“Let not your hearts be troubled. Believe in God; believe also in me.

Peace I leave with you; my peace I give to you. Not as the world gives do I give to you. Let not your hearts be troubled, neither let them be afraid. John 14:27

Are you being Gaslighted?

 And he opened his mouth and taught them, saying:

“Blessed are the poor in spirit, for theirs is the kingdom of heaven.

“Blessed are those who mourn, for they shall be comforted.

“Blessed are the meek, for they shall inherit the earth.

“Blessed are those who hunger and thirst for righteousness, for they shall be satisfied.

“Blessed are the merciful, for they shall receive mercy.

“Blessed are the pure in heart, for they shall see God.

“Blessed are the peacemakers, for they shall be called sons[a] of God.

10 “Blessed are those who are persecuted for righteousness’ sake, for theirs is the kingdom of heaven.

11 “Blessed are you when others revile you and persecute you and utter all kinds of evil against you falsely on my account. 12 Rejoice and be glad, for your reward is great in heaven, for so they persecuted the prophets who were before you.

Gaslighting, Crazy Making and the Reversive Blockade – Techniques of the Psychopath

 

Psychopaths use a number of techniques to manipulate their victims. Below is a collection of quotes and sources that describe different facets of pathological tactics used to maintain lies. They will call in to question another person’s sanity, insist on their ‘version of reality’ all the while projecting their defective inner landscape onto their target. The success of their manipulations depend on a lack of awareness of their true nature. Knowledge protects.

Gaslighting

Projection and gaslighting are also on the list of common sociopath techniques. Sociopaths refuse to be held accountable for their behavior and often assign their own behavior to their victims. For example, a sociopath could accuse a victim of stealing when it is the sociopath himself that steals. Gaslighting is a common practice of abusers who attempt to convince their victims they are defective for any reason such as making the victim more emotional, more needy or dependent. For example, if an abusive person says hurtful things and tries to convince you that you are mentally unstable and starts recommending that you get professional help, you might be in the presence of a gaslilghter.

Martha Stout, The Sociopath Next Door

————————————-

Signs of being gaslighted:

1. You are constantly second-guessing yourself

2. You ask yourself, “Am I too sensitive?” a dozen times a day.

3. You often feel confused and even crazy at work.

4. You’re always apologizing to your mother, father, boyfriend,, boss.

5. You can’t understand why, with so many apparently good things in your life, you aren’t happier.

6. You frequently make excuses for your partner’s behavior to friends and family.

7. You find yourself withholding information from friends and family so you don’t have to explain or make excuses.

8. You know something is terribly wrong, but you can never quite express what it is, even to yourself.

9. You start lying to avoid the put downs and reality twists.

10. You have trouble making simple decisions.

11. You have the sense that you used to be a very different person – more confident, more fun-loving, more relaxed.

12. You feel hopeless and joyless.

13. You feel as though you can’t do anything right.

14. You wonder if you are a “good enough” girlfriend/ wife/employee/ friend; daughter.

15. You find yourself withholding information from friends and family so you don’t have to explain or make excuses.

http://www.psychologytoday.com/blog/power-in-relationships/200905/are-you-being-gaslighted

—————————————-

Gaslighting is a form of psychological abuse or brainwashing where one individual attempts to get another individual to believe she is “crazy”. This is most often done through the denial of facts, events, or what one did or did not say. The gaslighter might also directly or indirectly imply that the individual is defective, crazy, or suffers from a mental illness.

(…)

When this technique is used on someone, he or she may initially become frustrated that one is being told his or her memory or perceptions do not match reality. However, after a while, the individual beings to believe the gaslighter. He or she may start to believe that he or she is imagining things, has some kind of mental illness, or has a faulty memory. When one doubts his or her perceptions of reality, the gaslighter is able to control that person; he or she becomes completely dependent on the gaslighter for the “truth”.

http://www.associatedcontent.com/article/163293/gaslighting_a_little_known_form_of.html?cat=5

———————————————————————————

Similar is the pathological use of crazy making

Crazy-Making Communication

How does all these communication malfunctions come together as a ‘relational cluster butt kick?’ How does it affect the actual interactive process of talking? The attempts at communication are crazy-making and will cause her to question her communication skills, how she views her ability to express herself, and eventually her sanity.

The triangle represents the roles the psychopath and her play in the communication process. Each of them moves around the triangle taking on different roles in the interchange. He is the wounded one while she plays the role of either liberating him or tormenting him. He may later shift and take on the role of liberator to her or tormenter to her. She in turn, might switch roles and become the wounded one. When one role shifts, it forces the other person into one of the other two remaining roles. Each shift shifts someone else.

These roles can shift moment by moment, sentence by sentence. One moment he acts as if she is the tormenter and in the next moment expected to liberate him. In the next argument he might aggressively be the tormenter and she, the wounded one. The same argument over the same topic only moments or days later could result in totally different roles by each of them. No consistency whatsoever is held and no resolution reached each time they enter into an attempt at communication.

Nowhere else in her life does she communicate this way. At work, she may hold a highly responsible position and communicate normally, without drama and crazy-making language. However, as soon as she enters into communication with him, the communication lapses into these three well-defined roles. Even when she attempts to communicate normally and utilize the skills she uses in everyday communication with others, the process still pulls her in and she is unable to communicate outside the three roles of Wounded One, Tormentor, or Liberator.

With the psychopath, communication is reduced to a very juvenile emotional age. He brings to this communication process other dysfunctional and aggravating behaviors which contribute to communication problems. For example:

– impulsivity

– splitting one person against the other

– knows-it-all so she can‘t contribute any new information

– lying

– drama

– manipulation

– juvenile decision-making skills

– changing subjects

– meaning/language differences

– blaming

– immature emotional age

– doesn’t take responsibility for his behavior/choices

– abandonment issues and acts like a victim

– gaslighting

– projecting his behavior on others

Sandra Brown, Women Who Love Psychopaths

———————————————————————————-

 

The Reversive Blockade:

Reversive blockade: Emphatically insisting upon something which is the opposite of truth blocks the average person’s mind from perceiving the truth. In accordance with the dictates of healthy common sense, he starts searching for meaning in the “golden mean” between the truth and its opposite, winding up with some satisfactory counterfeit. People who think like this do not realize that this effect is precisely the intent of the person who subjects them to this method… Use of this method can be included within the [previously] mentioned special psychological knowledge developed by psychopaths concerning the weaknesses of human nature and the art of leading others into error.

– Andrew Lobaczewski, Political Ponerology

———————————————————————————-

These methods of manipulation work so effectively precisely because people are not aware of the true nature of psychopaths. Lobaczewski further describes how normal people use corrective interpretation in their dealings with pathological types:

Corrective interpretation (in the context of authors who schizoidal psychopaths):

In spite of their typical deficits, or even an openly schizoidal declaration, their readers do not realize what the authors’ characters are like; they interpret such works in a manner corresponding to their own nature. The minds of normal people tend toward corrective interpretation thanks to the participation of their own richer, psychological world-view.

– Andrew Lobaczewski, Political Ponerology

Organized Stalking Described

Organized Stalking is a crime thats not accepted or addressed by law enforcement. It is a framework of social control. This is used by government to control some targeted individuals without doing anything that’s illegal in the control framework. It includes combination of bogus covert investigation and systemic harassment that involves intelligence agencies, law enforcement, businesses and communities. Organized stalking is a set of techniques used to destroy unwanted persons both mentally and physically without doing anything illegal in the process. The people involved in organized stalking know about law enforcement. The actions in organized stalking are designed considering the loopholes within the law to achieve the goal of destroying the person.

Oftentimes organized stalking is initiated after an informant or Covert Human Intelligence Source flags the targeted individual. Other times profile information of the targeted individual places them on government black lists and community notification lists.

The crimes committed through Organized stalking on an individual are covertly done, hence little in evidence is left behind of the crime, and the target is left with little in the way of recourses to defend himself or herself. The systemic harassment is illegal and the bogus covert investigation provides means to keep the target under surveillance 24/7.

Isolation, through disrupting socio-familial ties in an intense slander campaign, is usually achieved once the actual stalking begins. A pervasive slandering campaign takes place, painting the target as an unstable individual, child molester, a person with hidden dark secrets, or a person prone to psychopathic behavior. All the perceptions of the targeted individual’s life are turned negative. The Organized stalking is done in such a way that all aspects of the targeted individual’s life remain negative permanently and is never given time for cure.

The criminals planning a Organized stalking endeavor study the target long before the stalking begins. Psychological profiling is done, and this is to assist in the overall campaign that includes intense psychological harassments and demoralizations. Tactics used go well beyond fear, demoralization and psychological harassment.

The tactics used have been the protocol in campaigns against common people implemented by the KGB in Soviet Russia, Nazis of Nazi Germany, and the KKK in the early to middle of last century in America.. The accumulation of all the tactics and events in this dangerously hurtful organized crime against an innocent human being can led to trauma and will emotionally bankrupt the targeted individual, and may lead to death, as suicide is often induced through the assaults.

The perpetrators of organized stalking are serious criminals who do great damage, and the acts done are very serious crimes by any measure. Organized stalking is a highly criminal campaign, one directed at a target individual, and one that aims to destroy an innocent persons life through covert harassments, malicious slander and carefully crafted and executed psychological assaults.

Organized stalking deprives the targeted individual of their basic constitutional rights and destroys their freedom, setting a stage for the destruction of a person, socially, mental and physical, through a ceaseless assault that pervades all areas of a persons life. What drives such campaigns may be revenge for whistleblowing, or for highly critical individuals, as outspoken people have become targets. Other reasons why a person may become a target individual for stalking: ex-spouse revenge, criminal hate campaigns, politics, or racism.

Organized stalking may be part of a larger phenomena that may have loose threads that extend into a number of differing entities, such as intelligence agencies, military, and large corporations, though it is certain that organized crime is one of Organized stalking’s primary sources, or origins.

The goals of Organized stalking are many. To cause the target to appear unstable mentally is one, and this is achieved through a carefully detailed assault using advanced psychological harassment techniques, and a variety of other tactics that are the usual protocol for Organized stalking, such as street theater, mobbing, and pervasive petty disrespecting.

Targets experience the following:

1. A total invasion of privacy
2. Pervasive and horrific slander
3. Isolation through alienation that is caused by the slander
4. Destruction of, or alienation from all things that the target holds dear.

A discrediting campaign is initiated long before the target is actually stalked. They, the criminal perpetrators, twist and fabricate reality through such a campaign, displaying lies that paint the target as a child molester, a person with hidden dark secrets, a highly unstable individual who may be a threat to society, a prostitute, or a longtime drug user, etc. The slandering or discrediting campaign sets the stage for the target to become alienated in just about every social-familial- work environment, once the actual stalking begins.

This slandering campaign is instrumental in eliminating all resource and avenue of defense for the target, before the actual stalking begins. This stage is one that sees people close to the target, family, friends, neighbors, and co-workers recruited by the perpetrator criminals, who will pose as law enforcement officials, private investigators, or groups of concerned citizens.

The Organized stalking is aimed at achieving one or all of the follow:

1. Induced suicide
2. Financial devastation
3. Homelessness
4. Institutionalization in psyche wards.

Once actual stalking begins:

The target will endure a vast array of tactics: gaslighting, street theater, drugging, gassing, scent harassment, mobbing, subtle but frequent destruction of property, killing of pets.

Psychological profiling will be done so as to initiate an intense psychological harassment assault. Staged happenings and planned or directed conversations will take place around the target in public or places of work, and serves not only to undermine the targets psychology, but also may be used to cause the target to thinking that he or she is under investigation for horrific crimes.

Stalkers will have studied the target to such a level that they know and can predict the persons behavior. Again, often the target will think that they are being investigated for crimes that would be absurd for the target to have actually commited. Not knowing what actually is happening, the target is isolated and lives through a never ending living nightmare.

Once the target finds out that they are a target individual for Organized stalking, or multi stalking, they may have some relief, but from what I have read, the stalking simply changes dimensions a bit, and continues.
Identifying the exact people who initiated Organized stalking campaigns is difficult, or near impossible, and this makes it very difficult for people researching this phenomena to discover, in certainty, the roots and genealogy of the crime. Investigation of a Organized stalking crime would require a great deal of resources, and intensity similar to murder investigations.

What are the motivations for the targeted individual organized stalking system?

1. Organized stalking system is used by the government as a virtual jail for the targeted individual. The O.S. system isolates targeted individual from the community and creates barriers for the targeted individual within the community.

2. The targeted individual’s actions are severely limited to survival. He/she loses confidence in the community and cannot do anything dramatic or revolutionary to impact his/her environment or the community.

3. The targeted individual thinks about the problem of O.S., other pressing life issues are ignored or planned the least.

4. The O.S. system destroys the ego and identity of the targeted individual and stops him/her from pursuing successful life or influential life that cannot be controlled.

5. If the targeted individual complains about O.S. system, he/she will be misdiagnosed with mental illness as the O.S. techniques used mimic the symptoms of paranoid schizophrenia. The intelligence agencies have perfected this technique of using the mental health system to destroy targeted individuals after 50 years of research. Thus the intelligence agencies achieve perfect deniability in their crimes.

 

Mental Health System

The mental health system is apparently being used worldwide to discredit targeted people who complain. According to the book, Journey Into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, by Gordon Thomas, countries around the world, including the U.S., have used doctors to help abuse and discredit people, often for political reasons. It is also a documented fact that there was collaboration between doctors and the military when experiments were carried out in prisons, hospitals, and universities on unwitting people in North America.

McKinney states that medical doctors, as well as psychiatrist and psychologists appear to be providing cover for this program. This is similar to what was done in Russia, where enemies of the dictatorship would be thrown into mental institutions and drugged beyond recovery. “The APA’s refusal to acknowledge the impact of terrorization upon the human psyche, even given the publicity stemming from the Church Committee’s findings in 1975, raises serious questions about the validity of psychiatry as a profession in this country,” declared McKinney, “not to mention, the APA’s ethical intent, in the long term.”

The DSM is a diagnostic manual for identifying mental disorders. The first edition of the DSM was released in 1952 at a time when the APA was under the control of Dr. Ewen Cameron, who would commit brutal government-sponsored torture under the MKULTRA program. Dr. Rauni Leena Kilde, former Chief Medical Officer of Finland, wrote an article entitled, Microwave Mind Control: Modern Torture and Control Mechanisms Eliminating Human Rights and Privacy. In it she described “The Psychiatric Diagnostic Statistical Manual (DSM) for mental disorders,” as a “brilliant cover up operation in 18 languages to hide the atrocities of military and intelligence agencies’ actions towards their targets.”

Dr. Kilde says the manual “lists all mind control actions as signs of paranoid schizophrenia,” and that “all medical schools teach their students that the person is paranoid, ESPECIALLY if he believes intelligence agencies are behind it all.” Finally she proclaims, “Never is the medical profession told that these are routine actions all over the world by intelligence agencies against their targets.”

Dr. Munzert said that doctors, “first think of paranoia and schizophrenia” if someone complains of this program. He cautions that because of this, “victims” could end up in a “lunatic asylum.” Annie Earle, a Licensed Clinical Social Worker, and Board Certified Diplomat in her area of expertise, has over 25 years of psychotherapy experience as an independent practitioner. When referring to the DSM during an interview on the Republic Broadcasting Network, she stated, “It’s called the Diagnostic Statistical Manual … [and all] psychotherapists, regardless of specialty are required to give their patients a diagnosis from this manual, and in order to get the diagnosis you have to fulfill certain criteria that is clearly spelled out in the DSM.”

Earle noticed a pattern unfolding when some of the people who came to her who did not fit the standard criteria. “The patients that started coming to me really did not fit any of the standard classifications,” she explained. “For example, they might be having what some people consider a psychotic or schizophrenic breakdown in that they might report what seem to be hallucinations, but they did not have any of the other criteria that goes along with schizophrenia. There are many criteria that one is required to … [detect] in making the diagnosis of schizophrenia, and these people did not meet all that criteria.” Apparently Earle became targeted herself while studying this program.

Interestingly, the April/May 1996 issue of Nexus Magazine contained an article entitled, How The NSA Harasses Thousands Of Law Abiding Americans Daily By The Usage Of Remote Neural Monitoring (RNM) written by former NSA worker John St. Clair Akwei. It read, “NSA DOMINT [Domestic Intelligence] has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.”

The DSM appears to have been created with a loophole which allows government-sponsored harassment programs to exist. This was evidently done so that people will appear ill when explaining this to a mental health professional. Adding to this confusion, the program itself is designed to mimic mental illness when explained to those “not-in-the-know.” Mental health professionals may also participate in this program, wittingly or unwittingly by labeling targets as mentally ill. It is one of several layers of protection used to help keep this program operating in secrecy. It’s easy to see how some mental health professionals might “jump to conclusions.”

 

 

Gaslighting is any behavior or imparting of information that has the effect of making the target distrust their own perception. If you feel cold and told it’s hot, you start to doubt your reality checking faculty. Gaslighting is a form of psychological abuse that involves withholding of factual information from and/or providing false information to the target. Having the gradual effect of making the victim anxious, confused and less able to trust his/her own memory and perception.

Gaslighting tends to intersect with other tactics such as gang stalking, street theater, cryptic reference themes but generally involves sabotage of the target’s belongings and perspective in order to disturb the target’s peace of mind. The goal is to confuse the target to the point he/she cannot trust his/her memory or perspective.

Street theater is gaslighting

Via street theater gaslighting is carried out by networking of stalkers who share some profile information and disinformation about the target. While participating in staged events around the target this info and disinfo is mentioned to or loud around the target. The basic idea is to let the target know that personal information or things done around the home are known about them. Oftentimes during harassment the most mundane things are mentioned such as a phrase that the target said earlier that morning or mention an internet site that was visited etc. This is done to give the impression that everything they do is monitored. In most cases disinformation is also mentioned but is only pieced together by the target after many runnings with street theater stalkers. This disinformation is the most disturbing because the target is left to wonder why so many people are referring to the same topics or exact phrases. This is a pattern of neurolinguistic programming to instill negative emotions, and associations. Again with seemingly meaningless repetitious phrases, the idea is to confuse the target who may start questioning their senses. They flash when they hear several people mention the same words or the same topic while having no real significance in the target’s experience.

Cryptic reference is gaslighting

This happens in street theater but also in conversations with family and friends. When the target is profiled, the information about the target’s fears and weaknesses is used to create collection of key words and topics. These triggers are mentioned in the most casual conversations in an attempt to confuse and upset the target. To complicate things, the target starts seeing patterns and themes which come from harmless sources. Any attempt to share the gaslighting information with others will only isolate them as people will have hard time believing the target and see the events as life’s normal misfortunes.

Gaslighting by friends and family

Oftentimes people close to the target are approached and fed various lies and programmed long before the target even knows he/she has become a target. When the target tries to relate the events that are happening, the trusted friends and family tell the target various forms of NO – it is only your imagination. And if the target presses the horns the stalking event becomes intense. The target is advised to normalize and quit mentioning the signs of stalking that they see. Friends and family members are the worst / most effective wielders of gaslighting. The target, searching for support and meaning, takes the advice to heart to gain some sort of normalcy in life. This pushes the target in line to obey normal life dictates. While still being harassed by stranger stalkers and putting up with various other tactics, the target is forced to live in two worlds. Clearly this is the very definition of gaslighting. If the target is left in this state, they may start to doubt their memory, perception, and their very self. Induced self-doubt is indeed terroristic by its very nature. Friends and family members will say the target needs to move on and forget about the traumatic events. Repeatedly these gaslighting events lead the target to dangerous situations where they cannot trust their own intuitions.

Gaslighting permeates gang stalking from day one. Then as the target tries to regroup to have normal life, gaslighting from the target’s family members complicates the situation.

Mind Control
By Harry V. Martin and David Caul
Copyright, Napa Sentinel, 1991
Part Nine in a Series

Tuesday, October 22, 1991

In mans quest to control the behavior of humans, there was a great breakthrough established by Pavlov, who devised a way to make dogs salivate on cue. He perfected his conditioning response technique by cutting holes in the cheeks of dogs and measured the amount they salivated in response to different stimuli. Pavlov verified that “quality, rate and frequency of the salivation changed depending upon the quality, rate and frequency of the stimuli.”

Though Pavlov’s work falls far short of human mind control, it did lay the groundwork for future studies in mind and behavior control of humans. John B. Watson conducted experiments in the United States on an 11-month-old infant. After allowing the infant to establish a rapport with a white rat, Watson began to beat on the floor with an iron bar every time the infant came in contact with the rat. After a time, the infant made the association between the appearance of the rat and the frightening sound, and began to cry every time the rat came into view. Eventually, the infant developed a fear of any type of small animal. Watson was the founder of the behaviorist school of psychology.

“Give me the baby, and I’ll make it climb and use its hands in constructing buildings or stone or wood. I’ll make it a thief, a gunman or a dope fiend. The possibilities of shaping in any direction are almost endless. Even gross differences in anatomical structure limits are far less than you may think. Make him a deaf mute, and I will build you a Helen Keller. Men are built, not born,” Watson proclaimed. His psychology did not recognize inner feelings and thoughts as legitimate objects of scientific study, he was only interested in overt behavior.

Though Watson’s work was the beginning of mans attempts to control human actions, the real work was done by B.F. Skinner, the high priest of the behaviorists movement. The key to Skinner’s work was the concept of operant conditioning, which relied on the notion of reinforcement, all behavior which is learned is rooted in either a positive or negative response to that action. There are two corollaries of operant conditioning” Aversion therapy and desensitization.

Aversion therapy uses unpleasant reinforcement to a response which is undesirable. This can take the form of electric shock, exposing the subject to fear producing situations, and the infliction of pain in general. It has been used as a way of “curing” homosexuality, alcoholism and stuttering. Desensitization involves forcing the subject to view disturbing images over and over again until they no longer produce any anxiety, then moving on to more extreme images, and repeating the process over again until no anxiety is produced. Eventually, the subject becomes immune to even the most extreme images. This technique is typically used to treat people’s phobias. Thus, the violence shown on T.V. could be said to have the unsystematic and unintended effect of desensitization.

Skinnerian behaviorism has been accused of attempting to deprive man of his free will, his dignity and his autonomy. It is said to be intolerant of uncertainty in human behavior, and refuses to recognize the private, the ineffable, and the unpredictable. It sees the individual merely as a medical, chemical and mechanistic entity which has no comprehension of its real interests.

Skinner believed that people are going to be manipulated. “I just want them to be manipulated effectively,” he said. He measured his success by the absence of resistance and counter control on the part of the person he was manipulating. He thought that his techniques could be perfected to the point that the subject would not even suspect that he was being manipulated.

Dr. James V. McConnel, head of the Department of Mental Health Research at the University of Michigan, said, “The day has come when we can combine sensory deprivation with the use of drugs, hypnosis, and the astute manipulation of reward and punishment to gain almost absolute control over an individual’s behavior. We want to reshape our society drastically.”

A U.S. Navy psychologist, who claims that the Office of Naval Intelligence had taken convicted murderers from military prisons, used behavior modification techniques on them, and then relocated them in American embassies throughout the world. Just prior to that time, the U.S. Senate Intelligence Committee had censured the CIA for its global political assassination plots, including plots against Fidel Castro. The Navy psychologist was Lt. Commander Thomas Narut of the U.S. Regional Medical Center in Naples, Italy. The information was divulged at an Oslo NATO conference of 120 psychologists from the eleven nation alliance. According to Dr. Narut, the U.S. Navy was an excellent place for a researcher to find “captive personnel” whom they could could use as guinea pigs in experiments. The Navy provided all the funding necessary, according to Narut.

Dr. Narut, in a question and answer session with reporters from many nations, revealed how the Navy was secretly programming large numbers of assassins. He said that the men he had worked with for the Navy were being prepared for commando-type operations, as well as covert operations in U.S. embassies worldwide. He described the men who went through his program as “hit men and assassins” who could kill on command.

Careful screening of the subjects was accomplished by Navy psychologists through the military records, and those who actually received assignments where their training could be utilized, were drawn mainly from submarine crews, the paratroops, and many were convicted murderers serving military prison sentences. Several men who had been awarded medals for bravery were drafted into the program.

The assassins were conditioned through “audio-visual desensitization”. The process involved the showing of films of people being injured or killed in a variety of ways, starting with very mild depictions, leading up to the more extreme forms of mayhem. Eventually, the subjects would be able to detach their feelings even when viewing the most horrible of films. The conditioning was most successful when applied to “passive-aggressive” types, and most of these ended up being able to kill without any regrets. The prime indicator of violent tendencies was the Minnesota Multiphasic Personality Inventory. Dr. Narut knew of two Navy programming centers, the neuropsychiatric laboratory in San Diego and the U.S. Regional Medical Center in Italy, where he worked.

During the audio-visual desensitization programming, restraints were used to force the subject to view the films. A device was used on the subjects eyelids to prevent him from blinking. Typically, the preliminary film was on an African youth being ritualistically circumcised with a dull knife and without any anesthetic. The second film showed a sawmill scene in which a man accidentally cut off his fingers.

In addition to the desensitization films, the potential assassins underwent programming to create prejudicial attitude in the men, to think of their future enemies, especially the leaders of these countries, as sub-human. Films and lectures were presented demeaning the culture and habits of the people of the countries where it had been decided they would be sent.

After his NATO lecture, Dr. Narut disappeared. He could not be located. Within a week of so after the lecture, the Pentagon issued an emphatic denial that the U.S. Navy had “engaged in psychological training or other types of training of personnel as assassins.” They disavowed the programming centers in San Diego and Naples and stated they were unable to locate Narut, but did provide confirmation that he was a staff member of the U.S. Regional Medical Center in Naples.

Dr. Alfred Zitani, an American delegate to the Oslo conference, did verify Narut’s remarks and they were published in the Sunday Times.

Sometime later, Dr. Narut surfaced again in London and recanted his remarks, stating that he was “talking in theoretical and not practical terms.” Shortly thereafter, the U.S. Naval headquarters in London issued a statement indicating that Dr. Narut’s remarks at the NATO conference should be discounted because he had “personal problems”. Dr. Narut never made any further public statements about the program.

During the NATO conference in Oslo, Dr. Narut had remarked that the reason he was divulging the information was because he believed that the information was coming out anyway. The doctor was referring to the disclosure by a Congressional subcommittee which were then appearing in the press concerning various CIA assassination plots. However, what Dr. Narut had failed to realize at the time, was that the Navy’s assassination plots were not destined to be revealed to the public at that time.

 

Space Mirror

by N.Shpakovsky,
TRIZ-Consultant, Ph.D.
nick_sh2000@mail.ru

Abstract. The article analyzes the failure of the Russian project �Znamya 2�, which is better known as �Space Mirror�. When unfolding, the space mirror membrane caught on the antenna that projected over the space station body.

Using TRIZ, the causes of the failure were analyzed and a number of solutions for improving the reliability of the flexible membrane unfolding under weightlessness were proposed.

Introduction. The space mirror that reflects the Sun�s rays onto the nightside of our planet is one of the impressive space projects. In 1993, the spaceship �Progress M-15� placed into orbit a 20-meter film mirror (the project �Znamya 2�). The mirror unfurled and produced a light spot that was equal in strength approximately to one full moon. A huge plash of sunlight glanced over beclouded Europe to be seen only by astronomers on the top of the Alps.

The project �Znamya 2.5� stood head and shoulders above its predecessor. The mirror was expected to be perceived on the Earth as 5 to 10 full moons and it formed a trace of about 7 km in diameter which could be controlled by fixing it on one spot for a long time. The space mirror was a slightly concave membrane of 25 m in diameter made of thin film with a mirror surface, which was attached around the periphery of the station. The membrane was expected to unfold and be held unfolded by centrifugal forces (Fig.1).


Fig.1

However, the project was a failure. Soon after the deployment started, the membrane caught on the antenna (Fig. 2). The spaceship �Progress M-40 was de-orbited and buried in the ocean.

Fig. 2

It would be interesting to consider this situation in terms of TRIZ. Why exactly hasn�t the membrane unfolded? Has everything been done for it to unfold? What can be done to make such membranes unfold under various conditions? There is a great many of similar constructions and it is not always possible to provide such unfolding conditions as for the solar mirror.

Was this failure natural? In principle, from the point of view of traditional design everything is OK. The membrane�s prototype is a parachute canopy. There is no oncoming air stream in space, so inertia forces that occur as a result of the space station rotation are used to unfold the membrane. The first membrane – that of �Znamya 2� – unfolded successfully. Besides, there is a good analogue – designs of spaceships with a solar sail in which the sail is unfolded and held by a centrifugal force occurring during the spaceship rotation. It also seems correct in the context of TRIZ. The basic requirement of ideality is satisfied – the membrane itself without any additional devices moves off the station, unfolds and is held unfolded.

This, however, has not worked. The station started rotating, the membrane began moving off it and caught on the antenna. We can certainly blame the antenna. Parachute-jumpers thoroughly remove all buckles, hooks and heelplates – everything on which the parachute may caught while deploying – from their clothing and especially from the helmets and footwear. But the space station is an expensive and serious thing and is designed to solve many different problems during one flight. It is difficult to remove all devices from the station�s surface, as they are needed for solving other problems. Under such conditions, one accidental jerk of the engine can cause inertia to throw the unfolding membrane back onto the antenna.

Rational membrane-unfolding technology. Let us try to solve this problem with the aid of TRIZ and find a method for unfolding the membrane without removing the antennas and other objects projecting over the station�s surface. Unfortunately, we�ll only have to be guided by the published information, so we�ll have to think ourselves of such important �trifles� as the design of membrane-holding devices, locks, etc. Or, for instance, what are the radial slits in the membrane for?

Thus, we have a packed membrane attached around the periphery of the station. It is held, for instance, by several flexible bands with locks (Fig. 3, a).

Fig. 3

Let us recall one of the basic TRIZ laws – the law of coordination of ES parts� interaction – and try to build a �desirable technology� of membrane deployment. The deployment process falls into two distinct stages. At the first stage, the station starts rotating, locks are released and the membrane moves off the station�s surface (Fig. 3,d). The second stage includes the unfolding of the membrane, its final stretching and holding in the unfolded state. (Fig.3,c).

The first stage is apparently most complex. Since the entire mass of the packed membrane is situated near the axis of rotation, centrifugal forces are comparatively small at that moment, while the work to be done by them is considerable. At the same time, certain requirements are also imposed on the sequence of membrane deployment. It would be better for the membrane not to unfold at once throughout the entire volume, but from the center toward the edges, quickly receding from the station to the area that is free from projecting antennas, in the form of a compact torus-like packing and not as an inordinate heap.

Further stretching of the unfolded membrane is not connected with any troubles because at that time the membrane is already far from the �human factor�. Here we can do with centrifugal forces.

Thus, we can formulate an important requirement for the deployment process: �the unfolded internal part of the membrane must be permanently stretched�.

How can we accomplish sequential unfolding of the membrane? The chances are that it is �concertinaed� before the flight and then it is unfolded throughout the entire volume after releasing the locks.

Proposal 1. Leave free some of the folds adjoining the station and fasten the rest of the folds together with destroyable filaments or bands. Then peripheral tensile stress will first spread the folds near the station surface and the part of the membrane adjoining the station will be stretched. And only then the ties of the peripheral part of the membrane will break and the final deployment will start (Fig.4).

Fig. 4.

How can we accelerate the membrane deployment at the first stage?

It is obvious that we can either increase the station spinning frequency or increase the membrane mass. But carrying an extra load is not an ideal solution. Suppose we first spin up the station and then release the locks� And suppose we place a ring charge BB under the packed membrane, then release the membrane from the locks and explode the charge! Or place small jet engines around the external periphery of the membrane�

Something will definitely fly to pieces, because the membrane is only 7 mm thick.

What are the requirements for the membrane mass in this case?

  • On the one hand, the membrane must be heavy to be able to unfold fast and to move off the station.

  • At the same time, the membrane must be lightweight to prevent the occurrence of excessive loads produced by centrifugal forces.

We can resolve this contradiction in the following way. Let the membrane be heavy at the first stage of deployment and lightweight during the rest of the time. Or rather, the unfolding force must be great at the first stage. Then it may be much smaller, but great enough to unfold and stretch the membrane.

What resources are available?

Substances: membrane, space station, vacuum, air that remained inside the membrane after packing (if it is not evacuated while packing).

Fields: electric, magnetic, Sun�s light field, heat field, space wind. The characteristics of most fields may vary within very wide ranges by turning the station relative to the Sun.

Time: unlimited before the conflict, including the time of space station preparation on the Earth.

Let us draw an abstract model of the problem (Fig. 5).

Fig. 5

B2 is a station. It is a tool. B1 is a packed membrane. It is an object. B2 acts on B1 by the mechanical field (Fineria), produced by the inertia forces. This action is insufficient.

What do the standards recommend (1)?

Introduce one more substance and a field to control this substance.

For instance, add ferromagnetic particles while manufacturing the membrane. Then, while unfolding, the membrane may be acted upon by an annular electromagnet placed around the station body�s periphery. However, it is necessary to additionally introduce an electromagnet, which reduces the system�s ideality.

Add one more substance to one of the interacting substances.

B1 is a station. A space station is a large vessel with air. Consequently, the second substance is already available. It only remains to use it.

Proposal 2. We can provide rapid withdrawal of the membrane from the station to the distance of the non-fastened folds by using the energy of compressed air supplied under the packed membrane. In this case, as distinct from the explosion of a ring charge, the action value can be easily controlled (Fig. 6).

Fig. 6

Transfer to a capillary-porous substance.

Make the membrane capillary-porous.

Proposal 3. For instance, paste thin pipes in the mirror membrane cloth and supply compressed air into them while unfolding. The membrane will change into a plane practically instantly and with a great force.

Eliminating possible catching. As for possible hooking of the membrane during the deployment, the following contradiction occurs.

  • The membrane must not catch on a hook.

  • Under the deployment conditions, the membrane can contact a hook.

Of course, it would be ideal to remove the conditions that cause the membrane catching. But if we cannot eliminate such a probability, it is necessary to make so that the caught membrane can be easily released. How can we resolve this contradiction?

Firstly, we can do this in time.

At the first stage of deployment, when the catching is most probable, the unfolding force should be large enough to secure tearing a piece out of the membrane cloth. The peace should be big enough only for normal unfurling and stretching of the unfurled membrane.

This is achieved by introducing additional forces at the first stage of deployment (Proposals 2 and 3) to help the peripheral centrifugal force.

Secondly, we can do this in space.

For this purpose we use a resource: the membrane material.

We can formulate the following requirement for this material. Let the membrane have rigid surface in close proximity to the station and let the surface become flexible and elastic as the membrane moves off the station.

Proposal 4. The peripheral part of the membrane moves off the station in the form of compact torus-like packing. The packed membrane may be placed inside a rigid thin-walled body with an open bottom (Fig. 7). Because during the deployment the circumference of the packed membrane constantly increases, the body must be corrugated and must extend like accordion. Or it must be composed of several sections that move relative to one another. The use of such a body provides a good protection of the packed membrane against hooking and allows for preserving its compact form without bonding or binding.

Fig. 7.

The membrane is likely to have equal strength in all directions. This is quite correct for that of its parts, which is situated comparatively far from the station. At the same time, the requirements for the central part of the membrane are contradictory:

  • On the one hand, the membrane must not be durable so that it can tear and unhook.

  • At the same time, the membrane must be durable so that is does not fail while unfolding and in a working position.

To satisfy these contradictory requirements, we can structure the material of the central part of the membrane.

Radial filaments must be comparatively durable to provide reliable attachment of the membrane to the station body. Tangential filaments that are perpendicular to those radial must not be durable so that they easily break in case of hooking. For peripheral forces not to break the membrane at the interface of its central and peripheral parts, a ring band can be used here for reinforcement.

In principle, since the area of the membrane�s central part is comparatively small, tangential filaments may be removed at all.

Proposal 5. Make the membrane in the form of a wide ring attached to the station body with bands or cables. In packing, such bands are easy to �concertina� like shroud lines. Each folded band can be put into a covering attached to the membrane. This will ensure well-ordered unfolding of the central part of the membrane and will eliminate hooking (Fig. 8).

Fig. 8.

Final solution concept. To build a final solution concept, let us take proposal 3 as a basis that provides energetic withdrawal of the membrane from the station as envisaged in our �desirable technology of membrane deployment�. This proposal is well supplemented by proposal 1 that ensures the membrane moving off the station in a compact packed state and by proposal 5 that excludes the catching of the middle part of the membrane on the projecting parts of the station�s surface. In this case proposal 3 and proposal 5 are just combined. As for proposal 1, we only use the function �to hold the membrane packed� which is performed with the aid of resources available in the system (pipes with compressed air).

To provide fast and energetic unfolding of the middle part of the membrane, it is necessary to use, instead of a one-piece film, thin radially positioned pipes that connect the packed peripheral part of the membrane with the station. By supplying compressed air into the pipes we�ll practically instantly obtain a rigid frame that will ensure energetic unfolding of the membrane at the first stage.

To hold the membrane in a compact packed state until the full unfolding of its middle part, it is proposed to make each of the membrane-holding clamps in the form of two pipes that encompass the membrane on its sides. The pipes� end faces should be closed and connected with the rest of the frame. The pipes� ends should be connected with each other with a break-off band or filament. After the full unfolding of the frame of the membrane�s middle part, compressed air starts going into the clamps� pipes. The pipes straighten with a great force, break the bands and release the membrane (Fig. 9).

Proposal 2 is partially realized by using compressed air.

Fig. 9

Intensified solution. If it is still impossible to avoid the contact of the membrane, which moves off the station, with hooks, it is expedient to additionally use proposal 4.

The packed membrane is placed in a rigid multi-section thin-walled body, which is discarded after complete deployment of the membrane.

Conclusion. No doubt that using only open sources of information we missed out many circumstances. But I hope that this attempt to analyze the problem will be to a certain extent useful to space mirror designers, and not only to them. We are sure that all the errors will be corrected and after the next attempt we�ll see a hand-made sun in the night sky.

Reference

  1. Altshuller, Genrikh. �The Innovative Algorithm. TRIZ, Systematic Innovation and Technical Creativity.� Technical Innovation Center, INC. Worcester, MA. 1999.

The pictures by Elena Novitskaja.

 

(back to top)

� Copyright 1997-2005 CTQ Media LLC
http://www.triz-journal.com
All Rights Reserved.

 

NSA & “Artificial Thought” Control ( IBM Blue Beam)

Diffuse Artificial Thought

“The advancement of techniques propel us toward the third step in the Blue Beam Project that goes along with the telepathic and electronically augmented two-way communication where ELF, VLF and LF waves will reach each person from within his or her own mind, convincing each of them that their own god is speaking to them from the very depths of their own soul. Such rays from satellites are fed from the memories of computers that have stored massive data about every human on earth, and their languages. The rays will then interlace with their natural thinking to form what we call diffuse artificial thought.”

So how could that be possible you ask? Easy. Enter Project Joshua Blue, currently under development by our favourite business machines company, IBM. Joshua Blue is a program with the stated goal of “Evolving an Emotional Mind in a Simulated Environment”, “to enhance artificial intelligence by evolving such capacities as common sense reasoning, natural language understanding, and emotional intelligence, acquired in the same manner as humans acquire them, through learning situated in a rich environment.”

This is software that is capable of learning and developing ‘emotions’ according to a related document “Feeling Fabricated: Artificial Emotion“. Parts of this project involve the development of Joshua so that emotion is part of it’s reasoning and these guidelines are being followed: Naturalness and believability, social effectiveness, and meaningfulness of displays to human observers. In fact, the main goal of Joshua Blue is to achieve cognitive flexibility that approaches human functioning. In other words – this is artificial intelligence that could be diffused with our own thought because it has been designed to ‘think like a human’.

A computer program which can read silently spoken words by analysing nerve signals in our mouths and throats, has been developed by NASA. In my previous post I outlined the technology that exists. In 1994, the brain wave patterns of 40 subjects were officially correlated with both spoken words and silent thought. This was achieved by a neurophysiologist, Dr Donald York, and a speech pathologist, Dr Thomas Jensen, from the University of Missouri. They clearly identified 27 words / syllables in specific brain wave patterns and produced a computer program with a brain wave vocabulary. It does not take much thinking to realise that the US agencies have access to a perfected version of this technology. In fact the relevant computers have a vocabulary in excess of 60,000 words and cover most languages. In fact, the NSA’s signals intelligence monitor the brainwaves of their targets by satellite and decode the evoked potentials (3.50Hz 5 milliwatts) that the brain emits. So, using lasers / satellites and high-powered computers the agencies have now gained the ability to decipher human thoughts – and from a considerable distance (instantaneously).

With these seemingly far fetched technologies in mind, althought evidently not so far fetched, also consider this final one. Silent subliminal presentation system: A communication system in which non aural carriers (in the very low or high audio frequency range or the ultrasonic frequency spectrum) are amplified or frequency modulated with the desired “intelligence”, and propagated acoustically or vibrationally for inducement directly into the brain. This can be done “live” or recorded/stored on magnetic, mechanical or optical media for delayed/repeated transmission to the target. Sound can also be induced by radiating the head with microwaves (in the range 100 to 10,000 mhz) that are modulated with a waveform consisting of frequency modulated bursts. HAARP of course is going to be handling all the microwaves.

Knowing all of this, Joshua Blue could in fact be being fed with your personal data (facebook, myspace, medical records, driving records, police records, shopping records etc.) and could be simultaniously extracting your actual, real time thought processes. It could then calculate alternate thought trains and depending on the ‘mission’, it could distract you, lead you to the wrong conclusions or drive you insane. It could even manage to make you convince yourself that yes, aliens truly are invading or Jesus really is talking to you from the clouds. With all the data we put out into the internet about ourselves through MSN, I’m 100% certain ‘they’ know how we talk and therefore how we think. This is way too feasible for me to be comfortable. If the thought that was generated artificially by the computer was so accurately precise how could you reasonably differentiate from AI and your own thought? This scares me.

Joshua Blue is specifically being designed to handle emotions, so thought patterns and logically chosen emotions to compliment them are going to be very hard to overcome.

Conditioning: Aversion therapy & Desensitization

Mind Control
By Harry V. Martin and David Caul
Copyright, Napa Sentinel, 1991
Part Nine in a Series

Tuesday, October 22, 1991

In mans quest to control the behavior of humans, there was a great breakthrough established by Pavlov, who devised a way to make dogs salivate on cue. He perfected his conditioning response technique by cutting holes in the cheeks of dogs and measured the amount they salivated in response to different stimuli. Pavlov verified that “quality, rate and frequency of the salivation changed depending upon the quality, rate and frequency of the stimuli.”

Though Pavlov’s work falls far short of human mind control, it did lay the groundwork for future studies in mind and behavior control of humans. John B. Watson conducted experiments in the United States on an 11-month-old infant. After allowing the infant to establish a rapport with a white rat, Watson began to beat on the floor with an iron bar every time the infant came in contact with the rat. After a time, the infant made the association between the appearance of the rat and the frightening sound, and began to cry every time the rat came into view. Eventually, the infant developed a fear of any type of small animal. Watson was the founder of the behaviorist school of psychology.

“Give me the baby, and I’ll make it climb and use its hands in constructing buildings or stone or wood. I’ll make it a thief, a gunman or a dope fiend. The possibilities of shaping in any direction are almost endless. Even gross differences in anatomical structure limits are far less than you may think. Make him a deaf mute, and I will build you a Helen Keller. Men are built, not born,” Watson proclaimed. His psychology did not recognize inner feelings and thoughts as legitimate objects of scientific study, he was only interested in overt behavior.

Though Watson’s work was the beginning of mans attempts to control human actions, the real work was done by B.F. Skinner, the high priest of the behaviorists movement. The key to Skinner’s work was the concept of operant conditioning, which relied on the notion of reinforcement, all behavior which is learned is rooted in either a positive or negative response to that action. There are two corollaries of operant conditioning” Aversion therapy and desensitization.

Aversion therapy uses unpleasant reinforcement to a response which is undesirable. This can take the form of electric shock, exposing the subject to fear producing situations, and the infliction of pain in general. It has been used as a way of “curing” homosexuality, alcoholism and stuttering. Desensitization involves forcing the subject to view disturbing images over and over again until they no longer produce any anxiety, then moving on to more extreme images, and repeating the process over again until no anxiety is produced. Eventually, the subject becomes immune to even the most extreme images. This technique is typically used to treat people’s phobias. Thus, the violence shown on T.V. could be said to have the unsystematic and unintended effect of desensitization.

Skinnerian behaviorism has been accused of attempting to deprive man of his free will, his dignity and his autonomy. It is said to be intolerant of uncertainty in human behavior, and refuses to recognize the private, the ineffable, and the unpredictable. It sees the individual merely as a medical, chemical and mechanistic entity which has no comprehension of its real interests.

Skinner believed that people are going to be manipulated. “I just want them to be manipulated effectively,” he said. He measured his success by the absence of resistance and counter control on the part of the person he was manipulating. He thought that his techniques could be perfected to the point that the subject would not even suspect that he was being manipulated.

Dr. James V. McConnel, head of the Department of Mental Health Research at the University of Michigan, said, “The day has come when we can combine sensory deprivation with the use of drugs, hypnosis, and the astute manipulation of reward and punishment to gain almost absolute control over an individual’s behavior. We want to reshape our society drastically.”

A U.S. Navy psychologist, who claims that the Office of Naval Intelligence had taken convicted murderers from military prisons, used behavior modification techniques on them, and then relocated them in American embassies throughout the world. Just prior to that time, the U.S. Senate Intelligence Committee had censured the CIA for its global political assassination plots, including plots against Fidel Castro. The Navy psychologist was Lt. Commander Thomas Narut of the U.S. Regional Medical Center in Naples, Italy. The information was divulged at an Oslo NATO conference of 120 psychologists from the eleven nation alliance. According to Dr. Narut, the U.S. Navy was an excellent place for a researcher to find “captive personnel” whom they could could use as guinea pigs in experiments. The Navy provided all the funding necessary, according to Narut.

Dr. Narut, in a question and answer session with reporters from many nations, revealed how the Navy was secretly programming large numbers of assassins. He said that the men he had worked with for the Navy were being prepared for commando-type operations, as well as covert operations in U.S. embassies worldwide. He described the men who went through his program as “hit men and assassins” who could kill on command.

Careful screening of the subjects was accomplished by Navy psychologists through the military records, and those who actually received assignments where their training could be utilized, were drawn mainly from submarine crews, the paratroops, and many were convicted murderers serving military prison sentences. Several men who had been awarded medals for bravery were drafted into the program.

The assassins were conditioned through “audio-visual desensitization”. The process involved the showing of films of people being injured or killed in a variety of ways, starting with very mild depictions, leading up to the more extreme forms of mayhem. Eventually, the subjects would be able to detach their feelings even when viewing the most horrible of films. The conditioning was most successful when applied to “passive-aggressive” types, and most of these ended up being able to kill without any regrets. The prime indicator of violent tendencies was the Minnesota Multiphasic Personality Inventory. Dr. Narut knew of two Navy programming centers, the neuropsychiatric laboratory in San Diego and the U.S. Regional Medical Center in Italy, where he worked.

During the audio-visual desensitization programming, restraints were used to force the subject to view the films. A device was used on the subjects eyelids to prevent him from blinking. Typically, the preliminary film was on an African youth being ritualistically circumcised with a dull knife and without any anesthetic. The second film showed a sawmill scene in which a man accidentally cut off his fingers.

In addition to the desensitization films, the potential assassins underwent programming to create prejudicial attitude in the men, to think of their future enemies, especially the leaders of these countries, as sub-human. Films and lectures were presented demeaning the culture and habits of the people of the countries where it had been decided they would be sent.

After his NATO lecture, Dr. Narut disappeared. He could not be located. Within a week of so after the lecture, the Pentagon issued an emphatic denial that the U.S. Navy had “engaged in psychological training or other types of training of personnel as assassins.” They disavowed the programming centers in San Diego and Naples and stated they were unable to locate Narut, but did provide confirmation that he was a staff member of the U.S. Regional Medical Center in Naples.

Dr. Alfred Zitani, an American delegate to the Oslo conference, did verify Narut’s remarks and they were published in the Sunday Times.

Sometime later, Dr. Narut surfaced again in London and recanted his remarks, stating that he was “talking in theoretical and not practical terms.” Shortly thereafter, the U.S. Naval headquarters in London issued a statement indicating that Dr. Narut’s remarks at the NATO conference should be discounted because he had “personal problems”. Dr. Narut never made any further public statements about the program.

During the NATO conference in Oslo, Dr. Narut had remarked that the reason he was divulging the information was because he believed that the information was coming out anyway. The doctor was referring to the disclosure by a Congressional subcommittee which were then appearing in the press concerning various CIA assassination plots. However, what Dr. Narut had failed to realize at the time, was that the Navy’s assassination plots were not destined to be revealed to the public at that time.

Brainwashing and Mind Control Methods

There are many methods of gaining control over the human mind. Commonly disguised as relaxation or meditation, hypnosis induces a high state of suggestibility and is mainly achieved in three ways: repetitive music (close to the human heart beat), voice rolling (talking to a beat of 45 to 60 beats per minute in a patterned, paced style), and to make the subject comfortable and drowsy with the feel of the room. Other methods of mind control are: imposing fear or guilt, allowing no questions, playing “games” with obscure rules, forcing controlled approval, isolation, finger pointing, financial commitment, confession, sleep deprivation, imposing fatigue, peer or group pressure, love bombing, confusing doctrine, communication, removal of privacy, disinhibitation, uncompromising rules and verbal abuse.

You Are Being Brain Washed

written by Ken Poirier – November 2008

YOU ARE BEING BRAINWASHED. You don’t have to like it, but most people do. There has always been an “opiate for the masses”. It is a necessary part of the civilized world. Imagine if everyone was running around with a free thinking mind of their own. People would work less and less, demanding more and more pay. Parents would trust their children to make decisions on their own. Teachers would teach information based on research, instead of curriculum. Students would learn, instead of achieving grades.

Fortunately, You don’t have to worry about that. You are being brainwashed.

Although brainwashing has existed for thousands of years, the term “brainwashing” was coined by the CIA in 1950. It is also known as re-education, thought control, propaganda, and conversion.

The human mind is not predisposed to accept external control. Look at children. If you tell them to do something, they automatically rebel. It is only through repetition of instructions and a punishment/reward system that they “learn” to “behave properly”. If it wasn’t for this early brainwashing, we would all be running around naked, making funny noises for no reason, leaving doors open, and farting in public.

This is how brainwashing works. Mental programming requires three basic elements. First, the programmer needs to limit the information available to the subject. Then they control the subject’s behavior. The final piece of the puzzle is to apply subtle amounts of stress to the subject to distract them from the thought control process.

Mind ControlLimiting the information can be done by isolating the subject from alternate opinions. We say to the child, “You can’t play with Jimmy. He’s a bad influence.”, “You need to go to church every Sunday.” The programmer can physically separate you from those opinions or make you dismiss them before those ideas are heard. They may say, “Those people are uncivilized”, “They are just crackpots and alarmist.”, “Let us never tolerate outrageous conspiracy theories.” (GW Bush) or on the other side, “You can never trust the white devil.” If someone is trying keep you from learning, you are being brainwashed.

It can also come in the form of repetition. It could be something someone is saying to you, “You’re an idiot.”, “You don’t know what your doing.”, “You can’t hold a job.”, “you’re a drunk.” If someone says something to you enough, you will eventually believe that it’s true. Repetition might also be something you say over and over again, like a prayer, pledge, or saying. It most often comes in the form of TV news or slogans, “Stay the course” , “In God We Trust”, “We can’t let the terrorist win.”, “I’m thinking Arby’s!”

If you are hearing or seeing, or (even worse) saying, the same phrase over and over again, you are being brainwashed.

The second phase is controlled behavior. It can be as simple as being woken from a state of sleep to go to work or school, or telling someone when they can or can’t go to the bathroom. It could be someone telling you, not asking you, to chew with your mouth closed. It can also be repetitive movements such as when we are at church, being told to kneel, stand, or sit on command. It can be even broader, Pay your taxes, Drive the speed limit, green light = go, red light = stop.

Our behavior can also be controlled by observing the behavior in others. If a child sees her father beating her mother, she will grow up and be beaten by her husband. If, in a movie, a teacher takes a note from a student and reads it out loud before the class, and a teacher or student watches that movie, they will imitate that behavior in real life. If an evangelist sees their family in church rolling on the floor, “possessed by the holy spirit”, they too will one day roll on the floor. If someone plays Call of Duty 4 enough, they will think it is ok to go to foreign countries and kill brown people.

Usually though, you will just get brainwashed into buying a new car or exercise equipment you can’t afford.

The last aspect is the application of stress. Most often, this takes the form of a conditional threat; hence it is often called conditioning. “If you don’t stop drinking, I’m taking the kids and leaving”, “If you sleep with anyone else I’ll kill you”, “If you leave me, I’ll kill myself”, “If you don’t pray, you’ll go to hell”, “If you don’t behave, we will beat you again”, “If you don’t pass a $700 billion dollar bail-out, I’ll instate marshal law.”

If someone is trying to control your behavior or putting stress on your life, you are being brainwashed. Get away from them!

The worse thing about being brainwashed is that once you are brainwashed, it is very difficult to be aware of it. Your brainwashed state of mind and actions is completely normal to you. You are just an average Joe (maybe you’re a plumber, zing!). Everything you do seems completely normal. Since, you are normal, anyone who doesn’t share your beliefs and values must be either insane or uncivilized. So what do you do? You brainwash them!

That is the beauty of the system. Since humans feel a need to be socially justified, without even thinking about it, we go out and “teach” others about “proper behavior”. The brainwashed become the brainwashers, at no extra charge. The programmed behavior spreads like a virus from host to host, to friends, lovers, and family.

There is hope. You can change your ways. The main defense against brainwashing is to not let the stress distract you and to remain aware that you are being brainwashed. Next time someone is telling you what to do, if you are doing something that seems against your will, if the words coming out of your mouth are not yours, say to your self, “I’m being brainwashed!” Then get yourself out of that situation and away from those people! Remember, it’s not their fault, they are brainwashed. Just get away from them.

Remain aware! When you put this paper down, you will be aware that you are being brainwashed.

What is Mind Control / Psychotronic Torture?



BY DEB CHAKRABORTY

 

The term “Mind control” basically means covert attempts to influence the thoughts and behavior of human beings against their will (or without their knowledge), particularly when surveillance of an individual is used as an integral part of such influencing and the term “Psychotronic Torture” comes from psycho (of psychological) and electronic. This is actually a very sophisticated form of remote technological torture that slowly invalidates and incapacitates a person. These invisible and non-traceable technological assaults on human beings are done in order to destroy someone psychologically and physiologically.

Actually, as par scientific resources, the human body, much like a computer, contains myriad data processors. They include, but are not limited to, the chemical-electrical activity of the brain, heart, and peripheral nervous system, the signals sent from the cortex region of the brain to other parts of our body, the tiny hair cells in the inner ear that process auditory signals, and the light-sensitive retina and cornea of the eye that process visual activity. We are on the threshold of an era in which these data processors of the human body may be manipulated or debilitated. Examples of unplanned attacks on the body’s data-processing capability are well-documented.

An entirely new arsenal of weapons, based on devices designed to introduce subliminal messages or to alter the body’s psychological and data-processing capabilities, might be used to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the various sensory and data-processing systems of the human organism. In both cases, the goal is to confuse or destroy the signals that normally keep the body in equilibrium.

Definition of psychotronic (psycho-physical) weapons.


Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means (techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden, forced influences on the psyche of a person for the purpose of modifying his consciousness, behavior and health for what is desired in the way of influencing aspects of control…” This is not only dangerous, this is deadly!”

Actually, the goal of mind control is to access those areas of the brain that are outside of the conscious control of the individual by circumventing the normal inhibiting response of the cerebral cortex: “an individual’s voluntary conscious self-control must be bypassed or short-circuited.” This unconscious coercion is done through electromagnetic-wave bombardment of the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne waves can travel over distances and are known to change the behavior of animals and humans in their path. Such remote control makes possible potentially frightening uses for altering the brain’s functioning. These are invisible and deadly waves. This waves goes directly to the subconscious parts of the human brain for receiving or transcoding the messages and without the person exposed to such influence having a chance to control the information input consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting mind control requires the creation of “profound and deep emotional states.” Recommended are fear, shock and anxiety, which have “an intense disinhibitive effect on the human brain.” What this means, in essence, is that emotional trauma facilitates the accessing of dissociative states. In order to disable the brain’s “cortical block,” Verdier recommends alcohol, euphoric drugs, isolation, solitary confinement, and – “the most dramatic and unique item in the brainwashing arsenal” – hypnosis. All of these are methods that have been extensively tested by the CIA under the rubric of the MK-ULTRA program.

The technology is rooted in surveillance devices, such as audio and video bugs, through-the-wall and remote sensing devices, and biosensors both remote and implanted.  This provides the feedback for the influencing, as well as any “entertainment” value for voyeur/sadists and intellectual property theft for thieves.  Coupled with the surveillance is some sort of “effectors” or feedback path for influencing an individual.

Thus there are several categories of mind control operations, for example covert drugging, hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks, and ongoing feedback control setups for long-term torture and exploitation of victims, to mention a few.  What they have in common is the attack against the mind of the victim, as well as the deniable and denied nature of the attack.  The exact means being used in any particular case are beside the point here.  These techniques do not just violate one or two of what everyone knows are fundamental human rights:  In one fell swoop they violate almost every fundamental human right a person has.

The electromagnetic technology works on the theory that the mind and body are an electromagnetically mediated biophysics system and the electromagnetic signals form outside sources can mimic the mind and body’s electromagnetic signals and therefore a weapon can be developed based on these principles.

There is evidence that since the 1950’s the U.S. and other government have been developing electromagnetic weapons which can remotely target the electromagnetic system of the human body for military and intelligence purposes.

The First phase is the harassment/surveillance program


During the first phase of this Govt. program a person is broken physically and mentally. The methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon, Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs, homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family, friends. The isolation is needed to have access to the person to conduct many of the experiments on them. All privacy and constitutional rights are thus stripped away.

The second phase is the assaults of Directed Energy Weapons.


After a victim becomes isolated from everyone in the world. The victim now having feelings of regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During this time many have been implanted with microchips. Many begin experiencing extreme pain to their head. Some hear voices. Then pain is delivered to various other parts of their bodies. The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing the pain and no one is touching them. It is an invisible energy force. Along with drugs being administered by the scientist through either a drip system which!has been inserted into an individual, food tampering, or injection all without the victims permission. Then Mind Entrainment begins.

Directed Energy Weapons


Some of the weapons were known as non-lethal weapons. They use such weapons as extremely low frequency Elf electromagnetic weapons (which has been used in mind control), acoustics, harmonics (which have been used as a mind control technique), ultrasound, microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic energy beam can be used to induce “considerable agitation and muscular activity” or “induce muscular weakness and lethargy” this weapon is know as Ultra High Frequency EM.

Psychological warfare tactics are being used against unsuspecting citizens to destroy their jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to utterly destroy a person, very often resulting in a person taking his or her own life, or ending up in a mental hospital. This has been taking place for years and nothing is ever said about it. Nothing is ever written about it. For the sake of those who came before us, and those who come after us, the world needs to know what is happening.

For many people, this comes out of nowhere. They don’t know whose toes they stepped on in order to warrant such a brutal attack. For others who are whistleblowers, they know full well how they garnered such attention. For some, they don’t even realize that they are the targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that something unspeakable and devastating is happening.

What makes this crime so heinous is that the most sophisticated techniques of psychological warfare are employed against a person in order to make them look like they are crazy. Friends and family members don’t believe the things that are happening and often believe the targeted person is crazy.

This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking part of it, which targets experience to varying degrees. This involves stalking by a multitude of individuals both on foot and while you’re in the car. Known as “street theatre” by those who experience it, it involves vandalism to house, car and personal property. Gang stalking can also be referred to as cause stalking, vengeance stalking and multi-stalking.

Some people also experience electronic harassment. This is extremely distressing, painful and invasive, and feels like one’s mind and body is undergoing constant rape, 24 hours a day, 7 days a week. The technology used to do this is unknown, but hundreds of victims report the same physical sensations and experiences. Many take their lives in an attempt to escape the horror. It is so distressing that only fellow targets can really understand what another target is experiencing.

In either case, the attacks are so well orchestrated that only the victim is aware of them. This is intentional, and it appears that these groups have perfected these techniques over many years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do, since new targets are completely bewildered as to what is happening to them, having never heard a peep out of the media about such occurrences (except in relation to mental illness). Their actions are based on many of the same tactics as those employed in ritual abuse, and are designed to weaken the target’s mind and perpetrators are becoming increasingly addicted to this game of predator/prey, always needing more targets to satisfy their unending thirst for a thrill.

“Electronic harassment” or e-harassment is a catch-all term used to describe a group of circumstances which a large number of people are currently experiencing in common. In general, this term refers to the use of electronic technology to view, track and/or harass a person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by neighbors) is largely personal opinion. There is no definitive proof that would allow any of the present victims to launch a court case, but the numbers of victims and the commonality of experience speaks for itself.

The technology involves the use of electromagnetic waves of various frequencies to achieve different results. Some frequencies will make a person tired, while others may cause confusion or memory loss. With the rapid increase in cell phone usage, many experiments have been conducted on the detrimental effects of those particular frequencies on animals. The results indicate that the invisible e.m. signals from cell towers can cause a wide range of physical ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is even more likely the case with the frequencies which may be used to cause direct, intentional harm to a person.

Electronic harassment is sometimes referred to as “psychotronics”, but would more accurately be described as “criminal psychotronics”.

Types of Weapons:

Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons

Soft Kill Weapons
Less-Than-Lethal Weapons

What is a psychotronic weapon?

It is a weapon that emits certain electromagnetic frequencies  that can affect the central nervous system and the neural activity of the brain, disrupting its normal  activities.  This is part of a larger study under several names, electromagnetics, biomagnetics, and  others.  Apparently, if reports can be believed, the first uses of psychotronic warfare was by the  Soviets during the cold war.  Some synonyms for psychotronics are synthetic telepathy, subconscious  brainwashing.

 

ПСИХОТРОНИКА  – отрасль науки и техники, в основе которой лежит взаимодействие человеческой психики с физическими приборами и техническими устройствами; возможность работы этих устройств заключена не в самом приборе, а в специально подготовленном операторе, в его психической программе и глубине сознания, поэтому в результате психического воздействия человека-оператора физико-технические характеристики устройства существенно меняются.

Методы целенаправленного воздействия на человека
Воздействовать на ум и поведение человека можно различными путями, одни из которых требуют лишь специфичной подготовленности специалиста (убеждение, внушение, подкуп…), а другие – еще и специальной аппаратуры (технотронные приемы, секс-мероприятия, зомбирование…).
Методы прицельного влияния могут быть щадящими (внушение…) и агрессивными (шантаж), простенькими (запугивание…) и изощренными (зомбирование…), трудно уловимыми (нейролингвистическое программирование…) и дополняющими (фармакоуправление…).
*Выбор применяемой методики зависит от*:
– реальной уязвимости объекта (черт его характера, эпизодов биографии, наличной ситуации…);
– цели намечаемого воздействия (изменение мышления, привлечение к сотрудничеству, получение информации, одноразовое содействие, воспитующее наказание…);
– собственных возможностей (обладание временем, умением, знанием, техаппаратурой, должными химпрепаратами, компетентными помощниками…);
– персональных установок исполнителя (его уровня моральной допустимости…).
*В практике чаще всего используются*:
– убеждение;
– внушение;
– гипноз;
– нейролингвистическое программирование;
– нарковоздействия;
– секс-мероприятия;
– фармакоуправление;
– технотронные приемы (ультразвук, инфразвук, СВЧ-излучения, электрошок, подпороговая стимуляция, торсионные излучения…);
– зомбирование;
– подкуп;
– запугивание;
– пытки..

Synthetic Telepathy Spies and Near Death Experiences

Synthetic Telepathy  Spies and Near Death Experiences

The U.S. intelligence agencies have extremely top secret technology that can pick up the private thoughts given by individuals in the vibrations produced by the brains electrical impulses, and that these thoughts can be broadcast by means of microwave transceivers, infrasound and ultrasound transceivers, satellites, and any other form of technology which uses electromagnetic transfer, i.e. television, radio, the internet, and the telephone. The pentagon calls this mind reading technology SYNTHETIC TELEPATHY, although there is nothing paranormal about it at all. The N.S.A. or National Security Agency is a part of the U.S. Department of Defense, and a very secretive part at that. The N.S.A. has a black budget, and is always headed by a flag officer from one of the branches of the U.S. military. The top secret technologies available to the U.S. military is usually thirty years or maybe even more ahead of the technology which is available to the U.S. civilian economy. Who is to know among the general U.S. public what the level of technological development is within the secret laboratories of the N.S.A. and D.A.R.P.A. [ Defense  Advanced Reserch Projects Agency ].
A system of subliminal, subconscious, wireless microwave remote control is used today against targeted individuals suffering from synthetic telepathy harassment. Synthetic Telepathy is used for conducting torture training and/or experimentation against people suffering from various types and degrees of mental illnesses, as red herring “good cop/bad cop” or tough love acting, diversions, feints, decoys, and smokescreens, as smear campaigns by association, as openly secret intimidation campaigns against targeted dissidents, and as a means of espionage. Sometimes American synthetic telepathy spies can imitate Russian spies.
No doubt, secret agents have microscopic computer chips which are invisible to brain scan detection implanted surgically or injected in them in order to scramble or block the ability of enemy spies to read their silent, private thoughts or mentations, and to place erroneous, misleading thoughts in their minds in order to deceive enemy spies.

On the need for neurotechnology in the national intelligence and defense agenda: Scope and trajectory

Chris Forsythe, PhD1, James Giordano, PhD2, 3,4*

1. Sandia National Laboratories, PO Box 5800, Albuquerque, NM, 87185-(mail stop), USA. 2. Center for Neurotechnology Studies, Potomac Institute for Policy Studies, 901 N. Stuart St., Suite 900, Arlington, VA, 22203, USA, 3. Oxford Centre for Neuroethics, Oxford University, UK, 4. Uehiro Centre for Practical Philosophy, Oxford University, UK,

Email: jgiordano@potomacinstitute.org.

In light of the recent advances in neuroscience and neurotechnology, we posit that intellectual and empirical commitment to brain science is critical to national security. Moreover, we believe it is equally important to have a commitment to translational research, or at very least, devoted attention to the steps essential to progressing science from theory to application. Our position is that while there is no shortage of science and intellectual consideration, there is a substantive gap in our understanding of how to engage this knowledge toward useful — and ethically sound — ends.

Whether the basis for improved human performance or more intelligent machines, the impacts of neuroscience and neurotechnology will be far-reaching, change the landscape of human capabilities, and will necessitate readdress of guidelines, policies and practices (1, 2). The ratio of applications to discoveries in brain science is high, and international advances in neuroscience and neurotechnology highlight the importance of maintaining US competitiveness in these areas. For example, researchers at the Max Planck Institute in Germany have demonstrated capability to predict test subjects’ decisions for simple choices based on neuroimaging-based assessment of brain activity arising prior to the subjects’ conscious awareness of their decision (3).

Employing such findings beyond the laboratory, it might thus be possible to develop human-machine systems that could enable an operator’s intentions to be anticipated and controlled well before conscious initiation of action(s) (4). As well, research institutes in different nations have engineered nanomaterials to sense and manipulate activity to induce specific effects on targeted regions and functions of the brain and/or spinal cord. Researchers at the RIKEN Center in Japan have manipulated the genetics of embryonic stem cells to cultivate neural precursor cellsthat when transplanted into a living mouse, self-organize to form neural circuits that integrate with existing neural tissue to enable normal brain activity (5). This creates the potential to alter the neural genome, phenome and connectome in ways that induce short- and long-term structural and functional changes to affect brain activity relevant to cognition, emotion, and/or behavior. It is not diffi cult to imagine how an increasingly embellished, or widespread use (or misuse) of these technologic applications could impact not only human thought, and action, but also more fundamental constructs of beliefs, intention, and the nature, meaning and contexts of various socio-cultural interactions. These possibilities illustrate the ways that sustained investments in basic and applied neuroscience and neurotechnology can be directed at the structure of the brain and its function(s) — viz. – the “mind” — to incur profound impacts upon aspects of human cognition and behavior that are relevant and important to security and defense.

As with other scientific and technical innovations (e.g., flight, nuclear physics), the dual-use (i.e., civilian and military) capability of neuroscience is apparent. Since the early 20th century, technologies that affect the nervous system, and brain~mind have been employed in national defense (e.g., nerve gas, attempts at “brain-washing” techniques of interrogation, etc.). The speed and sophistication of new developments in neuroscience and neurotechnology (as well as the linking of existing devices and technology to innovative approaches; e.g., nanoscale delivery systems; genetic tools, etc. within a directed program of integrative scientific convergence) are such that the breadth and depth of this progress demands continuous re-address, re-appraisal, and reflective governance (1). While ethical caveats have restricted neuroscientifi c research in US national security and defense (at least to some extent), it cannot (nor should not) be overlooked that other nations are making tremendous investments in brain science, and much of this research could provide a basis for offensive capabilities. In response to these potential threats, we posit that it is important that the United States conduct research to examine and evaluate how and what neuroscientific neurotechnologic advancements may be employed in these ways, so as to anticipate, be prepared for, and perhaps counter such intelligence and military application(s) of brain science by our (current and future) adversaries. But while an emphasis has primarily been upon anticipating threats posed by other nations, we believe that it is equally important to emphasize United States’ capabilities so as to remain ahead of — or at least in step with — any international competition in these areas, and in this way, not render our national security vulnerable. But, surveillance, identification, analysis and a forward-looking program of research development testing and evaluation (RDTE) does not imply our developing and stockpiling potential neuroweapons. If the nuclear age has provided any lesson at all, it is that any programs of mutual, mass accumulation of weaponry is both self-perpetuating, and generally problematic. Rather, we posit that a viable goal is to develop and utilize neurotechnologies to maximize national intelligence efforts, and apply such intelligence methods to deep analysis of the fi eld and the assessment and mitigation of any/all international efforts that might be considered as potential threats. Indubitably, new threats will emerge that could be diffi cult to mitigate without sufficient information and knowledge of the strengths and limitations in other nations’ existing and potential neuroscientifi c and neurotechnological capabilities. Thus, attention to augmented cognition technologies, and its employment in education and training, as well as operational field use, are of vital importance, both at present and in the future. In this light, we have identifi ed four interactive areas of neuroscience that could affect and be important for national security; these are:

1. Nano-neuroscience: Nano-substances and devices may be engineered to alter neural networks, induce changes in properties of the nervous system from periphery to brain, and affect sensitivity to internal and/or external stimuli. Nano-neurotechnologies could therefore be used to modify cognitive, emotional and/or behavioral functions, and in this way affect mental and motor capacity, alter mood or cause near- and long-term disability. Such capability might be used to modify the function of national intelligence and security personnel, and/or could be employed in a) combat (both to enhance performance of troops, as well as impair function of enemy warfi ghters) and/or b) by our enemies as a form of biological-technological terrorism and a means of mass subjugation.

2. Advanced neuropharmacologicals: Augmented cognition and neural performance improvement (and/or degradation) can be achieved through the use of psycho-neuropharmaceuticals. As mentioned above, these agents could be administered via nanodelivery systems that allow enhanced access to the central nervous system (CNS) in ways that maximize biological (and ultimately psycho-social) effect(s), yet could easily elude detection. Similarly, pharmaceuticals can be linked to brain stimulation technologies (vide infra) to synergize effects in modifying specifi c cognitive, motoric, emotional and/or behavioral processes.

3. Neuro-imaging and neuro-manipulative devices: Current and prospective developments in neuroimaging offer the potential to visualize relatively site- and network-specifi c brain processes that are putatively involved in (or may explicitly subserve) various cognitive-emotional and behavioral functions. Identifying these neurological axes could provide means to investigate — if not “detect” and/or “reveal” — mental states. But imaging alone, at least in its current iteration(s), while useful in the scientifi c and medical investigation of cerebral function, may be of limited utility for practical applications of rain~mind science for intelligence and defense purposes. Efforts are underway that focus more upon measuring (i.e., quantifying and qualitatively defining) brain activity, in attempt to provide indications of “what”, if not “why” cognitive and/or emotional processes (such as deceit, intent, aggression, etc.) occur. Obviously, this has given rise to hypothetical “mind reading” scenarios, and, like other aspects of neurotechnological research and applications, has prompted considerable debate about the validity, value and ethical implications of such devices and techniques. Moreover, imaging/ measurement can be yoked to neuro-interventional technologies (e.g., transcranial magnetic stimulation, pharmacologicals) to guide or enable manipulation of  neurological activity. Simply put, near-future iterations of these technologies (either as stand-alone modalities, or if used in convergence) makes the notion of biotechnologically “altering brains” to “changing minds” evermore viable.

4. Neuroinformatics and cyber-neurosystems: The linking of rapidly advancing computational capability to neurotechnology has established three major domains of progress. The fi rst is the use of computational systems and models to augment human cognitive processes (i.e., human-computer interfaces), the second is in reverse-engineering cognitive mechanisms to create computational techniques and systems to achieve efficient and robust machine intelligence(s), and the third is the data banking of information (about neural structure — including genotypes — and function) to facilitate real-time access, analyses and use.

References

1. Giordano J, Gordijn B. Scientifi c and philosophical perspectives in neuroethics. Cambridge:  Cambridge University Press; 2010.

2. Giordano J, Olds J. On the interfl uence of neuroscience, neuroethics, and ethical, legal and social issues: the need for (N)ELSI. Am J Bioethics- Neuroscience.2011. 12-14.

3. Soon C, Brass M, Heinze H, Haynes J. Unconscious determinants of free decisions in the human brain.

Nature Neuroscience. 2008; 11:543-545.

4. Libet B, Gleason C, Wright E, Pearl K. Time of conscious intention to act in relation to onset of cerebral activity (readiness-potential). Brain. 1983; 106(3): 623-642.

5. Kim T, Nakagawa T, Kita T, Higashi T, Takebayashi S, Matsumoto M, et al. Neural connections between

Hearing Voices: Audio Implants by Intelligence Agencies

AUDIO IMPLANTS

BACKGROUND INFORMATION

The concepts used in audio implants had been discovered in the first half of the 20th century, but the refinement of technology to take advantage of what had been discovered waited until the second half of the century. The development of audio implants ran on two tracks, one was the public medical research and the other was the secret Illuminati/Intelligence Agencies’ research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati was experimenting on some victims at this stage, and the military in the Vietnam war used auditory implant devices to aid communicating to their men who were sent into tunnels and who were placed into forest situations where audible noise would compromise their locations to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the experimentation secret. It appears from looking at the worldwide research on audio implants that the Illuminati realized that the field was so ambiguous, and open to so many different approaches, that rather than straightjacket the research community by a specific strategy, they encouraged a wide variety of approaches in the research. Consequently, research by one group would overlap or duplicate research by another. Much to their credit, a few researchers rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the intelligence agencies were willing to start using hundreds of people to experiment operationally with the implants. People in every state of the U.S. were selected as victims. Many of these implant victims had programmed multiple personalities already. The controllers were very heavy handed with the people they implanted, and they used the full force of the Illuminati/Intelligence agencies power to keep these people under their control at all times. These innocent victims have had their lives totally destroyed. Some tried to fight back, spending thousands of dollars to get out from underneath the incessant audio messages that the implants sent, but the system was too big and too powerful to fight. Police, congressmen, psychologists and many other people turned their backs on these victims. Some victims who initially fought back gave up resisting, some committed suicide, and some continued to fight. Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia, France and other countries began to receive the cochlear implants. Australia was so proud of their audio implant research/development they issued a postage stamp showing an implant device (“bionic ear”) developed in Australia. The question begs asking, if thousands of people have publicly received audio implants, isn’t obvious that the secret societies and secret intelligence agencies have done at least as much if not far more?

BRIEF CHRONOLOGY OF AUDIO IMPLANTS

1790–first known attempt by Volta to electrically stimulate the ears. He shot approximately 50 volts of electricity into his auditory system, and experienced the sensation of a blow to the head followed by a sound like the boiling of viscous liquid.

1850–Electro-otiatrics was begun by otologists who hoped electricity could help ear diseases in various ways.

1925–Sounds were created in people by radio engineers by placing electrodes near the ear with a modulated alternating current.

1930–Weaver & Bray discovered the principles used later in the cochlear microphonic implants.

1937–By passing an alternating electrical current in the audible frequency range from an electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear sounds. For a number of years these men studied this phenomena.

1957–Djourno and Eyries in France woke the world up concerning the ability to electrical stimulate the auditory nerves and produce sound with their reports. A patient from France reportedly gets William F. House, MD interested in developing an implant device.

1961–William House implants two patients with short-term audio implants. One patient receives a multiple electrode implant.

1960s–intense research for audio implants is conducted in California in places like Sanford, the Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to soldiers in situations where external noise would compromise the location of the American soldiers, such as exploring tunnel system.

1970s–Various researchers around the world begin publicly implanting audio implants into people. The Illuminati and intelligence agencies begin to secretly implant people, this is known because many of the early victims can pin point at time in the 1970s when they got their audio implants.

1980–The FDA establishes Federal regulations regarding cochlear audio implants.

1984–By this year, 369 people have publicly received the House Cochlear Audio Implants, which have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for use in adults, which is already in hundreds of adults, receives FDA approval in Nov.

1990s–Audio implants along with other implants begin to be used more aggressively by the mind-control programmers. Successful intelligence operations are carried out with the aid of audio implants.

BASICS OF HOW THE IMPLANTS CAN FUNCTION

Thousands have publicly received audio implants, and thousands have received audio implants without their permission by the New World Order. The implants (whether secret or public) basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or electrical stimulating device. When sound waves arrive to the human ear, the sound causes biological reactions all along the auditory pathway–from the cochlea, the auditory nerve, the brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game for machinations of the mind-control researchers. There are brain stem potentials which originate in the auditory brain stem nuclei–primarily in the inferior colliculi. The public auditory implants produce a small electrical stimulus that bypasses damaged hair cells and directly stimulates the remaining auditory neural elements. This means that for the secret implants, the electrical impulse that is generated to stimulate the person to hear a sound or sentence is totally unnoticed by everyone but the victim. As mentioned before, psychologists are being used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do these psychologists know that the person isn’t hearing voices from an implant? Some psychologists are declaring the implant victims are “crazy”, “delusional”, & “insane”, because audio implants supposedly don’t exist–therefore it is useless to give any credence to the complaints of victims. In other words, psychologists are being used as the establishment’s witch doctors to cover up the mind-control activities of the New World Order. What’s new? Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the programmed-multiple slaves “paranoid schizophrenics”. During experiments, it was discovered that the skin of a person can pick up auditory vibrations, so tests were run to see if implants in other parts of the human body could be used for auditory implants. The vibrotacticle system of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the brain was a very limited way to create sound. For most purposes it isn’t a viable approach, even though some experimental auditory implants were placed in places like the chest. The ones that were tested only reconfirmed the suspicions that the best results are by using the inner cochlea and the auditory canal area. Dr. Begich’s and later others showed that a nonlinear function will translate one frequency to another frequency, but although it does jump, this method is inadequate for the current mind control signals, and a linear function is used which operates simply on the energy that the implants have.

Originally single channel devises were used, but then multichannel devices were soon found superior. The processing units of a device, had to have an extraction method to determine the pitch of the signal and then would present a square wave at the rate of that frequency. Soon the miniature computers that made up part of the audio implant were made so that they were programmable. Some of the publicly implanted people (for instance some who got a 4 mm. cochlear auditory implant), who thought they were getting medical help, were later followed up a decade later by the intelligence agencies for their own agenda, and instead of just hearing the world, they got to hear mind-control drivel from some handler communicating via the implant. As sound waves come into the public implants, they are fast Fourier transformed into many channels lying between say 100 and 4000 Hz. Each channel may be assigned to a specific electrode located on an array of electrodes. The electrodes are stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators that then stimulate the subject to hear something. (Fourier transforms have also been identified being used by human brains to encode memory.)

In order to keep their signals to their implanted victims secret, the Network employs a tactic called piggybacking where they piggyback their own audio transmission onto standard FM frequencies.

CANAL is the acronym for an system that is used simultaneously for transmission and reception via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.

USES OF THE IMPLANTS

a. by themselves

b. with other implants

c. in conjunction with other mind-control devices

TYPES OF AUDIO IMPLANTS–

Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.

Part A. Publicly admitted audio implants.

The entire world has gotten involved in audio implant research. The British Cochlear Implant Group has been setting up “implanting centres” for the UK. Not all the publicly known implants will be listed here, for instance, some of those I chose not to list include some developed in Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made implants, and several made in East and West Germany before the wall went down, and the Swiss implant which was simply the Austrian audio implant used with their own processor.

3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGN–MODEL 7700 (AKA ALPHA)

BANFAI, EMG –Several models developed by Banfai in Cologne-Dueren, West Germany. It is digital, with a pulsatile signal and a programmable memory. The implant can be communicated with using an interface device hooked to a computer. The patient has a keyboard. It was first implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of people.

BRITISH, for instance UCH– Developed by Douek, Fourcin and Moore in London and implanted with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and promontory grooves for the electrode, and neural network programming in its computer memory.

CHEN AUDIO IMPLANT–developed in Guangzhoi, mainland China and first implanted in 1984. It was said by the chinese that 20 people received this implant.

CZECHOSLOVAKIAN–Implants were created by Volvoda and Tichy in Prague and implanted in the 1980s into a few people.

FRASER–Developed in London, and first implanted in 1983. It was notable because it had a round window in the implant. In the first few years it was implanted into 56 people. The encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other European researchers had done

FRAYASE–Developed in Toulouse, France, this audio implant was implanted with its receiver in the chest. It was first implanted in 1981, and 22 people were said to have received it.

GOA–developed in Shanghai, China by Lee and Lin.

INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a woman who had an implant in one ear and not the other. She was asked to compare the pitch signals from natural sources versus the right ear audio implant. The most apical implanted electrode was not as accurate as the more basal located electrodes using an Ineraid implant.

IMPLEX COM 12–Comes with an interfacing computer and a Syncom patient self-tester

LAURA–Developed at Antwerp, Belgium. These were first implanted in 1986, and had an internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an antenna, and a data control circuit. Only a few subjects got this implant. It comes with a computer, and an interface unit. It does have a programmable memory.

MED-EL –Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in 1977. Hundreds of people were implanted with this audio implant. Some were implanted externally with it and some internally inside the ear canal. It has one channel and a multitude of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It does not have a programmable memory.

MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by 1990 into 179 people.

NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARK’s Implants)–At least two models developed in Australia at Melbourne. This audio implant was first implanted in 1978. The implant is programmable from the outside. It has been implanted into many hundreds of people. It has a multitude of electrodes that stimulate the audio system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant comes with a diagnostic and programming interface computer. The Australian government heavily subsidized with millions of dollars research into audio implants and got the Cochlear Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid succession, and special algorithms are used which change the relationship between the pulse amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.

Storz Instrument Co.’s Implant–developed at Univ. of Calif, San Francisco.

Part. B. Secretly implanted audio implants.

There were several profiles of people that were used in the World Order’s selection of secret victims to implant. The following were criteria that they liked in the selection process, a. vulnerable, such as single women, b. people who were already programmed with trauma-based mind-control, c. psychics, who had already told people they heard or saw things ordinary people don’t, d. people, not highly regarded by society such as minorities, criminals, street people, mentally insane, who would not be able to find a support system to help them fight the experimentation. They also did the audio implants into some of their own intelligence agents, apparently to some who were getting somewhat difficult to their superiors. Because of this type of profile, and some other things this author learned, it appears that the initial two decades were used more for experimentation and development than they were for actual operations. However, with more than 2 decades of experience, they are now fully operational. From watching their interaction (messages) with victims of audio implants, it is clear that they are not in the testing stage, but are fully operational, and have a full cadre of trained operatives (men & women) to staff the secret bases from which the monitor and broadcast signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx. 6 a.m. In other words, from what we can tell they are using standard shift times for the audio implant control staffs.

COCHLEAR IMPLANTS–There are Cochlear implants for auditory control secretly implanted without permission. A rubber molding skin color covers the outer lining of the ear canal. There are tiny slits in this lining, which when pushed to the side would show the presence of coils and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face due to intense heat generated by implants, which is painful.

DENTAL AUDITORY IMPLANTS–At least a dozen victims have complained that after their teeth were capped they began hearing voices. Other sources indicate that during the filing process implants are being put into people. This is the type of implant placed into J. Z. Knight and left dormant for many years until they decided to activate her as New Age guru.

RIDGE IMPLANTS– These implants can produce Theta waves and even voices. They are designed to suppress a particular type of thinking. The body may be sent into paralysis or given various stimulus-response stimuli in order to suppress certain thought patterns. If the slave begins to have certain thought patterns that threaten the programming and programming structures, these implants kick in to divert the person’s mental activity to something else.

MASER BEAMS READING SUBVOCALISED THOUGHTS

The latest advance in electronic mind control is equipment that uses special types of microwave beams called MASERs (Gyrotron Resonance Masers). These are the laser equivalent of microwave beams.

MASER stands for Microwave Amplification by Stimulation Emission of Radiation. A LASER is a MASER that works with higher frequency photons in the ultraviolet or visible light spectrum (photons are bundles of electromagnetic energy commonly thought of as “rays of light” which travel in oscillating waves of various wavelengths) .

These MASER beams have been used to develop something called synthetic telepathy. This is the ability to read people’s minds from a distance. Electronic scanning of victims’ brains by monitoring the electromagnetic (EM) emissions from peoples brains and using amongst other things, the brain waves (as measured on an EEG), to read the victim’s subvocalised thoughts.

In synthetic telepathy, the weak electromagnetic signals in the brain associated with subvocalised thought, are connected to a computer by use of electrodes, or in more advanced mechanisms by MASER beams. Sophisticated computer systems have learnt to read the subvocalised thoughts in the brain, by associating a specific brain exciting potential, with a particular word. In this case, only one specific language can be decoded, as each word in a language has a specific set of frequencies that must be discovered. Once the donkey work of finding the specific frequencies for all the words in a language has been programmed into a super computer, which can carry out massive parallel processing, fuzzy logic software is used to match this with real world excitation potential associated with subvocalised thought obtained from thousands of abductees, who are used to calibrate the synthetic telepathy devices.

Synthetic telepathy detects the I5Hz, 5 milliwatt auditory cortex brain emissions, that are linked with the excitation potentials in the brain associated with subvocalised thought. New technology, involving low frequency microwaves and RF, has enabled devices to be built which can scan through walls and look inside peoples’ bodies like X-rays. This enables security personnel to see a target in his own home and to track him throughout the house. Further to this, being able to see inside the victim’s head, would allow computer controlled targeting of specific brain centres in the victim’s brain, even when he was walking around the house. A scan of the specific brain emissions given off when the victim subvocalises using an array AF pulsed frequency MASERs fired at the specific brain centres of the subversive, while he resides in his own home, enables the victim to be scanned. By finding an array of ELF pulse modulated MASERs, which scan up and down the window of frequency emissions given off by subvocalised thought, interference effects can be measured in the MASER beam. The victim’s ELF brain emissions will interact constructively or destructively with the pulse frequency MASER carrying ELF in the ELF window associated with subvocalised thoughts.

If we fire an array of pulsed MASERs, which are out of phase with each other, extraneous noise can be filtered out in the digital domain. Since the converging ELF modulated MASERs are being effected by the low level emissions in the victim’s brain, the shifts in the ELF pulsed signal going into the subversive’s brain can be detected.

A simplistic version of this would be the LASER beam shone at the window of the person that is being bugged. The vibrations in the window cause modulations in the LASER that can be converted into electrical signals and hence into sound. In this way the subvocalised thoughts in the victim’s brain can be read. Having already built up a library of excitation potential signatures for differing words and groupings of words, a sophisticated computer can begin to decode the emission signatures into word streams. In this way the subvocalised thoughts of the victim can be stored in the memory of a supercomputer and analysed to give a read out of what the target is thinking.

Using ELF audiograms carried by a single pulse-modulated Maser, subvocalised thoughts can be placed in the victim’s brain. This enables synthetic telepathy operators the ability to enter into conversations with the subversive to drive him mad or to bring up key words which will get the victim thinking about the information they wish to find. Visual cortex excitation potentials can also be broadcast into the victim’s brain so that illusory images can be projected into their brain to drive them mad, or to program them to commit suicide.

 

An introduction to the effects of “ACOUSTICS” on the human body.

Lately the mainstream television media has addressed the issue of illegal surveillance possibly performed on and against American citizens within the borders of the United States, and has mentioned wiretapping, and reading of e-mails, but no real mention of the heavy duty “ACOUSTICS”.  “Acoustics” refers to the more sophisticated type of surveillance devices which can actually be used as WEAPONS when deployed certain ways.  The “I.R. laser” can be aimed at an area or focused on a window pane or other part of a building or vehicle and can pick up sounds and conversations which can be transferred through electronic circuitry and amplified to produce recognizable conversations and voices, etc..  Whether this device is aimed directly at a person within the building or vehicle, and how close the device is aimed from may determine how much ear ringing or skull pressure and general aggravation the target-victim may suffer.  Also any ability of the operator to alter the modulation of these devices may have an additional effect on the target-victim.  Recently there were incidents on mainstream television news in the past few years of aircraft pilots getting lasers aimed into their cockpits, and the reports of persons going blind or partially blind continues as well, though much of the blindness injury reports escapes the media.

In the event the surveillance lasers are used in the attacks on airliner pilots within their cockpits and the unexplained blindness injuries, do you think government agents would actually admit they have abused these surveillance weapon-devices?  If one could show a jury in a courtroom the harm these devices are capable of doing to a human body up close, would it not stand for reason that they are harmful at any distance to the body, especially sensitive organs ??!!!  I doubt seriously if any law enforcement or military person would want to get in front of one of these devices and stay there for as long as they have aimed them at surveillance target-victims.  Why??

Surely the personnel who use these lasers have been trained and briefed on the possible effects of direct exposure.  There are other forms of these surveillance weapon devices which use sonar type technology, microwave, etc., etc., and most use radiation.  Whether one aims non-nuclear, electromagnetic radiation at a person, or nuclear gamma X-ray at someone, the effects on a long term overall basis to the human body will most always result in some debilitation like cancer or anemia, or chronic fatigue, or possibly even a condition of inflammation of blood vessels which can also result in death.

Regardless of what kind of radiation one cares to mention, if it is applied to the human body the results can be catastrophic if the radiation is re-applied over and over again on a regular basis.  How does this relate to today’s topic of surveillance?  Once again, if surveillance weapon-devices depend on emitting radiation aimed at target persons to hear the information then the target persons are receiving doses of radiation and we can say the device operators are “radiating” the target victim.

Enough repeated exposure sessions and the target victim person may begin to feel bad.  Let’s look at an early form of one of these devices which was used against an American embassy’s personnel later, and for now, let’s concentrate on the significance of how the Patriot Act allows abuses of these surveillance weapons on individuals domestically, that is, within the United States.

Under normal circumstances if the United States was not operating under the Emergency War Powers Act and other emergency laws, it would require a warrant be issued by a court of law in order to wiretap or invade one’s space with a microwave listening or infra red laser device and that would require a show of cause to a judge as in a “show cause” order.  At least some form of rudimentary evidence of possible terrorism or dangerous activity to provide “probable cause” for such investigation would need to be produced against the target person to be spied on before authorities could proceed with the sophisticated radiation producing weapon-devices, and the main point of all this is………..this would leave a legal record of when, and, consequently, how many times the targeted subject was radiated !!!!  Without this record a person can be relatively burned up with these weapons, having no way to accomplish discovery and form a lawsuit or counter suit against this brutal space-age abuse!!!

According to what I’ve seen, The Patriot Act forbids persons knowing of certain types of investigations from telling the target person he or she is being investigated, and applies even if the target is a relative.  Do you see what a perfect setup has been arranged for completely blindsiding, victimizing, and destroying a target-victim by various illegal programs of discrimination by authorities in the United States?  Don’t forget the F.B.I. Cointelpro program which may be called something else these days.  Remember how the late actress, Jean Seberg, was mentally tortured by the false, planted newspaper rumors and had a miscarriage?  She was later found “suicided”, dead for about 11 days, I think.

With no legal recourse, no legal remedy, no redress of grievance, the present day American public is literally falling apart.  In California one tortured man ran out of his house using his baby daughter as a human shield as he charged the police, allegedly firing at them with a gun, and he and daughter were gunned down and killed.  But, nowhere did anyone I know hear any news reports of whether acoustics were used on him and his family.  This man may have been driven mad by acoustics.  The press won’t say.

Perhaps those who don’t buy the phony Warren Commission Report just need a big dose of mind control, super duper microwave surveillance radiation, and, gee, without the need of a warrant issued by a judge who knows his or her bill of rights, such a skeptic can, without a doubt, be re-surveilled (radiated and treated) again and again.

Microwave Surveillance is Mind Control.  Microwave mind control hides government corruption as it destroys the target victims.  Target victims are citizens who are a liability to the crime families and syndicates who run and control the United States.

 

http://www.informamerica.net/

https://geeldon.wordpress.com/

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s