowly."

Health complaints similar to those of the women at Greenham Common are being made by women peace activists at Seneca, New York, and from activists at other locations. The symptoms at Greenham seem to occur on an occasional basis now, perhaps due to the Intermediate Range Nuclear Forces (INF) treaty, which applies to the missiles housed there, or due to somewhat increased public or congressional awareness.

It is not necessary that the transmission take place from equipment in the vicinity of a target (although the Greenham women seemed to be suffering from transmissions made from within the base.) Propagation of microwaves has been very well studied and is very sophisticated, e.g., a two inch beam can be sent from a satellite, point to point, to a receiving dish on earth; and, it was reported in 1978, that the CIA had a program called Operation Pique, which included bouncing radio signals or microwaves off of the ionosphere to affect the mental functions of people in selected areas, including Eastern European nuclear installations.

In the U.S. the military has intentionally obfuscated discussion of environmental health effects. With their ally "industry" they have won, at least for the time being, the right to perpetuate their interests, to the detriment of the public's best interests. Scientists who have spoken up on the environmental impact of military microwave or electromagnetic systems have been treated as security risks, and have had their funds cut, so great is the military's concern in protecting their communications systems by ensuring themselves unlimited use of radio frequencies or microwaves.

The upshot is that in the U.S. at this time, there is no legally enforceable microwave standard. There never has been an enforceable standard for the public or the workplace. Microwaves at intensities within the suggested "guideline" have finally been shown, even by U.S. research, to cause health damage.

Worse, some industrial exposures are extraordinarily high. For instance, plastic sealers, a low income group comprised mainly of women within childbearing years, use equipment that exposes them to over 10,000 microwatts of microwaves or radio frequencies throughout an eight hour day, and in some case, to hundreds of milliwatts. As energy absorbed from their equipment flows to ground, so much heat has been felt in the ankles of some workers that they have learned to do their tasks with their feet elevated on plastic. They are not provided metal shielding as workers are in more health conscious countries.

While most of the public are only exposed to very low levels of microwaves and radio frequencies, a considerable number (between one and two percent) live or work near emitters, such as radio and television transmitters, military and airport radar, and industrial tools utilizing these frequencies. Therefore, it is likely that they are exposed to levels that have been proven to be unhealthful or downright dangerous.

References for Remote Mind Control Technology

McAuliffe, Kathleen, The Mind Fields, OMNI magazine, Omni Publications, February, 1985

ISN News, Reproductive Hazards From Video Display Terminals, Planetary Association for Clear Energy, 1985.

Adey, W. Ross, Neurophysiologic Effects of Radiofrequency and Microwave Radiation, Bulletin of the New York Academy of Medicine, V.55, #11, December, 1979; The Influences of Impressed Electrical Fields at EEG Frequencies on Brain and Behavior, in Behavior and Brain Electrical Activity, Burch, N. and Altshuler, H.I., eds., Plenum Press, 1975; Effects of Modulated Very High Frequency Fields on Specific Brain Rhythms in Cats, Brain Research, V.58., 1973; Spectral Analysis of Low Frequency Components in the Electrical Activity of the Hippocampus During Learning, Electroencephalography and Clinical Neurophysiology, V.23, 1967.

Koslov, Sam, Bridging the Gap, in Nonlinear Electrodynamics in Biological Systems, Adey, W.R. and Lawrence, A.F., eds., Plenum Press, 1983.

Steneck, Nicholas, The Microwave Debate, MIT Press, 1984.

Brodeur, Paul, The Zapping of America, W.W. Norton and Co, 1977.

Marha, Karel, Microwave Radiation Standards in Eastern Europe, IEEE Transactions on Microwave Theory and Techniques, V.MTT-19, #2, February, 1971.

Zarat, Milton, Human Injury Relatable to Nonionizing Radiation, IREE-ERDA Symposium - "The Biological Effects of Electromagnetic Radiation," 1978.

Annals of New York Academy of Sciences, V. 247, February, 1975.

Frey, Allan, Behavioral Biophysics, Psychological Bulletin, V.65, #5, 1965; Human Auditory System Response in Modulated Electromagnetic Energy, Journal of Applied Physiology, V.17, #4, 1962; Neural Function and Behavior: Defining to Relationship, Annals of the New York Academy of Sciences, V.247, February, 1975; Exposure to RF Electromagnetic Energy Decreases Aggressive Behavior, Biolectromagnetics, V.12, 1986.

MacGregor, R.J., A Brief Survey of Literature Relating to Influence of Low Intensity Microwaves on Nervous Function, Rand Report, R-4397, 1970; A Direct Mechanism for the Influence of Microwave Radiation on Neuroelectric Potentials, Rand Corporation, P-4398, 1970.

Becker, Robert O., The Body Electric, William Morrow and Company, Inc. 1985.

Bowart, Walter, Operation Mind Control, Dell Publishing, 1978.

Subliminal Communication Technology, House of Representatives, Committee on Science and Technology, Subcommittee on Transportation, Aviation and Materials, 1984.

Rosenfeld, Sam and Anne, The Roots of Individuality: Brain Waves and Perception, Mental Health Studies and Reports Branch, National Institute of Mental Health, October, 1975.

Harvey, J., Ickes, W., Kidd, R., New Directions in Attribution Research, V.2, John Wiley and Sons, 1978.

Regna, Joseph, Microwaves Versus Hope, Science for the People, V.19., #5, September/October 1987.

Bealy, Kim, Electromagnetic Pollution: A Little Known Health Hazard, A New Means of Control?, Preliminary Report, Greenham Comman Women's Peace Camp, Inlands House, Southbourne, Emsworth, Hants, P0108JH.

Kramer, J. and Maguire, P., Psychological Deterrents in Nuclear Theft, National Bureau of Standards for Intelligence and Security Directorate, Defense Nuclear Agency, NBSIR 76-1007, March, 1976.

Lapinsky, G. and Goodman, C., Psychological Deterrents to Nuclear Theft: An Updated Literature Review and Bibliography, Center for Consumer Technology, National Bureau of Standards for Surety and Operations Directorate, Defense Nuclear Agency, NBSIR 80-2038, June, 1980.

World Health Organization, Environmental Health Criteria 16, Radiofrequency and Microwaves, Geneva, Switzerland, 1981.

Saturday, September 12, 2015

The Israel You Rarely Hear About in the Media Part 2

Inside Israel's Race Wars:

Incited in Israel, Inflicted on Gaza:

Ethiopian Jews Face Racism in Israel:

Zionist Minimize Israel Racism:

Fighting for Marriage Equality in Israel:

Friday, September 11, 2015

Franklin Cover-up: Intelligence Agencies, Drugs, Child Prostitution and Mind Control

Please watch the videos below.  If you have never heard of the Franklin Cover-up and its connections to the intelligence agencies and people in high places, this will be a wake up call for you. Do you think anything has really changed?

Unaired Documentary Based of John DeCamp's book:

Interview with John DeCamp:

Another Interview John DeCamp:

Another Interview of John DeCamp:

EU – Commission Ethical Aspects of ICT Implants in the Human Body

The following text is an extract from the European Group on Ethics and New Technologies with the Swedish Professor Goran Hermerén as chairman, adopted and delivered to the EU-Commission 16th of  March 2005.


Brain-computer interface (BCI) or direct brain control: the technologies involved above are communication technologies: they take information from the brain and externalize it. There are internalizing technologies whose purpose is to take information from the outside and provide individual access to it.

Biosensors or MEMS (Micro Electro-Mechanical System) devices are sensors implanted inside the human body for accurate monitoring of inaccessible parts of the body. The biosensors form a network and collectively monitor the health condition of their host.

The information to be transmitted is crucial medical information that is required by law to be secure. Consequently, information technology is a critical component of these biological implants that, with the energy, memory and computational capabilities, present challenging research issues.

Computer scientists have predicted that within the next twenty years neural interfaces will be designed that will not only increase the dynamic range of sensors, but will also enhance memory and enable cyber think – invisible communication with others. Artificial Vision: according to recent research undertaken to develop an artificial retina, it will be possible, one day, to see light in the infrared.

Human Dignity

Dignity is used both to convey the need for absolutely respecting an individual’s autonomy and rights and to support the claim to controlling individuals and their behaviour for the sake of values that someone plans to impose on other individuals.

- Non-instrumentalisation: The ethical requirement of not using individuals merely as a means but always as an end of their own.

- Privacy: The ethical principle of not invading a person’s right to privacy.

- Informed Consent: The ethical principle that patients are not exposed to treatment or research without their free will and informed consent.

- The Precautionary Principle: This principle entails the moral duty of continuous risk assessment with regard to the not fully foreseeable impact of new technologies as in the case of ICT implants in the human body. This assessment concerns particularly the analysis of present and future situations in which the use of ICT implants in the human body may be considered as a potential risk, or even as a potential threat to human dignity or to other ethical principles. It should be stressed that there are no reliable scientific investigations concerning the long-term health aspect of ICT implants in the human body.

Autonomy and Limits on ICT Implants

As regards external controls and influence, autonomy of the individual becomes especially important in connection with the right to rule out that a person’s conduct may be determined and/or influenced by the entities managing electronic links – if the latter give rise to permanent connections with external entities.


Contemporary society is confronted with changes that have to do with the anthropological essence of individuals. There is a stepwise shift in progress – after being observed, via video surveillance and biometrics, individuals are being modified, via various electronic devices, under skin chips and smart tags, to such an extent that they are increasingly turned into networked individuals. Thus we might be continuously connected and could be configured differently so that from time to time we would transmit and receive signals allowing movements, habits and contacts to be traced and defined. This would be bound to modify the meaning and contents of an individuals’ autonomy and to affect their dignity…This unrelenting erosion of personal prerogatives – going as far as transforming the body – co-exists not only with the growing attention paid to dignity, but also with the already mentioned fact that the person is at the centre of the constitutional order.

Value Conflicts

There could be a conflict between the personal freedom to use one’s economic resources to get an implant that will enhance one’s physical and mental capabilities and what  society at large considers desirable or ethically acceptable.  Another value conflict concerns the potential conflicts between limiting the freedom of people dangerous to others by surveillance and promoting the safety of others. Freedom of researchers may conflict with the obligation to safeguard the health of research subjects. Concern for economic competiveness and other economic values may come in conflict with respect for human dignity. The unrestricted freedom of some may endanger the health and safety for others…

As in other areas, the freedom to use ICT implants in ones own body, i.e. the principle of freedom itself might collide with potential negative social effects. In these cases ethical counselling as well as social and political debate might be necessary…Legislation is necessary in order to avoid a situation in which society is becoming more and more dependent on such intrusive technology in order to provide social security while at the same time the technical perfection of such implants is helpful for all kinds of medical purposes as well as for legitimate social applications. Consequently, the EGE stresses the need for a continuing, inclusive debate on which kinds of enhancement should be allowed – under what conditions and in which situations.

It is clear from the preceding sections that there are important knowledge gaps that are relevant both to future research programmes and to the primary ethical concerns. These include:

Human Dignity, Integrity and Autonomy

- How far can such implants be a threat to human autonomy particularly when they are implanted in our brains?

- How far can such implants have irreversible impacts in the human body and/or in the human psyche and how can reversibility be preserved?

- How will they influence human memory?

- Does a human being cease to be such a ’being’ in cases where some parts of his or her body – particularly the brain – are substituted and/or supplemented by ICT implants? Particularly as ICT implants can contribute to creating ’networked persons’ that are always connected and could be configured differently so that from time to time they can transmit and receive signals allowing movements, habits and contacts to be traced and defined. This is bound to affect their dignity.

Privacy and Surveillance

- How far can ICT implants become a threat to privacy?

- How far can ICT implants give an individual, or a group, specific capabilities that could become a threat to society?

- What are the potential invasions of privacy through ICT implants as sources and/or receivers of information in a network environment?

- How far should we be subject to the control of such devices or by other people using these devices?

Enhancement and Human Self Awareness

- Does the creation of an improved ’race’ on the basis of ICT enhancements mean necessarily a new form of racism? The potential industrial use of ICT implants raises the question of the limits of such implants for the creation of more efficient bodies and brains for economic purposes. The question of the use of ITC implants as a cultural leap in human evolution, similar to the invention of machines or to the invention of devices complementing and enhancing such devices as human memory (though writing, printing, digital technology) or other human capabilities.

- How far should the use of such implants to enhance human capabilities be allowed?

- How far can such implants be considered as a part of what can be called ’body design’ including the personal free design of one’s (enhanced) bodily and psychic capabilities?

Social Aspects

- How far do we transform our social and cultural environment through ICT implants.

- To what extent does this technology allow manipulation by and for advertising?

- To what extent might this technology be misused by the military?

- ICT Implants for which Special Caution is Necessary

- ICT implants that cannot be removed easily.

- ICT implants that influence, determine or change psychic functions.

- ICT implants that due to their network capability could be misused in several ways for all kinds of social surveillance and manipulation, such as for instance in the case of children or disabled persons.

- ICT implants influencing the nervous system and particularly the brain and thus human identity as a species as well as individual subjectivity and autonomy

- Military applications

- Intrusive’ technology by-passes normal sensory experience

- Implants that will influence biologically and/or culturally future generations.

To improve the protection of privacy (data protection), respecting people’s right to maintain boundaries and also to preserve privacy, autonomy and confidentiality; and  to empower individuals against the introduction of systems likely to reduce their freedom and autonomy (video surveillance, behaviour control and personal profiling based on internet transactions) are likely to increase people’s dependency on selection and decision mechanisms which are not transparent or understandable.

Human beings are neither purely natural nor purely cultural beings. Indeed our very nature depends on the possibility of transforming ourselves. Information technologies have been considered under this anthropomorphic bias as extensions of man. However, the transformation of the human body has consequences also on the cultural human environment.

Under these premises, human beings are seen as parts of a complex system of natural and artificial messages that function on a digital basis…In this sense the human body can be seen as data. This view has large cultural effects particularly as it precludes higher level phenomena such as human psyche and human language or conceives them mainly under the perspective of its digitalization, giving rise to reductionism that oversimplifies the complex relations between the human body, language and imagination…Extrapolating into the future, this logic might even lead to the transformation of the human race.

How far should we let ICT devices get ’under our skins’? When do ICT implants threaten the dignity of the human body, its identity and its basic capabilities? When might such devices be used for instance for surveillance and in which cases would this be legitimate? Where are the threats related to the hopes of enhanced capability based on ICT implants?

The question of ITC implants in the human body is thus located between two extremes. On the one hand, the protection of the natural human body, that is to say, the medical use of ICT implants for health care, and, on the other hand, the elimination of the human body as we know it today and its substitution by an artificial one – with all possibilities in between. Human dignity concerns the human self as an embodied self. Thus the question of autonomy and respect of the self cannot be separated from the question of bodily care and the possible changes due to ICT implants.


Against this background, the European Group on Ethics of Science and New Technologies submits the following Opinion:

The downright reduction of our body to a device does not only enhance the trend – already pointed out – towards turning it increasingly into a tool to allow continuous surveillance of individuals.  Indeed, individuals are dispossessed of their own bodies and thereby of their own autonomy. The body ends up being under others’ control. What can a person expect after being dispossessed of his or her own body?


The respect for the human dignity must be the fundamental basis of discussions of where the limits should be drawn for different uses of ICT implants. However, even in these cases, the use of such implants should not result in any discrimination or abuse contrary to human rights. To the extent that an individual via an ICT implant has become part of a part of an ICT network, the operation of this whole network – not just the ICT implant – needs to be considered. It is particularly important that the power over this network is transparent. This is based on the principle of respect for persons, as well as the principle of avoiding harm.

Freedom of Research

Although the necessity for research can sometimes be questioned, new knowledge is essential for the development of individuals and societies. However, the freedom of research has to be restricted by respect for other important values and ethical principles, for example respect for persons and the obligation to avoid physical, mental and economic harm as a result of participation in research.

The EGE stresses that the following possibilities should be banned:

- ICT implants used as a basis for cyber-racism

- ICT implants used for changing the identity, memory, self perception and perception of others

- ICT implants used to enhance capabilities in order to dominate others

ICT Implants for Surveillance Purposes

ICT implants for surveillance in particular threaten human dignity. They could be used by state authorities, individuals and groups to increase their power over others.

Public Debate and Information

A broad social and political debate is needed as to what kind of applications should be accepted and legally approved, particularly concerning  surveillance and enhancement. A precautionary approach is recommended by the EGE. The Member States and their national ethics councils have a responsibility to create conditions for education and constructive, well-informed debates in this area.
The European Group on Ethics in Science and New Technologies

The Chairperson: Göran Herméren
The Members:

Nicos C. Alivizatos, Inez de Beuaufort, Rafael Capurro, Yvon Englert, Catherine Labrusse-Riou, Anne M cLaren, Linda Nielsen, Pere Puigdomenech-Rosell,  Stefano Rodota, Günter Virt and Peter Whittaker

Wednesday, September 9, 2015

No-Touch Torture: The Enumerated Torture Methods for Interrogation and Behavior Modification

Torture is a horrific topic and most minds will turn away from it because it can’t be comprehended that humans can be motivated, or computer programs can be run to do this to other sentient beings. Just when we believed we were becoming more civilized as a culture, the technology for torture has advanced more than a hundred fold in recent decades. See here for Full Spectrum Dominance and Technological Torture. Also see here for more about using East German Stasi techniques along with the technological torture. They have created a virtual hell for anyone who opposes them.  This is being completely covered up in the media.

This summary will get into ‘the minds of the dishonorable monsters’ of the psychology of torture. Those like Dick Cheney who helped authorize it under certain administrations and regimes of the U.S. government which have been proven to be criminal under U.S. law, treaties, and the International Criminal Court. There are many people involved in the conspiracy and cover-up including General Hayden.

The full report discloses the spectrum of techniques of interrogation and torture used by the U.S. and its allies. The United States government will officially deny the claims of this “no-touch torture report” but in time it will stand firm. The technologies used are still classified as state secrets and will not be discussed in this summary.

This report will not use skewed, misleading language such as “enhanced interrogation” to describe the torture techniques.

Why torture? The CIA claims it works. The assumption is that it works to gain actionable intelligence. Torture is often used for revenge, punishment, interrogation, and behavior modification.  In other terms torture is used to remove the continuity of thought to confuse the target to reveal information, erase brain patterns such as values and beliefs, or to break down the human spirit to make them submit and obey their handlers.

The downside of torture is that the countries that do it lose “moral soft power” in world politics. Without due process, over 25% of those reported in the Senate Torture Report were declared innocent. Blowback is always a repercussion of torture. Torture often takes a long time to affect the target from months to years.  Torture has shown to be unreliable except for getting false confessions and bad information, but the U.S. and its allies are improving on their tactics and techniques.

The purpose of this report is to draw the parallels between physical torture techniques and no-touch torture methods used in secret by governments who possess the technologies that still go on today. This is a brief summary of offensive psychological and information warfare methods using traditional methods and modern cybernetic techniques while exploring hyper-game theory to walk the target to the desired path: leak intelligence, commit assassinations, or change beliefs.

No-touch torture uses the same interrogation tactics as physical interrogations but with some new twists. Techniques such as “Jeff and Mutt” a.k.a. “Good Cop Bad Cop” are used. The bad cop tortures the target and the good cop tries to gain their trust. In mind control, trust games are commonly employed to manipulate the beliefs of the target.  Creating hatred of groups through false correlations and deception is a common CIA method of trickery.

In the CIA programs, the target is put through these phases as written in the documentation, “Disorient and confuse the target. Use them for our purposes, and then dispose of them in any way possible.” We can only surmise by our sample set of a thousand people what “dispose” means: prison, suicide, or perhaps a mental hospital.  Coercing and torturing people to suicide is very common. Both tactics in physical or no-touch torture involve plausible deniability.

The no-touch interrogations are better than physical rendition techniques for exposing support networks. Traditional NSA tracking of email and phones calls are useful but if the targets are taken into a secret prison they can’t contact their networks. In no-touch torture, the target will contact everyone who might help them. Then those relationships can be destroyed to isolate the target. All these techniques rely on the target having a fear of death and pain.

Deception is very important during interrogation. In physical interrogations, the targets are often drugged. This creates the confusion necessary to pull off certain trickery. In terrorist interrogations, for example, the CIA uses fake newspapers to make the target believe whatever event they were suspected of plotting had already happened, obviously looking for a confession.  Sometimes the government in charge of the torture is looking for a political gain through a false confession. None-the-less false flag operations are commonly used in both forms of torture and interrogation.  The trick is to make the target believe another foreign country is doing it to them. In no-touch torture, the trick is to make them believe someone related to them is behind their suffering.

Numerated Torture Methods for
Interrogation and Behavior Modification

(A comparison between physical and no-touch torture tactics)

1.  Induction of Depressive/Manic states
The idea is to shake up the emotional states of the target because different information can be accessed at each state.  Making the target feel despair and helplessness is the objective. This cycle of hope building and then breaking is done in many ways.  The techniques between the physical methods and the no-touch technological methods are similar. Speech is very important during this process of emotional manipulation. Such examples are, “We have imprisoned you without due processes or hope of it. You are indefinitely detained.” Hope building examples include, “Sorry. We have mistaken you for someone else. You will be compensated for false imprisonment and torture.”   The main difference between the cybernetic technology and physical is that emotional state clusters can be entrained into the target mind which speeds up the process. The communication is done differently but perceived as human speech. In the no-touch torture methods, it is helpful if the target is labeled with mental illness that is being created for discrediting purposes so as not to draw human rights groups’ attention.

2.  Memory Erasure - False Memories - Thoughts That You Believe Are Your Own
The military and CIA have been researching memory erasing drugs for half a century.  The focus of this summary report is on interrogation. Memory erasure is an important technique during interrogation. It is used in combination with sleep deprivation.  There are many drugs that have been developed for physical memory erasure. One such interrogation method requires acquiring information from the target while on these drugs and recording the subject. After a sleeping cycle, the interrogator claims that the target has confessed. Of course, the target remembers nothing of their conversation. The interrogator will play samples of the subject’s conversation back to them making the subject believe that the interrogator knows more than they do.  Similar techniques are used in the wireless, no-touch torture and interrogation programs. The cybernetic methods of memory erasure have additional purposes.  The memory erasure can be used on the cybernetic target to make the target believe people have broken in and moved their belongings. While physical black bag jobs do occur, it is a way to make the target more paranoid. One of the most used techniques is inducing thoughts or emotions in the head of the target that are not their own. (For an example, see this TedTalk and some of the links listed there. See here for an article about how scientists successfully implant a chip that controls the brain allowing thoughts, memory, and behavior to be transferred from one brain to another. See here for more about DARPA brain projects and the Human Brain Initiative. See here for a lecture from the Royal Society about controlling brains from the outside, be sure to watch the video at the bottom with Jose Delgado controlling a bull.)

3. Electricity and Shocks
Pain and fear of death are common tactics during interrogation. Shocking by electricity is a traditional method of torture and exposed in the CIA’s secret prisons.  Shocking the testicles and nipples are the most common due to their sensitivity. Interestingly, the thousand of interviews of no-touch torture involves pain, “stings” and “shocks” to various parts of their bodies over long durations.

4. Fear and Terror
There are many techniques to induce extreme fear in the target.  In physical renditions dogs, power drills, guns, insects, mutilation, blow torches, waterboarding, suffocation, mock burials, and mock executions are just a few the United States government have used.  Remember that many targets of torture die from the physical effects. It is torture to death. Let us compare the no-touch torture methods used to inflict the same terror and mental anguish.  In several of these techniques, the target needs to hear their handler’s voice.  The thoughts in one's head can also be made to sound identical and indistinguishable from the targeted individuals own thoughts. This report does not describe the technologies used to broadcast voices or thoughts to the target at a distance. While the subject can be broadcast mental images to their mind, the more invasive controls of the brain manipulation technologies can be used to entrain the brain’s autonomic nervous system such as not breathing causing the target to not be able to sleep from fear of suffocation equivalent to waterboarding. The neural linguistic programming can add fears such as heart attack, stroke, and cancer threats. Even motor cortex mapping can cause twitches in any part of the body. One example could be a swift neck twitch or movement with a voice transmission, “We are trying to break your neck.” Directed energy effects such as Active Denial System can make the target feel that they are burning without the target dying from burns. The targeted individual's body could also be stimulated with diverse resonance frequencies to create mental and physical sickness, pain, abnormalities, and problems.  Maximum pain and torture weapons have been evolving. Every drug effect can be artificially induced into the target mind.

5. Imprisonment and Isolation
Isolation is commonly used as punishment in prisons. Many whistleblowers like Bradley Manning suffer this condition. In soft interrogation, it is used to get the target to talk to their interrogator since humans have the need for companionship. In no-touch torture, the target is driven from their friends and family using different techniques in order to isolate them so that the electronic mind control has more effect on their psyche.  Like in Guantanamo, the target becomes isolated losing their job and medical care. Part of the method involves slander in their community. They end up on the most part in poverty and paranoid about doctors and other people from false correlations that are purposefully induced into their lives. Isolation is also a form of sensory deprivation which will be discussed later. Days and weeks lose their meaning.

6.  Sexually Disturbing Tailored Pornography
The Summary of the Senate Torture Report disclosed the disgusting revelations that in the secret torture prisons the targets were forced to perform homosexual acts on each other against their will and religion in order not to be beaten or killed. This is a common breakdown tactic of belief systems and the human will. In no-touch torture, the techniques are more psychologically specialized for each target. Most common examples include homosexual targets that are forced with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are forced to view child pornography in their minds. And vice versa is true, that heterosexual targets are forced to view homosexual sexual acts like in the secret U.S. torture prisons. Another method would be similar to the psychic driving method used by Donald Ewen Cameron on his test subjects at McGill's Allan Memorial Institute, Targets would be constantly bombarded with thoughts and voices similar to what was described under Number 4. This sort of strategy, coupled with isolation and sleep deprivation would have the effect of influencing and modifying the behavior of the target.

7. Mutilation
Also mentioned in the declassified report on torture was mutilation of the human. Cutting the naked target’s penis and scrotum, pulling nails or teeth is common.  In no-touch torture, mutilation is done by trickery.  Let us look at a couple examples. There have been several targets who believed that the microwave hearing effect and other voice induction methods were done by microchips implanted in their teeth or ears. They had all their teeth pulled because they believed it was a technology called bone conductance. Others have poked out their ear drums in the belief they had micro implants in their ears. There are many more examples of trickery used to make the targets mutilate themselves.
Constant twitching and pain could also lead the target to such high levels of frustration that they begin to mutilate themselves. For instance, a simple twitching of the eye every day, all day, non-stop. Or one could replicate something similar to the Chinese water torture dripping on the target forehead.

8. Personal and Spiritual Defamation
In physical torture, the CIA and other groups use propaganda and defamation of character for those they oppose. For detainees, they try to disenfranchise the target from their religion. They will defecate on their Bible or Koran for example. They might say, “Why is your God not saving you?”  In no touch torture and behavior modification, they might try to make an atheist believe in God. It is just a mechanism to alter belief systems for control and experimentation. Perhaps the target may wish to confess their secrets to a “voice of god weapon”. Information warfare covers the gamut of electronic communication as well. The government training exercise uses language like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”, “use deception”, “ruin business relationships”, and “post negative information on appropriate forums” - in a malicious effort to target bloggers, activists, journalists, social event organizers and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.

9. Psychological Intimidation
This is a topic for a target at the beginning of the trials and programs. Physical break-ins are common even if the target has an alarm system. The NSA and the CIA have used stalking of foreign officials in the past for economic gain. The FBI does black bag jobs to invade a home without a warrant. The point is to let the target know they are being watched and to increase their paranoia. The NSA easily hacks all computer systems and causes harm to the victim’s intellectual property and their relationships from that endpoint. In the no touch torture, false correlations between pain and a neighbor coming home can be induced.

10. Rape
Rape is a common practice in torture. It causes much psychological trauma. In the United States, methods of rape in their military and CIA secret prisons is often relabeled. It is commonly done by prods but “rectal rehydration” is the more common misnomer. Often they call it forced feeding through the rectum but it is meant to induce psychological scarring and trauma. Several have died from the technique due to rectal bleeding.  In no-touch torture, the psychological trauma of simulated rape takes on different forms. Using techniques that are often called EEG-heterodyning, the targets will receive molestation effects of their genitals. In men, this can be the anus and genitals. Similarly, women can be wirelessly raped by the analogous function of perception. Also, let's not forget, the effects of mental rape is quite similar to that of physical rape and should be treated with the same level of seriousness. Mental and physical rape are both capable of destroying the long-term psychological and spiritual health of any human being.

11. Dietary Manipulation, Forced Weakness, and Sickness
The idea behind dietary manipulation is to weaken the target. This is easily done in a physical setting but in no-touch, the hunger trigger needs to be suppressed. Sometimes a false correlation between eating food and sickness is induced to make the target believe they are being poisoned. However, poisoning is common in physical renditions too.

12.  Repetition
The verbal breakdown is most important during interrogations and torture. Obviously speaking the language of the target is necessary. This is why there are interrogators in all languages. Repetition is an important neural linguistic programming interrogation tactic to influence the target mind.  During the breakdown process, threats to kill and to torture the target’s family or friends are common. Repetitious questioning and break down phrases are automated in both the physical and no-touch versions of torture. An interesting technology that is used for no-touch torture is called chatter-bots. Chatter-bots, an artificial intelligence program, automate much of the repetition so that the interrogators don’t drive themselves crazy during the neural linguistic torture and programming phases. Let us not forget the Chinese Water Torture, a single drop of water on the forehead of the detainee for months. Repetition is a form of torture.

13. Sensitization of Pain Impulses
While the reverse can be obtained, optimizing perceived pain and misery is the objective in torture. Each trauma adds to the overall misery throughout life.  Optimization of pain has been studied by the military and intelligence agencies.  In the past, the CIA has used drugs such as LSD to enhance fear and terror in the subject.  Other methods such as hypnosis can increase perceived pain and the power of suggestion such as telling the subject his pinky finger is going to be cut off before it is done. In no-touch torture, the same psychological manipulations are exerted. Subliminal and overt suggested are often told to the subject before the directed energy or EEG heterodyning pain inductions in order to maximize their effectiveness.

14. Sensory Overload and Deprivation
Again, this technique of overloading or depriving the human of sensory stimulus is ubiquitous in torture around the world not just in U.S. secret prisons. Torture subjects in the United States have reported the use of repetitive bad music and noise campaigns. An unusual torture technique used in the U.S. secret prisons was of a use of a plastic suit filled with ice while they beat the target.  Ultra bright lights for days on end in the prison and hot/cold temperature changes in the environment are frequent. In no-touch torture, the target’s brain is forced to release dopamine which causes pupil dilatation. This acts as a sensory overload. For example, the nonlethal microwave weapons research done by a professor in the University of Nevada has shown this capability. Body metabolism can be altered with these weapons causing cold and hot flashes.  Targets of no-touch torture often hear endless tinnitus.

15. Sexual Humiliation and Lack of Privacy
Often used in common prisons is a lack of privacy. It is both necessary for security and a form of sexual humiliation. Also in prison, many people are raped. No-touch torture offers the same sexual humiliation and lack of privacy by using through wall satellites, radar, cameras, and EEG visual cloning to let the target know they are being watched. Degrading comments are often used on the no-touch torture subjects while they are naked or in the bathroom.

16. Maximum Sensory Pain Techniques
Basic torture involves brutalization, i.e. physical strikes, kicks in the groin, pepper spray or tear gas, etc. Anything that involves maximum pain is the objective. Amazingly, these same basic tortures can be done wirelessly and remotely. All forms of sickness have been reported without any real illness behind the suffering.

17.  Sleep Deprivation
This is the number one torture method along with the popularity in the press of waterboarding.  This is done in every country that uses torture. The United States is number one in torture since they are currently the world’s only superpower.  A repetitive sleep deprivation cycle is generally done 180 hrs/7.5 days at a time in the physical renditions, or in no-touch torture five days awake and two days of sleep.  Sleep deprivation accomplishes the objective of memory loss during interrogation and induces hallucinations which help with the interrogation process. In behavior modification and programming, it is necessary too.

We will finish off this summary of U.S. and its allies’ torture, interrogation, and behavior modification experimentation with ideas of why they are done to the general public and falsely accused detainees.  Anyone can be put into these programs. Justice and rule of law do not exist at the highest levels of government. Treaties are worthless because the #1 agreement in the rules of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead by example.

Finally, the topic of human experimentation for improving weapons, torture, interrogation, and social disruption methods will be breached. Most of the techniques mentioned above work most effectively if the target has no SERE training (Survival, Evasion, Resistance, and Escape) or psychological understanding of the methods to influence the human mind. Unfortunately, every sample point in the world’s society needs to be studied to improve the weapons systems. This is why many random people are put into the torture and mind control experiments. There are some devious uses of a secret army of remotely controlled assassins in every country in the world. The samples must include different education, language, culture, and economic factors.  Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it. No-touch torture is much more complex than physical torture. Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary to test on innocent targets.

However, the psychological and perceived physical pain is only half the story with no-touch torture. It also involves a set of scripts, mind games if you will, to walk the target to murder and/or suicide. This is called “Hyper Game Theory”.  It is used in war games to determine how to control your enemies and targets.  Game Theory can be used on governments, individuals, or for determining propaganda to alter cultures. The experiments on the public provide a means to test the efficacy of these scripts and determine under what circumstances to use them.

One last comment on why “We must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex” as President Eisenhower warned. During these torture programs run by the United States and its allies, accurate “truth” data points need to be used to judge the efficiency of the interrogation methods. This is why there is a dispute between the CIA and Senate Intelligence Committee reports about the usefulness of torture. Subterfuge by the CIA hacking into the senate oversight committee’s computers is a big deal; a rogue agency has been formed. Data fusion centers, Homeland Security Data Fusion Centers, NSA, and FBI collect data on Americans. This data, in turn, is used during torture and interrogation of Americans in no-touch torture.