Category Archives: biomedical research

American Human Rights Advocate Reminds German Ambassador, Dr. Otto Lampe, of Documented US & German Non-Consensual Human Experimentation

American Human Rights advocate and researcher Karla Smith reminds Dr. Otto Lampe, German Ambassador in Bern, Switzerland of lessons from history which reveal that non-consensual human experimentation was performed during the 20th century by unethical Nazi doctors in Germany just as much as by unethical military doctors in nominally democratic USA, in this letter submitted in support of physicist and German citizen Dr. Katherine Horton who recently issued a worldwide appeal for help in stopping the inhumane covert assault on her person with electromagnetic weapons in Switzerland.

Today, as testimonials of personal assault with 21st-century radiation weapons and neuroweapons are surfacing from all over the world—as amply covered here and on various informative websites online—even as Governments try desperately to clamp down on news of this phenomenon with a mainstream media blackout, avid government propaganda, and political collusion with the Big Pharma-run industry of psychiatry to label all reporting victims delusional, schizoid, and paranoid–Karla Smith emphasizes that these complaints must be taken seriously, because we are living in an era of Big Funding for directed-energy weapons testing, brain research, genetics research, and more, while history shows us military and Intelligence agencies have freely indulged in non-consensual experimentation in the past on civilians and veterans:

This early experimental research under Project MKULTRA is considered the foundation of non-lethal weapons programs that are currently active. There is abundant evidence in the public domain that non-lethal weapons research is ongoing and funded annually in the tens of millions of dollars, or more.

Given the fact that chemical and biological weapons, behavior modification drugs and radiation have been tested on non-consensual civilian populations; and on-going complaints of electronic harassment by U.S. and foreign citizens, it is possible or even likely that non-lethal weapons are also being tested on unwitting citizens. With the advent of the U.S. Brain Initiative, Europe’s Human Brain Project, and the Human Genome Project, additional complaints are emerging about non-consensual human experimentation with other technologies such as neurotechnologies.”

This letter is posted with the writer’s permission, in the hope that awareness of these electromagnetic assaults on innocents and activists, whistleblowers, veterans, and writers spreads, and more and more people become aware that the phenomenon of “Targeted Individuals” is not an issue for mental health “fed by the Internet,” as Government propaganda primes you to believe, but rather, is an issue of gross human rights violation with Electronic Warfare weaponry that every one of us needs to speak out about and take personal action to stop. Please read more about Dr. Horton’s situation, and please express your humanity by taking action on her behalf, yourself. Please share widely.

***

December 21, 2016

To: Dr. Otto Lampe
German Ambassador to Switzerland

From: Karla Smith, U.S. Citizen
Subject: Letter of Support for German citizen Dr. Katherine Horton

Dear Dr. Otto Lampe,

I am writing a letter of support for German citizen and particle physicist Dr. Katherine Horton who has reported systematic abuse by electromagnetic weapons and harassment.

Historically, it is well documented that both the United States and Germany have engaged in unethical non-consensual human experimentation. As you may be aware post World War II the United States recruited Nazi scientists through operation Paperclip where they were assimilated into government positions.

The United States (U.S.) engaged in government-sponsored radiation, biological, and chemical warfare experiments from World War II into the twenty-first century. The U.S. also engaged in behavior modification programs such as Projects Chatter, Bluebird, Artichoke, and MKULTRA and others which were often interwoven with radiation experiments and research on chemical and biological weapons.

In Senate testimony transcribed in Human Drug Testing by the CIA, 1977 (page 90), Dr. Geschickter described research with radar directed towards monkey brains to see if they could be put to sleep. This MKULTRA Subproject 62 was conducted at the National Institutes of Health by Dr. Mailtland Baldwin, a neurosurgeon. A Subproject status report states that, “certain kinds of radio frequency energy have been found to effect reversible neurological changes in chimpanzees.”

This early experimental research under Project MKULTRA is considered the foundation of non-lethal weapons programs that are currently active. There is abundant evidence in the public domain that non-lethal weapons research is ongoing and funded annually in the tens of millions of dollars, or more.

Given the fact that chemical and biological weapons, behavior modification drugs and radiation have been tested on non-consensual civilian populations; and on-going complaints of electronic harassment by U.S. and foreign citizens, it is possible or even likely that non-lethal weapons are also being tested on unwitting citizens. With the advent of the U.S. Brain Initiative, Europe’s Human Brain Project, and the Human Genome Project additional complaints are emerging about non-consensual human experimentation with other technologies such as neurotechnologies.

Project MKDELTA was a special procedure designed by the CIA to oversee MKULTRA research conducted abroad in the 1950’s. MKDELTA funded the use of biological materials for harassment, discrediting or disabling purposes. COINTELPRO was a series of covert projects aimed at surveilling, infiltrating, discrediting and disrupting domestic political organizations and individuals that the FBI deemed subversive. Similarly, Zersetzung, which is well documented, comprised extensive methods of control and psychological manipulation against subversives.

In the United States, over 300 victims alleging on-going non-consensual research wished to offer comment to the Presidential Commission for the Study of Bioethics Issues (PCSBI) meeting of May 18-19, 2011. Due to overwhelming response only 19 victims were allowed to testify, however statements were submitted by victims to the PCSBI. Additionally, in January of 2016 approximately 60-70 victims submitted approximately 90 public comments to the Department of Health and Human Services regarding proposed changes to the federal policy for the Protection of Human Subjects.

In March of 2016, the Minister of National Defense for Poland Antoni Macierewicz received a question from a Polish citizen who asked [translated from Polish to English] “Does Poland have a strategy in regards to illegal experiments, that means the testing of electromagnetic weapons on Polish citizens?” To which he replied [translated from Polish to English] “Right now we are doing an analysis to identify where people who complain of such ailments and situations are located. I think in about 6 months I may be able to tell you more in regards to these matters. But from the limited information that I have received, the regions of South West (Lower Silesia) and North West Poland are where most of the complaints are coming from.” See

https://www.youtube.com/watch?v=YgVs4-m0lNY.

Complaints by citizens such as Dr. Katherine Horton warrant consideration and investigation based on historical facts; on-going research into non-lethal and directed energy weapons and other technologies; as well as similar complaints by other citizens of Germany, Poland, the United States and other countries.

Thank you for your consideration.

Karla Smith

***

RELATED:

NSA Whistleblower Karen Stewart’s Letter to Dr. Otto Lampe, German Ambassador in Switzerland, on Dr. Katherine Horton’s Behalf

Dr. Katherine Horton, Oxford Physicist, Assaulted with EMF Weapons, Needs Your Help: Please Write to the German Ambassador in Bern

Seth Farber, Ph.D: The Psychiatric Metanarrative, Targeted Individuals, and the Deep State: A Response to The New York Times

Open Season on Targets: Blacklisted Individuals, Extreme Abuse in Targeting, Secretive Lab-Rat Exploitation, & Massive Establishment Cover-Up

No Waivers of Informed Consent, PERIOD: The Public Reports Ongoing Non-Consensual Experimentation and Demands the Common Rule Protect Citizens, Not Covert Activities July 17, 2016

February 8, 2016, International Day Against Mind Control/In Honor of Dr. Rauni Luukanen-Kilde

https://i1.wp.com/www.mind-control-news.de/images/grafiken/500/8-feb-2016-international-day-against-mc-h500.jpgRe-posted, on request, from Mind Control in Deutschland und Europa, who are seeking to disseminate information on a call-in television program in Poland tomorrow, on Feb 8, to raise public awareness of Mind Control (EMF radiation/scalar/sonic) weaponry being used extra-judicially and covertly on citizens in Europe and worldwide, and discuss issues related to Mind Control Harassment, on the occasion of the newly-instituted International Day Against Mind Control, created to honor the anniversary of Dr. Rauni Luukanen-Kilde’s passing. As many know, Dr. Kilde, who was Chief Medical Officer of Finland, was a vocal opponent of Governmental and military mind control programs using Covert Electromagnetic weapons that she learned about in the course of her professional life, researched, authored books on, and took every opportunity to speak widely about. The TV program mentioned below is a joint venture of Swedish WHITE TV and Polish NTV, and will include Skype call-ins, more information below.

Dr. Kilde’s December, 2000 essay, posted here earlier, titled Microchip Implants, Mind Control, and Cybernetics traces the history of brain implants, the abuse of neurotechnologies in non-consensual brain experimentation projects being conducted worldwide today by governments and militaries, and warns against the very real and imminent dangers of human robotization implicit in these trends. You can explore her several informative and insightful talks and interviews on Youtube. Dr. Kilde, whose death is attributed to covert assault by Directed-Energy EMF weapons, which she had reported earlier, also spoke and wrote widely on subjects of spirituality, consciousness, and evolution, and was known and loved for her positive outlook, vitality of spirit, and outspokenness.  

***

World Day against Mind Control on February 8th, 2016

Contributed by redaktion on Feb 06, 2016 – 01:20 PM              Pageviews: 156

Picture 0 for World Day against Mind Control on February 8th, 2016

First international day in memory of Rauni Kilde and for TIs worldwide called for Monday, Februay 8th 2016. Polish NTV will send 3 hours special program. National Groups to send victims’ reports.

Minden/Poland/Stockholm.

The following message was published by Tomek Bieniek from Poland.

Dear All,

As you recall, in Berlin I proposed on behalf of the Polish delegation and the originator, the NTV editor, Mr Zagórski, to proclaim the date of death of Dr. Rauni Luukanen-Kilde, International Day Against Mind Control. You have liked the idea and 8th of February is coming soon, so it’s time to put it into life and pay back the moral debt to her, who made so much for the TI’s movement.

Establish World Day for e-harassment victims

On this occasion STOPZET association together with the internet televisions: Swedish – WHITE TV and Polish – NTV propose to all the TIs’ of the world and their allies to take part in the common medial event.

Our aim is to proclaim the International Day Against Mind Control, to pay tribute to Dr. Kilde and to broadcast most widely via Internet the information about necessity of immediate prohibition of inventing, testing, producing and using the newest generation weapons that can remotely control human behavior.

On this occasion we plan to put online 2 following petitions to sign for you:

1) To the Polish Parliament about the prohibition of testing those weapons on the Polish citizens and about setting up the special parliamentarian committee to research the issue of secret EU and NATO experiments that were undertaken on us in this matter.

2) To EP (the letter edited by Mojmir Babacek that you know from Berlin)

International guests on Polish NTV

We plan at least 3 hours long program block. Our guests in studio will be Mojmir Babacek and Dr. Henning Witte that you know from Berlin, but we also count on the presence of the other TI friends on Skype or by video.

The first hour will be devoted to Dr. Kilde’s memory and the necessity of lobbying for the prohibition of weapons remotely influencing human beings’ nervous system. The second hour will be filled up with the statements of the victims of secret harassing from Poland and from all over the world.

Then we start the debate with the participation of Polish politicians and journalists. We would like to invite also you to take part in this event. .. watch NTV Poland on Monday

National Groups: Please contribute

grafik: international dayWe ask the representatives of national groups for a short video recording (2-3 min) about the situation of TIs in a relevant country. If there are a few associations in a country, we ask each of them to introduce itself, give the number of members, estimated number of victims of mind control, if it is known, as well as briefly mentioned the most important issues and initiatives. Please send us the recorded video till 5 february into the following address wdr@otn.com.pl by WE TRANSFER.

The point is to make other Internet users aware of global scale of the problem and the fact that it may happen to themselves at any time as well. In addition, we would like the decision-makers and persecutors realize that their victims start organising themselves and demanding the compensation.

You need not expose your personal details or the face if you don’t want. However a tongue of the transmission i.e. English is a crucial element, because the entire meeting and all video materials are live broadcast online, repeated in the evening program. Later it will be put on YT on the special Playlist. In the case your English was a barrier, please record yourself in your mother tongue and provide the recording with English subtitles.

Marathon of revealing silent violence

We also want to invite the politicians and journalists, who feel displeasure of the violence applied towards us and would like to hurry with help. They will be invited into the studio in person as well as virtually (via Skype). If you know such people in your countries, ask them to support our event with the brief presentation on video. Best in English, and if it is impossible, then with translation in subtitles into English. A few words will literally be enough in a style like this: My name is, I am representing …, I am supporting etc.

Please, do it as soon as possible, as we will still have to put Polish subtitles and assemble that for Polish viewers in the end. In order to make the work easier for editors, we ask you to mark every recording with a category in English:

TI – for groups and associations of Tis, JOURNALIST, POLITICIAN or DIFFERENT.
We are waiting for your recordings till 4 February and this deadline is intransigent.

At last, we will open a special page for private persons or organizations, which would like to express their support for the movement of TIs. An e-mail address, a full name or a name will be enough for an organization. You will get relevant links and materials soon and we ask- let us do it together.

It is only a small pace and marathon is in front of us, but it is necessary to start one day. Jointly and definitely. See you in NTV!

for NTV – Janusz zagórski
for STOPZET – Ewa Pawela
for WHITE TV – Henning Witte

Source, with thanks: Mind Control in Deutschland und Europa

Exploring The FBI’s “Consensual Monitoring” and the CIA’s “Concealed Monitoring”: One-Party Consent to Electronic Recordings and Non-Consensual Two-Way Radio Implant Communications?

Perhaps we can start by agreeing there is no such thing as Consensual Surveillance, for if there were, we would all be ticking boxes on Census-like forms offered to us by benevolent government entities keen to surveill us with our consent, saying Yes! You can surveill me, adding, defensively, as many of the unthinking among us do, After all, I have nothing to hide.

The FBI States It Engages in Consensual Monitoring

Still, the FBI is on record now as stating that it engages in Consensual Monitoring, in the case of the aerial surveillance of Baltimore in May during the protests succeeding Freddy Gray’s death in police custody, as documents obtained by ACLU reveal. This October 30, 2015 ACLU report has the story, and the FBI Evidence and Memo Logs referencing “Consensual Monitoring” in pdf form can be found linked at the end of that article.  These evidence logs, which are redacted in places, seem to be logging in Aerial Surveillance Videos, but in a few cases, log in “Other Electronic Surveillance” which is still item-described as “Aerial Surveillance,” and in one case, additionally, as “Consensual Monitoring–Non-Telephonic.”

What is Consensual Monitoring?

fbiBaltimore-1What can Consensual Monitoring possibly be? Is the FBI defining a form of monitoring and surveillance it engages in as Consensual, in hopes of “keeping it legal”? One clue they offer is that it’s “Other Electronic.” It’s not Aerial Video. It’s not Aerial Photography. Can it be Aerial Cyber Surveillance? (Why would they need to do that from the air, when it would be far more effective from the ground?) It’s Non-Telephonic. So it’s not Stingray, Dirtbox, cell-phone-tower-mimicking scooping-up of cellphone voice and text data. It’s Electronic, and it’s Consensual–so they say–and it’s not Video, Audio, Telephonic, Cyber-related.

From the ACLU article:

“FBI evidence logs reveal that at least half of the flights conducted video surveillance, and that the FBI retained copies of those videos in its files. Other flights conducted some type of “electronic surveillance,” but specific descriptions are redacted. This suggests that those flights were perhaps using more sensitive or powerful recording gear than just video cameras, though what kind we don’t know.

What we do know is that one of the aircraft, a Cessna propeller plane registered to an FBI front company, NG Research, had specialized surveillance camera equipment on board. FAA documentation shows that the FBI installed a Paravion Technology infrared camera mount and a FLIR Talon multi-sensor camera system on the exterior of the plane. The FLIR system includes a “thermal imager,” an optical camera, and a “laser illuminator” for recording at night. We did not receive documentation about the second plane observed circling over Baltimore, so we don’t know if it was carrying different gear.”

Regular FBI Surveillance Flights Over Cities and Rural Areas

A June 2015 article by the Associated Press revealed the fact of regular surveillance flights over cities by FBI planes, although again the nature of the surveillance was not clarified:

“Scores of low-flying planes circling American cities are part of a civilian air force operated by the FBI and obscured behind fictitious companies, The Associated Press has learned.

The AP traced at least 50 aircraft back to the FBI, and identified more than 100 flights in 11 states over a 30-day period since late April, orbiting both major cities and rural areas. At least 115 planes, including 90 Cessna aircraft, were mentioned in a federal budget document from 2009.

For decades, the planes have provided support to FBI surveillance operations on the ground. But now the aircraft are equipped with high-tech cameras, and in rare circumstances, technology capable of tracking thousands of cellphones, raising questions about how these surveillance flights affect Americans’ privacy.

“It’s important that federal law enforcement personnel have the tools they need to find and catch criminals,” said Charles Grassley, chairman of the Senate Judiciary Committee. “But whenever an operation may also monitor the activities of Americans who are not the intended target, we must make darn sure that safeguards are in place to protect the civil liberties of innocent Americans.

The FBI says the planes are not equipped or used for bulk collection activities or mass surveillance. The surveillance equipment is used for ongoing investigations, the FBI says, generally without a judge’s approval.”

Also:

“One of the planes, photographed in flight last week (May/June 2015) by the AP in northern Virginia, bristled with unusual antennas under its fuselage and a camera on its left side.”

fbiplane

The AP video report that accompanies a Blaze article on this same AP report identifies the spherical white protrusion with cable on the fuselage as a ball camera to provide sweeping panoramic views, but the other equipment is not identified.

“Evolving technology can record higher-quality video from long distances, even at night, and can capture certain identifying information from cellphones using a device known as a “cell-site simulator” — or Stingray, to use one of the product’s brand names. These can trick pinpointed cellphones into revealing identification numbers of subscribers, including those not suspected of a crime.

Officials say cellphone surveillance is rare, although the AP found in recent weeks FBI flights orbiting large, enclosed buildings for extended periods where aerial photography would be less effective than electronic signals collection. Those included above Ronald Reagan Washington National Airport and the Mall of America in Bloomington, Minnesota.”

Currently Available Aerial Surveillance Technologies

On the subject of technology currently being used in Aerial Surveillance by Law Enforcement, and by Military PISR operations (Persistent Intelligence, Surveillance, Reconnaissance), see this slide show presentation from the company Persistent Surveillance Systems, linked in pdf and posted Jan 2014 at PublicIntelligence.net, which includes suggested policy statements on Persistent Surveillance for Law Enforcement, among other things.

The image below of the Surveillance Systems market size  is from this pdf. Also posted at Public Intelligence is the US Joint Command Handbook for Persistent Surveillance.

PSS

The Washington Post ran an article on this subject in Feb 2014. Also see the video produced by the Center of Investigative Reporting and PBS demonstrating this system.

Essentially, what they say is that Wide Area Persistent Surveillance camera systems that are carried on planes offer panoramic views of large areas such as whole towns and cities, several miles (up to 25 miles in reports) in diameter, and the way they are used is to generate real-time video by having the planes circle interminably over defined areas, for about six hours at a time, combining the data obtained thereby with that from networked ground cameras, traffic cameras, gas station cameras, etc., to create a detailed picture in real-time of what anyone is doing, outside, on foot or in cars/vehicles. CIR and KQED’s video on surveillance below introduces this system and also touches on biometric intelligence, and other forms of surveillance.

State of Surveillance: Police, Privacy, and Technology

ACLU also discusses this issue, and elsewhere covers wide area surveillance (ARGUS-IS) from drones as it raises privacy concerns.

Persistent Surveillance Systems on Military Electronic Warfare Planes

Merely as reference, consider too the kind of wide-spectrum surveillance and data collection in process currently with Military Persistent Intelligence, Surveillance, and Reconnaissance programs, which use continuously-generated data from planes, ground stations, and satellites, as illustrated in this Raytheon UK overview image, from a Dec 2014 AIN Online article (Raytheon UK Develops New ISR Solutions). Note especially SATCOM–how satellites are being used to network data from the ground, from aircraft, from mobile forces, and from “tactical” ground stations.

raytheonUKoverview

Electronic Warfare aircraft, whose collection of ELINT, COMINT, SIGINT–Electronic Intelligence, Communications Intelligence, Signals Intelligence–is achieved through sophisticated radar systems, electronic jamming systems, and radio antennas, use various networked tools to engage in Persistent Aerial Surveillance.

The image below of an Electronic Warfare plane is from GlobalSecurity.org; while this aircraft looks obviously military and loaded with “pods” and antennae, Military news reports (and Defence company news and press releases) over the past couple years have pursued the creation of increasingly “intuitive” portable and streamlined EW collections/jamming packages that can be mounted more easily on smaller craft, including drones, as well be used in ground vehicles, fixed installations, and in backpacks for “foot soldiers” to carry. (See The Future of Army Electronic Warfare, Sep 2013.)

So, looking again at the FBI surveillance plane imaged above, one might just wonder if it’s possible this high-tech FBI surveillance aircraft is merely a smaller, streamlined version of the plane below, carrying compact Electronic Warfare collection/jamming systems for Persistent Intelligence, Surveillance, Reconnaissance.

electronicwarfareaircraft

Electronic Warfare Includes “Signals Intelligence” Collection

Not to be forgotten is the fact that Electronic Warfare, which has been covered previously in this post here, includes electronic surveillance and remote electronic signals collection–by which is meant a variety of electronic signals, as this Army Concept Capability on Electronic Warfare for the Future Modular Force 2015-2024 document details, including remotely-culled information from computers and electronic communications. Electronic Attack, one of the three Army-Doctrine aspects of Electronic Warfare, seeks to use electromagnetic energy to attack personnel, as well as equipment, and Electronic Warfare Support  seeks out sources of intentionally and unintentionally radiated electromagnetic energy for threat recognition and targeting, as this overview image from the Army Concept Capability document illustrates.

ewow

Widely-posted –although less-well-known–information from the ’90s on NSA Signals Intelligence reveals that SIGINT also includes information on human bioelectric fields and EMF thoughtwave forms (unintentionally radiated energy), as noted by John St.Clair Akwei in his lawsuit against the NSA (See especially the Section, NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL)).

Returning to Consensual Monitoring

It turns out the FBI has Department of Justice-specified Procedures for Consensual Monitoring.

See this Sep 2005 report: Chapter Six: Procedures for Lawful, Warrantless Monitoring of Verbal Communications (Consensual Monitoring)/FBI’s Compliance with the Attorney General’s Investigative Guidelines (Redacted) Special Report.

Opening information from this report:

“Consensual monitoring is the interception by an electronic device of any wire, oral, or electronic communication where one of the parties to the communication has given prior consent to the monitoring or recording. A warrant is not required to conduct consensual monitoring, and the party providing consent may be a government agent. See 18 U.S.C. § 2511, (2) (c) – (e) (2002).

The Attorney General Guidelines governing consensual monitoring cover only non-telephonic consensual monitoring.319 The types of monitorings addressed by these Guidelines include the use of body recorders and transmitting devices. To supplement the Guidelines, the FBI imposes detailed administrative and management controls on the use of both non-telephonic and telephonic consensual monitoring. MIOG II § 10-10.”

Further, the report goes on to specify that DOJ permission to monitor is required only in the case of “sensitive individuals” such as members of Congress, Governors, and other public officials, and duration of monitoring be permitted in those cases for only up to 90 days at a time. For all other parties–such as you and me–no permission is required other than a sign off from a Special Agent at the local FBI office, and duration of monitoring may be marked by said Special Agent as “for the duration of the investigation,” may be conducted by anyone, including possibly Government agents, and doesn’t need a warrant or DOJ approval.

Records are required to be maintained in all cases of consensual monitoring; the record to FOIA-request is: Form FD-759, captioned “Notification of SAC/ASAC Authority Granted for Use of Telephonic and/or Nontelephonic Consensual Monitoring Equipment in Criminal Matters Only.”

Is Consensual Monitoring Accomplished via 1), Recordings Unilaterally Consented-to by Hundreds of Thousands of Recipients of National Security Letters, & 2), Covertly Implanted RFID transponders?

Given this information, while it appears as if this kind of monitoring is being legitimately engaged in by the FBI purely in matters of criminal investigations, because there is much information online about abusive surveillance–fraudulent and wasteful investigations on non-terrorists and non-spies mis-characterized post-Patriot-Act as terrorists and spies–being conducted by DHS/FBI, including from ex-FBI insiders and whistleblowers (such as Mike Germain), and because thousands of individuals today in the US report covert assaults with Remote Neural Monitoring technologies involving Directed-Energy Weapons and Covert RFID implants, two other possibilities come to mind:

Consensual Monitoring One: The consensual monitoring being spoken of here is via recorders, such as apps on cell phones, or videorecorders/audiorecorders on cell phones, which belong to people who are “co-operating in an investigation” by the FBI, and who are being gagged from speaking about this to the individual under investigation by way of National Security Letters, hundreds of thousands of which, possibly now more than a million, have been handed out every year (See the Electronic Frontier Foundation‘s Module on NSLs);

and Consensual Monitoring Two; The “body recorders and transmitting devices” spoken of are biomems, RFID chips, MicroElectroMechanical devices, neurostimulators, and the like, covertly implanted in individuals, which do indeed function as “body recorders” and radio transmitter/receivers. Of course, this is scarcely Consensual communications, even if it is a two-way radio communication, since the implants themselves are non-consensual, but is an attempt being made here to pass off RFID transmissions as “Consensual Monitoring”?

The CIA’s Concealed Monitoring

This brings us to the CIA, and a June ACLU article by Staff Attorney Ashley Gorski, New Docs Raise Questions About CIA Spying Here At Home which revealed the recent FOIA-requested (by ACLU & Yale Law School’s Media Freedom and Information Access Clinic) release of several documents–eg., the CIA’s own internal regulations on spying in both foreign and domestic areas, titled AR 2-2, a CIA/FBI Memo of Understanding regarding foreign and domestic intelligence collection, and others, related to the CIA’s collection programs under Executive Order 12333.

It must be noted, these documents are continuously redacted, with blanks in place of particular Intelligence collection information marked “National Security Act.”

These documented regulations apparently govern the domestic activities of the CIA, in its human subject research programs, its domestic intelligence collection programs, its foreign intelligence collected-domestically programs, its domestic monitoring programs, and its co-ordination with the FBI in domestic electronic surveillance and monitoring.

This ACLU article, and all the documents it points to, in particular the document AR 2-2, which clearly notes that the CIA engages in human subject research and experimentation programs–an issue of profound concern at this site, deserve close reading and analysis, and will be examined further here, in a succeeding post (when redactions will be filled in, speculatively).  

What’s of particular note here to this analysis, from this ACLU article/finding is: The CIA works closely with the FBI on domestic intelligence collection and can ask the FBI to collect intelligence anytime on anyone it likes. Any recording consented to by one party is not considered electronic surveillance, it is possibly considered Concealed Monitoring, a term that Army Intelligence and the CIA are familiar with(this seems to be the same kind of surveillance the FBI discusses as Consensual Monitoring, where one party unilaterally consents to a recording involving two parties or more). The CIA gives itself permission to install “monitoring devices” whenever no warrant is required for law enforcement–a loophole created by other loopholes–but does not specify what these devices are. (RFID Implants/Bio-MEMs maybe?)

The ACLU article notes:

“In addition, Annex B explains that the CIA may “use a monitoring device within the United States under circumstances in which a warrant would not be required for law enforcement purposes if the CIA General Counsel concurs.”

But what qualifies as a “monitoring device”? And how exactly does monitoring differ from “electronic surveillance,” which the CIA is prohibited from doing domestically? We don’t know. In the newly released documents, the definition of “monitoring” (as distinct from “electronic surveillance”) is redacted.​”

Redacted Signals Intelligence Collection Information, Persistent Intelligence, Surveillance, Reconnaissance, One-Party Consent Labelled Consensual Monitoring, Warrantless FBI Monitoring with Transmitting Devices, Warrantless CIA Monitoring Devices Used Domestically, Redacted Definitions of Monitoring

Security and Intelligence analysts need to start connecting the dots here and planning strategies to force this information out into the open in order to seek accountability and exposure. All Americans deserve to know that our Intelligence agencies–in particular the FBI and CIA–are 1) actively collecting particular electronic signals information the nature of which is being kept redacted and classified–but which thousands of Americans experiencing covert-assault and covert-access with radar and Remote Neural Monitoring technologies, as well as researchers studying Mind-Hacking patents and technologies can identify as Human Bio-Resonance EMFs and Brain EMFs; 2) getting away with close monitoring and surveillance of Americans, domestically, and secretively, using National Security Letters as leverage to obtain one-party consent that is then labelled “consensual monitoring”; 3) self-permitting and installing covert non-consensual implants of radio transmitting/receiving devices in the bodies of Americans so as to engage in Remote Monitoring which is then rolled into “concealed monitoring.”

Further posts here will specifically examine CIA involvement in ongoing classified human subject research and experimentation programs, and the nature of the transmitting devices/monitoring devices–radio frequency implants– being self-authorized for CIA/FBI use in undisclosed Remote Monitoring programs.

For an inside look at one extraordinary instance of the documented CIA use of biomedical implants in Intelligence collection as a surveillance method, see David Larson’s 2009 testimony, lawsuit against the CIA, and report with photographs.

 

 

 

Dr. Robert Duncan: The Executive Summary: Neuropsychological and Electronic No-Touch Torture Report

(Article re-posted with thanks to Todd Giffen and the site drrobertduncan.com.)

neuroI just recently came across this article on aspects of the Senate Torture Report, posted with a release date 4/2015, and read it with quite some interest as it seems to openly discuss the phenomenon of “No-Touch Torture” or covert remote-control electromagnetic torture of private individuals in once-free Western societies as an acknowledged CIA pursuit. The information it offers from the CIA point of view seems to suggest some of the CIA rationales and unspoken subtext and context for this program of torture, and gives hints as to what exactly is being intended and accomplished (covert detention without due process via electronic incarceration, covert “interrogation” via brainwave acquisition and modulation, covert “monitoring” via radio signalling to implanted devices) by this completely pathological and insane and absolutely inhumane program targeting thousands of individuals worldwide.

It would seem therefore, reading this report, that the entire phenomenon of “Targeted Individuals” being hit with electromagnetic and other directed-energy weapons is a CIA set-up, ostensibly to test more of their “enhanced” interrogation techniques on unsuspecting “detainees”–ordinary people in the US and elsewhere, who, much like the many innocent prisoners of Guantanamo who were picked up in Yemen and other places and have absolutely no connections to terrorism yet are being detained indefinitely without charges and tortured while in custody, are being “detained indefinitely,”and being “interrogated,” and being “tortured for purposes of interrogation”–only rather exotically, with energy weapons and implants which peer into brains and body parts, constantly track EMF emissions, and attack continuously and covertly with EMF signals on bodies and brains which are translated inside brains also as images, moods, feelings, sensations, dreams, and audio commands. Experimentation on human brains and nervous systems with energy weapons.

This is supremely disturbing, and an issue that needs to be tackled openly and publicly with the CIA. As noted elsewhere on this site, this is blatant human experimentation, that is being permitted covertly behind the scenes by our government under “classified” and “state secret” covers using “national security” as password for absolute abuse. (It’s not called Torture for nothing.)  

robduncanDr. Robert Duncan does a fine job detailing the ins and outs of this Torture, but refrains from disclosing details on the technologies involved, which, he notes, are still classified as “state secrets”– although “leaked” by thousands who have experienced these assaults (whom he also notes are frequently discredited as being mentally ill). Torture technologies, classified as state secrets–I feel it’s important to emphasize this; our sleeping American masses need to know this. We cannot exist as a free society when we have Torture technologies classified as state secrets! We Need open discussion–and open condemnation and termination–of these technologies!

Dr. Robert Duncan, of course, is the now-rather-well-known CIA researcher soulcand computer scientist who has written several books and given many public interviews on radio and video shows, including Jesse Ventura’s Conspiracy Theory, speaking candidly about his involvement in these mind control/uber-surveillance/nonconsensual experimentation programs which have been conducted unlawfully for decades on Americans and on citizens worldwide.

From the opener to his early work, The Matrix Deciphered: “My research interests have been neural networks, virtual reality, and EEG controlled robotics. Before graduate school I worked for the Department of Defense, Navy, NATO, and various intelligence agencies computer science projects. I have done business consulting and computer consulting for the largest companies in the world. I have been a professor, inventor, artist, and writer. I am one of the last Renaissance men.

My projects have included algorithms for Echelon and CIA natural language parsing and classification of document content, IRS formula for red flagging audits, writing the artificial intelligence code to automate tracking of the Soviet Nuclear Submarine Fleet and all water vessels, work integrating HAARP with SIGINT SIGCOM and SPAWAR. I have worked on projects for the Justice Department connecting local, state, and federal databases for the tracking of terrorists. I developed a system for the FBI to track license plates past toll booths and other locations. I worked on the soldier 2000 program to create body networks for reading vital signs and other information. A system I worked on called Snyper is operational in Iraq which triangulates on intercity conflict gun shots. I have been to a couple secret bases in the so called free world. I have developed telemedicine robotic surgery and virtual reality applications for the Army. For DARPA, I have worked on satellite computer vision target tracking applications and tank simulation as well as integration of the land, sea, and air surveillance systems like SOSSUS, towed arrays, and others.

Projects that I have worked on outside of government contracts include my thesis on computer generated holography, a project making paralyzed people walk again using choreographed stimulated muscles movements, face recognition, voice identification and recognition, finger print recognition, and neural network robotic controller. My research interests moved to enhanced reality heads up displays and wearable computing systems. My current research involves finding a cure for the mind control directed energy weapons fiasco. The integrated global surveillance grid is actually part of the holy grail of weapons and human control systems.”

(All emphases in red in the text posted below is mine.)

**************************************

The Executive Summary:
Neuropsychological and Electronic
No-Touch Torture Report


Based on “The Torture Memos” and the Senate Intelligence Committee’s Declassified “Torture Report”

By Robert Duncan, A.B., S.M., M.B.A., Ph.D.

04/2015

Download: PDF, DOCX | Visit drrobertduncan.com.

Torture is a horrific topic and most minds will turn away from it because it can’t be comprehended that humans can be motivated, or computer programs can be run to do this to other sentient beings.  Just when we believed we were becoming more civilized as a culture, the technology for torture has advanced more than a hundred fold in recent decades.

This summary will get into ‘the minds of the dishonorable monsters’ of the psychology of torture. Those like Dick Cheney who helped authorize it under certain administrations and regimes of the U.S. government which have been proven to be criminal under U.S. law, treaties, and the International Criminal Court. There are many people involved in the conspiracy and cover-up including General Hayden.

The full report discloses the spectrum of techniques of interrogation and torture used by the U.S. and its allies. The United States government will officially deny the claims of this “no-touch torture report” but in time it will stand firm.

The technologies used are still classified as state secrets and will not be discussed in this summary. The torture methods have been leaked through thousands of American citizens who have survived the no-touch torture programs. The research and testimony has been accumulated since 2002 and merely used as examples but the names of the victims are withheld.

This report will not use skewed, misleading language such as “enhanced interrogation” to describe the torture techniques.

Why torture? The CIA claims it works. The assumption is that it works to gain actionable intelligence. Torture is often used for revenge, punishment, interrogation, and behavior modification.  In other terms torture is used to remove the continuity of thought to confuse the target to reveal information, erase brain patterns such as values and beliefs, or to break down the human spirit to make them submit and obey their handlers.

The downside of torture is that the countries that do it lose “moral soft power” in world politics. Without due process, over 25% of those reported in the Senate Torture Report were declared innocent. Blowback is always a repercussion of torture. Torture often takes a long time to affect the target from months to years.  Torture has shown to be unreliable except for getting false confessions and bad information but the U.S. and its allies are improving on their tactics and techniques.

The purpose of this report is to draw the parallels between physical torture techniques and no-touch torture methods used in secret by governments who possess the technologies that still go on today. This is a brief summary of offensive psychological and information warfare methods using traditional methods and modern cybernetic techniques while exploring hyper-game theory to walk the target to the desired path: leak intelligence, commit assassinations, or change beliefs.

Numerated Torture Methods for
Interrogation and Behavior Modification

(A comparison between physical and no-touch torture tactics)

  1. Induction of Depressive/Manic states

The idea is to shake up the emotional states of the target because different information can be accessed at each state.  Making the target feel despair and helplessness is the objective. This cycle of hope building and then breaking is done in many ways.  The techniques between the physical methods and the no-touch technological methods are similar. Speech is very important during this process of emotional manipulation. Such examples are, “We have imprisoned you without due processes or hope of it. You are indefinitely detained.” Hope building examples include, “Sorry. We have mistaken you for someone else. You will be compensated for false imprisonment and torture.”   The main difference between the cybernetic technology and physical is that emotional state clusters can be entrained into the target mind which speeds up the process. The communication is done differently but perceived as human speech. In the no-touch torture methods it is helpful if the target is labeled with mental illness that is being created for discrediting purposes so as not to draw human rights groups’ attention.

  1. Memory Erasure

The military and CIA have been researching memory erasing drugs for half a century.  The focus of this summary report is on interrogation. Memory erasure is an important technique during interrogation. It is used in combination with sleep deprivation.  There are many drugs that have been developed for physical memory erasure. One such interrogation method requires acquiring information from the target while on these drugs and recording the subject. After a sleeping cycle, the interrogator claims that the target has confessed. Of course the target remembers nothing of their conversation. The interrogator will play samples of the subject’s conversation back to them making the subject believe that the interrogator knows more than they do.  Similar techniques are used in the wireless, no-touch torture and interrogation programs. The cybernetic methods of memory erasure have additional purposes.  The memory erasure can be used on the cybernetic target to make the target believe people have broken in and moved their belongings. While physical black bag jobs do occur, it is a way to make the target more paranoid.

  1. Electricity and Shocks

Pain and fear of death are common tactics during interrogation. Shocking by electricity is a traditional method of torture and exposed in the CIA’s secret prisons.  Shocking the testicles and nipples are the most common due to their sensitivity. Interestingly, the thousand of interviews of no-touch torture involves “stings” and “shocks” to various parts of their bodies over long durations.

  1. Fear and Terror

There are many techniques to induce extreme fear in the target.  In physical renditions dogs, power drills, guns, insects, mutilation, blow torches, water boarding, suffocation, mock burials, and mock executions are just a few the United States government have used.  Remember that many targets of torture die from the physical effects. It is torture to death.
Let us compare the no-touch torture methods used to inflict the same terror and mental anguish.  In several of these techniques the target needs to hear their handler’s voice.  This report does not describe the technologies used to broadcast voices to the target at a distance. While the subject can be broadcast mental images to their mind using hypnosis and other suggestions as well as visual entrainments, the more invasive controls of the brain manipulation technologies can be used to entrained the brain’s autonomic nervous systems such as not breathing causing the target to not be able to sleep from fear of suffocation equivalent to water boarding. The neural linguistic programming can add fears such as heart attack, stroke, and cancer threats. Even motor cortex mapping can cause twitches in any part of the body. One example used a swift neck movement with a voice transmission, “We are trying to break your neck.” Directed energy effects such as Active Denial System can make the target feel that they are on fire indefinitely without the target dying from burns. Maximum pain and torture weapons have been evolving. Every drug effect can be artificially induced into the target mind including those of poisons.

  1. Imprisonment and Isolation

Isolation is commonly used as punishment in prisons. Many whistleblowers like Bradley Manning suffer this condition. In soft interrogation it is used to get the target to talk to their interrogator since humans have the need for companionship. In no-touch torture the target is driven from their friends and family using different techniques in order to isolate them so that the electronic mind control has more effect on their psyche.  Like in Guantanamo, the target becomes isolated losing their job and medical care. Part of the method involves slander in their community. They end up on the most part in poverty and paranoid about doctors and other people from false correlations that are purposefully induced into their lives. Isolation is also a form of sensory deprivation which will be discussed later. Days and weeks lose their meaning.

  1. Sexually Disturbing Tailored Pornography

The Summary of the Senate Torture Report disclosed the disgusting revelations that in the secret torture prisons the targets were forced to perform homosexual acts on each other against their will and religion in order not to be beaten or killed. This is a common break down tactic of belief systems and the human will. In no-touch torture the techniques are more psychologically specialized for each target. Most common examples include homosexual targets that are forced with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are forced to view child pornography in their minds. And vice versa is true, that heterosexual targets are forced to view homosexual sexual acts like in the secret U.S. torture prisons.

  1. Mutilation

Also mentioned in the declassified report on torture was mutilation of the human. Cutting the naked target’s penis and scrotum, pulling nails or teeth is common.  In no-touch torture mutilation is done by trickery.  Let us look at a couple examples. There have been several targets who believed that the microwave hearing effect and other voice induction methods were done by microchips implanted in their teeth or ears. They had all their teeth pulled because they believed it was a technology called bone conductance. Others have poked out their ear drums in the belief they had micro implants in their ears. There are many more examples of trickery used to make the targets mutilate themselves.

  1. Personal and Spiritual Defamation

In physical torture the CIA and other groups use propaganda and defamation of character for those they oppose. For detainees they try to disenfranchise the target from their religion. They will defecate on their Bible or Koran for example. They might say, “Why is your God not saving you?”  In no touch torture and behavior modification they might try to make an atheist believe in god. It is just a mechanism to alter belief systems for control and experimentation. Perhaps the target may wish to confess their secrets to a “voice of god weapon”. Information warfare covers the gamut of electronic communication as well. The government training exercise uses language like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”, “use deception”, “ruin business relationships”, and “post negative information on appropriate forums” – in a malicious effort to target bloggers, activists, journalists, social event organizers and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.

  1. Psychological Intimidation

This is a topic for a target at the beginning of the trials and programs. Physical break-ins are common even if the target has an alarm system. The NSA has used stalking of foreign officials in the past for economic gain. The FBI does black bag jobs to invade a home without a warrant. The point is to let the target know they are being watched and to increase their paranoia. The NSA easily hacks all computer systems and causes harm to the victim’s intellectual property and their relationships from that endpoint. In the no touch torture false correlations between pain and a neighbor coming home can be induced.

  1. Rape

Rape is a common practice in torture. It causes much psychological trauma. In the United States methods of rape in their military and CIA secret prisons it is often relabeled. It is commonly done by prods but “rectal rehydration” is the more common misnomer. Often they call it forced feeding through the rectum but it is meant to induce psychological scaring and trauma. Several have died from the technique due to rectal bleeding.  In no-touch torture the psychological trauma of simulated rape takes on different forms. Using technique often called EEG-heterodyning the targets will receive molestation effects of their genitals. In men this can be the anus and genitals. Similarly women can be wirelessly raped by the analogous function of perception.

  1. Dietary Manipulation, Forced Weakness and Sickness

The idea behind dietary manipulation is to weaken the target. This is easily done in a physical setting but in no-touch the hunger trigger needs to be suppressed. Sometimes a false correlation between eating food and sickness is induced to make the target believe they are being poisoned. However, poisoning is common in physical renditions too.

  1. Repetition

Verbal breakdown is most important during interrogations and torture. Obviously speaking the language of the target is necessary. This is why there are interrogators in all languages. Repetition is an important neural linguistic programming interrogation tactic to influence the target mind. During the breakdown process, threats to kill and to torture the target’s family or friends are common. Repetitious questioning and breakdown phrases are automated in both the physical and no-touch versions of torture. An interesting technology that is used for no-touch torture is called chatter bots. Chatter bots, an artificial intelligence program, automate much of the repetition so that the interrogators don’t drive themselves crazy during the neural linguistic torture and programming phases. Let us not forget the Chinese Water Torture, a single drop of water on the forehead of the detainee for months. Repetition is a form of torture.

  1. Sensitization of Pain Impulses

While the reverse can be obtained, optimizing perceived pain and misery is the objective in torture. Each trauma adds to the overall misery throughout life.  Optimization of pain has been studied by the military and intelligence agencies. In the past the CIA has used drugs such as LSD to enhance fear and terror in the subject. Other methods such as hypnosis can increase perceived pain and the power of suggestion such as telling the subject his pinky finger is going to be cut off before it is done. In no-touch torture the same psychological manipulations are exerted. Subliminal and overt suggestions are often told to the subject before the directed energy or EEG heterodyning pain inductions in order to maximize their effectiveness.

  1. Sensory Overload and Deprivation

Again, this technique of overloading or depriving the human of sensory stimulus is ubiquitous in torture around the world not just in U.S. secret prisons. Torture subjects in the United States have reported the use of repetitive bad music and noise campaigns. An unusual torture technique used in the U.S. secret prisons was of a use of a plastic suit filled with ice while they beat the target.  Ultra bright lights for days on end in the prison and hot/cold temperature changes in the environment are frequent. In no-touch torture, the target’s brain is forced to release dopamine which causes pupil dilatation. This acts as a sensory overload. For example the non-lethal microwave weapons research done by a professor in University of Nevada has shown this capability. Body metabolism can be altered with these weapons causing cold and hot flashes.  Targets of no-touch torture often hear endless tinnitus.

  1. Sexual Humiliation and Lack of Privacy

Often used in common prisons is a lack of privacy. It is both necessity for security and a form of sexual humiliation. Also in prison many people are raped. No-touch torture offers the same sexual humiliation and lack of privacy by using through wall radar, cameras, and EEG visual cloning to let the target know they are being watched. Degrading comments are often used on the no-touch torture subjects while they are naked or in the bathroom.

  1. Maximum Sensory Pain Techniques

Basic torture involves brutalization, i.e. physical strikes, kicks in the groin, pepper spray or tear gas, etc. Anything that involves maximum pain is the objective. Amazingly, these same basic tortures can be done wirelessly into the human mind. All forms of sickness have been reported without any real illness behind the suffering.  All suffering can be entrained into the minds of no-touch torture subjects.

  1. Sleep Deprivation

This is the number one torture method along with the popularity in the press of water boarding.  This is done in every country that uses torture. The United States is number one in torture since they are currently the world’s only superpower.  A repetitive sleep deprivation cycle is generally done 180 hrs/7.5 days at a time in the physical renditions, or in no-touch torture five days awake and two days of sleep.  Sleep deprivation accomplishes the objective of memory loss during interrogation and induces hallucinations which help with the interrogation process. In behavior modification and programming it is necessary too.

  1. Stress Positions

Keeping detainees handcuffed above their head and to walls so that they must stand for days is a common ploy in torture. These types of poses are called stress positions. They can be mimicked in no-touch torture. An example of one such trick requires the target to believe they can deflect radar energy using pots or pans and that it is directional. The target is being given an ample amount of pain until their hands and arms are spread apart holding the pans trying to block the signals. They must maintain that position in order to get any relief from the torture signals. However the stress position itself is physical torture. Often accompanying this technique are voices saying to the target, “You are doing it to yourself.”

We will finish off this summary of U.S. and its allies’ torture, interrogation, and behavior modification experimentation with ideas of why they are done to the general public and falsely accused detainees.  Anyone can be put into these programs. Justice and rule of law does not exist at the highest levels of government. Treaties are worthless because the #1 agreement in the rules of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead by example.

No-touch torture uses the same interrogation tactics as physical interrogations but with some new twists. Techniques such as “Jeff and Mutt” a.k.a. “Good Cop Bad Cop” are used. The bad cop tortures the target and the good cop tries to gain their trust. In mind control, trust games are commonly employed to manipulate the beliefs of the target.  Creating hatred of groups through false correlations and deception is a common CIA method of trickery.

In the CIA programs, the target is put through these phases as written in the documentation, “Disorient and confuse the target. Use them for our purposes, and then dispose of them in any way possible.” We can only surmise by our sample set of a thousand people what “dispose” means: prison, suicide, or perhaps a mental hospital.  Coercing and torturing people to suicide is very common. Both tactics in physical or no-touch torture involves plausible deniability.

The no-touch interrogations are better than physical rendition techniques for exposing support networks. Traditional NSA tracking of email and phones calls are useful but if the targets are taken into a secret prison they can’t contact their networks. In no-touch torture, the target will contact everyone who might help them. Then those relationships can be destroyed to isolate the target. All these techniques rely on the target having a fear of death and pain.

Deception is very important during interrogation. In physical interrogations the targets are often drugged. This creates the confusion necessary to pull off certain trickery. In terrorist interrogations, for example, the CIA uses fake newspapers to make the target believe whatever event they were suspected of plotting had already happened, obviously looking for a confession.  Sometimes the government in charge of the torture is looking for a political gain through a false confession. None-the-less false flag operations are commonly used in both forms of torture and interrogation.  The trick is to make the target believe another foreign country is doing it to them. In no-touch torture the trick is to make them believe someone related to them is behind their suffering.

Voice transformation and morphing is an interesting technology also used in both physical and wireless interrogations. It is a form of deception used against a target to trick them into believing that they are speaking to real people that they know. It has been used in war to trick generals.  Obviously spoofing email and other identities on internet forums can be used in this manner too.

Finally, the topic of human experimentation for improving weapons, torture, interrogation, and social disruption methods will be breached.  Most of the techniques mentioned above work most effectively if the target has no SERE training (Survival, Evasion, Resistance and Escape) or psychological understanding of the methods to influence the human mind. Unfortunately, every sample point in the world’s society needs to be studied to improve the weapons systems. This is why many random people are put into the torture and mind control experiments. There are some devious uses of a secret army of remote controlled assassins in every country in the world. The samples must include different education, language, culture, and economic factors.  Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it. No-touch torture is much more complex than physical torture. Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary to test on innocent targets. Often the subject will be taunted by the statement, “Try to stop us.” This statement forces the torture subject to try to figure out shielding and jamming techniques to stop the wireless torture and helps the weapons designers to improve on the system.

However, the psychological and perceived physical pain is only half the story with no-touch torture. It also involves a set of scripts, mind games if you will, to walk the target to murder and/or suicide. This is called “Hyper Game Theory”.  It is used in war games to determine how to control your enemies and targets.  Game Theory can be used on governments, individuals, or for determining propaganda to alter cultures. The experiments on the public provide a means to test the efficacy of these scripts and determine under what circumstances to use them.

One last comment on why “We must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex” as President Eisenhower warned. During these torture programs run by the United States and its allies, accurate “truth” data points need to be used to judge the efficiency of the interrogation methods. This is why there is a dispute between the CIA and Senate Intelligence Committee reports about the usefulness of torture. Subterfuge by the CIA hacking into the senate oversight committee’s computers is a big deal; a rogue agency has been formed. Data fusion centers, Homeland Security Data Fusion Centers, NSA, and FBI collect data on Americans. This data in turn is used during torture and interrogation of Americans in no-touch torture.

James Lico: The Mass Shootings Keep Happening Because Targeted Individuals Are Being Tortured

Tremendous article by James Lico, connecting the Mass Shootings by various TIsindividuals in recent times, including Aaron Alexis and Myron May, as well as the terrible police-shooting death of Miriam Carey, to the illegitimate, unlawful, Covert Ops MKULTRA “Targeted Individuals” program underway in the USA and worldwide of attacking innocent civilians and veterans Miriam Careywith Directed-Energy EMR and sonic weapons on a 24/7 basis and subjecting them to invasive, intrusive minute-by-minute surveillance, which is participated in by lied-to members of neighborhoods and communities.

A very important aspect of this situation is the flagrant medical ethics violation represented by this clandestine program, which is deliberately inflicting bodily and mental torture on unconsenting “human subjects.” The Presidential BioEthics Commission which was informed in 2011 by dozens of individuals experiencing these covert assaults of the horrific nature of this violation has tried to completely exonerate itself of responsibility, suggesting that these are “law enforcement, regulatory, and legislative” issues, as the public letter from the Executive Director states.  BioethicsLetterJames Lico delivers a scathing critique of this stance, which essentially is a passing-the-buck move by a public body and a public agency entrusted with the sacred trust of Americans to watch out for their well-being.

Excerpt from the article:

“Compare Obama’s inaction to that of his Bioethics Committee and you can see that they are obviously dismissing TI’s.  Don’t you think that the corruption should stop?  We need to embarrass the President and the powers that be into action.  Call your Congressmen and Senators today.  Tell them that you want the EXTREME Electronic Surveillance and TORTURE of TI’s to STOP IMMEDIATELY!  Do not let them dismiss you.  If everyone would help with this, it could be over tomorrow.  In addition, it would spark an investigation into Mass Surveillance, TORTURE, The BAILOUT, 911 and other corruption.  IT WOULD HIT THE FAN so to speak.”

Please drop in at TI=HT, Human Trafficking, James Lico’s excellent blog covering all aspects of this horrific holocaust going on currently in present-day 2015 USA and in all UN-supporting countries worldwide–since this seems to be part of the global-governance undercover repression underway worldwide–and read this article and watch all the eye-opening videos. We are living in ridiculous times of open oppression–and we need every single one of us to become informed, become aware, and take action to Stop all this carnage, from whatever perspective or skill-set or ability you can contribute. Please take this issue very very seriously.  A few people being targeted and attacked like this–and today thousands are–suggests that Any one of us can be attacked and persecuted. This post details how thirty percent of Americans recently studied by scientists have already been found to be covertly RFID-microchipped.

The Mass Shootings Keep Happening Because Targeted Individuals Are Being Tortured

Analysis of Radio Frequency Identification (RFID) Chip Prevalence in 3 Discrete United States Populations

Re-blogged from Richard Presser’s Blog/Aug 19, 2015:

Analysis of Radio Frequency Identification (RFID) Chip Prevalence in 3 Discrete United States Populations.

******************

This post (linked above) points to a very interesting report on RFID chips found in Americans–the report by John Brugle, Ph. D, published on June 8, 2014 can be found also at this link at WITSCIENCE, the Wyoming Institute of Technology. Sample populations were selected randomly from 3 areas in the country, the Northeast, the Midwest, and the Southwest, and each of the 2,955 American volunteers was full-body-scanned for RFID chips–radio frequency microchips. Guess what rfid chipsthey found–that one in three, that’s thirty percent of the total number of people scanned, carried a microchip somewhere on their bodies, most often in their teeth.  The graphic here shows where else the chips were found, and how often–hands, knees, hips, and in implanted screws (teeth again?) and implanted birth control. Does that sound invasive enough?

The Implications?

Clearly, Americans are being implanted–and quite invasively–with microchips without their knowledge or consent, possibly by their very own dentists, doctors, and surgeons, during routine office visits or during scheduled surgeries for something else altogether. (Chips these days are super-tiny, and apparently can be inserted sub-dermally fairly easily. This can be researched online.)

For years, “Targeted Individuals” experiencing assaults on their bodies by Electromagnetic or sonic weapons have been reporting to medical personnel, local law enforcement, and psychiatrists the felt presence in their bodies of RFID chips, and clearly, they have very good reason for these accounts, as this report suggests.

“Targeted Individuals” Aren’t Delusional, Schizoid, or Schizophrenic for Reporting RFID chips and Covert EMR Weapon Assaults

There’s been a great push in mainstream media to discount the horrific experiences of “Targeted Individuals” being covertly assaulted, 24/7 with EMR and sonic weapons as a loony “belief” they held, at best, or, at worst, a delusion, a hallucination, a manifestation of “schizoid disorder” or “paranoid schizophrenia,” misdiagnoses freely handed out by either colluding or conned psychiatrists.

This report proves conclusively that people are being chipped without their knowledge or consent, all over the United States.

These people who are being chipped could include those who know and feel they are being covertly assaulted, as all “Targeted Individuals” do, by radio frequency  and microwave weapons, which use their RFID chips to identify them, to send assaultive resonant frequencies to, and thus to induce in their bodies the myriad of assaults “TIs” report, including organ damage, remote electromuscular shock, remote neural monitoring, remote heart attacks, and synthetic telepathy or V2K-Voice to Skull–voices induced within their brains, schizophrenia-style. Patents for all which weaponry exists, see this post for more.

Unconsenting Chipped Individuals Could Include You

But it could also include unaware Americans who return from doctor’s offices and dentist’s offices and hospital visits sicker than they went in, who suddenly develop mysterious chronic ailments, whether its “fibromyalgia,” or Lymes’ disease, or gum disease, or infertility, or rheumatoid arthritis, or multiple sclerosis, or irritable bowel syndrome, or whatever else, including cancer, symptoms and all stages of which can be induced by radio-frequency and microwave weapons, as all “TIs” attest.

Secret “Human Subject” Experimentation–Military-Grade Weapons, and the CIA/MKULTRA programs

These are being-kept-secret, covert weapons of Electronic Warfare, currently being tested and trained on whole populations, both in the US and worldwide. If you are thinking of the CIA and MKULTRA, you will not be far off the mark–humans are being experimented on today, in 2015, without consent.

Journalists in establishment media continue to fail us abysmally by refraining from reporting on what by all accounts continues to be and become a mass 21-st century holocaust. Alternative media is beginning to report more and more on this phenomenon however, and both European and American groups–the ICAACT and EUCACH in particular–working on exposing this tyranny are making progress, as the 2015 International Conference on Covert Harassment, scheduled to be held in Berlin in October, attests.

When Brian Williams reported glibly not so long ago on NBC that by 2017, all Americans would be microchipped, perhaps what he failed to add was–And you’ll never know it! For this microchipping of us has apparently been going on a long time, as this report reveals, and All of America is being targeted.

This seems to be a real turning-point report and I thank Richard Presser for drawing attention to it. I suspect every single misdiagnosed “Targeted Individual” would like to show this report to their psychiatrists and physicians.

We Need to Speak Out on Microchipping and Electronic Surveillance & Electronic Harassment

Surveillance on steroids, anyone? Our Brave New World has been spinning for a while now.

Covert assaults with EMR weapons are not being imagined by an imaginative few. Covert implants of RFID chips are not being imagined either–they are actually going on, covertly, all over the country. And Medical Personnel are involved, complicit, and complying with the Dirty Ops surveillance/harassment tactics of Mil/Intel in performing these RFID implants!

No American is safe, this seems to suggest, from one’s own doctor or dentist.

When is America–journalists, scientists, attorneys, the literate, the intellectually-aware, as well as everyone else, including the Doctors, maybe the few remaining ethical Doctors out there–going to put a Stop to this profound evil? Now is the time to stand up and be counted! Please take action, as and how you can, to combat this ongoing carnage. Please also spread this information widely, help keep America informed.

Holistic Doctors, Sudden Cardiac Arrest, “Targeted Individuals,” & Remote Radiation Heart Attack Weaponry: How to Protect Yourself

doctorsIn light of the recent reports on the sudden deaths of several holistic and alternative practitioners of medicine, including those MDs who were engaged in cancer research and in researching cures for autism and AIDs, there is now an increased awareness today, it seems, especially among holistic practitioners, of the frantic operation of a covert, criminal coterie emanating from the big drug industries, striving quite manically to suppress vital information about healing, cures, and medical treatments that work, and going to murderous lengths, literally, to do so.

HealthNutNews continues to cover this story, and Erin Elizabeth, who has been reporting these stories about the deaths, has several excellent videos on Youtube talking with doctors, cardiologists, and families of the slain doctors, discussing various aspects of this situation, which continues to be supremely concerning. I notice from Youtube videos by Professor Doom (whose video on the Nagalase connections first broke the story about the crucial importance of GcMAF in the body’s internal healing protocols), including this one, featuring holistic cancer researcher Amanda Mary Jewell, that other holistic cancer researchers are being targeted, mischaracterized, and “investigated.” Amanda Jewell reports for instance on how all her correspondence and reports from Dr. Bradstreet–autism researcher, one of the slain doctors–have been “disappeared” from her computer.

Healthy Doctors, Sudden Deaths

The deaths of these doctors continue to be unexplained. Several of them were in excellent health at the time of their sudden death. Dr. Hedendal was athletic. Dr. Holt, 33, was also athletic, and trained Olympic teams. See this article by Erin Elizabeth discussing each of the doctors.

Dr. Gonzales, who was well-known in holistic circles as a cancer-healer and had famously cured Suzanne Somers of breast cancer, had been seen to be in great health just days before his death by “sudden cardiac arrest.” This video by Professor Doom discusses Dr. Gonzales:

Actress Suzanne Somers on Death of Holistic Doctor Gonzales

Dr. Hedendal was found slumped over in his car. Dr. Gonzales was considered to have died of a heart attack, despite being seen in excellent health the day before. Dr. Holt, 33, father of a 3-year-old, was “found dead.” Dr. Ron Schwartz and Dr. Theresa Sievers were found murdered in their homes. Dr. Bradstreet was found in a river with a gunshot wound to his chest. Osteopath Lisa Riley was found with a gunshot wound to her head.

Do healthy, fit people have sudden heart attacks, out of nowhere? Can gunshot wounds be inflicted after death, as cover? Can guns be planted beside people, as cover?

Could these speculations imply foul play, covert attacks, and cover-ups?

The Remote Heart Attack Weapon

In the article here exploring the links between GcMAF, Nagalase, cancer, autism, AIDS, and the deaths of these doctors, I touched briefly on the Remote Control Radiation Heart Attack Weapon as a possible instrument in these deaths.

Does this sound like science-fiction to some? It’s not, anymore.

See this DefenseTech article by David Hambling on Military.com, Moscow’s Remote -Controlled Heart Attacks.

From the article:

“Makhunin notes that there is no general agreement on how EM waves disrupt nerves — he mentions ion channels similar to those in the plasma paper — but he certainly seems to be seeing the same effects as American researchers.

But it need not be a non-lethal weapon. Makhunin also mentions the effects of “change of electrocardiogram” and what he calls “function break of heart muscle.” The vulnerability of the heart to electrical stimulation (including that produced by EM waves) is well documented. A lethal device would interfere with the electrical potentials that keep the chambers of the heart synchronized, producing fibrillation and rapid death. A death ray doesn’t need to be a truck-sized laser that reduces the target to smoking heap; a small device that stops the heart will do the job.”

Read more: http://defensetech.org/2006/02/14/moscows-remote-controlled-heart-attacks/#ixzz3ii6ScnD2

BioElectromagnetic Weapons

satellite weaponsPart One of David Hambling’s focus above on bioelectromagnetic weapons, which discusses the Air Force’s research on using microwave weapons to affect nervous systems can be found here.

Keep in mind that the US Military as a matter of policy does not reveal the truth about the state of the art in technology that it’s currently using and operating, and keeps many of its weapons and research projects Top Secret, as do the CIA and other Intel agencies.

These articles are merely the tip of the iceberg regarding the state of microwave

From Earth Rising, by Dr. Nick Begich

From Earth Rising, by Dr. Nick Begich

weapon or Non Lethal Weapon technology currently, both in the US and Russia and elsewhere. Several websites and articles online cover many aspects of this deadly new radiation technology, which has been strategically mislabeled Non Lethal, and which is a primary component of the latest addition to the world’s arsenal of kinds of warfare–Electronic Warfare, something the US Military sees as being a global game-changer in their current visions of future war, something they call a Revolution in Military Affairs.  See this list of links to some articles and websites online covering Non Lethal Weapons.

What “Targeted Individuals” Know About Remote Controlled Heart Attack Weaponry

Overt Testing of Covert Weaponry

Bioelectromagnetic weapons, as also sonic weapons, scalar weapons, and DNA weapons, all of which use EM or sonic radiation as medium, are by nature Covert Weapons. Their discharge is invisible.

The US Military and Intel agencies, as also militaries and intel agencies worldwide, are currently overtly–and covertly–testing Electronic Warfare weaponry–essentially microwave weapons and sonic weapons attacking human nervous systems and body organs including the heart and brain–on “human subjects.” RFPs on contracts for these weapons testing projects can be found in the public domain on military and government procuring sites. Please visit muckrock.com to look at one such $49 million US Air Force contract with weapons-manufacturing General Dynamics Corporation, purportedly engaging in such research–Directed-Energy Bio-Behavioral Research–on consenting human volunteers, in a confined space, information provided this week after much delay in response to a FOIA request made by this writer a year ago.

emf weapons on bodyCovert Weaponry, Also Being Tested Covertly

“Targeted Individuals” worldwide–ethical individuals in communities being attacked by corrupt and criminal governments for their integrity, ethicality, or activism– however also know that these weapons are being tested covertly, on their bodies. In other words, they are experiencing assaults by remote-control radiation neuroweaponry on their persons.

These assaults are not acknowledged and not addressed by local Law Enforcement, by local government representatives, by members of Congress, nor by mainstream media. See this article here, discussing Clandestine weapons-testing projects, Electronic Warfare, and “Targeted Individuals,” which notes that the non-recognition of these covert assaults on civilians, activists, and veterans is deliberate, intentional, and strategic.

See this article by Kevin Barrett on Infowars.com, detailing clandestine microwave weapons attacks on activists and community members: “Disable the Purveyors”: Is the US Secretly Liquidating Dissidents?

Please explore other articles here on the subject, under Human Rights, and visit other sites online reporting these assaults, including Surveillance Issues, ICAACT, Renee Pittman’s sites and books, Mark Rich’s site and books. Note that all “Targeted Individuals,” while being assaulted in this fashion, their complaints and reports of assault being intentionally ignored by local “authorities,” or mischaracterized as “schizoid,” “schizophrenic,” and delusional, are also made the vicious target of deadly smear, slander, and defamation campaigns, fraudulent “criminal investigations” suddenly opened on them by local Intel–NSA/FBI/DHS, and the target of local harassment by conscripted communities under the guise of Community Watch/Policing programs.

Testing such deadly radiation weapons covertly on populations fills many nefarious Mil/Intel objectives, including mass control of populations, both by selecting/scapegoating specific targets, and essentially terrorizing the rest of the population into assisting in the persecution of the target, a tactic that is lifted directly from Nazi and Staasi action in Third Reich Germany. Paranoid schizophrenia, which was literally used as a weapon to disappear activists in the Soviet Union once, has made a comeback in the US and other “liberal democracies” worldwide.

Yes, these are deadly times we are living in.

Remote Heart Attacks

Among the weapons reported as used on their persons by “Targeted Individuals” (including this writer), patents for which may be found online, including here, at Renee Pittman’s site, is the remote heart attack weapon.

Note this information on the specificity of our cardiac bioelectromagnetic signatures, which can be determined remotely:

Patent/Remote, non-contacting personnel bio-identification using microwave radiation US 7889053 B2

In the past few years, it has been demonstrated that an electrocardiographic (ECG) waveform may be used to identify a person, with an accuracy of about 95%. This is significantly better than the typical accuracy of a fingerprint. However, an ECG usually requires at least 2 electrodes attached to the person, which has limited its usefulness in real world applications. A recently developed microwave cardiogram, disclosed in a published US patent application (publication number 20040123667), may be employed to provide a unique bio-signature for a person. This approach uses a specially designed microwave transceiver to form a narrow beam directed at the person of interest. The reflected microwave signal contains both the electrocardiographic waveform and the impedance-cardiographic (ICG) waveform of a person. This technique works over large distances, up to tens of meters, and it is very difficult to alter or disguise the ECG and ICG waveforms because they are a fundamental aspect of a person’s physiology. The microwave signal may penetrate barriers such as walls and doors, allowing for new capabilities in human identification.

Embodiments use a microwave cardiogram as a bio-signature for an individual. The microwave cardiogram may be measured over distances of several meters, and through barriers such as doors and walls using a microwave signal, to provide a non-contacting, remote sensing method to accurately identify specific individuals.

Embodiments process in real time the reflected microwave signal, which contains the cardiac signature of the person, using digital signal processing techniques. Embodiments use machine learning-template methods to segment out each cardiac beat, and then statistically compare a few beats of the microwave cardiogram to a pre-existing data set in order to identify the individual.” See more about that patent on this page at the Google patents site.

heartSpeaking from experience: the remote heart attack weapon can attack from a distance, invisibly; can send immense amounts of energy directly to the central chest region, creating a sense of congestion, pressure, and an impending heart attack; can send pencils or pulses of directed energy and subsequent pain sensations from above onto the left-side of the chest; can send pulses of directed energy from behind, near the spine; can send pulses of directed energy from underneath, near the left side of the chest, going up under the ribs; can send pulses of energy into the chest region also from the right-hand side of the chest.

No doubt any cardiologist can spell out what happens when intense electromagnetic or sonic energy of some frequency is pulsed relentlessly into your chest or at your heart.

How can one be sure this feeling of chest congestion or literally heart attack is coming at one from the outside? (And not being experienced internally, as a natural consequence of blocked arteries, genetic cardiac disease suddenly manifesting itself, etc.?)

Very simply. Metal blocks the radiation being used by this weapon, whether electromagnetic or sonic. If you feel a heart attack coming on–and you just happen to be a cancer or autism researcher or holistic doctor (or a writer/activist)–one, just move, get out of wherever you are; two, just where you are, hold up a metal plate or sheet to your heart/chest region, hold it against the area you feel the pressure or pain,also hold it against all of the entry-points mentioned above. If it stops or subsides immediately, know that you are being attacked from the outside.

“Targeted Individuals” are currently protecting themselves from distinct heart-attack weapon-assaults with metal.

How Can You Protect Yourself?

I am posting this information with intent: to inform holistic doctors, researchers, and practitioners that you can indeed shield yourself from invidious external attack by this weapon.

No doubt there are other measures of safety you must practice, but how does one protect against invisible radiation, directed with intent at your heart?

shieldsThe best shielding materials I’ve found: Non-stick cookie sheets made of steel-core–Calphalon’s the brand, I think, covered with a couple layers of insulating Reflectix, which is aluminium bubble foil, used as shield; sheet metal or brass plates with a couple layers of non-skid carpet-pad rubber used as pads; small neodymium magnets, rubber pads, and orgonite to camouflage your EMF signature, worn on your person. (Please note, I’m not pitching any products here, merely sharing information.)

Try getting a radio frequency meter, to record pulses. But if you hold up your shield made of steel plate cookie sheet and Reflectix, you will actually hear the unmistakeable hit of pulses on the bubble foil. You will know with certainty whether you are being hit from the outside with radiation, you will know what direction it is coming from–up, down, to your left or right; and you can prove to anyone in your vicinity you’re being hit.

Most important though, you can shield yourself, and protect your heart. Also note: move immediately, make a micro-move or a macro-move, but Move.

Major efforts have been made, including by mainstream media reporters, to discredit “Targeted Individuals” in order to keep these covert weapons covert. Please understand–even if some of you are still unaware of all these multiple assaults on us, including Mass Control technologies being deployed on us everyday–it seems we are now living in a totalitarian, corporate police and military state. This is all part of the Mass Control Mechanism being deployed against us. Writing, speaking, and spreading the word are some of the tools we have, to completely destroy these attempts to control and silence us, and to end the hold of this corporate/military tyranny over us.

I have no certainty that the Remote Radiation Heart Attack Weapon was used against these doctors. I speak merely to present a possibility–as a writer, teacher, and activist–from my ongoing experience of being assaulted with this weapon, among other(EMR/sonic radiation weapon)s, an experience which began after I contacted Senators about chem trails and spoke out locally in a school community about the unethicality of extra childcare fees; I survive and thrive primarily through vigilance and effective shielding.

Please spread and share this information widely; let no more of our holistic health researchers and practitioners be silenced. There is no media to rely on currently but ourselves.

RELATED:

GcMAF & Immune System Health/Nagalase in Vaccines/An Update

Holistic Doctors, Osteopaths, Nurses: More Deaths, More Questions

GcMAF, Nagalase, Vaccines, Autism & Cancer Cures, & Holistic Doctors Being Killed: What is the Connection?

Looking Closer At The Sudden Deaths of Several Holistic Doctors & the GcMAF/Nagalase & Cancer/Autism & Vaccine Connections

Dr. Rima Laibow: These Dead Doctors Told No Lies, Is That Why They Are Dead?

Richard Presser: Dr Rima Laibow interviews David Noakes and exposes the Big Pharma fingerprints in the GcMAF/Nagalase health bombshell