Friday, September 11, 2015

EU – Commission Ethical Aspects of ICT Implants in the Human Body


The following text is an extract from the European Group on Ethics and New Technologies with the Swedish Professor Goran Hermerén as chairman, adopted and delivered to the EU-Commission 16th of  March 2005.

Introduction


Brain-computer interface (BCI) or direct brain control: the technologies involved above are communication technologies: they take information from the brain and externalize it. There are internalizing technologies whose purpose is to take information from the outside and provide individual access to it.

Biosensors or MEMS (Micro Electro-Mechanical System) devices are sensors implanted inside the human body for accurate monitoring of inaccessible parts of the body. The biosensors form a network and collectively monitor the health condition of their host.

The information to be transmitted is crucial medical information that is required by law to be secure. Consequently, information technology is a critical component of these biological implants that, with the energy, memory and computational capabilities, present challenging research issues.

Computer scientists have predicted that within the next twenty years neural interfaces will be designed that will not only increase the dynamic range of sensors, but will also enhance memory and enable cyber think – invisible communication with others. Artificial Vision: according to recent research undertaken to develop an artificial retina, it will be possible, one day, to see light in the infrared.


Human Dignity


Dignity is used both to convey the need for absolutely respecting an individual’s autonomy and rights and to support the claim to controlling individuals and their behaviour for the sake of values that someone plans to impose on other individuals.

- Non-instrumentalisation: The ethical requirement of not using individuals merely as a means but always as an end of their own.

- Privacy: The ethical principle of not invading a person’s right to privacy.

- Informed Consent: The ethical principle that patients are not exposed to treatment or research without their free will and informed consent.

- The Precautionary Principle: This principle entails the moral duty of continuous risk assessment with regard to the not fully foreseeable impact of new technologies as in the case of ICT implants in the human body. This assessment concerns particularly the analysis of present and future situations in which the use of ICT implants in the human body may be considered as a potential risk, or even as a potential threat to human dignity or to other ethical principles. It should be stressed that there are no reliable scientific investigations concerning the long-term health aspect of ICT implants in the human body.


Autonomy and Limits on ICT Implants


As regards external controls and influence, autonomy of the individual becomes especially important in connection with the right to rule out that a person’s conduct may be determined and/or influenced by the entities managing electronic links – if the latter give rise to permanent connections with external entities.


ETHICAL BACKGROUND


Contemporary society is confronted with changes that have to do with the anthropological essence of individuals. There is a stepwise shift in progress – after being observed, via video surveillance and biometrics, individuals are being modified, via various electronic devices, under skin chips and smart tags, to such an extent that they are increasingly turned into networked individuals. Thus we might be continuously connected and could be configured differently so that from time to time we would transmit and receive signals allowing movements, habits and contacts to be traced and defined. This would be bound to modify the meaning and contents of an individuals’ autonomy and to affect their dignity…This unrelenting erosion of personal prerogatives – going as far as transforming the body – co-exists not only with the growing attention paid to dignity, but also with the already mentioned fact that the person is at the centre of the constitutional order.


Value Conflicts


There could be a conflict between the personal freedom to use one’s economic resources to get an implant that will enhance one’s physical and mental capabilities and what  society at large considers desirable or ethically acceptable.  Another value conflict concerns the potential conflicts between limiting the freedom of people dangerous to others by surveillance and promoting the safety of others. Freedom of researchers may conflict with the obligation to safeguard the health of research subjects. Concern for economic competiveness and other economic values may come in conflict with respect for human dignity. The unrestricted freedom of some may endanger the health and safety for others…

As in other areas, the freedom to use ICT implants in ones own body, i.e. the principle of freedom itself might collide with potential negative social effects. In these cases ethical counselling as well as social and political debate might be necessary…Legislation is necessary in order to avoid a situation in which society is becoming more and more dependent on such intrusive technology in order to provide social security while at the same time the technical perfection of such implants is helpful for all kinds of medical purposes as well as for legitimate social applications. Consequently, the EGE stresses the need for a continuing, inclusive debate on which kinds of enhancement should be allowed – under what conditions and in which situations.

It is clear from the preceding sections that there are important knowledge gaps that are relevant both to future research programmes and to the primary ethical concerns. These include:



Human Dignity, Integrity and Autonomy


- How far can such implants be a threat to human autonomy particularly when they are implanted in our brains?

- How far can such implants have irreversible impacts in the human body and/or in the human psyche and how can reversibility be preserved?

- How will they influence human memory?

- Does a human being cease to be such a ’being’ in cases where some parts of his or her body – particularly the brain – are substituted and/or supplemented by ICT implants? Particularly as ICT implants can contribute to creating ’networked persons’ that are always connected and could be configured differently so that from time to time they can transmit and receive signals allowing movements, habits and contacts to be traced and defined. This is bound to affect their dignity.


Privacy and Surveillance


- How far can ICT implants become a threat to privacy?

- How far can ICT implants give an individual, or a group, specific capabilities that could become a threat to society?

- What are the potential invasions of privacy through ICT implants as sources and/or receivers of information in a network environment?

- How far should we be subject to the control of such devices or by other people using these devices?


Enhancement and Human Self Awareness


- Does the creation of an improved ’race’ on the basis of ICT enhancements mean necessarily a new form of racism? The potential industrial use of ICT implants raises the question of the limits of such implants for the creation of more efficient bodies and brains for economic purposes. The question of the use of ITC implants as a cultural leap in human evolution, similar to the invention of machines or to the invention of devices complementing and enhancing such devices as human memory (though writing, printing, digital technology) or other human capabilities.

- How far should the use of such implants to enhance human capabilities be allowed?

- How far can such implants be considered as a part of what can be called ’body design’ including the personal free design of one’s (enhanced) bodily and psychic capabilities?


Social Aspects


- How far do we transform our social and cultural environment through ICT implants.

- To what extent does this technology allow manipulation by and for advertising?

- To what extent might this technology be misused by the military?

- ICT Implants for which Special Caution is Necessary

- ICT implants that cannot be removed easily.

- ICT implants that influence, determine or change psychic functions.

- ICT implants that due to their network capability could be misused in several ways for all kinds of social surveillance and manipulation, such as for instance in the case of children or disabled persons.

- ICT implants influencing the nervous system and particularly the brain and thus human identity as a species as well as individual subjectivity and autonomy

- Military applications

- Intrusive’ technology by-passes normal sensory experience

- Implants that will influence biologically and/or culturally future generations.


To improve the protection of privacy (data protection), respecting people’s right to maintain boundaries and also to preserve privacy, autonomy and confidentiality; and  to empower individuals against the introduction of systems likely to reduce their freedom and autonomy (video surveillance, behaviour control and personal profiling based on internet transactions) are likely to increase people’s dependency on selection and decision mechanisms which are not transparent or understandable.

Human beings are neither purely natural nor purely cultural beings. Indeed our very nature depends on the possibility of transforming ourselves. Information technologies have been considered under this anthropomorphic bias as extensions of man. However, the transformation of the human body has consequences also on the cultural human environment.

Under these premises, human beings are seen as parts of a complex system of natural and artificial messages that function on a digital basis…In this sense the human body can be seen as data. This view has large cultural effects particularly as it precludes higher level phenomena such as human psyche and human language or conceives them mainly under the perspective of its digitalization, giving rise to reductionism that oversimplifies the complex relations between the human body, language and imagination…Extrapolating into the future, this logic might even lead to the transformation of the human race.

How far should we let ICT devices get ’under our skins’? When do ICT implants threaten the dignity of the human body, its identity and its basic capabilities? When might such devices be used for instance for surveillance and in which cases would this be legitimate? Where are the threats related to the hopes of enhanced capability based on ICT implants?

The question of ITC implants in the human body is thus located between two extremes. On the one hand, the protection of the natural human body, that is to say, the medical use of ICT implants for health care, and, on the other hand, the elimination of the human body as we know it today and its substitution by an artificial one – with all possibilities in between. Human dignity concerns the human self as an embodied self. Thus the question of autonomy and respect of the self cannot be separated from the question of bodily care and the possible changes due to ICT implants.


EGE OPINION:


Against this background, the European Group on Ethics of Science and New Technologies submits the following Opinion:

The downright reduction of our body to a device does not only enhance the trend – already pointed out – towards turning it increasingly into a tool to allow continuous surveillance of individuals.  Indeed, individuals are dispossessed of their own bodies and thereby of their own autonomy. The body ends up being under others’ control. What can a person expect after being dispossessed of his or her own body?


ICT IMPLANTS AND HUMAN DIGNITY


The respect for the human dignity must be the fundamental basis of discussions of where the limits should be drawn for different uses of ICT implants. However, even in these cases, the use of such implants should not result in any discrimination or abuse contrary to human rights. To the extent that an individual via an ICT implant has become part of a part of an ICT network, the operation of this whole network – not just the ICT implant – needs to be considered. It is particularly important that the power over this network is transparent. This is based on the principle of respect for persons, as well as the principle of avoiding harm.


Freedom of Research


Although the necessity for research can sometimes be questioned, new knowledge is essential for the development of individuals and societies. However, the freedom of research has to be restricted by respect for other important values and ethical principles, for example respect for persons and the obligation to avoid physical, mental and economic harm as a result of participation in research.


The EGE stresses that the following possibilities should be banned:


- ICT implants used as a basis for cyber-racism

- ICT implants used for changing the identity, memory, self perception and perception of others

- ICT implants used to enhance capabilities in order to dominate others



ICT Implants for Surveillance Purposes


ICT implants for surveillance in particular threaten human dignity. They could be used by state authorities, individuals and groups to increase their power over others.


Public Debate and Information


A broad social and political debate is needed as to what kind of applications should be accepted and legally approved, particularly concerning  surveillance and enhancement. A precautionary approach is recommended by the EGE. The Member States and their national ethics councils have a responsibility to create conditions for education and constructive, well-informed debates in this area.
The European Group on Ethics in Science and New Technologies

The Chairperson: Göran Herméren
The Members:

Nicos C. Alivizatos, Inez de Beuaufort, Rafael Capurro, Yvon Englert, Catherine Labrusse-Riou, Anne M cLaren, Linda Nielsen, Pere Puigdomenech-Rosell,  Stefano Rodota, Günter Virt and Peter Whittaker

Wednesday, September 9, 2015

No-Touch Torture: The Enumerated Torture Methods for Interrogation and Behavior Modification


Torture is a horrific topic and most minds will turn away from it because it can’t be comprehended that humans can be motivated, or computer programs can be run to do this to other sentient beings. Just when we believed we were becoming more civilized as a culture, the technology for torture has advanced more than a hundred fold in recent decades. See here for Full Spectrum Dominance and Technological Torture. Also see here for more about using East German Stasi techniques along with the technological torture. They have created a virtual hell for anyone who opposes them.  This is being completely covered up in the media.

This summary will get into ‘the minds of the dishonorable monsters’ of the psychology of torture. Those like Dick Cheney who helped authorize it under certain administrations and regimes of the U.S. government which have been proven to be criminal under U.S. law, treaties, and the International Criminal Court. There are many people involved in the conspiracy and cover-up including General Hayden.

The full report discloses the spectrum of techniques of interrogation and torture used by the U.S. and its allies. The United States government will officially deny the claims of this “no-touch torture report” but in time it will stand firm. The technologies used are still classified as state secrets and will not be discussed in this summary.

This report will not use skewed, misleading language such as “enhanced interrogation” to describe the torture techniques.

Why torture? The CIA claims it works. The assumption is that it works to gain actionable intelligence. Torture is often used for revenge, punishment, interrogation, and behavior modification.  In other terms torture is used to remove the continuity of thought to confuse the target to reveal information, erase brain patterns such as values and beliefs, or to break down the human spirit to make them submit and obey their handlers.

The downside of torture is that the countries that do it lose “moral soft power” in world politics. Without due process, over 25% of those reported in the Senate Torture Report were declared innocent. Blowback is always a repercussion of torture. Torture often takes a long time to affect the target from months to years.  Torture has shown to be unreliable except for getting false confessions and bad information, but the U.S. and its allies are improving on their tactics and techniques.

The purpose of this report is to draw the parallels between physical torture techniques and no-touch torture methods used in secret by governments who possess the technologies that still go on today. This is a brief summary of offensive psychological and information warfare methods using traditional methods and modern cybernetic techniques while exploring hyper-game theory to walk the target to the desired path: leak intelligence, commit assassinations, or change beliefs.

No-touch torture uses the same interrogation tactics as physical interrogations but with some new twists. Techniques such as “Jeff and Mutt” a.k.a. “Good Cop Bad Cop” are used. The bad cop tortures the target and the good cop tries to gain their trust. In mind control, trust games are commonly employed to manipulate the beliefs of the target.  Creating hatred of groups through false correlations and deception is a common CIA method of trickery.

In the CIA programs, the target is put through these phases as written in the documentation, “Disorient and confuse the target. Use them for our purposes, and then dispose of them in any way possible.” We can only surmise by our sample set of a thousand people what “dispose” means: prison, suicide, or perhaps a mental hospital.  Coercing and torturing people to suicide is very common. Both tactics in physical or no-touch torture involve plausible deniability.

The no-touch interrogations are better than physical rendition techniques for exposing support networks. Traditional NSA tracking of email and phones calls are useful but if the targets are taken into a secret prison they can’t contact their networks. In no-touch torture, the target will contact everyone who might help them. Then those relationships can be destroyed to isolate the target. All these techniques rely on the target having a fear of death and pain.

Deception is very important during interrogation. In physical interrogations, the targets are often drugged. This creates the confusion necessary to pull off certain trickery. In terrorist interrogations, for example, the CIA uses fake newspapers to make the target believe whatever event they were suspected of plotting had already happened, obviously looking for a confession.  Sometimes the government in charge of the torture is looking for a political gain through a false confession. None-the-less false flag operations are commonly used in both forms of torture and interrogation.  The trick is to make the target believe another foreign country is doing it to them. In no-touch torture, the trick is to make them believe someone related to them is behind their suffering.


Numerated Torture Methods for
Interrogation and Behavior Modification

(A comparison between physical and no-touch torture tactics)

1.  Induction of Depressive/Manic states
The idea is to shake up the emotional states of the target because different information can be accessed at each state.  Making the target feel despair and helplessness is the objective. This cycle of hope building and then breaking is done in many ways.  The techniques between the physical methods and the no-touch technological methods are similar. Speech is very important during this process of emotional manipulation. Such examples are, “We have imprisoned you without due processes or hope of it. You are indefinitely detained.” Hope building examples include, “Sorry. We have mistaken you for someone else. You will be compensated for false imprisonment and torture.”   The main difference between the cybernetic technology and physical is that emotional state clusters can be entrained into the target mind which speeds up the process. The communication is done differently but perceived as human speech. In the no-touch torture methods, it is helpful if the target is labeled with mental illness that is being created for discrediting purposes so as not to draw human rights groups’ attention.

2.  Memory Erasure - False Memories - Thoughts That You Believe Are Your Own
The military and CIA have been researching memory erasing drugs for half a century.  The focus of this summary report is on interrogation. Memory erasure is an important technique during interrogation. It is used in combination with sleep deprivation.  There are many drugs that have been developed for physical memory erasure. One such interrogation method requires acquiring information from the target while on these drugs and recording the subject. After a sleeping cycle, the interrogator claims that the target has confessed. Of course, the target remembers nothing of their conversation. The interrogator will play samples of the subject’s conversation back to them making the subject believe that the interrogator knows more than they do.  Similar techniques are used in the wireless, no-touch torture and interrogation programs. The cybernetic methods of memory erasure have additional purposes.  The memory erasure can be used on the cybernetic target to make the target believe people have broken in and moved their belongings. While physical black bag jobs do occur, it is a way to make the target more paranoid. One of the most used techniques is inducing thoughts or emotions in the head of the target that are not their own. (For an example, see this TedTalk and some of the links listed there. See here for an article about how scientists successfully implant a chip that controls the brain allowing thoughts, memory, and behavior to be transferred from one brain to another. See here for more about DARPA brain projects and the Human Brain Initiative. See here for a lecture from the Royal Society about controlling brains from the outside, be sure to watch the video at the bottom with Jose Delgado controlling a bull.)

3. Electricity and Shocks
Pain and fear of death are common tactics during interrogation. Shocking by electricity is a traditional method of torture and exposed in the CIA’s secret prisons.  Shocking the testicles and nipples are the most common due to their sensitivity. Interestingly, the thousand of interviews of no-touch torture involves pain, “stings” and “shocks” to various parts of their bodies over long durations.

4. Fear and Terror
There are many techniques to induce extreme fear in the target.  In physical renditions dogs, power drills, guns, insects, mutilation, blow torches, waterboarding, suffocation, mock burials, and mock executions are just a few the United States government have used.  Remember that many targets of torture die from the physical effects. It is torture to death. Let us compare the no-touch torture methods used to inflict the same terror and mental anguish.  In several of these techniques, the target needs to hear their handler’s voice.  The thoughts in one's head can also be made to sound identical and indistinguishable from the targeted individuals own thoughts. This report does not describe the technologies used to broadcast voices or thoughts to the target at a distance. While the subject can be broadcast mental images to their mind, the more invasive controls of the brain manipulation technologies can be used to entrain the brain’s autonomic nervous system such as not breathing causing the target to not be able to sleep from fear of suffocation equivalent to waterboarding. The neural linguistic programming can add fears such as heart attack, stroke, and cancer threats. Even motor cortex mapping can cause twitches in any part of the body. One example could be a swift neck twitch or movement with a voice transmission, “We are trying to break your neck.” Directed energy effects such as Active Denial System can make the target feel that they are burning without the target dying from burns. The targeted individual's body could also be stimulated with diverse resonance frequencies to create mental and physical sickness, pain, abnormalities, and problems.  Maximum pain and torture weapons have been evolving. Every drug effect can be artificially induced into the target mind.

5. Imprisonment and Isolation
Isolation is commonly used as punishment in prisons. Many whistleblowers like Bradley Manning suffer this condition. In soft interrogation, it is used to get the target to talk to their interrogator since humans have the need for companionship. In no-touch torture, the target is driven from their friends and family using different techniques in order to isolate them so that the electronic mind control has more effect on their psyche.  Like in Guantanamo, the target becomes isolated losing their job and medical care. Part of the method involves slander in their community. They end up on the most part in poverty and paranoid about doctors and other people from false correlations that are purposefully induced into their lives. Isolation is also a form of sensory deprivation which will be discussed later. Days and weeks lose their meaning.

6.  Sexually Disturbing Tailored Pornography
The Summary of the Senate Torture Report disclosed the disgusting revelations that in the secret torture prisons the targets were forced to perform homosexual acts on each other against their will and religion in order not to be beaten or killed. This is a common breakdown tactic of belief systems and the human will. In no-touch torture, the techniques are more psychologically specialized for each target. Most common examples include homosexual targets that are forced with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are forced to view child pornography in their minds. And vice versa is true, that heterosexual targets are forced to view homosexual sexual acts like in the secret U.S. torture prisons. Another method would be similar to the psychic driving method used by Donald Ewen Cameron on his test subjects at McGill's Allan Memorial Institute, Targets would be constantly bombarded with thoughts and voices similar to what was described under Number 4. This sort of strategy, coupled with isolation and sleep deprivation would have the effect of influencing and modifying the behavior of the target.

7. Mutilation
Also mentioned in the declassified report on torture was mutilation of the human. Cutting the naked target’s penis and scrotum, pulling nails or teeth is common.  In no-touch torture, mutilation is done by trickery.  Let us look at a couple examples. There have been several targets who believed that the microwave hearing effect and other voice induction methods were done by microchips implanted in their teeth or ears. They had all their teeth pulled because they believed it was a technology called bone conductance. Others have poked out their ear drums in the belief they had micro implants in their ears. There are many more examples of trickery used to make the targets mutilate themselves.
Constant twitching and pain could also lead the target to such high levels of frustration that they begin to mutilate themselves. For instance, a simple twitching of the eye every day, all day, non-stop. Or one could replicate something similar to the Chinese water torture dripping on the target forehead.

8. Personal and Spiritual Defamation
In physical torture, the CIA and other groups use propaganda and defamation of character for those they oppose. For detainees, they try to disenfranchise the target from their religion. They will defecate on their Bible or Koran for example. They might say, “Why is your God not saving you?”  In no touch torture and behavior modification, they might try to make an atheist believe in God. It is just a mechanism to alter belief systems for control and experimentation. Perhaps the target may wish to confess their secrets to a “voice of god weapon”. Information warfare covers the gamut of electronic communication as well. The government training exercise uses language like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”, “use deception”, “ruin business relationships”, and “post negative information on appropriate forums” - in a malicious effort to target bloggers, activists, journalists, social event organizers and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.

9. Psychological Intimidation
This is a topic for a target at the beginning of the trials and programs. Physical break-ins are common even if the target has an alarm system. The NSA and the CIA have used stalking of foreign officials in the past for economic gain. The FBI does black bag jobs to invade a home without a warrant. The point is to let the target know they are being watched and to increase their paranoia. The NSA easily hacks all computer systems and causes harm to the victim’s intellectual property and their relationships from that endpoint. In the no touch torture, false correlations between pain and a neighbor coming home can be induced.

10. Rape
Rape is a common practice in torture. It causes much psychological trauma. In the United States, methods of rape in their military and CIA secret prisons is often relabeled. It is commonly done by prods but “rectal rehydration” is the more common misnomer. Often they call it forced feeding through the rectum but it is meant to induce psychological scarring and trauma. Several have died from the technique due to rectal bleeding.  In no-touch torture, the psychological trauma of simulated rape takes on different forms. Using techniques that are often called EEG-heterodyning, the targets will receive molestation effects of their genitals. In men, this can be the anus and genitals. Similarly, women can be wirelessly raped by the analogous function of perception. Also, let's not forget, the effects of mental rape is quite similar to that of physical rape and should be treated with the same level of seriousness. Mental and physical rape are both capable of destroying the long-term psychological and spiritual health of any human being.

11. Dietary Manipulation, Forced Weakness, and Sickness
The idea behind dietary manipulation is to weaken the target. This is easily done in a physical setting but in no-touch, the hunger trigger needs to be suppressed. Sometimes a false correlation between eating food and sickness is induced to make the target believe they are being poisoned. However, poisoning is common in physical renditions too.

12.  Repetition
The verbal breakdown is most important during interrogations and torture. Obviously speaking the language of the target is necessary. This is why there are interrogators in all languages. Repetition is an important neural linguistic programming interrogation tactic to influence the target mind.  During the breakdown process, threats to kill and to torture the target’s family or friends are common. Repetitious questioning and break down phrases are automated in both the physical and no-touch versions of torture. An interesting technology that is used for no-touch torture is called chatter-bots. Chatter-bots, an artificial intelligence program, automate much of the repetition so that the interrogators don’t drive themselves crazy during the neural linguistic torture and programming phases. Let us not forget the Chinese Water Torture, a single drop of water on the forehead of the detainee for months. Repetition is a form of torture.

13. Sensitization of Pain Impulses
While the reverse can be obtained, optimizing perceived pain and misery is the objective in torture. Each trauma adds to the overall misery throughout life.  Optimization of pain has been studied by the military and intelligence agencies.  In the past, the CIA has used drugs such as LSD to enhance fear and terror in the subject.  Other methods such as hypnosis can increase perceived pain and the power of suggestion such as telling the subject his pinky finger is going to be cut off before it is done. In no-touch torture, the same psychological manipulations are exerted. Subliminal and overt suggested are often told to the subject before the directed energy or EEG heterodyning pain inductions in order to maximize their effectiveness.

14. Sensory Overload and Deprivation
Again, this technique of overloading or depriving the human of sensory stimulus is ubiquitous in torture around the world not just in U.S. secret prisons. Torture subjects in the United States have reported the use of repetitive bad music and noise campaigns. An unusual torture technique used in the U.S. secret prisons was of a use of a plastic suit filled with ice while they beat the target.  Ultra bright lights for days on end in the prison and hot/cold temperature changes in the environment are frequent. In no-touch torture, the target’s brain is forced to release dopamine which causes pupil dilatation. This acts as a sensory overload. For example, the nonlethal microwave weapons research done by a professor in the University of Nevada has shown this capability. Body metabolism can be altered with these weapons causing cold and hot flashes.  Targets of no-touch torture often hear endless tinnitus.

15. Sexual Humiliation and Lack of Privacy
Often used in common prisons is a lack of privacy. It is both necessary for security and a form of sexual humiliation. Also in prison, many people are raped. No-touch torture offers the same sexual humiliation and lack of privacy by using through wall satellites, radar, cameras, and EEG visual cloning to let the target know they are being watched. Degrading comments are often used on the no-touch torture subjects while they are naked or in the bathroom.

16. Maximum Sensory Pain Techniques
Basic torture involves brutalization, i.e. physical strikes, kicks in the groin, pepper spray or tear gas, etc. Anything that involves maximum pain is the objective. Amazingly, these same basic tortures can be done wirelessly and remotely. All forms of sickness have been reported without any real illness behind the suffering.

17.  Sleep Deprivation
This is the number one torture method along with the popularity in the press of waterboarding.  This is done in every country that uses torture. The United States is number one in torture since they are currently the world’s only superpower.  A repetitive sleep deprivation cycle is generally done 180 hrs/7.5 days at a time in the physical renditions, or in no-touch torture five days awake and two days of sleep.  Sleep deprivation accomplishes the objective of memory loss during interrogation and induces hallucinations which help with the interrogation process. In behavior modification and programming, it is necessary too.

We will finish off this summary of U.S. and its allies’ torture, interrogation, and behavior modification experimentation with ideas of why they are done to the general public and falsely accused detainees.  Anyone can be put into these programs. Justice and rule of law do not exist at the highest levels of government. Treaties are worthless because the #1 agreement in the rules of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead by example.

Finally, the topic of human experimentation for improving weapons, torture, interrogation, and social disruption methods will be breached. Most of the techniques mentioned above work most effectively if the target has no SERE training (Survival, Evasion, Resistance, and Escape) or psychological understanding of the methods to influence the human mind. Unfortunately, every sample point in the world’s society needs to be studied to improve the weapons systems. This is why many random people are put into the torture and mind control experiments. There are some devious uses of a secret army of remotely controlled assassins in every country in the world. The samples must include different education, language, culture, and economic factors.  Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it. No-touch torture is much more complex than physical torture. Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary to test on innocent targets.

However, the psychological and perceived physical pain is only half the story with no-touch torture. It also involves a set of scripts, mind games if you will, to walk the target to murder and/or suicide. This is called “Hyper Game Theory”.  It is used in war games to determine how to control your enemies and targets.  Game Theory can be used on governments, individuals, or for determining propaganda to alter cultures. The experiments on the public provide a means to test the efficacy of these scripts and determine under what circumstances to use them.

One last comment on why “We must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex” as President Eisenhower warned. During these torture programs run by the United States and its allies, accurate “truth” data points need to be used to judge the efficiency of the interrogation methods. This is why there is a dispute between the CIA and Senate Intelligence Committee reports about the usefulness of torture. Subterfuge by the CIA hacking into the senate oversight committee’s computers is a big deal; a rogue agency has been formed. Data fusion centers, Homeland Security Data Fusion Centers, NSA, and FBI collect data on Americans. This data, in turn, is used during torture and interrogation of Americans in no-touch torture.

Torture, Slander and Organized Stalking


                   Must See Video at the Bottom of This Page!

The video below shows an example of an organized stalking victim. This is standard procedure in how this is being done to discredit "targeted" individuals. Especially political dissidents who know too much. (See here under the heading "Character Assassination" for what the Stasi used to do to targets.) See here for more articles about intelligence tactics. 

Quote: "Constant harassment, planned destructiveness, character assassination, destroying relationships, all done in concert with the goal of breaking someone down are a standard part of this program. Reportedly, the usual rumors spread about a person are that they are a pedophile, prostitute, terrorist, racist, anti-government, mentally ill, drug addict, drug dealer, or a threat to "national security." They are often spread to neighbors, friends, family, employers, etc. A major effort is spent to separate a person from their friends and families. See here and here for more about this."

Quote: "Apparently these rumor campaigns aid in recruitment. Deception is the name of the game, so recruits are told untrue sinister stories of their victims to keep them motivated. According to CNN, the Stasi used the exact same tactics. They stated, "The agency was authorized to conduct secret smear campaigns against anyone it judged to be a threat..." The Russian KGB too, with its massive network of informants, would slander their internal targets. These rumors may be propagated by multiple people (informants) behind a target's back. Apparently, not letting a targeted person become aware of these rumors is essential to their effectiveness. Victor Santoro noted in his book, Gaslighting: How to Drive Your Enemies Crazy, that, "The essence of defaming your target with rumors is it that it not get back to him." Many targeted people have rumors being spread about them that they are pedophiles. The organizers realize that labeling someone a pedophile will be highly damaging and produce optimum leverage for gaining community support. It is probably one of the worst rumors you could launch against someone. The Stasi would destroy the character of their targets by labeling them as pedophiles as well."


But it goes much deeper than this.

It also involves classified technology that can make your life a living hell. It can turn your life into a virtual Guantanamo Bay. It is much more evil than most people could even think of. In fact, most people don't want to think about it. They want to continue to live in a dream world.

The people perpetrating these activities are utter liars. As evidence, important information about the 9/11 terror attacks that is being swept under the rug. See here and here for more information on 9/11. But, not only are they liars, some of them are genocidal monsters. They dropped white phosphorus on women and children in a place that is nothing more than an open-air prison. It is one of the most densely populated areas in the world, and they call these people "terrorists." 

What about the sanctions in Iraq? Does anyone realize the levels of pure insanity the Iraqi people have gone through for years and years? The problems in Iraq started way before the invasion of Iraq in 2003. Iraq used to be a first world country! By the way, white phosphorus was also used in Fallujah in Iraq.

Remember, when considering the sort of people you are dealing with, they are the same individuals that are covering up the truth about 9/11, launching illegal wars of aggression on nothing but lies --- and watching mounds of innocent people die; including their fellow countrymen and women. They don't care if their fellow citizens are maimed or die. See here and here for their true goals. See here for the origins of Homeland Security. See here for more about Homeland Security and the strong connections between Canada, the United States, and Israel. See here for the crazy beliefs of some of the people who the one-time head of Homeland Security associated himself with. It is also important to learn more about Homeland Security and the RCMP, and who they regard as terrorists

Essentially, they are willing to work with the worst elements of society to accomplish their goals. They are engaging in human, drug and weapons trafficking. THEY KEEP GUANTANAMO BAY open just because they enjoy torturing people. Honestly, it sounds crazy, but look on my blog! They don't need Guantanamo Bay open! Why is it open? Because they are insane. See my previous posts regarding torture here and here.


Sunday, August 9, 2015

Video Examples of Augmented Cognition

Below are three videos about Augmented Cognition. The last video is a TedTalk that provides more detail by using chess as an example. You will see at the beginning of the first video that they don't shy away from showing its Eugenics roots. The example below shows a group of people wearing headsets, but, realize that the same thing could be done with a group of people hooked up to a single targeted person and that targeted person could have nanotechnology inside their brain and they wouldn't even know it. The nanotechnology could also be connected to a supercomputer and artificial intelligence at the NSA and Google. For example, if hooked up to Google, over time the artificial intelligence would train off of your brain and offer you videos at YouTube on what you did during the day.  This is very similar to what happens at Amazon.com from your search habits. You could also influence that person's behavior using synthetic telepathy. THIS IS ALL POSSIBLE NOW! 











Mind Control and Augmented Cognition: Hooked Up to a Supercomputer with Artificial Intelligence at the NSA and CIA


VERY IMPORTANT!
The Main Article is Below All The Links. Before you read the main article
on an Exocortex, (or Augmented Cognition,) and being hooked up to a supercomputer, you might want to view the links about mind control technologies and electromagnetic weapons:

Introductory Note: Google, Facebook, Yahoo, Twitter, Apple, LinkedIn, Microsoft and Oracle are fronts for the NSA and the CIA. 

1. Transhumanism and Google Part 1
2. Transhumanism and Google Part 2
3. Transhumanism and Google Part 3
4. Transhumanism and Google Part 4
5.
Ray Kurzweil Admits Nanobots in the Brain and About Connecting the Brain Wirelessly
6. Dawn of Human 2.0? Nanobot Implants Connect Our Brains to the Internet 

7. Silicon Valley is state-sponsored technology for the Intelligence Industry 
8. 
Secret History of CIA/NSA Connections With Silicon Valley 

1. Mind Control and Electromagnetic Weapons Evidence

a.) Mind Control Technology, Mind Reading Technology and Electromagnetic Weapons
b.) Brain Chips and Resonance Based Weaponry
c.) Canada Psychiatrist Concerned About Remote Influencing Weaponry
d.)
 Synthetic Telepathy
e.) The Inevitable Problems of Technology
f.) Playing God Documentary
g.) Can Someone Influence Your Behavior So You Cannot Tell Right and Wrong?
h.) 
Dennis Kucinich Attempted Ban of Space Based Weapons
i.) 
DARPA Brain Implants - Human Guinea Pigs
j.) Electromagnetic and Informational Weapons: Remote Manipulation of the Human Brain
k.) Electromagnetic Weapons: Remote Control of the Human Nervous System
l.) Electronic Warfare




The Brain Network

Augmented Cognition:
The Exocortex





Your brain hooked up to supercomputer and artificial intelligence.

An exocortex is an artificial external information processing system that augments a brain’s biological high-level cognitive processes. The way this is done today is through what is called Augmented Cognition. For a video example see here, the example is with a person using a headset, but, the same thing could be done with nanotechnology or what is known as a brain computer interface.

An individual’s exocortex is composed of external memory modules, processors, IO devices and software systems that would interact with, and augment, a person’s biological brain. Typically this interaction is described as being conducted through a direct brain-computer interface, making these extensions functionally part of the individual’s mind.

Individuals with significant exocortices could be classified as cyborgs or transhumans.

While [the traditional concept of] a cyborg has included artificial mechanical limbs, embedded chips and devices, another interesting concept is the exocortex, which is a brain-computer interface. In theory, the exocortex would be a computer-like processing system that would co-exist with and enhance the power of the human brain. Neuromancer is a book that has talked about such a scenario.

“BMI” = Brain Machine Interface, brain-computer interconnection

“FET” = Future and Emerging Technologies

“S.T.” = Synthetic Telepathy

“A.I.” = Artificial Intelligence

FET and ICT research and development (of the new “computer – brain language”) allows computers to read and learn human thought patterns by using injectable brain – machine – interface.

The same brain-machine interface that has been used and tested for Parkinson’s disease, Alzheimer’s and depression can also be used for accessing the brain’s memory.

Professor Goran Hermerén OPINION OF THE EUROPEAN GROUP ON ETHICS IN SCIENCE AND NEW TECHNOLOGIES TO THE EUROPEAN COMMISSION (ETHICAL ASPECTS OF ICT IMPLANTS IN THE HUMAN BODY) March 2005


New software for the brain-machine interface in nano-electronics combined with new information technology” provides the researchers with the possibilities for reading and taking “software images” of the brain’s neuron network. It provides high-resolution copies of the brain's cognitive behavior and human perception.

High-speed computers and related research have evolved into a sophisticated computer mind reading on real people….these research methods are unknown to our society’s legal system. SYNTHETIC TELEPATHY is direct communication with nanoelectronics between a computer and the human brain but also can be done between individuals in collaboration with this classified computer technology. Synthetic telepathy is a communication system based on thought, not speech.

It can be used to control for example a prosthesis and cure diseases such as Parkinson’s disease but can also decode the patterns used to study cognitive behavior such as memory, learning, and emotion. With nanotechnology the digital information can be recorded using the new quantum-inspired computers.

Simulation of behavior can be identified and provide diagnostic data for identifying the precursors to diseases such as dementia, stroke and myocardial infarction.

This article is intended to demonstrate the insanity in theso-called “protection of human rights” and thus the entire justice system. Synthetic telepathy could, as practiced, lie behind an unknown number of violent crimes and suicides due to research deliberately kept hidden from regulators.

Doctors and psychiatrists diagnose people with “voices in his head” following their “manuals”. DSM-IV (Diagnostic and Statistical Manual of Mental Disorders) published by the American Psychiatric Association and the ICD-10 (International Statistical Classification of Disorders and Related Health Problems).

This is an old-fashioned black and white methodology to diagnose individuals when new information technologies have been adapted with nano-electronics and can be harnessed to simulate mental illness.



Ulf Gorman writes in the book that with nanotechnology, we open the doors to an unknown area where we do not know how to apply ethics. What should be and what should not be allowed when you implant a chip that can both read and influence the brain? He takes the example of studying learning and memory.

Micro Implants can provide unprecedented opportunities to understand how we learn and remember things, and hence why we forget and find it difficult to learn. And it can be understood as a form of abuse to look into our most private mental world.

Lund University writes about the development of nano-electrodes that can both listen and communicate with neuronal synapses and their cell membranes.

EU priority ICT and FET research are talking about a  whole new communication technology in Europe, “it will help us understand and exploit the ways in which social and biological systems, organization and evolution, will pave the way for the development of new opportunities for next-generation software and network technologies."

To understand how the human brain works not only leads to innovations in medicine but also provides new models for energy, fault-tolerant and adaptive computing technologies.

This pioneering work is also being carried out on new ideas such as artificial living cells, synthetic biology, chemical communication, collective intelligence and two-way interface between brain and machine.



Other sources, e.g The UCI (University of California Irvin. Department of Cognitive Science) describes the development of Synthetic Telepathy:

Cognitive scientists, neuroscientists, specialists in speech recognition, and brain imaging have harnessed their collective intelligence from their vast areas of research in order to use the brain-machine interface. This device allows everyone, from soldiers to the paralyzed to send messages directly from the brain to a computer.

Researcher Michael D’Zmura, President of the UCI describes that the system begins with “the little voice in your head." How can a medical diagnosis unequivocally describe people’s perception of voices in their head and that no alternative can exist except mental disease? What if technology could accomplish the exact same thing and very few people knew of this? This is why these researchers must be forced to go public and announce this new scientific communication technology.

A number of past crimes could be directly caused by "voice to skull" and synthetic telepathy and brain-computer interface technologies. This technology must immediately be taken into consideration as an alternative for triggering a number of previously committed violent crimes and suicides.

During the development of BMI, software and network technologies are also computerized and long distance imaging of people's cognitive behavior and perception are obtained. Material that is recorded in the computer from the brain runs real-time and works to create an artificial intelligence environment that is used along with big-data, (for initializing A.I. and computerized decision making.)

The image of the brain’s “machine-code” is the most comprehensive and advanced ever made. Cognitive behavior depicted and simulated, language and meaning of the words for the subjects are identified. Human perception and mapping how the brain handles information, the image of mathematics reached its perfection.



Around the clock the computerized study goes on using collective, artificial intelligence and self-learning systems. Victims testimonies convey to us that the studies will not be completed until the victim in one way or another has been broken down and / or otherwise inactivated.

Obviously, this is a disgusting and illegal way to meet the advanced development of tomorrow’s medicine.

The “studies” have resulted in enormous damage to many subjects.The number of unrecorded victims/subjects is probably very high. Families are fragmented, the children of these families are suffering tremendously.



Brain – copying with BMI and broadband access is definitely no longer a marginal research. Employers have over the years lost millions of dollars and cut-downs is to be expected due to excluded employees. Broken families, children who, years later can not study or work and are forced to seek psychiatric care.

Injuries and privacy intrusion of thousands of people is done through “non-consensual guinea pigs” that serve as multimedia machines i.e: nodes for the recording of all contacts they have, such as politicians, scientists, lawyers, friends, acquaintances, relatives, international business relations, etc..

Security codes, access codes, etc. with the new technology is no longer private. How can we know that people are not equipped with nanotechnology brain-machine interfaces that make them into walking multimedia applications as their lives are illegally recorded? That means everything they think, hear and say is recorded and broadcast to whoever those in control of the technology choose to display it to. Not only that, they can also influence the person's behavior.

A sinister JOY seems to embrace the researchers and perpetrators over this superior and powerful tool for mind control and copying brainwave patterns. The tool is, without a doubt, a weapon of offense and stealth.

Implant technology in these forms should immediately be classified as a lethal weapon! It communicates directly with the brain’s neurons and the entire neural nervous system.

The technology is now used for purposes of breaking down the person's psyche, with serious accusations, threats, mock execution, incitement to suicide, physical violence, e.g, decrease and increase heart rate, pain in and around the heart, severe chest pains, sudden and painful headaches, difficulty to breathe, tampering with rectum, prostate and muscles to name a few.

The worst part of this technology is that subjects are exposed to these atrocities while the ignorant society is not legally able to do anything about the situation.

This ultimate humiliation has reached a whole new level. The researchers use enforced communication to enslave people with exhortations to try to see the individual results of the brain control. One could only imagine the amount of people who have been driven to madness and death with this technology.

There is nowhere the victims can hide or escape from the perpetrators accessing their thoughts. These psychopathic human rights violators can access a victim's brain with computers, 24/7 365 days a year to break down the subjects and stop them from trying to understand what’s happening to them.

A series of grotesque roles are played in order to manipulate the brain, with threats and statements that are made to control, subvert and ruin a person's life. 

This disrespectful research is performed and visualized in a 3D virtual game world in the researchers’ computers, with no ethical boundaries and human rights to stop them. It is done  with real living human beings, and they are used as “avatars." Somewhat similar to the movie Surrogates.

Cover-up of brain monitoring technologies means that the crime is waterproof.  Human rights laws are completely ignored by hidden intelligence scientists and officers.



Monday, August 3, 2015

Homeland Security - Organized Stalking and Militant Zionism


Brief commentary on the article below: Some of the information in the main article below deals with the word "Anti-Semitism." It is worth taking the time to define what this word even means. Go here for more about this. I did not write the article that is featured below, I found it on a site that deals with organized stalking and surveillance. It is important to realize that one of the goals of Homeland Security is protecting the one percent. See herehere, here, here and here for more about who the one percent are. (See this document and this video to see what official government documents are saying, that we will see an increase between the "haves" and the "have-nots," and that that the "haves" are going to start seeing the "have-nots" as a potential problem.) Also, it is crucial that you read the bottom of this article to find out more about the questionable organization which is known as the ADL. (The Anti-Defamation League.) It is laughable that a group with a background and a history like the ADL would be working with Law Enforcement or be training them on terrorism. See here, here, here, herehere, and here for more about which group of people are most likely to be terrorists.)

One more important note: Besides the main article below on the topic of Homeland Security, Organized Stalking and Militant Zionism, you might want to check out these articles on Homeland Security and how they are using STASI techniques:

1. The Stasi Octopus
2. Zersetzung - The Origins of Modern Day Homeland Security and the Police State
3. Zersetzung - The Origins of Modern Day Homeland Security and the Police State Part 2
4. Zersetzung Part 3 - The New Homeland Security
5. How Covert Agents Infiltrate The Internet To Manipulate, Deceive, And Destroy Reputations
6. Torture, Slander and Organized Stalking
8. An Interesting Video About Smearing Political Enemies
9. Stasi Take Down
10. Homeland Security and the Alternative Media Agenda
11. Canada --- Pathetic like the United States
12. Parroting.. What Is Being Done to Me
13. Mind Control: Hooked Up to a Supercomputer at the NSA and CIA
14. Mind Control and Mind Reading Technology - Is Edward Snowden a Fake?
15. Front Groups and Intelligence Agents
16. DARPA Brain Implants - Human Guinea Pigs
17. Domestic Terrorism Silent Rape And Murder - Nanotechnology and Electronic Warfare
18. RCMP Targets Muslim Extremists, But Gives Zionist Terrorists Free Pass
19. Activist Reveals Hidden Military Ties Between Canada and Israel
============================================================================

In researching the gang stalking program, I have been in communication with well over a hundred gang stalking targets. I have personally met with about a dozen gang stalking targets, and, have spoken on the telephone with over a dozen targets for a total of well over 100 hours.

Based on the above evidence, as well as my own personal experience, I believe that thousands of individuals in the U.S. have been targeted by militant Judaism for their having had a history of believed anti-Semitic beliefs. This is part of the modern day Homeland Security. Militant Judaism is the extreme belief that Jews are the "chosen people" and have a divine status - it can manifest as racism and intolerance towards other religions and people, although used by some to refer to all Jews, there is a difference between the views of most Jews and those of the Militant Judaism movement. Most militant Jews believe they have the right to treat others as they see fit. They are often hostile towards non-Jews and even Jews that do not share their extreme views.

Groups that have conducted hate campaigns against Gentiles perceived to be “Amalek”, meaning the Gentiles who are perceived to be anti-Semitic and must be destroyed according to Talmudic Law,  are led by Intelligence Agencies and militant Judaic factions. (For proof of this, see here  under the heading of Wars, law 611 to 613 at the bottom of the page. Also, watch the videos here, here and here to see how they treat perceived Amalek in Israel.) These factions include Intelligence Agencies, the Jewish Task Force, Jewish Defense Organization, the Jewish Defense League, followers of the late fanatical rabbi Meir Kahane, Chabadniks and their sympathizers, and front groups for criminal Zionism such as the ADL.

Based on my conversations with well over a dozen family members of gang stalking victims who were targeted because of suspected anti-Semitic beliefs, I have come to some conclusions about this type of targeting.

Firstly, gang stalking victims who were targeted by the program because of a history of  believed anti-Semitism can be generational targets. All of the targets who fall into this category come from families in which the entire family was targeted for gang stalking. This means that entire extended families were marked for surveillance and potential destruction using gang stalking tactics, and, some members were fraudulently bilked out of  inheritance by various schemes.

Secondly, this targeting was done in regions with a relatively large Jewish population. (Besides Israel, the United States and Canada have the largest Jewish populations in the world. The United States and Canada are extremely strong supporters of Israel.)

Thirdly, this targeting was supported by members of the mainstream Jewish community who were neither fanatical and associated with Jewish militant groups. A network of Jews were established in public and private Christian schools, workplaces and elsewhere to observe and report on persons with potential or believed anti-Semitic leanings. See here and here for more about Sayanim.

Fourthly, organized crime was recruited to participate in the destruction of the targeted Amalek families. These racketeers were rewarded with illegal payola in the form of government contracts, permits, etc., lucrative business deals, as well as other benefits, including preferential access of their children to elite colleges for their participation in the “protection racket”.

Families were aggressively targeted on often specious evidence. This included cases in which children were targeted for political views or for their families political views, ideas or comments they had expressed in school, wearing jewelry perceived as anti-Semitic, such as somewhat resembling the Swastika, or children drawing Swastikas.


WHY IS THERE SILENCE ABOUT THIS ISSUE?

There is silence about this issue because most of the media is controlled by large conglomerates that do not inform you of how the world really works. Many gang stalking victims are in denial. Disinformation agents and agent provocateurs foster the idea that the organized stalking phenomenon is a “personal issue." This goes beyond the role of militant Judaism in gang stalking to the wider government cover-up. Generational victims have an even greater reason to be in denial than does the average gang stalking victim. Yes, as crazy as it sounds, your family could be targeted for your parents "perceived" volatile or dangerous political views.


Examples:

An example of someone whose life and career was derailed due to a family history of perceived anti-Semitism is the actor Mel Gibson. Gibson’s father publicly stated that the six million Holocaust deaths were potentially an exaggeration. The Jewish dominated media seem to be somewhat bloodthirsty when it comes to families with perceived anti-Semitic leanings:

http://abcnews.go.com/Entertainment/story?id=2256719&page=1#.T9C-XpvtyDo

Reporter Rick Sanchez was probably profiled in a similar manner long before uttering the career-killing words “elite, North-east establishment liberals”.

Veteran CNN journalist Jim Clancy’s resignation after his Twitter spat regarding the French satirical magazine is another one that comes to mind. When he told them they were ganging up on him and practicing “hasbara,” the Hebrew word for “explaining” that describes pro-Israel advocacy often at the behest of the Israeli Ministry of Foreign Affairs, they lashed back as if the term were libelous. As it turns out, Clancy was not off base. Some who sparred with him have worked for the Israeli government and the pro-Israel lobby group AIPAC, and one online activist in particular boasts of a track record of getting journalists fired for their comments on social media about Israel and its conflicts in the Middle East.

A recent ADL poll found 1 in 6 Americans have supposedly serious anti-Semitic beliefs. The number was twice as high 40 years ago when the ADL began polling Americans’ attitudes toward Jews. The current rate of Anti-Semitism found in polling done in Europe is higher than in America, and, even higher in Russia.


Who is the ADL? Should You Even Be Listening to Them?

The ADL has a history of felony criminal activity, including offenses in which it has violated the civil rights of targeted individuals in illegal conspiracies with government co-conspirators. They were literally involved with organized crime from the beginning. So you have to be suspicious if anything has really changed.

If organized crime was involved with the ADL from the beginning does that mean they are still involved? This is an important question to ask, because they work with the all of the major law enforcement and intelligence organizations across North America.

1. A movie about the ADL: https://exposeintelligence.blogspot.com/2016/03/defamation-documentary-movie-about-anti.html
2. https://web.archive.org/web/20151025111656/http://theamericanmercury.org/2013/10/adl-100-years-of-hate/
3. http://exposeintelligence.blogspot.ca/2016/03/the-anti-defamation-league-covering-up.html
4. http://exposeintelligence.blogspot.ca/2016/02/the-adl-that-works-with-rcmp-and-fbi.html
5. http://www.whale.to/b/adl.pdf

Now, realize they work closely together with the Mossad in Israel, the CIA, the FBI in the United States, and the RCMP and CSIS in Canada.  Here are a few links showing the ADL working with the FBI and even the RCMP:

1. https://en.wikipedia.org/wiki/Law_Enforcement_Agency_Resource_Network
2. https://web.archive.org/web/20151017100625/http://archive.adl.org/presrele/mise_00/4347_00.html
3. https://web.archive.org/web/20160320055335/http://www.adl.org/combating-hate/law-enforcement/c/training-opportunities.html#.Vu468N_P270
4. https://web.archive.org/web/20150912073841/http://archive.adl.org/learn/adl_law_enforcement/leas+3-09.html
5. https://www.fbi.gov/news/stories/2010/march/leas_033010/a-different-kind-of-training-what-new-agents-learn-from-the-holocaust
6. https://web.archive.org/web/20150320101438/http://www.fbi.gov/news/speeches/the-fbi-and-the-adl-working-toward-a-world-without-hate/
7. https://web.archive.org/web/20141129205219/http://www.fbi.gov/news/news_blog/director-comey-speaks-at-anti-defamation-leagues-leadership-summit/
8. https://web.archive.org/web/20160422153950/http://www.rcmp-grc.gc.ca/en/news/2016/26/behalf-pei-crime-stoppers-pei-crime-stoppers-continues-its-efforts-make-pei-better
10. http://www.parl.gc.ca/HousePublications/Publication.aspx?Language=e&Mode=1&Parl=41&Ses=2&DocId=7898598

For whatever reason, the ADL also seems to be concerned about these people. In fact, they have given CSIS some information on them.

The JDL has targeted anyone who questioned the official history of the Holocaust, and, has used violence and terrorism against Jews perceived to be “insufficiently Zionist”:

http://www.whale.to/b/zionist.html

Sayanim's are Jewish, worldwide Soviet-style civilian spies for Zionism:

1. What is a Sayanim?
2. https://web.archive.org/web/20150321012246/https://www.veteranstoday.com/2011/12/26/sayanim-israeli-operatives-in-the-u-s-2/



Saturday, August 1, 2015

Study of Bioethical Issues Before the Presidential Commission

Before viewing the videos below, please watch the videos I posted on Presidential Bioethics Commission and the other Richmond Counsel Meeting Resolution for the Space Preservation Act. Also, check out this post with the Canadian Psychiatrist and this post about Domestic Terrorism; Silent Rape and Murder with Brain Chips, Nanotechnology, and Psychotronics. In the videos featured below, here is the lady that is listening to the testimonies. I have no doubt she knows that what most of these people are saying is true. The universities are involved in this coverup also. They are working with the Intelligence Agencies and the Military. This is the often covered up part about the Unabomber. Please see this video for more information about the link between the Unabomber and computers, the military, the intelligence community, the universities, and the aerospace industry.