Tag Archives: Counter Terrorism

The Hidden Hand: How NSA, CIA, DHS, and FBI Collude to Keep Victims of their Top Secret (Yet Well Known) Extremely Inhumane Neuro/DEW Experimentation and Operation Crimes (under Cover of Surveillance, Community Policing, Counter Terrorism) Unheard, Unseen, and Powerless for Decades–Installed Support Orgs and Groups, Installed Intel Plants

Feature Report | Ramola D | March 10, 2022

Recently, I learned that Melanie Vritschan of ICATOR–International Coalition Against Electronic Torture and the Robotization of Human Beings–with whom I’ve done many podcasts helping to publicize and broadcast her work helping DEW/Neurotech victims of organized crime run by intelligence agencies and governments in Europe (see my Odysee/Lbry Ramola D Reports channels) was planning to hold an international conference to publicize an upcoming class action lawsuit. Which is no doubt an excellent initiative, and all power to those working to expose these crimes and bring the government and corporation criminals to justice.

But there is an issue she has raised, which provides blinding insight into how and why these crimes have remained hidden for decades from larger public view–and given that it involves me and my long-run work as an independent investigative journalist exposing these crimes so closely, I think it is important to publicly speak about.

Neurotech and Anti-Personnel DEW Assault on Civilians Selected for Torture by Illegal and Unlawful FBI/Fusion Center Targeting

Neuro experimentation, cybernetics experimentation, bio-robotizing people, harassing people with V2K and Synthetic Telepathy, remote electro-shocking, remote vibrating, remote assault with microwave and milliwave weapons, covertly sharpshooting people with RFID implants, covertly implanting people in hospitals or via clandestine missions in their homes, covert nanotechnology assaults as described in the Nanomafia article by Dr. Flores, subjecting people to microwave/milliwave/ELF weapons tests using drones, satellites, planes, cars, cell towers, portable devices, 24/7 fusion-center-run assault of people in their homes, cars, stores, restaurants, at work with tracking radar and low-level or high-level microwave weapon hits, while lying about the chosen victims in their neighborhoods, workplaces, families–all horrific, inhumane, unethical crimes against humanity–are being run on people all over the world now, in the US and in Europe and elsewhere, a situation I have been working to expose for 8 years now, at this site and others online, along with many other human rights advocates absolutely appalled at what is going on worldwide–all under cover of Counter Terrorism, Surveillance, Community Policing, Community Mental Health Intervention, Pre Crime, Countering Violent Extremism and other institutional lies.

Add to this the hubris and atrocity of “non-lethal weapons-testing” on civilians, and be aware much is run under classified cover as “Sources and Methods” and classified-to-conceal-crime operations by the CIA, DIA, NSA, US Navy, US Marine Corps, US Airforce–and their European and British counterparts–all in intent of unethically probing, mapping, controlling and modifying the human brain, body, will, intention, soul, being, life, and agency, with clear weaponized intent to destroy all, as Dr. James Giordano has openly revealed, and as Dr. Robert Duncan has indicated he has helped weaponize.

Very simply, community informants—many connected to the uber-wealthy, globalist Luciferian, Illuminati, Freemasonic network working on the human-degrading NWO and Humans 2.0 (which should really be called Humans Minus 2.0) Transhumanist initiatives for Kurzweil, Soros, Schwab, the CCP, Mossad, Khazarian Mafia, Venetian bloodlines, British Pilgrims Society, Rothschilds and Lucifer—toss people they dislike onto FBI watchlists—no proof of terrorism needed, which then leads to trafficking this cadre into Black Ops CIA and DOD projects—for life, it appears, 24/7, all trauma and assault with Spectrum Weapons and Neuroweapons of Electronic Warfare and Neuro/Cognitive Warfare, no reprieve.

The only terrorism around emanates from here, these agencies and military divisions. Local police, Sheriffs, local DHS or fusion-center employees and “public-private partners” meaning all stores and restaurants contacted by the former participate in public harassment of the select people they have chosen for life-takedown—who are thence publicly condemned as “Mentally Ill Troublemakers” and “Known or Suspected Terrorists” who need to be constantly watched, gaslighted, photographed, filmed, and noise-harassed in public (beyond Stasi lunacy here).

For anyone new to this terrifying but sadly under-reported subject—of worse than KGB Terror and clear evidence of crime by the FBI, CIA, NSA, DHS–please see all my articles at this site on targeting, under the Disclosure on Targeting tab, the Ramola D Reports and Broadcasts page, and the video interviews and panels with scientists, FBI, CIA, and NSA whistleblowers, multiple reporting victims, and human rights activists I have recorded and published, all now at Odysee/Lbry (after Youtube censoriously crashed my journalism channel there on 3-3-2021) and partially at other video platforms online. See also the video report of the Online Press Conference of 15 Oct 2021 Exposing DEW/Neurotech Targeting, which exposes the crime internationally and presents much historic evidence.

Online Press Conference | Oct 15, 2021 | Exposing Worldwide DEW/Neurotech Targeting & AI-Cybernetic Torture, Bio-Neuro-Trafficking, Stasi Crimes Against Humanity by Fusion Centers, Military, Intelligence, Law Enforcement, Sheriffs, Local Govts, Universities, Research Institutions, Local Communities, Utility Cos., & Private-Party Criminals

As a writer and journalist, I have gone out of my way to record, report on, research, analyze, interview, broadcast, and document this subject, and I will venture to say that along with the work of a few outstanding writers and human rights advocates in this field including Dr. Rauni Kilde, Paul Baird, Gloria Naylor, Cheryl Welsh, Dr. Nick Begich, Dr. John Hall, Steve Shellen, Mary Gregory, Rosanne Schneider, and Dr. Corkin Cherubini the work I have accomplished to publicize and bring to light these deadly secret-agency crimes is considerable, and will stand the test of time.

Public Disclosure of Anti-Personnel DEWs and Neuroweapons (Non-Lethal/Limited Effect Wpns, EMF Spectrum Wpns) Being Used, Covertly but Definitively, Illegitimately, and Inhumanely, by US, UK, All Govts Worldwide on People

The piece of information I had learned earlier and which Melanie confirmed and which occasions this article—and the realization I publish here—is that she was including Karen Stewart in her conference, first she said as a victim, and later she said as participating in the planning of the conference.

KAREN MELTON STEWART: FORMER NSA INTELLIGENCE ANALYST, WHO HAS SINCE OPERATED AS A HIDDEN-HAND AGENT-PROVOCATEUR, FBI-INFORMANT, COINTELPRO AND FUSION-CENTER-ASSISTING OPERATIVE

Those who have followed my reports over the years here will know that Karen Stewart, a former human rights activism colleague and subject of my journalism as a self-claimed “NSA whistleblower” for 3 years, sought to disappear my name and work as a journalist as she spent 2.5 years running false-narratives and a smear campaign characterized by lies on me—after inexplicably turning on me overnight, directly on completion of the Joint Report on “Dr” Katherine Horton she freely participated in—particularly smearing me—openly lying–to other activists and victims to the extent that I was compelled to publish several articles rebutting her false claims and clear cyber harassment, especially since she completely ignored all immediate clarifying responses and threads to her on Twitter.

Karen Stewart

It seemed evident from the extreme malice of her attacks online that Karen Stewart was hellbent on destroying my name, and on getting others to turn away from my name and my work.

In this time, she also attacked many others–whistleblowers, activists, victims of Mil/Intel crime–and they too have published articles and posts on social media exposing her.

Karen Stewart used multiple media and multiple fronts to attack others publicly and privately, using Twitter posts from several alias-id accounts, Facebook posts from multiple Facebook pages, some of these absolutely obscene, private emails and DMs on various apps, public emails on group-lists, comments under other people’s videos on Youtube, engaging in repeat posts of her scurrilous lies, in clear intent, it appears, to project and cement a false-narrative and false-image of her victims, who included myself—as primary victim really.

In essence, she has behaved as a fusion-center-assisting operative, publishing lies, creating false-narratives and false-images, defaming and slandering freely, labeling people wrongfully on social media as troublemakers, bullies, narcissists (and worse—her epithets are choice, and horrifying to read), permitting the 24/7 NSA-FBI-DHS agents trolling social media to glean a false-picture to use to their advantage—since the whole crux of the targeting gig they are running is to falsely-label their victims and spin parallel-construction lies around them.

All this I have addressed in detail in my articles, summarized here, and in my public notices on Karen Stewart, including my latest article, which rather clearly revealed Karen Stewart’s COINTELPRO activities against me and my journalism—which helps all being targeted by the Government Intelligence agencies and Military, not just myself.

RAMOLA D | STATEMENT ON NSA WHISTLEBLOWER KAREN MELTON STEWART

Public Notice Re. Ex-NSA Karen Melton Stewart, Dec 28, 2020

It is an International Scandal that people are being brutalized to death with electromagnetic and neuroweapons in their own homes, and everyone in the whole world should be outraged about it: as a journalist, the work I do to expose this brutality I believe is critically important. I believe I became a target of Karen Stewart’s incredibly vicious attacks because I am a journalist exposing these Black Ops crimes—which the NSA, CIA, DIA, FBI, DHS, Navy, Marine Corps, Air Force, and all branches of the DOD have a lot to answer for, when they are fully known. In fact, as I point out here, her attacks intensified as I worked on and prepared to release particularly revealing articles showing the public-domain disclosure of Mil/Intel weapons use on civilians.

Documentary Evidence of Covert Electronic-Weapon and Neurotechnology Use By US Government on Americans Series (2) The Limited Effects Technology (LET) Program Report | JPSG, OOTW/LE Programs, 1996

Public Disclosure of Anti-Personnel DEWs and Neuroweapons (Non-Lethal/Limited Effect Wpns, EMF Spectrum Wpns) Being Used, Covertly but Definitively, Illegitimately, and Inhumanely, by US, UK, All Govts Worldwide on People

Karen Stewart has also launched inexcusable defamation attacks against other prominent writers, whistleblowers, and human rights advocates, including, notably CIA Whistleblower Barbara Hartwell and Galina Kurdina, President of the Organization of Mind Control Victims in Canada, both of whom have published notice of her defamation, slander, and libel crimes. She has also cyber-harassed and defamed various other activists on Twitter and Facebook, many of whom have published responses and notice of her defamation, slander, and libel crimes, some included in links in my many articles rebutting her lies, most listed in my Statement and Public Notices on her.

Ex-NSA Cyberstalker, Blasphemer, False Accuser, Karen Melton Stewart Strikes Again! More FACT-FREE Obsessive Defamation Against Barbara Hartwell/Barbara Hartwell, Jan 23, 2022

Public Notices to Agent Provocateurs-PUBLIC NOTICE Re. NSA agent Karen Melton Stewart/Galina Kurdina, Jan 3, 2021

It is notable that several aware, informed, present, and witnessing activists on the email lists including from Targeted Justice witness to Karen Stewart’s scurrilous attacks on myself and on Galina Kurdina in particular remained silent at the time, refusing to call her out, with many later picking up and continuing to host her on their conference calls as if nothing had occurred. To this same group, Karen Stewart has circulated (and published openly on social media) monstrous lies about me, in effect, legitimizing their continued support of her: classic COINTELPRO to cast me in a false light to this group—who are already highly suspect anyway, by virtue of their willingness to align with someone as profoundly malicious and abusive as she has proved to be. (Evidence in her own tweets and posts: screenshots in my articles.)

Protection Rackets & Containment Operations: Libel, Slander, False-Narratives, False-Reality-Constructs, Smear Campaigns & Serious Defamation

One aspect of Karen Stewart’s attacks on me in particular involved her publishing emails, tweets and texts from others, some from private correspondence with me—which she was either given by the other party or by her NSA-FBI friends engaging in surveillance on my desktop (evidence of which latter I have reported in my statements and notices on her). As a consequence—and in light of the situation of group silence to me and group support of her as noted above—I have withdrawn fully from all of these suspect group email lists and asked everyone emailing me to not include me on email lists involving Karen Stewart.

This must have finally caused some consternation among the NSA-FBI-DHS-CIA Counter Intelligence and Counter Terrorism set who like to coagulate their victims into pools, corralled into useless support groups and support orgs all run by themselves, gatekept by themselves, and wheel-spun (in activism or attempt to publicize these crimes) to oblivion—and didn’t want to let me go, for I began to receive all sorts of emails, phone calls, group invites on Facebook striving to pull me into one group or another. Norman Rabin, a long-reporting victim of Mil/Intel neurotech crimes, wrote me an email observing my removing myself from group email lists and challenging my stance, chastising me for believing I was a “superstar writer” who could expose these crimes on my own (a scenario he came up with on his own, since I have never claimed such), and offering to negotiate a truce between Karen Stewart and myself. He also enclosed a letter from Karen Stewart to himself, misrepresenting the entire saga of her abusive and libelous actions, which I responded to publicly here:

RESPONSE TO KAREN STEWART’S SLANDEROUS-FALSE-NARRATIVE

This quite-long and excruciating saga is all part of what Melanie has ignored on an ongoing basis – as she has often stated to me and to others as to Galina that she had no time to keep track of what was going on, being focused on her work. But why would she not wish to know what the people she works with and communicates with are doing to others, quite publicly?

Throughout, Melanie has indeed been made aware of and been apprised of Karen Stewart’s behavior and horrific words and actions against myself and others—including recently when I suggested she read my latest article, published on Jan 24, 2022, exposing Karen’s most scurrilous attack to date on me, launching a false-claim against me at the local Quincy, Mass police station, evidencing her clear COINTELPRO Informant status: COINTELPRO Karen Stewart & Her Narrative of Cyberstalking, yet has chosen to continue contact and work with her, as she has also chosen to work with Frank Allen of Targeted Massachusetts, another highly questionable character who has slanderously attacked me and others publicly, as reported earlier, and with Derrick Robinson of PACTS International who was recently sued by Wells Fargo for the theft of over 500 thousand dollars (corrected from million/Rd/3/10/2022) which it appears PACTS created a special bank account for in a false name to receive. (More on this below.)

Saying she was not addressing “personal grievances” and that she herself had had no problem with Karen Stewart, Melanie informed me she was focusing on “getting the message out” and looking forward to her court action, and that she might bring up “what I had told her” to Karen should she get a chance for a private conversation.

I am afraid this is the end of the road for me with Melanie since I certainly am not sitting around waiting for her Godly and misled pronouncements on what has transpired—facts on which she has summarily ignored–and which Karen Stewart certainly knows all about, since she was the arbiter of it.

No matter how noble one’s cause is, one is inextricably compromised and suspect if behaving opportunistically and without integrity, which is what is becoming evident here.

I must question as well Melanie’s other affiliations, since I have not forgotten her own earlier turnaround, dropping Katherine Horton to work more closely with me around the time a Belgian intelligence agent Marc Delantre—whom I have interviewed, and who brought up the interesting IT-driven Gladio wargaming operations tied to macabre hypergame-theory ops linking Mil/Intel victims to large false-flag events, essentially Mil/Intel crimes, which many victims have reported cognizance of, in reference to their own experience—appeared. Prior to that, Melanie had professed annoyance at my advice to her to disassociate from Katherine Horton given what Katherine had insidiously accomplished, the medical kidnap of Melanie’s baby at Erasme Hospital in Brussels, which I had reported on closely, and what Katherine was then engaging in, which was a massive defamation and slander campaign against myself and many others (which exact campaign was picked up and continued by Karen Stewart later) after the break-up of Techno Crime Fighters Forum.

In fact, she had been engaging in communications with both Katherine Horton and myself at the time—which problematic situation ended with Delantre showing up and apparently influencing her turn toward me and dropping Katherine Horton as a work colleague in activism. Has Belgian and French intel been influencing Melanie since then, guiding her connecting with Derrick of PACTS and now Karen of Psy Ops from the Bowels of the NSA? Did they influence her ability—by making a private deal with her–to finally retrieve her child from the clutches of the State, run ICATOR scanning operations for victims through a Belgian University—reported by many to me to be rather unscientific and not useful–and embark on a series of operations to remove covert implants, an opportunity few Mil/Intel victims can report? Why would other Mil/Intel victim members of her group ICATOR not be able to avail of the same useful surgical operations she reports to remove their own covertly-planted implants? Perhaps they should ask her.

I have long worked with Melanie, promoted her work, and supported her voice and work, since I have thought that indeed it is an exceptional thing to be doing, public advocacy for Mil/Intel victims of Emerging-Tech crime—but there are many unanswered questions here, pointing to unrevealed affiliations.

What she is doing currently, working with Derrick and including Karen Stewart–ignoring her absolutely disgraceful public defamation and lying campaigns on myself and on Galina (who stopped working with her for similar reasons, and more, which she is better equipped to recount herself)–is completely inexplicable, unacceptable opportunism, and an indicator to me of Intel involvement.

Infiltration, Control, Influence Operations: The Black Counter Paws of Counter Intelligence

Frankly, Melanie’s support and platforming of Karen Stewart past all events which have occurred—by simply ignoring all notice of it–has made me question the entire setup of NSA whistleblowers, NSA gatekeepers, FBI informants, Belgian Intelligence, French Intelligence, other Intel interventions, including in Europe, and the alt-media set-up—in layers and circles it seems—surely connected to the CIA’s Operation Mockingbird and dark control over who is allowed to play in the Media Game and who isn’t. However alt. (Just consider how incredibly shadowbanned and disappeared I am online at all video channels while Amazing Polly and Sarah Westall and Dana Ashlie and Ann van der Steel sure as heck aren’t.)

That Karen Stewart seems to have a close connection with the NSA and FBI in their false-labeling and parallel-construction activities was revealed earlier. This excerpt from Public Notice Re. Ex-NSA Karen Melton Stewart, Dec 28, 2020 addresses some of the egregious cyberharassive and cyberlibel attacks Karen Stewart has engaged in, while revealing the NSA and FBI connections she has publicly acknowledged:

“7. Karen Stewart has repeatedly—and falsely—claimed she has published evidence to back her name-calling and labeling of Ramola D, when what she actually has published is 1) Repeat-accusations repeatedly ignoring repeat-corrections of her claims of “cyber-stalking” in reference to two specific emails (addressed to Ramola D’s friends, not to her) cyber-hacked off Ramola D’s desktop and sent to her in Nov 2019 clearly by Intelligence cyber-hackers—her own friends, it appears, in NSA, FBI, CIA, DHS, or Mossad or whoever surveills our PCs & phones, as per her own published statements on Twitter, which suggest she receives Surveillance feedback off Ramola D’s desktop—continually and deliberately miscasting the actions of cyber-hacking on Ramola D’s desktop by known Surveillers as cyber-stalking by Ramola D, and 2) Publishing an email without permission from Ramola D during the writing process of the Joint Statement in Nov 2019 out of context, particularly omitting the context of her own preceding false-narrative, falsely accusatory email, and distorting the intent, tone, and content of Ramola D’s response-email in her false framing of it.”

That Karen Stewart also may have a CIA connection—in my speculation–comes from the abruptness and vituperative malice of her attacks on me, as well as her sudden round of appearances on victim conference calls and shows as well as certain alt-media outlets—usually directly after a podcast or revealing article I have published–including recently Sons of Liberty Media, Alfred Webre’s show, and The Stew Peters Show—purporting to reveal the very fusion center crimes she has participated in against me and others. It is significant as well that Karen Stewart has falsely accused me of being a CIA asset (sort of beyond laughable) and a media-puppet being handled by CIA Whistleblower Barbara Hartwell (whose integrity and brilliance she cannot hold a candle to) whom I have interviewed and run panels and podcasts on Counter Intelligence, her specialty, with—accusing others of their own crimes is exactly what the Khazarians, Luciferians, Nazis, Satanists, Freemasons practicing “The Hidden Hand” and now Intelligence agencies hosting this species practice as policy, I have learned.

The CIA has a long history of connection with cults and a long history of horrific experiments on people, including the MK ULTRA experiments—and there’s no doubt the CIA is continuing those MK ULTRA and Artichoke experiments on people today—CIA and DOD whistleblowers admit it.

“MK ULTRA on Steroids”: Dr. Robert Duncan Reports On Today’s Neurotech Targeting of Humanity, Secrecy, and The Need For Change

My first interview with Dr. Robert Duncan was livestreamed the night before I flew out to India in Feb 2020, two weeks before the Plandemic hit, necessitating my stay in India for several months after

The CIA in fact has the most to cover up, among Mil/Intel victims. But then again, the NSA is pretty Satanist too, with a history of Michael Aquino, Anton Lavey and the Church of Satan et al. The Satanists and Occultists are Master Deceivers; lies, deception, false-claims, covers, and deceit are their calling-card. US Navy I understand is also prime in this area of Black Ops, long-term Mind Control and “Non Lethal Weapon” experiments, using public deceit to sheathe their crimes; indeed USMC and US Navy both have been running numerous NLW weapons-tests and Marine Air Ground weapons system operations for C5ISR—Intelligence, Surveillance, Reconnaissance activities, itself a cover for full-on 24/7 Spectrum targeting of civilians, which might also be, with NATO, and the NSA’s Global Spy Network an International Sport: subjects I will document further soon. Special Forces, Psy Ops, US Army: there are many contenders for top Black Ops terrorists in this arena of deathly assault on the citizenry.

There are multiple players in the Black Ops arena of Hidden Terror, and a slew of Defense, Telecom, Security contractors from the private-sector are involved, in addition to the agencies and the military, and they’re all sailing on the convenient covers and lies of Classification, Compartmentalization, Sources and Methods in complacency, hubris, entitlement and greed, mutually covering each others’ crimes.

For some reason, the disappearing of my name as a journalist reporting Intelligence agency and Military crimes against the populace has become very important to the hidden controllers running Karen Stewart—whether NSA, CIA, FBI or anyone else–and also running all the various support organizations and groups and informants and plants placed as head of these support groups.

For it is becoming increasingly clear to me now that many if not all of these support groups have actually been set up by the very agencies—FBI, CIA, NSA, DHS, US Navy, US Army, US Airforce, DOD, DARPA–engaged in targeting people with false-reports, wrongful watchlisting, and traumatizing neuro/DEW targeting and life-takedowns.

This is of course in tandem with a bludgeoning media campaign (which one can connect to the CIA’s Operation Mockingbird) to cast all reporting Mil/Intel crimes as “Targeted Individuals” labeled to equate to “Paranoid, Schizoid, Delusional, Schizophrenic” and a cruel medical and psychiatric collusion to misdiagnose and mislabel all reporting Mil/Intel victims as such instead of scanning them for implants and examining them physically for radiation damage, as the Havana Syndrome doctors are now doing for US diplomats and spies. Not to mention scanning their homes for RF bugs, hidden cameras, sensors, and constant microwave assault.

But I am writing this article because I have realized the rot comes also from within: the very support organizations and groups purporting to help reporting victims appear to have very strong agency and military connections.

Targeted Justice is one such group, which mushroomed into being around 2017, a year after my interview with Karen Stewart was published, when she had become a central contact for various parties, including Midge Mathis, whom she then introduced to me, who supposedly had a secret calling to set up a human rights organization to address unlawful targeting and Spectrum Assault—yet turned out to be a highly suspect “activist” who ignored COINTELPRO and libel from “Dr” Katherine Horton (reported earlier in many of my articles), ignored smear campaigns and participated in them, and engaged in superficially impressive yet questionable activities such as “going to DC and informing Congresspeople in their offices” with flyers and no follow-up, holding “Clown” banners in front of the CIA Langley headquarters—the CIA are for sure not Clowns but deadly Criminals—and promoting the COINTELPRO of Richard Lighthouse, reported here recently by me and by their former Legal Director John Christiana here.

I have previously reported on the actions of various people in Targeted Justice including Midge Mathis in participating in smear campaigns and disappearing my journalism by refusing to acknowledge it—as she also sought to disappear the work of Stephen Shellen in his film The Spark, a prescient film on the targeting of humanity by a techno-fascist lot intent on propelling all into a bleak, unethical future–by refusing to place a link on their website to it, and Richard Lighthouse in running COINTELPRO on targeted victims by inviting them to “dox” public officials, a crime of targeting in itself which the FBI called attention to, as the Blueleaks files exposed, yet did nothing to address. I have reported that the DEW attacks on me accelerated when I reported on Targeted Justice, Karen Stewart, “Dr” Katherine Horton, and Ella Free. I have examined the consequences of infiltration among activists in stalling all forward movement in activism, exposure, and redressal of these crimes. I have reported the actions of “Dr” Katherine Horton on TCFF in playing agent-provocateur and saboteur and in inverting the facts as she like Karen Stewart later fixated on smearing, lying, libeling and defaming myself and others while she worked on gatekeeping and promoting Disinfo. That Katherine Horton is an Intel plant I have extensively addressed in previous articles.

I have looked back on and examined the many encounters I have had with people associated with FFCHS, Targeted Justice, and now PACTS. Parallel construction is behind ALL of the FBI’s targeting, judging by the DEW retaliation I have frequently endured, and it seems Karen Stewart has helped sustain and further this targeting on me by running a smear and lie campaign on me—particularly to other purported-targets on Mil/Intel-victim email lists, but publicly, on social media, for NSA, FBI, DHS, DOD witness and collection: that’s fusion-center-assisting.

Vicious Lies, Libel, Inversions, Character-Assassination: Is Karen Stewart a “TI Leader” or a Covert Fusion Center Operative?

Early FFCHS interventions to contain the disclosure by a writer and journalist

FFCHS and Targeted Individuals

One of the primary US victim-support organizations, FFCHS—Freedom From Covert Harassment—run by Derrick Robinson and which has now dissolved—for reasons I am unclear on, but which may have included all sorts of money misappropriation and legal issues I heard rumors about from various of the older activists who have worked with Derrick Robinson, set itself up as a central spot for all newly-targeted—people being suddenly ostracized in their neighborhoods, stalked publicly by police and strangers, and experiencing the unmistakeable assault on their bodies of electromagnetic weapons and remote-access neurotechnologies, who searched online or in books for information and found notice of “Targeted Individuals” and victim-support-groups such as FFCHS.

The term “Targeted Individual” itself I believe is a label invented by the Mil/Intel coterie and placed for use within the support groups so that people researching their sudden EMF assaults are persuaded to think of themselves as this label; in reality, this label has very sinister connotations and hidden currency. Common law excavations are finding that both the term “person” and the term “individual” are meant to refer to incorporations and enslavement (see the American Common Law 101 webinar). Calling oneself a “targeted” anything sounds like one is consenting to the illegal and unlawful targeting—which obviously no-one so attacked is. No-one should be identifying as a Targeted Individual, but the fact is, the support groups have ensured that this term is used to denote all reporting Mil/Intel victims—TI or Targeted Individual as label has become common usage among victims. (And used against them by Media.) I have previously expressed my thoughts about this term in print, including here.

FFCHS, Buddy Lists, and Questionable Characters

Very early on, in late 2013, when I was first hit, as described in all my Personal Reports articles and interviews, when I first learned of FFCHS and contacted one of the local “buddies” listed online at their website, Letitia Aby, I was persuaded to work with her on supposedly setting up a new human rights organization on the East Coast, which led to various odd occurrences, including a very odd occasion of driving (from Dorchester) to ACLU Massachusetts in Boston in winter to report the DEW assaults while she suddenly got on the phone although supposed to be navigating, then seemed to be part of an odd encounter with the front desk staff who were rude, combative, and mocking, whom she appeared to know well (ACLU later wrote back to me saying they couldn’t help individuals, only groups); setting up a phone inclusion on a conference call with the Dept of State and various human rights groups but suddenly vanishing and leaving me to it—Jameel Jaffer of ACLU informed me he was glad other HR orgs like ours existed, to address illegal-weaponized-FBI/DHS-targeting, as if the ACLU should not be addressing this themselves!–preaching about the Holy Spirit to me quite often, asking me on one occasion to surgically excise an RFID implant she said was beneath the skin on her arm—which I informed her I could certainly not do, not being a surgeon, leaving me to write grant proposals and mission statements while she began to berate me on what to do and what not to do, including what to write: this encounter ended when I cut my connection with her at this point—I am afraid you do not tell a practiced writer and teacher of writing what and how to write. In between there were other occasions where I recall Letitia was inordinately interested in how I shielded and what I used to protect myself from the DEW attacks and radar tracking—was she FBI? Was she a data collector for one of the agencies? Was she planted Controlled Opposition running a containment-operation on me? Was she doing more than she said she was doing—engaging in Parallel-Construction lies of some kind for the FBI or another agency? I certainly speculate on all of this now, since “The Human Dignity Council” website she set up suddenly vanished offline along with an article on shielding I had published there and her efforts ended; much later when I wrote to her mentioning some of this, she denied working for the FBI. Maybe she was NSA or CIA—I suspect mostly however she was FBI but I could be wrong. It is significant however to note that I met her through FFCHS. My work for Letitia Aby’s “Human Dignity Council” has now been published in this Call for a Congressional Investigation at my site.

Call for a Congressional Committee: Investigate & Prosecute Non-Consensual Clandestine Experimentation, Surveillance, Monitoring, Harassment of Citizens with ElectroMagnetic/Scalar/Sonic Weapons & Related Crimes

FFCHS and Email List Gatekeepers and Targeters

Someone else local I learned of from the big email lists I suddenly was a part of—all through those initial contacts with FFCHS I think, and later connection with Kate Ryan and others, Regis Burke, ran a very strange scenario on me early which I now distrust as genuine; she called one night and set up a “crisis-incident” (sounding panicked) reporting that her car had gone through red lights in Brookline in Boston and had no brakes and so on. At the time I believed this story and stayed on the phone with her on and off until midnight while she waited for a tow truck (she said), offering support although unable to drive up to rescue her—not driving very much in the Boston area at that point, since we had just recently moved. Regis Burke, who said she was a nurse, and initially sent congratulatory notes on my articles, later tried hard to get me to “become a patient” of her psychiatrist, the rather well-known Dr. Stephen Soldz, saying it would be very helpful for me to have a psychiatrist as an ally—I found this absurd, given that the very basic nature of these FBI-targeting crimes for CIA-DOD-mauling involves false diagnoses as schizoid, schizophrenic, and paranoid, and I was certainly going to keep as far away from psychiatrists as I possibly could. The same Regis Burke also visited me once at my home, coming over for lunch dressed in blue scrubs, like a nurse—what a very odd and “surveillance-role-player”-type thing to do: was she playing Mental Health Nurse for the lied-to neighbors all informed by the FBI-DHS targeters I was “mentally ill”? Was Regis Burke an Intel operative too, playing a handling-operation on me? I suspect so. Again, it is significant that she is someone I encountered on the email lists after my initial contact with people like Letitia Aby and Kate Ryan through FFCHS.

Kate Ryan is a New England activist I have met—again after initial contact through FFCHS–whose public comments on non-consensual experimentation at SACHRP and elsewhere I have reported on, who led the Global TI Survey with NSA Whistleblowers Bill Binney and Kirk Wiebe, along with Karla Smith, and while I have had only cordial encounters with her, this is a survey that came to nothing; Kirk Wiebe reported to me at time of my interviewing him last year he had seen no evidence (X-rays, photos, MRIs, and such) from anyone of injuries suffered from DEW/Neurotech attacks which were being filtered through Kate Ryan and Karla Smith, but had seen only the written survey reports. (I should note here that as a reporter I have certainly seen photographic, X-ray, MRI, and toxicology-report evidence of burns, micro/nano implants, and injuries from DEW/Neurotech damage on many, and reported on these as well in various articles and podcasts.)

Skizit Gesture and Citizens Against Harmful Technologies (CAHT)

Other encounters with supposed targets on these email lists including the odd Skizit Gesture of CAHT—described in previous articles/notes reporting her inexplicably hostile reaction to the Battlespace Neuroethics series I had proposed on an email list—make me wonder whether each of these characters worked on Parallel Construction in relay, making false-claims for falsifying records–for purposes of continued FBI targeting. My next-door neighbor, a Richard Norton, a retired military veteran, was at this time engaged in active tracking and EMF-signal-hits on me from his home and parked SUVs in his driveway, in addition to overt “community-monitoring,” and I recall, deliberately stepped outside on his deck as I spoke to a friend on the phone relaying Skizit’s actions, clearly eavesdropping—in fact grinning to himself, as he had by then become part of the local FBI-DHS crew using EMF weapons from pickups and parking in his driveway, while also going indoors to chat and socialize. Part of what the local FBI-DHS Character Assassination brigade does is extend and further the rumor that the target is a troublemaker, and incipient terrorist: fracas on group email lists I suspect, as also contrived fracas in public are being recorded (by NSA-FBI-DHS) for this purpose. Are there gatekeepers and COINTELPRO plants from these groups then, such as CAHT and FFCHS, now PACTS, further targeting and aiding the FBI’s Parallel-Construction projects, as there are many FBI-DHS cybertrolls now lurking on Facebook, Twitter, and elsewhere online, provoking and attacking Mil/Intel victims, just to provoke online squabbles and chaos? This is not idle speculation; this is exactly what many others being targeted and politically persecuted including FBI whistleblower Geral Sosbee report.

Reputation Assault as a Matter of Course for Black Ops Psy Ops agencies engaging in massive crime using biohacking and neurohacking weapons

All activists, journalists, podcasters working today to expose corruption and crime by the agencies, governments, militaries report reputation assault. But the matter becomes exacerbated when the journalist is a target already, as I have certainly learned, over this entire scenario of being publicly attacked with lies, false-claims, and massive cyber-harassment for years by “Dr” Katherine Horton first, and then by Karen Stewart—including in between by all their followers. Behind these public lies, are private lies circulated by the coterie of Law Enforcement, Homeland Security, and their contractor-minions which typify the fusion-center tying-down of neighborhoods, communities, and families so that the person targeted is held continually in sight as a “person of interest” to be watched, monitored, harassed, so that the CIA, NSA, FBI, and DOD can freely move about in their jeeps, vans, trucks, SUVs, drones, helicopters, terrorizing the neighborhood and the target with actual EMF/Neurotech assault. National Security Letters (NSLs) and falsified records freely handed out cement this major enterprise of massive lying to keep the neighborhood quiescent, literally “pacify” the neighborhood with lies. This production has clearly been wrought around me as well; I have described this earlier in many reports and interviews.

That it continues, and that it is built apparently on false-records probably being maintained by the most deceitful FBI is brought home to me often, including currently as the next-door neighbor John Mazzeo—replacing Richard Norton–who has parked his SUV directly under my study window and sends all manner of EMF hits upward, currently slams his doors, revs up his V-8 engine, drives in and out making a racket and yells for his dog which he has oddly named “Luna!” perhaps with pointed reference to “Oona!” who is the Principal of a Montessori pre-school in Quincy where I taught art at for a couple years before abruptly being divested of my job, no reasons given except that she was returning to a more fully Montessori curriculum, eschewing Art for the children. (Who drops Art for the children?! But this happened right after I was first targeted by the local FBI-DHS contingent, directly after my encounters with School Board member Sinead Walsh and evidence of complicity from School Board President Alexander Steffan, from my daughter’s Montessori school, Adams Montessori, as I have previously reported.)

Since Mazzeo’s arrival next-door last year, he has frequently brought his dog out to the drive and called its name rather pointedly, while I am working literally a few feet away, shouting “Luna, sit!” – perhaps because the planes and drones constantly droning about are trying hard to fixate on private parts, seated?—something I have reported in detail before: not merely are they tracking non-consensual implants, they have a fixation with people’s nether regions and energy chakras and meridians. But indeed, given that this man has proven himself to be a 100% planted mercenary employed by the agencies, I don’t doubt he is engaging in bizarre Covert-Comms which he may imagine should have serious connotations for me: all I can think of when this happens pointedly right under my window is that it is entirely possible Oona back in 2014 was contacted and lied-to with an NSL, which led directly to her letting me go.

But “Luna” is a nice touch for Lunatic too, and that in fact is exactly what the CIA, NSA, DOD set think they have set up for all their victims, that label of Lunatic, when their absolutely frightful activities of biohacking and neurohacking are exposed. This is their go-to Cover, one they imagine shields them comfortably.

Paranoid Schizophrenia, Tool of the Red Terror, Makes a Comeback in Authoritarian USA & Other Western “Democracies”

As a journalist and writer who has not stopped exposing these crimes, I have frequently reported being assailed with screaming ambulances on the street directly after podcasts and articles—their fond hope always, no doubt, is that the men-in-white come along and lead me out, in a straitjacket possibly.

Echo-stalkers, Freemasons/Intel contactees among guests on podcasts

My podcasting over the past five years has also led to many interesting encounters with interesting people, some of whom I and others suspect are agents. Indeed, the entire alt-media world with both its front-faces and its hosts is filled with agents. The Truman Show that is set up around all targets – a NSA-CIA stunt? — also has found me; while many watching my podcasts have taken care to point out to me which of my many guests are making clear Masonic gestures, they shouldn’t imagine I don’t see it too. I have been frequently treated to the transparent echo-stalking and Intel-driven-buzzword-using run by hypergame theory and “surveillance feedback,” indicating guests either being involved or contacted. I’ve kept a straight face and my thoughts to myself — but those who have been on my podcasts and thrown out those buzzwords at me imagining I wouldn’t notice or worse, that the secret laugh they were sharing openly about it was somehow indicative of a harmless prank should know they have participated in the ongoing crime of covering for criminally-harassive agencies. All in the service of the larger investigation and exposure of corruption and crime – which my podcasts have certainly done.

NSA Gatekeepers in support groups who also play COINTELPRO provocateurs, saboteurs, and wheelspinners

Further evidence of the NSA sitting on email lists and gatekeeping targets/Mil/Intel victims while playing activist comes from ex-NSA Julianne McKinney, to whom is attributed a rather useful report on microwave weapon assault on civilians from several years ago, who gave an interview to Greg Symanszki also many years ago, and who suddenly reappeared on email lists reinvented in a most horrific way as arch, acidic, censorious, and gatekeeping to all targets/Mil/Intel victims, insulting one and all at whim, while also playing Intelligence Analyst taking apart each report of Mil/Intel weaponized assault and dismissing much. In my own encounter with this persona on email lists, I have initially taken her at face value and included her comments on letters and articles such as this one reporting Karen Stewart’s being Baker-Acted in Florida. Many others—among the older activists–witness to the hostility have assured me this is not the same Julianne McKinney as of old but a case of an Intel agent using an usurped-id, which sounds plausible to me, as also in the case of another prominent activist from some years ago, an engineer by the name of Eleanor White, reinvented now as gatekeeper. Both these email-ids (which is what they are to me, I have never met them in recent times, nor has anyone else from what I can tell) have sent me (as to others) similarly rude, hostile, and gatekeeping emails, seeking to disappear my witness testimonials of covert/clandestine-implants in main (the NSA-CIA-DOD is working hard to disappear all evidence of this in particular, but their clandestine assault on Americans with sharpshot, and surgically-implanted microchip implants at hospitals, dental offices, and via clandestine break-ins at home is indisputable, and has been proved by many with MRIs and X-rays). After several hostile and frankly nasty emails from Julianne Mckinney email-id, I have asked her not to email me again, while blocking her on my email server, as also Eleanor White email-id, who had taken to cyberstalking me incessantly, demanding I agree with her “analyses” on various matters related to the weapons those targeted are reporting.

Derrick Robinson who went on from the closure of FFCHS to setting up another organization PACTS—People Against Covert Torture and Surveillance—also has an NSA connection. At the Testimonies page on Galina Kurdina’s website he states he was a US Navy employee working for the NSA at the NSA building in Fort Meade when he was first targeted with smear campaigns and more, eventually being driven out of his job at the NSA building. Later reports from others suggest he was a linguist. Curiously, so was Karen Stewart, when at the NSA, by her report.

Emperor Napoleon/Hidden Hand

That’s 3 former NSA employees (or 2 and 1 email-id) who have now risen to prominence as “human rights activists” minding the illegally-FBI-targeted-and-sold-into-Military-Intelligence-Academic-neurotrafficking-and-biohacktrafficking-victimhood-in-secrecy-collectives on email lists and in support groups.

I have written earlier on Karen Stewart’s peculiar aligning with anyone and everyone running support calls (Ella Free) and support groups regardless of their questionable actions (slander, wheelspinning, giving MSM reporters false information) which cause harm to victims. It is evident now from the stray group emails sent to me she has established herself along with Julianne McKinney email-id—joint gatekeepers now–as a “leader” on these lists—which should give anyone pause.

Failure-To-Report-Crime | The Chicago Sun-Times Debacle: Neil Steinberg, Ella Free, David LaPorte, Ph.D, and the Ruthless Tearing-Down of All Reporting Unethical US Mil/Intel/Medical Experiments and Political Persecution Operations with Neuro/Bio/Energy Weapons as Delusional, Paranoid Schizophrenics Enjoying a “Mass Delusion”

The very-criminal targeting-for-DEW/Neurotech-Terror-and-Slander programs run on a few dark intentions: to label targets of Mil/Intel crime Mental, problematic (as in “troublemaker”), extremist, pre-criminal if not criminal, pre-terrorist if not terrorist, anti-social, unstable, and dangerous, to be watched 24/7—and it seems they accomplish this through deceit and working from the inside, among targets, as gatekeepers, censors, misdirectors, liars.

From the very obvious NSA connections here from the most gatekeeping, questionable, and defaming “activists” occupying prominent spots among Mil/Intel victims therefore, I must conclude the NSA is manipulating targets, through the email lists and support groups. Note, we are speaking of NSA victims here, people being sharpshot, covertly implanted, hit with exotic neurotech, 24/7 assaulted with microwave pulse weapons from the full array of US Military Might: drones, planes, helicopters, fusion houses housed with mercenaries wielding exotic weapons, community mobbing programs garbed as “monitoring” and “policing” and much more.

Of course, these are also CIA victims, FBI victims, DHS victims, and DOD/ Navy/ Army/ Airforce/ DIA/ DARPA victims. NSA’s taking care of it all. Any questions re. Karen Stewart still standing after her absolute crimes against many, including myself? Just ask the NSA-CIA-DOD burying the flagpole.

Derrick Robinson, PACTS, IRMAETOS, and ICATOR

Melanie has revealed over the last couple years she is working with Derrick Robinson of PACTS, as also with other international groups on a joint venture they termed IRMAETOS—which may stand for International Resistance Movement Against Electronic Torture and Surveillance—at first, and now seems to just be ICATOR. When news broke last year that PACTS was involved in a lawsuit, as news surged online: https://www.docketbird.com/court-cases/Wells-Fargo-Bank-N-A-v-People-Against-Covert-Torture-and-Surveillance-International-et-al/cacd-5:2019-cv-02269—occasioning the resignation of John Christiana from the Board—and when questions arose as to the nature of the funds said to be stolen by PACTS, Melanie supported Derrick, saying all targets were being framed and she would wait to see the outcome of the case. Wells Fargo was accusing PACTS of active fraud with money intended for a charity being oddly intercepted and funneled into a PACTS bank account instead renamed Sodexo, the very name of the intended Wells Fargo recipient. By John Christiana’s report, Derrick’s roommate Bertrand Pangan was involved in the transfer, and in setting up this account. Half of the funds had been intended for him–with Derrick apparently having written a check to him for $269,000–half remained in the PACTS Sodexo account. Keen to comprehend the facts, Jack Christiana and a colleague drove out to visit Derrick Robinson, learning however that on the very day they would visit, Bertrand Pangan suddenly died. In reporting this in his PACTS newsletter, Derrick brushed off the death as executed anonymously by DEW. In his newsletters, he later mentioned the lawsuit, berating those like Galina Kurdina who questioned him, and said he would reveal more when the case was closed. He also refused to respond to the questions of this reporter, restating that more would be known when the case closed.

The case was closed eventually last October after a settlement with Wells Fargo negotiated by Jack Christiana, by his report, as a consultant commissioned to assist—when he persuaded Derrick Robinson to return the funds being wrongfully retained by his organization’s bank account, that is, by him. This Derrick rephrased to state on later newsletters he had been exonerated. But is this what really had transpired? The initial sum transferred by Wells Fargo was over $539, 000 (corrected from million/Rd/3/10/2022) dollars, with half of this long being retained apparently in the PACTS account.

The questions that surround this transaction have not deterred Melanie who has continued working with PACTS and Derrick Robinson—who has also been reported by older activists to be untrustworthy by way of previous claims of embezzling of funds and active gatekeeping censorship of all proposed plans by them to publicize and expose the DEW/Neurotech targeting crimes run by the US Govt/5-Eyes Govt agencies on Americans, British, Europeans, Australians, others for over three decades now.

Support groups and plants protected by the FBI

That Derrick is being protected by the FBI is a conclusion many have come to—since no repercussions for setting up false bank accounts and retaining stolen funds while being present at time of his roommate’s sudden death are evident. No police investigation of the roommate’s sudden death in California appears to have occurred.

Let us not forget the police are corrupt too. Fusion centers include the state county and city police. In Massachusetts, the State Police Chief heads the Commonwealth Fusion Center. Police, through DOJ, have been handed the same deadly electronic weapons and neuroweapons which thousands of Mil/Intel victims all over USA are now reporting being assaulted with. In turn, fusion centers have handed these Spectrum Weapons to numerous contractors who carry these in their pickups, utility vans, service vans, trucks, SUVs, attics and basements and engage in “Ubiquitous Technical Surveillance” aka Covert Assault—I should know, I have measured EMF signals from many of these sources on my street. And deadly is the word: these weapons can induce heart attacks and sudden death, I have reported being hit with these several times. These frequency weapons can also cause grave illness, and mood and brain changes. As the CIA has proved, over and over, used with intent they can create Manchurian candidates for mass shooting and suicides.

Fusion Centers and Police are Using Psychotronic weapons, Neuroweapons, Active Denial 5G weapons, Microwave Weapons, Sound Weapons

Note on Facebook/Sound Weapons

Here is the Mass Fusion Center Chief’s refusal to identify what weapons he is using on the street, saying he is protecting Public Safety in doing so. (Beyond laughable.) And here is a California police chief ruminating on the use of neuroweapons and psychotronic weapons in crisis negotiation and in Crowd Control. A note on Facebook reveals a police officer in Dixie, California revealing information on a sound weapon he had to put people to sleep. We have all seen the active-denial microwave weapons being used in Canberra recently. And here is the Dutch secretary speaking of 5-G weapons—Active Denial—for crowd-control while an EU document talks about neuroweapons for Crowd Control.

Police in US cities and counties and States, as also in the UK and Europe and Australia are heavily Freemasonic. Not operating therefore as keepers of the law and keepers of the peace, but keepers of crime and silent atrocity with electronic weapons. For their Satanic bosses and Grand Masters of lodges.

Someone else at helm of a support group seems to be protected by the FBI and that is Richard Lighthouse of Targeted Justice, whose doxing advice was mentioned earlier—noticed by the FBI and circulated internally on a memo but not followed up on. Similarly with his flyers which were reported in mainstream media as having fentanyl on them. No questioning by the FBI on that either.

CIA, NSA, FBI, DHS, NASA, DOD work together to suppress reports of Mil/Intel victims using email lists, support groups, and conference calls

In examining the evidence therefore of the last few years of my experience with and observation of those running support groups, conference calls, and email lists for Mil/Intel victims, I must conclude it appears that the CIA, NSA, FBI, and DOD are working collusively and covering for each other.

Richard Lighthouse has a background in NASA, holds up Clown banners at the CIA, has published Disinfo regarding the DEW/Neurotech targeting meted out to many, on interviews, on his web site, maintaining unsourced narratives and misleading flowcharts, and is protected by the FBI. Is he CIA?

I have reported earlier on Ella Free of Freedom for Targeted Individuals who has NASA and Hollywood connections, says she was a former model, who suddenly appeared among Mil/Intel victims and began to run 4-hour support calls and interviews while also telling MSM reporters TIs were mentally ill. Is Ella a plant—from CIA, NASA, NSA?

“Dr” Katherine Horton

Looking back on “Dr” Katherine Horton—whose career on the activism podcast begun by Dr. Paul Marko, Techno Crime Fighters Forum started off so promisingly, yet ended with her shouting about lopping off people’s heads, and yelling about killing judges and police—in classic COINTELPRO fashion, as favor to the FBI, delivering TCFF all trussed and bound for FBI-surveillance as a suspect group when we certainly were not engaged in or inciting any kind of violence in response to Mil/Intel atrocity—including FBI atrocity–being wreaked on the populace, but public speaking and writing—as I have spelled out here—I have to conclude she was also, like Karen Stewart, assisting the fusion center operatives and agencies. Was she working for the FBI—while also engaging in CIA-style NLP and data-gathering activities, as I have reported before? Was she CIA and FBI both possibly—in addition to Swiss and UK Intel?

Please note, my speculations on people’s Intel affiliations are all my own, but I do want to point here to CIA Whistleblower’s excellent article REPORT EXPOSING CHARLATAN, PROVOCATEUR KATHERINE HORTON AXED!/Barbara Hartwell/Sep 16, 2020 which delineates some of what “Dr” Katherine Horton has done, citing her own words.

Several on the email lists have distinguished themselves as patronizing and patriarchical gatekeepers, including one Max Williams email-id who signs off as a “Foreign Office” retiree—whether that means Department of State or CIA, one can draw one’s own conclusions.

But I do think the CIA lurks on these lists and in the support groups, and is responsible for both the insider-action (especially from Targeted Justice and FFTI) of Mil/Intel and MK ULTRA victims holding protests and rallies, with spokeswomen talking irresponsibly to reporters about victims being mentally ill, as well as the outsider-action, from media and planted psychologists, sociologists, psychiatrists (the very annoying and completely-transparent-as-CIA-plant Todd Grande comes to mind) fixated on labeling all reporting victims as delusional, mass-delusional, stuck in echo-chambers, and so on. How convenient, for the hackers, experimenters, sadists, cannibals, and brutes over yon at Black Ops Center, well hidden by Covers and Lies of “Classified” while wreaking the most incredible of atrocities on their civilian-victims, in broad daylight, hidden in plain sight, directly in the midst of everyone else! How useful, and how complete, that iron-clad dungeon door, to strap victims in their seats so they can be tortured for life!

Many Others Out There: Plants, Trolls, Operatives, Spooks

There are many other Intel plants, Intel operatives, and agency trolls running support groups and calls out there, on social media, on Talkshoe, on Youtube whom others have had closer contact with and greater knowledge of.

I recommend that all Mil/Intel victims aware of such expose them all. I also recommend that people break free of these gatekeeping groups (which excel in malice and slander) and start filing criminal affidavits against whoever they can identify as their perpetrators with their local cities and counties, and that people make consistent efforts to publish their stories–on their own websites, channels, blogs, in e-books and books, but also with repeat letters of information sent to all alternative, true-media outlets and journalists, podcasters, and public speakers they can identify who are engaged in exposing crime, as well as human rights groups, and Senate Intelligence and Government Affairs committees and senators engaged in assisting “Havana Syndrome” diplomat/spy victims but ignoring Americans being finished off by the FBI with the selfsame DEWs and neuroweapons, such as Sen Jeanne Shaheen. Various support groups, whistleblowers, and advocates have in the past cautioned against believing anyone could have any effect against the behemoth of the US Intelligence-Security-Military complex commandeering such assault on people, at the behest of and with the collusion of Shadow Government Illuminati Freemasons, but I would suggest people transcend this sense of fatalism and publicize and publish their stories anyway: times can only change here on out. The truth must be known by all.

Addendum: Those interested in including notice of their unlawful-targeting in my upcoming investigative report on Mil/Intel Targeting Assault and Battery Crimes are welcome to fill out and send their targeting-record to me as noted here: Targeting-Record. Email filled document or PDF to ramolad@everydayconcerned.net. Thanks.

The fact is: Intelligence, Security, Law Enforcement, and Military agencies have gone rogue and given themselves enormous power over the populace, using tremendously destructive weapons and protocols (24/7 assault? Really? This is “Deterrence”? It’s certainly not Surveillance, and it certainly is Assault and Battery.) and are now collusively running torture operations on the populace, in absolute hubris, in absolute complacency of classification, and absolute belief in their virtue in maintaining secrecy in torturing others for profit.

In this, numerous commercial and academic entities are also complicit—these include outfits like Neuralink and Kernel, Elon Musk and Mark Zuckerberg.

Neuroscientists from the military who speak openly of the powers of neuroweapons such as Dr. James Giordano and Dr. Charles Morgan, and Neuroscience, Robotics, AI departments at Universities engaging in DARPA/DOD/CIA-funded AI and machine learning projects–on non-consenting victims–using cybernetics, neural network mapping, and BCI-AI prosthetics are also complicit in executing physical trauma and torture on those illegally-FBI-targeted tossed into these Black Ops programs via the ever-flowing Black Ops pipeline set up now all over the world in every neighborhood: Because who else are they experimenting on for their classified operations but this population?

Implications for Global Governance and a social credit system to run Silent Torture programs on the critical thinkers, dissenters, questioners, conscious, awakened, compassionate? You guessed it: infinite, as in infinite possibility for further abuse.

In the wrong hands, these weapons—secretive and stealth by nature, bio hacking and neuro hacking without fingerprints–can take down humanity. And guess what, it’s only in the wrong hands that these weapons are being operated today.

There is a great urgency for the full truth about these deadly weapons to be known by all, and for all worldwide to be engaged in open and public discussion about them–since the implications for human rights, bodily autonomy, privacy, sanctity, brain rights, cognitive liberty and neuro privacy are enormous.

How have they been able to get away with it for so long? And I think part of the answer to that is, they are running a large number of the most prominent victim support groups, interfaces, calls, lists, collectives themselves. That’s how.

Related

March 14, 2022: Reporting the Journalism that’s been Lost: on Disclosure from Declassified Docs on DEW/Neurotech Ab/use on Americans, Europeans By Their Own Governments/Reposting a Twitter thread/Part of The Hidden Hand Reveals | Ramola D | Plain Speaking/Substack

March 11, 2022: The Hidden Hand: Intelligence Community Crimes, Law Enforcement Crimes, Military Crimes: High Tech Crimes, Well-Hidden/Using Spectrum Weapons on the populace is easy to hide when the “Support Groups” help wheel-spin the disclosure to oblivion | The fallout is disappearance of journalism | Ramola D | Plain Speaking/Substack

Reporting the journalism that’s been lost/Thread: https://threadreaderapp.com/thread/1502702747623243782.html

Open Season on Targets: Blacklisted Individuals, Extreme Abuse in Targeting, Secretive Lab-Rat Exploitation, & Massive Establishment Cover-Up

Online Press Conference | Oct 15, 2021 | Exposing Worldwide DEW/Neurotech Targeting & AI-Cybernetic Torture, Bio-Neuro-Trafficking, Stasi Crimes Against Humanity by Fusion Centers, Military, Intelligence, Law Enforcement, Sheriffs, Local Govts, Universities, Research Institutions, Local Communities, Utility Cos., & Private-Party Criminals

Once Again, A Memo to President Trump: Massive Surveillance State Abuses | Treason on the Ground, in the USA: Public-Private Partners in Targeted Killing of Americans

Ville Hellberg | Rendition Flights, Anyone? Inter- And Cross-Governmental Torture Programs Manifested under the New Surveillance and Counter-Terrorism Laws Withhold Legal Protection, Human Rights, and Constitutional Rights from Civilians, Their Targets

Report by Ville Hellberg | Posted by Ramola D | 31.05.2021

Note: This is a major report from a European policy analyst exposing the horrors of counter-terrorism and mass surveillance torture programs being run worldwide since 9/11 by US, Five-Eyes, Fifteen-Eyes, EU member nations under agreement with US intelligence and security agencies, self-labeled as surveillance and counter-terrorism, self-permissive of bio-hacking and neuro-hacking, using invasive anti-personnel Electronic Warfare neuroweaponry, self-permissive of “No-Touch Torture” and remote-access physical and neurological abuse, shrouded in secrecy and propaganda, deeply invasive of human privacy, and unleashing Stasi, Nazi, Mengele-style programs of atrocity, torture, physical, and psychological abuse in concentric circles of control on millions of innocent civilians, wrongfully labeled “suspects” and “terrorists” for purposes of competitive development worldwide of supercomputing AI, cybernetics, robotics, neuroprosthetics, Brain Nets, Mind Hives, Cerebral Internets, and brain-degrading Neuroweaponry all at the cost of massive human suffering and human lives, revealing a complete breakdown of ethics and consideration for human rights among governments, militaries, security, and Intelligence agencies, seen through the eyes of European policy analysis and human rights convictions examining US Foreign Policy just as much as state of the art Surveillance Technology and Neurotechnology.

While these programs of political persecution and hidden torture are the same ones American human rights campaigners and others worldwide have been discussing widely in articles and books (see Targeting is Real), this report is groundbreaking and unique in its close examination of the US “War on Terror” declared by George Bush in 2001, which has influenced US Foreign Policy and coerced European submission to a worldwide fixation on counter-terrorism and mass surveillance inducive of clampdowns and removals of civil rights and liberties, and destroyed the concepts, principles, and protections of democracy worldwide, including European concepts of human dignity and rights completely at odds with American imperialism. “Europeans do not wish to bring the War on Terror to European soil,” writes Ville Hellberg from Finland.

What few people know–thanks to mainstream media propaganda and long-term occlusion of human rights reportage with deprecating, discrediting cover, intended to obfuscate, of “Targeted Individuals” who have been reporting extreme torture and abuse now for over three decades–is that American counter-terrorism and surveillance programs and laws have gone well beyond the revelations of Edward Snowden and permitted egregious torture, abuse, and removal of rights on American soil, as reported by this writer and others to President Trump in 2017 and 2019:

Memorandum to President Donald J. Trump on Domestic US Torture Programs Running Under Cover of Surveillance

Once Again, A Memo to President Trump: Massive Surveillance State Abuses | Treason on the Ground, in the USA: Public-Private Partners in Targeted Killing of Americans

What Ville Hellberg brings to this disclosure is keen insight into the structure of global security agreements, the excessive role played by US “War on Terror” foreign policy demands, the rise of new technologies permitting extreme invasion of human, bio and neuro privacy, the false legalizing of “sources and methods” of interrogation and investigation granted to Intelligence and Security agencies, and the crying need to address and end the silent suffering of thousands of innocent citizens, wrongfully targeted, blacklisted, ostracized, tortured, maimed, disfigured, continually abused, destroyed, and yes, also murdered–in a complete breakdown of recognition of human rights–worldwide. Many thanks to Ville Hellberg for this powerful and deeply thoughtful analysis and report, which is surely going to pave the path to positive change, going forward.

–Ramola D

****

PDF here:

****

RENDITION FLIGHTS, ANYONE? INTER- AND CROSS-GOVERNMENTAL TORTURE PROGRAMS MANIFESTED UNDER THE NEW SURVEILLANCE AND COUNTER-TERRORISM LAWS WITHHOLD LEGAL PROTECTION, HUMAN RIGHTS, AND CONSTITUTIONAL RIGHTS FROM CIVILIANS, THEIR TARGETS

Ville Hellberg | May 31, 2021

WE ARE WITNESSING GLOBAL ELECTRONIC WARFARE BY SUPERPOWERS WHERE INDIVIDUALS, POPULATIONS, AND INFRASTRUCTURE ARE TARGETED. DUE TO THE WAR CIRCUMSTANCE, GOVERNMENTS HAVE PERMITTED THEMSELVES TO DIVERT FROM LAWS AND DEMOCRATIC PRINCIPLES.

Torture is a horrific topic and most minds will turn away from it because it can’t be comprehended that humans can be motivated, or computer programs can be run to do this to other sentient beings. Just when we believed we were becoming more civilized as a culture, the technology for torture has advanced more than a hundred fold in recent decades.” – Robert Duncan, ‘Neuropsychological and electronic “no-touch torture”. The spectrum of “interrogation” and torture techniques used by the US and its allies’. [7]

Electronic Warfare (EW) anti-personnel applications such as DEW (directed energy weapons) and AW (acoustic weapons), as well as their distant cousins neuropsychological electronic (neurotech) applications RNM (remote neural monitoring)/RMI (remote mental imaging) /EEG (electroencephalogram), and the product of these, V2K (microwave hearing), among other techniques, are being directed to civilians globally. With the exception of capital-intensive neurotech applications or other mass operations, the tech can be operated by private sector agencies and corporates, whilst the operations are in general run by military and law enforcement agencies from multifunctional radar and antenna platforms globally. Even though the applications are used in connection with psychological operations, they have the fatal capacity and produce pain, suffering and psychological trauma, even fatalities in their targets; civilians. Thus, the utilisation supports the definition of torture. Under governments’ execution, the operations are run by the military whose clientele the national security, law enforcement, intelligence societies are. Whether the implementation and targeting of this technology on civilians constitute a war crime should be evaluated. The technology ’consumes’ the human body, especially the neurological system, as directed to its targets for over inhumanly prolonged periods. Other scientists say the neurotech mass surveillance AI applications should be considered as a WMD. It is imperative indeed to acknowledge that the vast increase in numbers of targeted civilians indicates a widespread attack on human rights.

Due to its stealth nature, the technology has attracted military budgets globally. Other governments have developed sophisticated global operations and are well advanced in the utilisation of this technology. However, due to the low cost of operations most governments have utilised their own version of the technology. This also involves increased non-consented human testing and yet another armament. Human testing on dissidents, activists and whistleblowers, even their descendants, seems common. Whilst the effects of resonance spectrum frequencies on the human body and nervous system were discovered to their full potential by the midst of the 1970s [6], it still needed an agenda and strategy for implementation. The new millennium has brought us “the War on Terror” in which counter-terrorism and mass surveillance laws introduced legal instruments to allow the use of “mass surveillance neurotechnology” under which the resonance technologies are operated. The use of anti-terrorism as an agenda is an unconstitutional plan of the Western coalition that has significantly strengthened sovereign national power at the expense of human rights and democratic systems through surveillance laws.

The new dynamics of global geopolitics have also impacted the global power balance and foreign and security policies. We may have to accept that there are several superpowers capable of globally utilising this technology against the citizens of other countries. International laws should regulate the imperialistic execution of these technologies by regime and purpose e.g. automatized targeting, target selection, technology and intergovernmental co-operation should be regulated and watched carefully. There are some parallel operations and agendas that further increase the number of targeted people and populations. When the operations are global it is likely the resonances are directed through OTHRs (over-the-horizon-radar) and satellites which in turn facilitates the discovery of the source radar. For the sake of clarity, it is sensible to acknowledge that cellular phones have a key role in locating targets and delivering biometrics. The MSM is full of cover articles when one government is caught using the technology and blaming the others. Recently, we have seen evidence of purposely leaked material in MSM regarding global Electronic Warfare, in attacks where resonance technologies have been used, such as the attacks to White House officials [29] and Cuban embassy staff [30] by assumed DEW microwave technologies. These operations have been leaked not only to inform the public and other governments of the ongoing global Electronic Warfare but also to blame the other governments. It is reasonable however, to recognise that these attacks really are lightweight samples of the use of the WMDs. People should be suspicious in view of the recent bushfires also. In other words, it is the infrastructure, populations and individuals that are being targeted in this global war and not discussed in the MSM. We are indeed viewing the evidence of a global war.

The technology is poorly understood by lawmakers, practioners and politicians it is presented by military and law enforcement lobbyist and therefore, become approved and utilised globally. Human rights activists are in search of political co-operation whereas the political or administrative powers will not touch the topic. There is a significant number of similarities in details of this “play” to the events of WWII where the messengers of the Holocaust had not been taken seriously either.

Brain invasive neurotechnology applications (RNM/RMI/EEG) are claimed to have been used in mass surveillance operations. The applications are commonly called “cybernetics” although finding common global terminology for the EW applications seems problematic. We suggest the use of military terminology since the technology is based on military design. Each technology presented in this paper should be defined as Electronic Warfare anti-personnel applications, including the mass surveillance neurotechnology applications.

The mass surveillance operations target civilians and their neural systems. The operation is automated and run by supercomputers through multifunctional radar or antenna systems which means robotic elements are involved. In the investigations of the neural systems of the targeted civilians, the cortex is being stimulated by a spectrum of electromagnetic pulses for years in order to clone the entire neural system. The methodology is called synthetic telepathy since it may investigate and implant thoughts and mind patterns into the targeted brains. The term “mind control” implies the domination of the conscious nervous system. The process is not painless, hence the term “no-touch torture”. A group of brains can be linked together as “brain network” which in turn assists supercomputers to develop a competitive advantage in the field of AI. In “neuropsychological electronic torture” painful stimulants help to cause a reaction in the targets’ cortex that is measured and biometrics collected. Synthetic telepathy refers to reading and replacing one’s thoughts with “synthetic thoughts” or even by another mind replacement. The recent development where mobile devices, phones, can be used to collect and introduce these emissions i.e., ICT and 5G networks are in use. Scientists have developed systems to take nanotech to the brains which then receive the resonances. It has been presented that the mass delivery of this nanotech would occur through public vaccinations. The nanotech operates using the body energy (piezoenergetics) or by energy delivered resonances. Thus, the resonances deliver both the energy and the informantion in form of commands. The delivery of these resonances can be arranged from any platform, even by mobile device emissions. The mass surveillance utilises satellites and OTHRs. This allows continued mass observations of the feelings, senses, thoughts, and actions of the target. The fact is that individual’s free will and degree of autonomy are hugely affected.

As a result of the recent breakthrough of technological development different forms of applications are being utilized in many areas in the society, such as police, customs office, border control, prosecutor, judicial system, and intelligence community but also in the private sector. The technology remains unregulated and lacks sufficient measures of supervision, monitoring, and control due to the covert nature of the operations. In Europe, the situation is being recognized [23] by lawmakers to a certain extent. Whilst the EU has been speculated to push through a reform [8] on the laws of AI mass surveillance to ban the use of AI for mass surveillance (from the private sector alone) and some other uses this has not been ratified. There has been a good progress made to impose further regulation on automated weapons systems [31] and interrogation methodologies [32]. In addition, the consistency of surveillance laws is being evaluated in the EU by the ECHR [33]. It seems lawmakers do not understand the technology since they only have the military introduction to it. In the absence of ethical aspects, international laws, regulation, and compassion, solidarity the torture-like execution continues to be conducted, hence the phenomenon of targeted individuals.

Introduction

Too little is spoken in public about white-collar law enforcement and intelligence community operations’ military tactics that produce pain, suffering, and psychological problems to civilians. Resonance technologies are at the core of the Western intelligence community and law enforcement operations today, executed by the military among others. Yet it is unclear which government agencies and how many countries are abusing neurotech methodologies. The military technologies have been introduced to politicians under anti-terrorism agenda by a Western intelligence coup as surveillance methodologies with a major detail left ignored, that the technology causes significant pain, suffering, physical and psychological trauma, even fatalities. The technologies are also being widely misused in operations lacking supervision in an unregulated industry in the absence of ethical aspects.

Such tactics as DEW (directed energy weaponry; laser, maser, high power microwave and radio frequencies as well as particle beams), AW (acoustic weaponry), RNM (remote neural monitoring), reverse EEG (electroencephalogram), and V2K (microwave hearing) to mention a few are somewhat creatively executed from multifunction radars and a series of antennas and directed to their living targets from a diversity of platforms with satellite assistance. Despite the fact that these are military tactics, and a crucial part of Electronic Warfare anti-personnel operations, they are being directed towards civilians to cause pain and suffering when misused and therefore, must be considered as torture. Should that not constitute a war crime? In addition to a law (Finland: Rikoslaki luku 11 pykälä 9a) that defines torture as a crime, most of these nations have signed on the UN Convention on Torture.

Anyone can be put into these programs. Justice and rule of law does not exist at the highest levels of government. Treaties are worthless because the #1 agreement in the rules of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead by example.” [7] This is the explanation of the “War on Terror”. It seems the police, prosecutor, in particular, border control, customs, judicial system, intelligence community and military operations are all in favor of this type of implementation, the citizens themselves being bypassed. Probably, the entire clientele favours this technology which allows direct participation in the activation of the targeted suspects’ sensors. This is the end of privacy as we know it, the film ‘Minority Report’ in steroids.

Coercive Measures and the Use of “No-Touch Torture”

In Finland, military intelligence confirmed on 06.05.2021 [16] that some of their coercive measures are similar to the ones used in the local law enforcement. More interestingly, the article confirms that the district court (of Helsinki) regulates the use of coercive measures which in turn may be interpreted that the judicial system in Finland allows the use of military tactics that are sometimes referred to as “no-touch torture” (torture caused without visible connection to the targeted) to be used to target the Finnish citizens. In view of the fact that law treats any torture or intentionally caused pain as a crime (Rikoslaki Ch 11 §9a among the UN Convention against Torture) in Finland, the arrangement is somewhat disputable. Another trick to hold back the argument on war crime?

In Finland, the chiefs of military and law enforcement select the technologies used under coercive measures and self-supervise the utilisation of these. It is indeed wishful thinking that the lawmakers, law practitioners and politicians approving the use of the technologies would also understand them. Some targets have been targeted for decades even though the permitted period is supposed to be 6 months each time before renewal. The renewal process would not stand any closer evaluation. The law enforcement officers manufacture the evidence to present the suspect in a negative frame. There is no alternative explanation on why the same targets are under the execution for decades unless, they are the targets of military exercise. The former ptotocol is called target manufacturing. It surely seems the technologies have become a punitive instrument for the political and administrative cultures.

One acknowledged problem seems to be the new surveillance law that allows the use of resonance technologies together with counter-terrorism laws which in turn allows the removal of civil rights. Finnish Defence Forces (FDF) are investing in cyberwar in the future [17] and confirms that AI is involved in order to handle significant amounts of data. The terminology appear to cause problems with interpretation since the term “cyberwar” has been used in the media to cover resonance methodologies also. Bear in mind the ICT sector is a part of the mass surveillance structure and 5G infra based on resonance technologies. Since 10bn Euros is being invested in the new fighter jet fleet which in turn supports cybertechnologies by multifunctional radar systems it is clear the technology is in use. Kivinen, the Chief of Defence, states that in developing a cyber defence programme the Finnish Defence Forces co-operate with other members of the EU cyber defence projects [17]. It was brought to the knowledge of Finnish Prime Minister Antti Rinne in 2019 that what mistakenly is called cyber weaponry instead of anti-personnel EW technologies were being used to target civilians and even children. Rinne publicly aimed a reminder to the Chief of Defence who in turn publicly mentioned the technology related to an international war exercise [18]. As it has been brought to the discussion earlier the EU seems to have security policies that conflict with human rights and indeed, with the EU policies for human rights. Since the EU does not possess an organised military compartment or co-ordination for the common defence the EU member nations practice with who they will. Human rights are left under the observation of the military in this war exercise, a light operation if any.

Since the views of targets have not been heard in preparation of the surveillance and counter-terrorism laws in the EU, the understanding of the technology is based on military reviews. This is an excellent reason why targeted should be heard by lawmakers, law practitioners, and politicians instead of copying military methodologies from other societies supported by massive lobbying. If not legal risks, at least political and reputational risks will acknowledged by the Governments of the EU [17, 20, 26]. The use of these weapons should be regulated more aggressively and indeed, take into account that the same targeted civilians, shockingly, remain the targets of international war exercises for years, as long as their physiology can withstand for the attacks of the energy weapons.

The Intelligence Ombudsman in Finland supervises the legality of civil and military intelligence and the realisation of basic and human rights in intelligence activities (The Act on the Oversight of Intelligence Gathering entered into force in February 2019) states the website of the Intelligence Ombudsman. The Ombudsman has produced recently (05.05.2021) a second opinion on the operations of military intelligence and intelligent services in Finland according to which he approves the operations. The Intelligence Ombudsman is aware of the use of the technologies brought to discussion in this report in Finland. He has been presented with 26 accounts of personal reports of targeted civilians on Finnish soil. These technologies have been used on the targeted well before the surveillance law came into force. An independent external review is suggested on the surveillance laws in the EU as there is no consistency among them. Similarly, the coercive measures used and the principles on what basis they are being used on civilians in the EU [20, 23, 26] should be put under review.

The Rights of the Targeted

Governments may mistake their citizens as enemies in the same way that an immune system may lose its ability to distinguish between the body’s own cells and pathogens. ” [21]

The above is a very polite articulation of the fact that human targets are required to develop military technologies. The targets are approved through a judicial system that operates law approved by politicians and lawmakers. By practice, we know that most of the targeted individuals are manufactured targets and presented in a frame that has very little to do with reality in order to allow the use of counter-terrorism and mass surveillance laws.

If an intelligence law is not well-conceived and rational, it could easily become a formidable weapon of repression. An intelligence law should not only protect citizens against terrorism, but also against the State… There is a total absence of control in this law.” M Trevidic [23]

The EU security strategy has been impacted by the Western agenda for anti-terrorism and allows such resonance technologies to be utilised under the law enforcement and intelligence operations of its member countries against the earlier knowledge of the topic (art. 30 Resolution on the Environment, Security and Foreign Policy from January 28, 1999, Nr.A4-005/99) to civilians. No human rights, no rights of the accused nor legal protection is respected in the process to which civilians are exposed. Constitutional rights are removed by these counter-terrorism acts. The counter-terrorism laws and mass surveillance laws both are used against democracy and human rights. The suspects do not have rights nor legal protection against coercive measures. In fact, the suspects have been stripped of their rights during the implementation of this protocol. The accused supposedly have rights (ignored), the rights of the accused, however, only a very few ever are being accused. The unconditional nature of implementation indicates it is not about seeking the truth under district court approval but the aim is to degrade the individual. It takes time for civilian targets to recognise their life is over as they used to know it. Dramatically enough no instance informs targets of their amended status in society. Even members of families with small children are placed under the torture scheme in which situation everyone is affected physically and psychologically (an acknowledgement based on empirical observation).

“As Lord Hoffmann noted in a concurring opinion in A Secretary of State for the Home Department, ”The real threat . . . comes not from terrorism but from [practices] such as these.””[21] referring to the impact of counter-terroristic measures in the society.

The Torture

Why torture? The CIA claims it works. The assumption is that it works to gain actionable intelligence. Torture is often used for revenge, punishment, interrogation, and behavior modification. In other terms torture is used to remove the continuity of thought to confuse the target to reveal information, erase brain patterns such as values and beliefs, or to break down the human spirit to make them submit and obey their handlers.” [7]

– Robert Duncan – “Neuropsychological and electronic “no-touch torture”. The spectrum of “interrogation” and torture techniques used by the US and its allies”

Neuropsychological and electronic “no-touch torture” [7, 9] is used as the spectrum of “interrogation” and torture techniques by the US and its allies says Robert Duncan, a former CIA analyst and engineer, who has been developing such methodologies as a CIA, DoD engineer. Robert has an opinion the neurotech mass surveillance technology is indeed a WMD.

The intelligence agents can also use low level microwaves to cause mental and physical confusion that leads to illness. Beaming microwaves at victims makes them fatigued, damages their immune system, causes neurological damage that affects their thinking and ability to carry out tasks, induces premature aging, cancer, and cataracts. ” T Rifat. [22]

The mass surveillance neurotechnological weaponry causes a spectrum of effects depending on the computer program, the technology chosen, and the team running the execution. It may be sensible to make a note that we are indeed talking about piezoelectric mechanisms [25] (NB. Figure 15. Piezoelectric energy harvesting from the human body) within the human body (biochemical balance within the body e.g. various proteins electrically reacting towards each other). Antioxidants alleviate the potential risks of EMF exposures [24]. The following effects are reported among others [13]: Synthetic telepathy (reading and broadcasting of thoughts), microwave hearing, forced visions some synched with body motion, forced memory blanking, controlled dreams, forced waking visions, artificial tinnitus, wildly racing heart at rest, forced muscle quaking, the sensation of tapping, intense general pain or hot-needles-pushed-deep-into-flesh sensations, sensations of electrical shocks, burning sensations, intense pain in a larger area of body e.g. face or chest (technical capability to amend the spread of the beam as well as the spectrum), special attention to the genital area; itching, forced orgasms, intense pain, forced thoughts and feelings and sleep deprivation (sleep being constantly disturbed with the above).

In Finland, a survey of a population of nearly 100 victims of Electronic Warfare anti-personnel applications was taken in 2020-21. The research involved questionnaires and interviews and produced very consistent information on the symptoms and observations of the victims. Reported health damages and symptoms appeared to be far more serious than what was expected. There also seems to be an apparent division of symptoms and observations by different executions of DEW and neuropsychological resonances. The findings of this research will be published in another context; however, it can be noted here that the following psychological disorders or physical symptoms were reported among others: Memory lapse, PTSD, long-term stress, panic attack, state of fear, severe depression, suicidal thoughts, paranoia, schizophrenia, anxiety, lack of concentration, ADHD, sleep deprivation, desire for sex /food etc, cardiac arrhythmia, headache, hearing voices, sensation of disturbance in cognitive processes, orgasms, erections, sensation of pressure in brains, pain in eyes, chest pain, difficulty to breathe, stomack pain, digestive problems, temporary paralysis, pain in genitals, twitches, sudden increase in blood pressure, brain fog, neurological symptoms, strokes, tinnitus, sensations of burns, temporary feelings of blood clots and numbness anywhere in the body, cosmetic injuries such as burnt skin and physical and psychological exhaustion among other. The targets reported that their head, heart or genital area was attacked the most. In addition, some Electronic Warfare anti-animal attacks have been conducted to their pets and anti-material attacks were reported in which mobile devices or computers were either used remotely or entirely damaged their hard discs. In connection to preparing this documentation many methods were conducted to potentially prevent the submission of this material. Many targeted people have reportedly been targets of an attempted murder also. The dilemma here is that potential injury cannot be connected to the resonance technologies. Another argument being used by the supporters of the neuropsychological technologies is that whenever there is pain, no injury has necessarily taken place. The definition of torture is based on the concept of experiencing pain. Therefore, whether the pain is physically caused or ‘only’ the idea of pain being delivered to the brains, the pain is still being experienced.

The long-term effects are not well published expept for long-term sleep deprivation which is a major catalyst to changes in the human body causing, for instance, high blood sugar and other signs of exceptions leading to long-term diseases. The radiation may impose a threat on internal organs, especially the liver and heart. An exposure to radiation in the long-term is very likely to cause heart diseases such as cardiac muscle inflammation which in turn may cause the failure of the heart muscle. Exhaustion seems to be one of the common symptoms that also was shown in the results of the Finnish research.

If anyone was to argue that the aforementioned symptoms were based on civil applications, such as the 5G or electricity grid, they are not entirely wrong. The ICT (information communications technology) infrastructure is being utilised within these operations; together with electricity, radar, and satellite technologies they create a strong electromagnetic field that enables the surveillance and introduction of “brainwaves” and what not. It is however, the effect of the radar that amplifies within the strong electromagnetic field and causes the symptoms by signals delivered via satellites and ICT network. Due to the nature of the scientific research, the findings are kept secret and the health concerns remain unpublished to cover the economic model within the industry. The business model is a cash cow and supports also related industries and business models. The symptoms reported in the Finnish research are consistent, the experiences are similar and indicate a clear correlation of the presence of strong electromagnetic fields. Such an electromagnetic field requires radar or antenna series for targeting. Also the observations on the use of OTHR (over-the-horizon-radar) and satellite delivery correlate with the symptoms. The impacts of long-lasting combined microwave exposure on the human body may not have been adequately investigated and approved by the medical scientific society. It seems it is the currently targeted population which produces this critical empirical knowledge since the biometrics are available for reading at all times. The Military/ Intelligence/ Private sector execution seems more interested in the development of their projects, in the development of AI and in spying on civilian targets as well as the profits produced, than in the health and wellbeing of the targeted people. The cortex is being stimulated by overlapping applications and new “products” are constantly being developed. By now the audience should acknowledge that the radar technology eanbles 360-degree imaging of the target.

Neurological research found the brain to have specific frequencies for each voluntary movement called preparatory sets. By firing at your chest with a microwave beam containing the ELF signals given off by the heart, this organ can be put into a chaotic state, the so-called heart attack.” – T. Rifat [22]

The aforementioned effects reconcile well with the methods of interrogation and behavior modification illustrated by R Duncan in his report on torture [7] where Duncan introduces 18 tactics of torture that can be implemented via physical or “no-touch torture”. ”Coercing and torturing people to suicide is very common. Both tactics in physical or no-touch torture involves plausible deniability.”[7]

The Target Selection

The problem is persistent since there is a vastly growing number of operations that aim to benefit neuro-invasive technologies. There are private AI developers in the sector and many of them are known for entirely another type of consumer products. As a result of long-running operations their resources have developed a pattern of excellence and now are looking to gain a technological advantage in neuroscience and supercomputing. Some corporations or countries may own satellites which in turn allow a significant access to the field of research. These companies consider their employees as a resource by clauses in their contract of employment that allow the use of “brain data” in form of any inventions made by the employees.

A significant amount of States are utilizing the technology and having a “brainrace” causing perhaps overlapping execution on international individuals since there are also a number of individual government agencies whose operations may be run from their independent facilities. This explains the vast increase in the headcount of targeted individuals. The law enforcement body involving the prosecution and judicial system is becoming dependent on the technology which is likely used during trials and pre-trial examinations already.

The resonance methodologies have their roots in military technologies. Recently, the security sector and law enforcement agencies have owned the technology and the defense industry has developed new applications [10]. Also, international white-collar organizations such as the NSA under the national Foreign Ministries’ military wing, the DSA, execute the operations [12]. The technology is operated by the military using multifunctional radar signal intelligence for law enforcement and intelligence community (DSA) white-collar agencies acting as their ”clientele”. NSA officers can globally flag any individual and set them up under the execution without hearing the person. The justice systems and law enforcement agencies are used actively to get hold of the citizen to manufacture them a target [11]. The targeted are not informed of their amended status as a suspect which in turn prevents the target to kick-start legal action. Supervising instances are claiming to use legal protection and reminder of remedies the society may offer. It is difficult to get a message across that no tricks are left, no authority takes responsibility. Taking the matter into the court which has just approved the use of the methodologies sounds illogical. Usually, terrorism, national threat, or serious crime are being used as the excuse to approve the use of the technologies under the coercive measures [17]. In doing so, it seems the EU acting as an ally also is unaware it backs the implementation of the anti-democratic measure that ignores citizens’ human rights, the international rights of the accused, and leaves the targets without legal protection and due process. No questions being asked from the individual themselves.

Since the manufacturing of the targets seems relatively careless and no oversight committee or set of regulations or auditable institution is monitoring how targets are being selected, the protocol may be used for an extension of personal and political, even economical interests. Picking and setting up random targets, no legal groundings necessary. Certainly, dissidents, activists, or whistleblowers are not there by accident. Random people, people who have been in the wrong place at the wrong time are selected to reach the critical mass, the amount of targets to allow for technological breakthrough. The execution does not seem to have a deadline. Anyone could become the future’s target; the extrajudicial implementation does not recognize social statuses, unless social scoring is involved. The targeted people will experience their life being demolished in all areas, holistically, and therefore, their profile is on the downhill. The execution of such a program requires inter-and cross-governmental implementation, hence the “international torture program”. The targeting is inhumane, unjust, unreasoned, and unaccountable [1].

It may well be that the private sector acts as the developer of the product and runs the experiment whereas the governments are backing the research and delivering the resources, the brains in the execution of neurological mass surveillance.

The Human Rights Issues

Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it. No-touch torture is much more complex than physical torture. Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary to test on innocent targets.” [7]

The usage of resonance technologies is observed to be at times politically orientated, or not adequately justified, and is always questionable, strongly subjugating human rights or constitutional rights let alone moral aspects. This is because i) the technology produces a spectrum of pain in the target (and injuries of which some fatal), ii) sleep deprivation in long term preventing full participation in society, iii) the technology is being directed towards civilians (against the Geneva Convention), iv) the technology is being utilized without the permission or consent of the targeted person (against the Nuremberg Treaty), v) the operations lean on self-supervision and monitoring to the extent the human rights aspects are not being considered appropriately (no measures on corruption), vi) the technology is being directed to people inhumanly while asleep and vii) towards bystanders (especially children while also asleep disturbing their sleep and causing them pain), viii) the technology is being directed to homes of the targeted citizens (against constitutional rights for privacy, domestic peace, etc), ix) the period the technologies are being implemented to targets is matter-of-factly inhuman, reportedly from less than a decade up to 30 years (in which time most of the targets are forced outside of their societies and health, social structure, career, and families have all been destroyed), x) the technology may cause fatal injuries that are impossible to trace back to the usage of this technology and xi) torture, definition, of which the use of this methodology fulfills, hardly is an argumentative solution. Finally, xii) targets do not possess constitutional rights, nor legal protection from the practitioner or executor of this torture on them since it is with significant likelihood the local or other government. In addition, xiii) law enforcement and healthcare have been instructed to deny the matter. Local regulators, political power, legislators, and courts approving the use are not understanding and aware of these aspects due to the fact that the military traditionally has been the only institution with this knowledge. Yet this technology has lobbied its way into our societies. The substantial list of shortcomings above leads us to conclude the technologies have not been adequately investigated. The lawmakers, practioners, politicians have only listened to the military and law enforcement arguments as the marketer of these technologies [4].

Legal Issues

Under the anti-terrorism agenda, the constitution and human rights can be occluded, it seems, by the declaration of War on Terror which yet allows derogation of the civil rights on a temporary basis only [21]. When a civilian is targeted by goverment and presented as a terrorist they can be exposed, it seems, to methods of interrogation (e.g. coercive measures neurotech mass surveillance). This derogation should be however a temporary measure. How is it explained that some individuals have been targeted for a decade and more? Indeed, the neurotech mass surveillance is a “no-touch torture” protocol that causes long periods of serious pain, suffering, and even fatalities. By now we should agree that the execution is conducted as a counter-terrorism measure.

The European Convention on Human Rights requires that a member state availing itself of the derogation clause inform the Secretary-General of the Council of Europe of the measures the state has taken and the reasons for them.” [21]

Although the idea of temporality is not expressed in the derogation provisions of the ICCPR or the European Human Rights Convention, it has been understood to have been implied by the notion of emergency. According to the U.N. Human Rights Committee, article four of the ICCPR requires that “measures derogating from the provisions of the Covenant . . . be of an exceptional and temporary nature.“[21] and ““Derogations from human rights obligations are permitted in order to deal with emergencies. They are intended to be temporary.’” Thus, the suspension of ordinary processes must end when the emergency that required the suspension ceases to exist.“[21] The targeted under counter-terrorism law could argue that the temporary state has been maintained for purpose since no evidence of terrorism has been found for those accused. In a case where implementation has taken 10 years, the government should be prosecuted for inefficiency in dealing with the matter and thus, violating human rights. This is hardly a temporary measure in the aspect of human life.

Currently, there are no specific laws protecting humans or animals, neither any medical support for them, during cybernetic torture. “The situation is created by the fact that scientists do not leave any information about the illegal mind reading technologies.” How should “we protect people that by utilitarian grounds, without informed consent, are used for brain studies with brain-computer-interfaces in Cyber Psychological Systems, illegal stealing of brain data” [13]?

In view of the above intellectual rights are important but the human rights violations probably the core of concern. It seems governments have agreed with a single-minded informal agreement that they have the right to remove legal protections from the citizens. They have interpreted that in certain circumstances (that have been artificially created by themselves) they have the right to degrade the human rights, constitutional rights and strip the citizens of legal protection. The torture and inhumane, unjust, unreasoned, and unaccountable targeting [1] may lead to significant compensation requests from the victims for the use of WMD mass surveillance protocols once they become organized. The UN should support this idea. The periods under execution seem to be unlimited which demonstrates the enslaving nature of the implementation.

There is simply no privacy at all when the privacy of thoughts, feelings, senses, and life overall is demolished. The targets’ households are trespassed physically and technologically, and subjected to domestic disturbance from outside by the resonances (some evidence on this will be published in connection with the field examination). No government is capable of replacing what has been taken away from these people. The terror in their life has been unspeakable. What about the immaterial rights such as the stolen brain data?

“Article 1 of the Charter of Fundamental Rights of the EU (2000) states that “Human dignity is inviolable. It must be respected and protected”.”

The Psychic Driving/System Programming

States have used the same tactics for centuries to put away activists and dissidents who do not buy into the explanations of the power elite and publicly challenge the administration. The targeted people are many times activists, whistleblowers, or dissidents in addition to random people. During the execution of the “no-touch torture program [7]”, targeted individuals are being treated as mentally ill by the government. The police and healthcare, who are the emergency services, the first point of contacts, have been programmed to handle these patients with a certain presumption. The programming, or inadequate education/ omission of the education, is a part of the design of the torture program [9]. States have a national manual of diseases where identical symptoms the targeted experience have been added indicating alleged neurosis / mental illnesses that correlate with medication designed to worsen the condition of the targeted and strengthening the impact of the resonance. Doctors do find themselves in a helpless position with neurotechnology victims since the illnesses could be induced into the patient [6]. Linking specific medicines with microbiological structured molecules a desired impact can be delivered on the purposed area of the brain. Also, nanotechnologies can be used to deliver nanotechnological engineering into the brains [28]. These are used in combination with EMF resonances to activate certain viruses, bacteria, even cells, synapses to deliver their function. Dr. J. Giordano also specifies neurotoxins that can be used to gain a certain effect. This technology can force the human brain to think certain thoughts, feel certain emotions, and can theoretically override motor control functions. This knowledge must have been obtained by investigating human bio-effects and experiences.

By specialising on the pulse frequency you could induce psychiatric ilnesses to the point where a psychatrist could not tell if it is a genuine psychiatric illness or an induced psychiatric illness.” – Barry Trower – Microwave Warfare.

The body is an electromagnetic chemical reaction. Yes, chemicals like drugs can help the body and be used as countermeasures to electromagnetically induced problems. Drugs can be used to affect the body’s electrical-chemical processes.” – R. Duncan, How to Tame a Demon – A Short Practical Guide to Organized Imtimidation Stalking, Electronic Torture, and Mind Control

Many States maintain laws under which the patients can be forced to receive medication and mental help when deemed necessary (by labels of neurosis, imminent threat of violence, self-harm, etc). Due to the inter-and cross-governmental nature of the implementation, the treatment is being coordinated from a co-ordinative structure above the staff treating the patient. The entire process can be evaluated by the supervisory co-ordinative team and depending on the content that the patient discloses as well as his/her behavior the team makes the decision on the most practical plan for him/her. Medication can be used to assist neurotechnological implementation[17]. In some societies, implantable devices are injected into the targeted civilians to assist the chemical balance or observation of the biometrics. These military developed devices are not painless either whilst nowadays merely replaced by nanotechnological materials that may be only inconveniencing to digestion.

The biological and socio-psychological aspects of the targeted’s lives are heavily influenced. Many are pushed outside of their societies and the social networks that are crucial for well-being. A target that intends to disclose the program may experience imminent measures of discrediting or a form of punitive measures that strips social status from the target. Informal reporting and social scoring by the administration is impacted immediately which also derogates the rights of the targeted. They become outlawed. The accused have rights, the rights of the accused but the suspects do not have any. The term “suspect” refers to the removal of civil rights and being made a target. They are profiled internationally and presented as a terrorist, serious criminal, or national threat. The torture that has many faces and sides may go on for decades, in which time the target has lost his social status, fellows, health, financial sustainability, earning model, and credibility.

When the target intends to approach separate parts of the administration to deliver information on potential consipiracy and illegal government activity it is imperative the target has a well argumented, well-written and comprehensible statement to deliver intended content since their profile will be attacked severely by those in the administration who lobby on behalf of the implementation of mass surveillance. Measures will also be taken to prevent any electronic submissions or hard copies delivery to authorities. The informal nature of the execution and coercive measures ensure that the targeted cannot defend themselves against implementation that does not officially exist.

Indeed, an annulment is a common practice. It has become visible and reported that some implementations of systematic programming of discrimination are directed towards the same bloodline or family over the generations. Genetic information hardly provides us a decent explanation for this type of execution.

There are governments with a significant number of totalitarian attributes that have disguised themselves as a democracy. It goes without saying the social sector of administration supports the governmental agenda and is in a position to set up any individual with a variety of methods. Similarly, the judicial system that not only regulates the use of coercive measures but also operates a governmental agenda as the steering mechanism in relation to these individuals. A target cannot possibly receive objective and equal treatment in court. The judicial system reflects the will of the Government.

The method by which the CIA and intelligence community control masses and MSM is to publish fiction that involves similar elements that are involved in the news they want to deny or shut down. They create stories and mix them with the original report (in this case my analysis) and because the topic is complicated the masses are unable to separate the two, only a marginal audience understands what is going on.

There are countless tactics to discredit individual revelations made in media. A common tactic is to descredit the author/content of a revelation that is harmful to government. Another trick is to confuse the original message to an imaginary content that has similar elements. Perhaps involving aliens or conspiracy models that ridicule or make fun of the actual revelation.

Controlling the public is a game of capturing the opinion of masses by using MSM (main stream media). Governments are participating in the information war (between governments) and propaganda (inside the nation) either by direct or indirect ownership of the media. “Regulation, legislation, physical attacks, and threats against journalists or media owners are effective methods used to capture the media. But funding is arguably the  most effective method of all. By financing media and journalists willing to toe the government line and by not funding independent, critical media, authorities manage to suppress large parts of  the media sector.” [10, 36]”

The Technology

Resonance methodologies are at the core of Electronic Warfare (EW) operations. DEW, AW, RNM/RMI/EEG, and V2K are tactics being used on targets under anti-personnel execution. DEW and AW are purposed to cause physical injuries whereas the neurotechnological applications used under AI mass surveillance programs such as NRM/RMI/EEG cause psychological effects and pain. RNM Remote Neural Monitoring is used along with the EEG for cloning the neurostructures of the target. A heterodyne is a signal frequency that is generated by combining or mixing two other frequencies using a signal processing technique called heterodyning. Heterodyning is utilised to shift one frequency range into another, new frequency range, and is also involved in the processes of modulation and demodulation. Heterodyning and technology based on TMS (Transcranial Magnetic Stimulation) can be used for the synthetic telepathy. Neurotechnological implementation can be fatal in multiple ways it can drive the targeted to suicidal thoughts but it also has physical health effects that may weaken the body and immune system of the targeted in the long term fatally. V2K can also be produced in a multiple ways but one of the most sophisticated ones is as an AI computer software, developed to learn, which can communicate with the target in real-time and read their memory, thoughts and is able to manipulate targets psychologically and emotionally [13]. The V2K can be used for behavior modification when the technology is based on a psychiatric medical technology called Neurofeedback – EEG Biofeedback. The software acts as an alternative roadmap for the brain (an AI software accesses brain waves emitted by the brain ie ELF waves) by harvesting brainwaves when the brain reacts negatively and the cloning this type of brain wave (ELF waves). V2K technology can be used to clone or mime different medical pathologies, including psychiatric ones. This is why many targets are diagnosed with Schizophrenia or other mental illness. When the use of mobile device emissions is introduced to affect a targeted brain we are in uncontrolable territory.

The operational implementation does not differ. The resonances are delivered from multifunctional radars (active electronically scanned array [AESA]) or antennas on any platform, also by using satellite targeting. Similar radar antennas are used in fighter jets. Networks similar to GWEN (Ground Wave Emergency Network) can be used to create EMPs. In DEW implementation the effect is based on transmitted high amplified energy pulses that cause pain or injuries, even fatalities. Physical obstacles may be overcome by maser technology. In the neurotechnological implementation, the impact is based on heterodyne which combines by intermodulation (two alternating signals, eg radio signals) to produce two or more signals having frequencies corresponding to the sum and the difference of the original frequencies that cause pain or the wanted effect in the target. Depending on the purpose there are custom-designed handheld platforms to be used inside buildings also. An electromagnetic field is created around the target to read the target’s biometrics and run them in a computer simulation in real-time that aims to clone and link the targeted brains. The computer program executes a chosen torture method for interrogation and behavior modification and to the targeted, the execution naturally appears entirely ruthless and cruel. This means the entire process is being automated [7, 9]. Also entire thought patterns, feelings, and images can be induced to the target [6]. The concern in view of the future is whether the transmitting technology will be integrated with our handheld ICT technology and its infrastructure. The handheld mobile devices may already emit resonances below 100Hz that are closely linked to our biology.

DEW (directed energy weapons) can be broadly defined as systems that produce “a beam of concentrated electromagnetic energy or atomic or subatomic particles” which is used as a direct means to incapacitate, injure or kill people, or to incapacitate, degrade, damage or destroy objects [3]. Execution by microwaves, lasers, masers and particles.

AW (acoustic weapons) Acoustic weapons aim to use the propagation of sound – a variation in pressure that travels through a fluid medium (such as air) to affect a target. Most of the acoustic weapons that have been speculated upon are based on either ultrasound (above 20 kilohertz, kHz),

low frequencies (below 100 hertz, Hz) or infrasound (below 20 Hz) deployed at high levels. The human range of hearing is commonly given as between 20 Hz and 20 kHz. In reality, the upper hearing-threshold frequency decreases significantly with age, whereas sounds with lower frequencies can be heard and otherwise perceived if the level is high enough[2].

We should not forget the ionosphere radar or over the horizon radar (“OTHR”) of which the most famous is the HAARP (The High-Frequency Active Auroral Research Program) which is capable of producing a very high amount of energy in beams and wanted resonance to exact locations at any time. Other nations have revealed their concern with regard to this. HAARP is located in Gakona, Alaska, and was developed by DARPA (Defense Advanced Research Projects Agency). Another OTHR is EISCAT in Longyearbyen, Norway which was originally designed by France, Germany, and the three Nordic countries (Norway, Sweden, and Finland). The Targets in Finland have seen evidence of weather modification as well as traces in the clouds as a marker of the use of OTHR and satellite co-ordination beaming. In view of the European Parliament Resolution on the Environment, Security and Foreign Policy from January 28, 1999, Nr.A4-005/99 art 30 states “Calls in particular for an international convention for a global ban on all research and development, whether military or civilian, which seeks to apply knowledge of the chemical, electrical, sound vibration or other functioning of the human brain to the development of weapons which might enable any form of manipulation of human beings, including a ban on any actual or possible deployment of such systems.” Is it a coincidence that the commonly operated facility has been set into a country that locates in Europe but is not a member of the EU?

When delivering resonances that imitate body functions a satellite becomes a very operative assistance and used seamlessly with the execution of OTHR. Especially for these radar systems, living human targets are a necessity to develop the operating systems, their accuracy, amount of energy directed, and before anything the psychological impact on the individual. A spontaneous EKG can potentially discover the operation whereas a planned scrutiny for healthcheck results in a pause in the execution of the beaming.

The entire multilayer strategy of implementation involves remote execution with satellites and OTHR, local operation by field operatives with a gangstalking element from ordinary local people hired from social media, as well as the utilisation of the ICT infrastructure via mobile devices and the mobile antenna infrastructure. The latter is controlled by software applications that are run within the network. A huge step forward in synthetic telepathy has been the introduction of nanotechnology which has greatly assisted the transportation of AI technology to human brains but also facilitated the access to brains from AI frameworks [34, 35].

The Agenda

You’re either with us or against us in the fight against terror.

– George W Bush on 6.11.2001

It is breathtaking how few politicians have understood the larger picture. The anti-terrorism movement by states is an agenda that allows the rights of citizens to be removed for the greater “good of the State” and therefore, a very unconstitutional movement. The strategy, however, was at first implemented by the Western coalition ’Five-Eyes’ to hijack the foreign and security policies of targeted nations, including the allies in the EU. The Western coalition finger-pointed allies saying there is a terroristic activity spotted within the population of the EU countries defining who is a terrorist and what is a terroristic act. Something the European leaders should quickly accomplish is figure out whether they have been treated as allies or subservients by Western Five Eyes coalition manufacturing targets and addressing to the EU member nations that they have citizens with terroristic tendencies (naturally artificial and false accusations) which in turn may be used to force the foreign and security policy of the EU member nations to remove reputational risk and potential risk of conflict. We quote a journalist from RT Neil Clark’s article [14]on 25 Feb, 2021: ”The ‘War on Terror’ was based on a fundamental deceit. It was a deep state/neocon con trick. Not only was it a war that could never be won, it was never meant to be won. It was meant to be permanent.” Indeed, the idea of the anti-terrorism agenda is the declaration of war on those who beg to differ by opinion. There should be only one interpretation of the world events and no exception to the “Western” one is tolerated. The bully-tempered narrow-mindedness quite often leads to a point where sensible analysis is not conducted. There is no need to disagree to juxtapose.

The agenda is an imperialistic tool to force governments to operate similar foreign policies and line up with the West. To make the EU a participant in the War on Terror and bring the conflict onto the European soil. Originally terrorism has been an inconvenience of those nations practicing imperialistic and clumsy foreign policies intervening in the internal politics of other nations. Now, the EU is taking moral responsibility for this against better understanding.

We do not need conflict in the EU and our younger generations should be psychologically free of this type of liability.

There are several pillars to this operation. Strategies are linked to the technological advantage of the Western technology. Signing up as a user a nation agrees with certain conditions and integrates the operations. This happens for the sake of maintenance alone. For instance, for fighter jet fleets, which carry multifunctional radars, their maintenance and updating require a common technological strategy. States which purchase fighter jet fleets will be committed to one strategy due to the maintenance and development of the system. It is a deep integration of defense strategies.

Terrorism, serious crime, a national threat is used as the rationale to justify the manufacturing of the targets to European allies. Must say the manufacturing of the consent has been a bit careless not to forget the implementation. The Western military-intelligence complex coup has won the intelligence communities over by their advanced technology. An average American taxpayer supports the military industry to the extent that equals the cost of free healthcare. By creating suspects in each nation the Western coalition has been enabled to a) force the State to take care of the terrorism and b) offer the Government technology to be used in connection with this which in turn means more dollars for the military complex. Manufacturing targets is a trillion-dollar plan since their resources can be linked to develop AI. “The more brains you have collected in your pool the better AI you will be able to develop”.

Terrorism is indeed a very gloomy and poisonous projection to deliver to our next generation which has already been psychologically affected by the speech of terrorism constantly present in the MSM. We may not be able to estimate the damage caused but we could do something to stop building horrible scenarios. It is indeed recommended that this bellicose agenda is abandoned since the rest of the world, especially our new generation, do not wish to live under such a narrow-minded scenario. A return to international democracy is recommended.

What will the Governments do next to defend their position? It is apparent that so far some of the terroristic attacks in Western societies have been provoked if not financially and operationally supported by Western intelligence itself. We would not expect to see this level of governmental radicalism anymore. The strategy of governments will be to temporarily rate higher the threat of terrorism so that any criticism would not question their undertakings. The Western governments will put the curriculum vitae of their funded researchers (eg Magnus Ranstorp) against those who have been forced to independently investigate the field. This is to the benefit of the researchers since they strengthen their position and ego in supporting the idea of War on Terror. They market the war on behalf of terrorism. It is better to have war to cover the agenda than admit the imperialistic effort to control global population. This is a fight between David and Goliath and the Goliath owns the MSM (mainstream media). Also. the MSM is turned selectively towards other areas of interest.

War on Terror? Not exactly. The methodologies used to harness innocent individuals for something so evil as WMD targeting them are a crime against humanity. We must re-think the role of Western surveillance within society not alone the supervision and monitoring aspects. The execution appears as Robert Duncan (CIA officer and engineer) illustrates[17]: ’It was a clever tactic used by the Germans in WWII to take people away slowly so no revolt occurred. As one CIA agent says, “The Nazis didn’t lose the war they just had to move.” It is not about the Jews now. It is something much more complex and evil’. One should hope the Covid-19 pandemic is not an agenda to enhance governmental control over individuals [14]. Oh no, it is not. There is a chance that it is indeed a part of the very same operation to deliver access to brains of the population.

A senior officer J. Karsikas responsible for digitalisation in the Finnish Defence Forces states that considering super powers it is unlikely they would commit themselves in any regulation and ratify any international agreements in the development of AI [27]. This is due to the fact that AI technologies may constitute the next strategic advantage.

Conclusion

What is the most disappointing aspect of the Electronic Warfare between superpowers, in which populations and individuals are constantly targeted by military technologies is that for these living targets who have become the instruments of global war, no government seems to have a social sector strategy? No civil defence strategy. Societies have created multimillion Euro plans to cover the infrastructure, but the civilian targets are left to die, not being overly dramatic. A meritocratic society is programmed to think there is something seriously wrong with these individuals which leads to isolation of the targeted individuals. That is as intimidating as is the implementation of WMDs. The lack of will to improve the lives and circumstances of the victims speaks thousands of words.

Wanton killing of innocent civilians is terrorism, not a war against terrorism.” – Noam Chomsky

Electronic Warfare (EW) anti-personnel resonance-based applications that cause pain, suffering, even fatalities are being directed to civilians globally by means of energy- and psychological effects. The governments responsible for the implementation, under which the execution is operated, are utilizing at diversity of military platforms to conduct these operations based on the resonance spectrum. The “Torture Program” is based on the idea of using pain and suffering as a stimulant, an instrument of interrogation to cause a reaction in the targets. The operation is to intentionally cause pain and suffering in its targets for a prolonged period of time. Scientists are in opinion the technological implementation should be reviewed as a weapon of mass destruction. It is a technical legal aspect of international laws of human rights whether the operation should be viewed as a war crime. Execution of a technology that causes pain and suffering, even fatalities, in innocent civilians and bystanders, even children, is now left to supercomputers to run? We are seeing the evidencing of a phenomenon that reminds me in detail of the human experiments during the WWII conducted by Nazis. Even the public demonstrates similar ignorance and prejudice. It seems this psychological cycle repeats itself in human history when a part of the society comes to think of itself as “too invincible”. A result of meritocracy. It is imperative to acknowledge the vast increase in numbers of targeted civilians indicates a widespread attack on human rights.

The resonance spectrum-based technology that now abuses human targets had been developed to its full potential in the midst of the 1970s. The knowledge was kept tight in the military instead of considering civil applications. The War on Terror offered a suitable basis for an imperialistic global agenda and strategy of implementation. The mass surveillance neurotechnology is operated under the agenda of the Western coalition to force new order among states. Anti-terrorism as an agenda is an unconstitutional plan of the Western coalition not only to strengthen sovereign state power at the expense of human rights and democratic systems through surveillance and counter-terrorism laws but also to hijack the foreign and security policies of other nations. War naturally speeds military spending. And speaking of an entirely new niche of technologies the War on Terror is a blessing to the defense industries. The concept of war has been creatively introduced to legally eclipse human rights and democratic decision-making. The erosion of the Constitution is significant.

As for private citizens in terms of pain and suffering caused also their rights have been removed under the counter-terrorism and mass surveillance acts. Suspects do not have the rights of the accused since they will never be accused instead, they have been stripped of their civil rights complete families affected at once. Measures that were purposed as an exceptional and temporary tool to deal with emergencies are now used on an unlimited basis under surveillance laws. It is clear the aforementioned laws are abused to target innocent people. A significant majority of the targeted are not brought to courts of justice and officially accused due to the fact that they are not guilty. These people and their human rights are degraded once abandoned under technology-driven human experiments that remove entirely their privacy and domestic peace. The fact is that individuals’ free will and degree of autonomy are hugely affected. It is the question of a plan with multilayer agenda. It seems that the counter-terrorism and mass surveillance laws are used to manufacture candidates for the human experiment. The selection protocol is inhumane, unjust, unreasoned, and unaccountable. What a convenient tool for governments to root out and yet benefit from the physical existence of political opponents, whistleblowers, activists, or dissidents. At the same time, a significant element of opponents to the political power is being created.

The execution was based on the idea that the targeted would not organize themselves and see through the plan. Now the life cycle of this agenda is different. It is indeed imperative to increase public awareness on the ongoing torture to impact on the life cycle. No totalitarian method can tolerate public awareness as European history points out.

The War on Terror has been successfully used as an extension of the imperialistic foreign policy of foreign nations to destabilize the peace in Europe and the seed of war has been implanted in the soil of the EU. We European citizens do not approve of the War or Terror on European soil. Citizens do find it difficult to believe that European leaders who were supposed to look after the civil rights and peace in Europe are taking a role in such an imperialistic agenda. We expect the EU to be built upon the idea of democracy that guarantees equal rights to everyone. It has been a result of ignorance, shortsightedness, and poor judgment that this sort of plan has gone past our due diligence processes impacting greatly on the future beliefs of young generations who are at the core of well being of any nation.

Making Torture legal is a very questionable agenda. We suggest an urgent review of surveillance laws as well as counter-terrorism laws. The laws have now been used as a punitive measure allowing unequal and inhumane treatment and abuse of civilians by the governments and an underpinning of sovereign state power. The laws have become a formidable weapon of repression. An intelligence law should not only protect citizens against terrorism but also against the State. The modern holocaust has revealed significant weaknesses in our societies. Lawmakers, law practitioners, and politicians, even human rights activists poorly understand the technologies being approved for use on citizens for a prolonged period of time. The role and the strategies of intelligence function in societies European wide should be revisited and some consistency introduced. Military and intelligence functions in eroded society are meant to represent a marginal mechanism, but not the role of the decision-maker. It seems there is a psychological cycle in the collective consciousness of humanity, the need to repeat the pattern of pain and suffering. Perhaps the revised agenda could take a sustainable look to raise the standards of performance we all need to evidence and take part in for the mental growth of the human society. We would choose “trust” among people instead of synthetic telepathy that indeed demonstrates the opposite.

The new generation is experiencing the world as a threatful place today. Continuous airtime on news of terrorism by MSM creates psychological expectations that will last decades. The citizen’s belief in the future is constantly heavily impacted. There are so many areas in society that require improvement that the civilization hardly has time to handle them if crises similar to the War on Terror are intentionally created. I think there might be confusion on where the civilization is going from here. It seems politicians are lost on their way. It is known that beliefs in the future is directly correlated with the well-being and prosperity of national economies. Should the beliefs be a little more positive than they are? One should think the War on Terror hardly is an agenda for a nation looking for well-being to follow. Europeans do not wish to bring the War on Terror to European soil. Therefore, the message for the politicians goes accordingly in terms of foreign and security policies.

The EU should develop its independent defense, especially in terms of technologies, to reduce its dependence on NATO and the Western military-intelligence complex. Therefore the military spending and exercises internally should be coordinated. The EU should seriously review its relation to Western allies, to determine whether the role of European allies is viewed as subservient. The abuse of intelligence operations and aggression in foreign politics that do not respect sovereign EU member nation decision-making as well as the dynamics of ongoing confrontation among powers have taken so many years.

It is apparent the EU has chosen a homeland security strategy that confronts its human rights agenda. Mass surveillance and counter-terrorism laws should be reviewed from the European perspective alone and not as an ally to someone with an imperialistic agenda. The security strategy and following surveillance laws are a result of a poor understanding of Electronic Warfare and its technologies. It would be to the benefit of European democracy to drop the ignorance and bring to the table the representatives of the targeted so that all aspects are indeed understood.

SOME SUGGESTED ELEMENTS FOR A PLAN TO MAKE PROGRESS:

What should be done to prevent the abuse of innocent victims:

1. Increasing awareness of the public of the cybernetic abuse and means of Electronic Warfare being tested on civilians is at the core of tackling the crime against humanity.

2. Breaking the ignorance. It is imperative that the viewpoint and experiences of the targeted must not be ignored or bypassed since understanding the perspective of victims allows for democratic decision making. The victims should be permitted to offer consultation and expertise, the perspective of the targeted to law- and decision-makers for the creation of appropriate EU legislation to protect civil citizens from covert cybernetic crimes and other Electronic Warfare applications.

3. Organisation of the resources. In order to defend the civil rights of the targeted and support the targeted, a global organization should be created which would set up a representation globally for human rights and could enhance “best practices for the establishment of clear ethical boundaries to strictly regulate the use of cyber systems enabling the manipulation and control of human beings” [13].

To be clear, a), no torture should be tolerated, and both torture and “no-touch torture” protocols should NOT be allowed as an interrogation tactic even though “neuro-surveillance” for purposes of safeguarding national security may be intended; b), Surveillance permission- granting process should be adequately and closely monitored. Mass surveillance of innocent citizens should not be allowed; c) The intel gathered in any possible surveillance method should not be misused and only used in the form it has been approved by court. We may need to allow surveillance but no method of neuro-surveillance or bio-surveillance should use targeted pain or pain at all as a catalyst. Also, the surveillance, of whatever kind, should be limited to a 6-month period with renewal permissions significantly tightened to say only 15% of the applications for renewals, firmly overseen, and with detailed, documented reports delineating reasons for applied renewals, which can be audited, overseen, and withdrawn at any time; d) Human rights auditors from outside Intelligence and Security agencies need to be involved in the continuous monitoring and auditing process, to prevent abuse and torture of targets, as we have now; e) No covered experimentation using pain and torture techniques as “sources and methods” of gathering information, as for instance, the US intelligence community [11], and other intelligence agencies and militaries are currently doing, under classified cover, to prevent scrutiny of their torture for neural network mapping and neuro behavior modification. What should be allowed instead are strict protocols, regulation, and monitoring of the intelligence community in place as well as surveillance laws that are consistent globally, and the intelligence community held responsible for potential misconduct.

Global consistence in surveillance laws, country-specific regulations, supervision, and monitoring as well as civil channels for reporting potential misconduct is a good start. What is the problem in the US as K Shipp and W Binney [10, 11] indicate, is that the intelligence community may not observe the law, i.e., there is a constitutional conflict since secrecy and classification are currently being used to classify and conceal extreme crime against humanity and actual torture and assassination of human beings.

The message to the governments is to support democracy and avoid planting foreign agendas against democracy to the European audiences. The concern relates to the younger generation which have been entirely forgotten with the anti-terrorism . There is no excuse for bullying civilians and taxpayers since it seems that the EU has increasingly plans for common taxation. No threat exists on this planet that justifies harming and torturing civilians. No collective rationale would speak for the torture without the consent and permission for the implementation. What has been done to civilians on the watch of governments is unforgivable. It is apparent that the administrations involved, have had a need to identify from a worst-case scenario, even though they could afford to see democracy and citizens as a positive reserve and potential, not as a threat.

The targeted individuals are put through a spectrum of social, medical, legal, financial and professional discrimination in their societies. Since the victims or their relatives do not receive the redress, reparation, and rehabilitation they are entitled to under international law (A/73/207) there are some important measures the UN could take to reduce that ’accountability gap’ and to improve the position of the targeted civilians. Perhaps one of the most important measures is to implement pressure on the local governments by holding them responsible to 1) investigate the reported torture and other cruel, inhuman, or degrading treatment or punishment by the law enforcement. Currently, the police systematically ignores the reports of these crimes and in an unprofessional manner suggest mental health problems for those reporting their findings to the police. Also, healthcare should be put responsible to 2) guarantee access to healthcare to receive the redress, reparation, and rehabilitation of victims. 3) Compensations on the targeted civilians should be paid to ensure they are able to return to normal life. The first step, however, would be to request the governments to recognise the issue of targeted individuals. The governments should be requested to prepare a statement in view of this matter. These people should be made to once more become socially accepted and full members of the societies. There should be a program available for the rehabilitation of these individuals where consultation and support would be available for each of them. When a government fails to implement basic standards of living for these individuals, they should be submitted a candidate for the Universal Periodic Review protocol (UPR) for the following decade to follow up their progress. The UPR mechanism should be started by each government to reach a common view and statement on the recognition of the issue. The status of each government should be reported annually and compared to the quality of issues and the number of reports received from targeted individuals. Reputational risk should be made obvious to steer some of the governments. Where no progress had been visible the governments could be made legally responsible for the violation of civil rights in the Court of Human Rights globally and the targets should be entitled to compensations. Indeed, a creation of political, legal, financial, and reputational risks to balance the enthusiasm to participate in the aggressive military resonance programs would be advisable.

ATTACHMENT:

(1) TARGETING PEOPLE – ARTICLE36.ORG – Key issues in the regulation of autonomous weapons systems, Convention on Conventional Weapons (CCW) Geneva, November 2019

(2) ACOUSTIC WEAPONS – ARTICLE36.ORG – Discussion paper for the Convention on Certain Conventional Weapons (CCW) Geneva, November 2018

(3) DIRECTED ENERGY WEAPONS – ARTICLE36.ORG – Discussion paper for the Convention on Certain Conventional Weapons (CCW) Geneva, November 2017

(4) TARGETED USE OF DEW MILITARY TECHNOLOGY APPLICATIONS (THAT CAUSE FATAL OR SERIOUS INJURIES AS WELL AS SERIOUS PAIN AND SUFFERING FOR INHUMANLY EXTENSIVE PERIODS OF TIME) TO CIVILIANS IN FINLAND – OHCHR SUBMISSION 08.2020 – V. Hellberg

(5) INTERNATIONAL TORTURE PROGRAM MANIFESTED UNDER ANTI-TERRORISM LAWS WITHHOLDS LEGAL PROTECTION AND CONSTITUTIONAL RIGHTS FROM ITS

TARGETS? – TECHNOLOGY TESTED ON CIVILIANS 09.2020 – V. Hellberg

LINKS:

(6) Barry Trower – Microwave Warfare

(7) Robert Duncan – Neuropsychological and electronic “no-touch torture”. The spectrum of ‘interrogation” and torture techniques used by the US and its allies

(8) The Verge – The EU is considering a ban on AI for mass surveillance and social credit scores

https://www.theverge.com/2021/4/14/22383301/eu-ai-regulation-draft-leak-surveillance-social-credit

(9) Ramola D & Robert Duncan – Report #165: Robert Duncan on the Neurotech Targeting of Humanity, Secrecy, & the Need for Change

(10) Geoengineering – Kevin Shipp – New: CIA Agent Whistleblower Risks All To Expose The Shadow Government

(11) Chris Hedges – CIA’s intelligence coup with William Binney

(12) William Binney – Whistleblower: NSA Goal Is Total Population Control’

(13) Task Force EU Coalition

(14) Tony Blair’s anti-freedom project continues, but ‘War on Terror’ is replaced by ‘War on Covid’

https://www.rt.com/op-ed/516591-tony-blair-war-terror-covid/

(15) Next-Generation Nonsurgical Neurotechnology by Dr Al Emondi

https://www.darpa.mil/program/next-generation-nonsurgical-neurotechnology

NEWS REPORTS

(16) Pääesikunnan tiedustelupäällikkö: Uusista tiedusteluvaltuuksista ollut konreettista hyötyä rauhanturvaajiin kohdistuvien uhkien torjunnassa

https://yle.fi/uutiset/3-11917909

(17) Sotilastiedustelun uudet toimivaltuudet vahvistavat Suomen kyberpuolustusta

https://yle.fi/uutiset/3-11062431

(18) Kommentti: Pääministeri antoi uudelle puolustusvoimain komentajalle ainutlaatuisen julkisen ripityksen – ”sotilasvallankaappaustako” Rinne pelkää?

https://www.is.fi/politiikka/art-2000006195198.html

BOOKS & PUBLICATIONS:

(19) R. Duncan, How to Tame a Demon – A Short Practical Guide to Intimized Gang Stalking, Electronic Torture, and Mind Control

(20) Finnish Military Intelligence Review 2021

https://puolustusvoimat.fi/documents/1948673/74055459/PV_sotilastiedustelu_raportti_www_ENG.pdf/2ffb6a29-cabd-b852-7ba0-83892580c632/PV_sotilastiedustelu_raportti_www_ENG.pdf?t=1620281555293

(21) “INFORMAL” SUSPENSION OF NORMAL PROCESSES: THE “WAR ON TERROR” AS AN AUTOIMMUNITY CRISIS by ADENO ADDIS, Boston University Law Review

(22) MIND CONTROL IN THE UK by Tim Rifat BSc BEd. The Truth Campaign Magazine Spring

(23) Commissioner for Human Rights (The Council of Europe): Human rights in Europe should not buckle under mass surveillance

https://www.coe.int/en/web/commissioner/-/human-rights-in-europe-should-not-buckle-under-mass-surveillance

(24) Effects of electromagnetic fields exposure on the antioxidant defense system: Elfide Gizem Kıvrak,* Kıymet Kübra Yurt, Arife Ahsen Kaplan, Işınsu Alkan, and Gamze Altun – The Journal of Microscopy & Ultrastructure

(25) A Review on Mechanisms for Piezoelectric-Based Energy Harvesters: Hassan Elahi, Marco Eugeni and Paolo Gaudenzi – Department of Mechanical and Aerospace Engineering, Sapienza University of Rome

LETTERS TO THE GOVERNMENT

(26) V. Hellberg: To The Supreme Court of Finland – Salaisten Pakkokeinojen Säätely Suomessa

VIDEOS:

(27) HardTalk: Tekoäly ja Puolustusvoimat – miten suhtaudutaan?

(28) Dr. James Giordano: Battlescape Brain: Military and Intelligence Use of Neurocognitive Science

ADDITIONAL LINKS

(29) US investigating possible mysterious directed energy attack near White House – CNN Politics on the April 29, 2021

https://edition.cnn.com/2021/04/29/politics/us-investigating-mysterious-directed-energy-attack-white-house/index.html

(30) ‘Havana syndrome’ likely caused by directed microwaves – US report – BBC News on the 6th of December 2020

https://www.bbc.com/news/world-us-canada-55203844

(31) INTERNATIONAL COMMITTEE OF THE RED CROSS: The ICRC’s concerns about autonomous weapon systems

https://www.icrc.org/en/document/icrc-position-autonomous-weapon-systems

(32) Association for the Prevention of Torture: New Principles on Effective Interviewing for Investigations and Information Gathering

https://www.apt.ch/en/news_on_prevention/new-principles-effective-interviewing-investigations-and-information-gathering

Försåtlig granskning ska sänka Ranstorps anseende

Ramola D (October 22, 2018): Welcome to the Gulag Created by Crooked Intelligence Agencies, Crooked US Military, and Crooked Fusion Centers

PRESS RELEASES:

(33) ECHR 164 (2021) – 25.05.2021: Insufficient safeguards in bulk signals-intelligence gathering risked arbitrariness and abuse

(34) CNN BUSINESS: Ray Kurzweil: Humans will be hybrids by 2030

https://money.cnn.com/2015/06/03/technology/ray-kurzweil-predictions/index.html

(35) An Implantable Wireless Network of Distributed Microscale Sensors for Neural Applications: Jihun Lee; Ethan Mok; Jiannan Huang; Lingxiao Cui; Ah-Hyoung Lee; Vincent Leung; Patrick Mercier; Steven Shellhammer; Lawrence Larson; Peter Asbeck; Ramesh Rao; Yoon-Kyu – 2019 9th International IEEE/EMBS Conference on Neural Engineering (NER)

(36) Control the money, control the media: How government uses funding to keep media in line – Marius Dragomir, Center for Media, Data and Society (CMDS), School of Public Policy, Central European University

CORRESPONDENCE TO THE EU COMMISSION

11.03.2021

The UN Convention against torture was signed by nations, many of them only partially, on 10.12.1984. Since that time the world has changed significantly in terms of torture. What the EU intends to do with common legislation on torture? A very timely matter.

What the EU Commission intends to do by the fact that the EU strategy for homeland security is in conflict with its policies for human rights?

The coercive measures of law enforcement of western countries are based on resonance methodologies such as electronic warfare anti-personnel technologies DEW, AW, RNM, EEG, V2K, etc. The usage of this technology at times politically orientated, or the usage is not adequately justified, and is questionable, strongly mitigating human rights or constitutional rights let alone moral aspects. This is because i) the technology produces a spectrum of pain in the target (and injuries of which some fatal), ii) sleep deprivation in long term preventing full participation to the society, iii) the technology is being directed towards civilians (Genova Convention), iv) the technology is being utilized without the permit or consent of the targeted person (Nurnberg Treaty), v) the operations lean on self-supervision and monitoring to the extent the human rights aspects are not being considered appropriately (no measures on corruption), vi) the technology is being directed to people inhumanly while asleep and vii) towards bystanders (especially children while also asleep disturbing their sleep and causing them pain), viii) the technology is being directed to homes of the targeted citizens (constitutional rights for privacy, domestic peace, etc), ix) the period the technologies are being implemented to targets is matter-of-factly inhuman, reportedly from decade up to 30 years (in which time most of the targets are forced outside of their societies and health, social structure, career, and families have been destroyed), x) the technology may cause fatal injuries that are impossible to trace back to the usage of this technology and xi) torture, which by definition the use of this methodology fulfills, hardly is an argumentable solution. Finally, xii) targets do not possess constitutional rights, nor legal protection from practitioner since it is with the significant likelihood the local or other government. In addition, xiii) law enforcement and healthcare have been instructed to deny the matter. Local regulators, political power, legislators, and courts approving the use are not aware of these aspects due to the fact that the military traditionally has been the only instance with this knowledge. The intelligence community has gained an imbalanced position with this tech and now abuses it in each member country. Also, justice system is becoming addicted to this tech. W Binney quite correctly points out concern about democracy, human rights, constitution, and legal protection of our citizens in the following: https://www.youtube.com/watch?v=xF_VYNtDgN8&t=441s

15.03.2021

What the EU intends to do in view of human rights in Europe?

Most of the member nations do not have legislation on torture, they rely on the UN convention from 1984. For instance, in the case of Finland, this convention is only partially recognized (article 21 paragraph 1 and 22 paragraph 1).

The security strategy strongly relies on technologies of which use conflicts with human rights and the EU policy for HR. These have a significant impact on 1) democracies, 2) corrosion on constitutional rights and 3) confidence in the future which in turn defines the development of wellbeing in any nation. The security strategy supports electronic warfare (EW) anti-personnel resonance methodologies. These are being proposed as a surveillance tech by the intelligence community and defense forces who do not reveal these technologies have the capacity to cause pain, suffering, and fatalities (Resolution on the Environment, Security and Foreign Policy from January 28, 1999, Nr.A4-005/99) and the capacity is in heavy use and not supervised, controlled properly. The national supervision and control mechanisms are not sufficient. The massive and growing audience of TI (targeted individuals) is a remarkable sign of this issue.


The technology is being supported by the western agenda for anti-terrorism and benefits the defense industry. Why would the EU cast this type of future for itself? There is an interesting phenomenon ongoing in western societies. The intelligence community has been allowed to step up and guide societies. A function that has been purposed to a marginal mechanism within the society now manufactures the consent.

The resonance technology provides the intelligence community and defense function a role during the time of peace that conflicts with the idea of democracy. These instances appear to paint pictures of horror to advance their agenda under national security, threats and crisis constantly to argue stronger participation within the society. A good example of this is the agenda of anti-terrorism that defines the form of society today. We lay an artificial threat to our younger generation. The confidence for the future of the new generation is being tested with the current threats created by geopolitical agendas and the birth rate has sunken significantly in many societies. Why would a society inflict upon itself such a curse?

Does the EU understand that by buying the idea of the threat of terrorism it accepts the idea of the ‘war on terror’ and casts it to Europe? We must remember that terrorism has been defined by the ’west’ and the recent issue may be seen as a result of heavy-handed foreign policy, poor diplomacy of nations from past decades that refer to themselves as the empire. By accepting the idea of the war on terrorism we accept the war is in Europe. As citizens of the EU we are looking for a less gloomy picture for the future and rather would identify from positive models of the future. The human mind operates from the level it identifies. We should do better than this.

21.04.2021

How does the EU intend to do to control surveillance activities in the EU?

There is a lack of consistency in surveillance laws among the EU nations. When a surveillance law of a member nation prevents e.g. use of RNM/RMI (remote neuromonitoring/remote mind imaging) towards its citizen the intelligence community turns to the nation where the use of the technologies is allowed. The intelligence community serves each other thus the rights of a citizen or legal protection does not hold anymore. The ruling is awaited that prevents where forbidden technology in one country is being used from another to target civilians. The EU would benefit from resonance-free zones. Social media: Reading an individual’s social media communication private of nature the intelligence community from Finland may turn to Swedish intelligence who is a member of ’nine eyes’ and has access to XkeyScore.

The US intelligence services have become desirable among the European intelligence community due to the technological advantage but also by US anti-constitutional approach their strategy to enhance the sovereign rights by the cost of civilians. A part of the imperialistic agenda is to create security concerns that overrule any rights of citizens and also underpin the position of intelligence communities in democracy. The US has won the European intelligence community on their side by integrating the individual intelligence services by technology that also defines the strategy for the user. In the anti-terrorism agenda, the US hijacks security and foreign policies by defining who is a terrorist and what is a terroristic act. Since a nation identifies from the frame it is given why provide the EU with a gloomy pic? Mass surveillance laws to consider seriously the aspect from resonance technologies, AI, robotics, neuroscience (https://lbry.tv/@RamolaDReports:8/Invasive-Neurotech-True-Neuroethics—Panel-2:e). Fighter jet fleets use EMP to target citizens without their permit or concent torturing civilians with multifunctional radars and manipulating their biometrics.

In Finland, the constitution was amended to provide intelligence service power and tools to operate. The community is asking for more eg allowing trespassing. An analysis was completed from the perspective of resonance technologies why this should not be allowed. Civilians are targeted by military tech to their homes, bystanders, even babies, and children intentionally produced pain, suffering, and even fatal injuries. The big picture indicates absolutely no reason other than the paranoia and profile rise effort by the intelligence service why such powerful tools should be allowed. No legal protection for targets to rely on, constitutional rights, or human rights not respected. The international rights of the accused are being orbited by presenting the target as a suspect. The targets are manufactured to test the ultimate control over an individual. Trust is gone. Testing periods are inhumane.

25.04.2021

How are the EU law enforcement agencies regulated, monitored? How does the EU inland security strategy recognize the fact that resonance-based mass surveillance systems (RNM, EEG, RMI) are being targeted to civilians? How common is the knowledge that these cause pain, suffering, psychological trauma even fatal injuries in their targets, bystanders, civilians, even babies, and children? Is it known the execution is careless? How are the individuals chosen for these ’torture programs’? What principles are being met to prevent politically-minded targeting? How does the EU recognize the rights of suspects since there are no rights similar to the rights of the accused? How are the periods of targeting regulated? A large number of govt agencies, also from foreign communities, have access to these programs. Torturing is illegal by law in most EU nations and against human rights, constitutional rights. No legal protection for citizens exists against this crime against humanity. Operations are run by the national military agencies thus, can be defined as a war crime. How the EU intends to root out the problem of torture by state agencies and private sector partners foreign intelligence community? A good memory of the operation ’rendition flights’, that had no legal ground, of which distant cousin this operation is. What the EU intends to do to improve the approach of national law enforcement and healthcare systems to the targets of resonance technologies (government-directed mass surveillance protocol that cause pain and psychological trauma) that clearly degrade their rights? How is the legal protection of these citizens improved? Are these people still degraded and treated as mentally ill in front of police or healthcare? What an uncivilized, backward, and inhumane approach. How is the idea of democracy with this implementation?

Having made myself familiar with the SOCTA 2021 report among other reports it seems the Europol does not make a note of such a problem at all albeit the headcount of targeted civilians is piling up. Pretending such a problem does not exist? The global market reports as well as the manufacturers’ technological guides, scientific articles, etc confirm electronic warfare anti-personnel technology is based on military multifunctional radars and signal tech soon to be operated from ICT framework and indeed, operated by the military. An issue of a war crime? Are we really doing this? Pretending that there is no problem and allowing the extrajudicial purge similar to the holocaust ongo at the EU watch? Even though human rights, the constitutional rights are severely and violently attacked there is no word on the phenomenon of targeted civilians? Individuals, someones’ children, are targeted without consequence, perhaps overlapping. Targets do not have rights, no legal protection. Since the technology in question is operated as an extension of political decision-making as a punitive instrument. We will never know who is going to be the next target. No status will bring a shield in the future.

Is that due to fact that it is the law enforcement and intelligence community in the EU who are targeting civilians with military equipment electromagnetic pulses that cause pain, suffering, and fatal injuries as well as psychological trauma? We have a serious concern since the EU’s strategy for homeland security conflicts with the strategy for human rights.

04.05.2021

As Finnish citizens, we experience it difficult to reach information from officials in Finland on our rights and therefore we approach the Commission for this matter.

In 1995 Joseph Biden introduced a bill called the Omnibus Counterterrorism Act of 1995. It previewed the 2001 Patriot Act by 1) allowing secret evidence to be used in prosecutions, 2) expanding the Foreign Intelligence Act and wiretap laws, 3) creating a new federal crime of ’terrorism’ that could be invoked based on political beliefs, permitting the US military to the used in civilian law enforcement, and allowing permanent detection of non-US citizens without judicial review.

The Center for National Security Studies commented the bill would erode ’constitutional and statutory due process protections’ and would ’authorise the Justice Dept to pick and choose crimes to investigate and prosecute based on political beliefs and associations’.

We share the concerns addressed and would urge to review the rights of the accused and suspects of serious crime or terrorism in Finland. It seems the rights of the accused have been degraded and the legal protection of suspects has been eroded similar to their constitutional rights. Coercive measures such as neurotech applications (RNM/RMI) cause pain, suffering, likely fatalities are being misused and directed to homes of investigated for long periods of time.

Who overviews the methodologies of coercive measures? Who supervises the technology is being used correctly? How is the ethical aspect present when technology is being chosen? There is no adequate control.

To what extent it is permitted in the EU (Finland) to benefit materials in a prosecution that a) has been obtained by coercive measures b) that is classified (the accused has no chance to verify the material nor defend themselves against it)?

To what extent are neurotech applications being used in courts? To what extent the technology steers the decision-making of judges? It seems the accused has the role of the bystander in their trial.

The permission-granting process is not controlled properly. To what extent the evidence to open a secret investigation is being verified and examined by the district court of Helsinki? How political or personal interests of investigation are prevented? Coercive measures are used to manufacture state will. The state interest as an investigator is to make the suspect appear guilty or question their integrity, crecitability, and the suspect does not have the position to defend themselves in the process. To convict a terrorist suspect of a felony of any kind reduces the impact of miscalculation or political ambition by the state. There is evidence of implantable devices injected into the bodies of citizens without their permit producing agony and pain. The current correct practice of investigation is not so much to seek the truth that it is to degrade an individual.

04.05.2021

JUDICAL SYSTEM AND DEMOCRACY IN FINLAND

The rights of the accused are not self-evident today. In practice, the burden of proof is often shifted to the accused. The accused is granted a chance to make himself heard albeit this rule is being broadly violated. A significant moral dilemma exists also in the access of the accused to counsel. Whilst compensated in quality it is allowed at a good rate in the national courts. Whereas trial above the national judicial system, at the time when legal process often becomes the case of state integrity, no assistance is granted anymore. This remarkably reduces the number of processes reaching the ECtHR and limits the possibility of discovery of potential malpractice of the national judicial system.
White collars should follow ethical practices which highlight fairness and equality. The relation of the police and prosecutor seems to put the values to the test(pre-trial). Instead of justice, the national court appears to deliver the ’will of the State in relation to the accused’.

The counter-terrorism laws are used against democracy. Suspects do not have rights nor legal protection against coercive measures. The accused have rights, the rights of the accused. Very few are ever being accused.


Coercive measures are being abused with the assistance of the court and target suspects for an inhumanly long period of time with investigation methodologies that cause pain, suffering, and even fatalities to the targets or family members, even babies. During this time the suspect does not have proper legal protection, even constitutional rights are removed by the execution.

Neuropsychological and remote electronic ’no-touch torture’ applications used under coercive measures compromise heavily human rights and are thought of as WMD by its engineers. Since there is no adequate fair inspection in place suspects are abused during investigations likely for wrong reasons. Counter-measures are being used to manufacture trials directed against the suspect by State or individuals advised to do so. This tactic guarantees further investigation permitted. The accused should never be found guilty on the basis of evidence that has not been brought to light and examined by the accused. The evidence is not presented to the accused to ward coercive measures.

There have been several serious incidents that indicate deep structured corruption of critical infrastructure of Govt institutions under the monitoring of the Parliament. Inadequate supervision has become a significant problem. The role of the political power as the inspector raises many questions of which the least important is not ’whether Finland should have its Constitutional court?’. Although ’professional judges must have a higher university degree in law’ it does not prevent corruption especially since the judicial system is ’independent’. A mature member of society understands, by human nature this is impossible. The judicial system does not seem to convince the citizens anymore.

What mechanisms the EU has to evaluate the level of democracy in member nations? Democracies to be re-evaluated.

20.05.2021

How does the EU regulate, overview or monitor the preparation of counter-terrorism and surveillance laws by member states? How is the consistency of the laws being monitored between the nations? How do civil rights and legal protection survive in these circumstances?

By observation, globally ‘the war on terror’ seems to underpin the sovereign power at the expense of civil rights. We have a constant dilemma on how the ‘act of terror’ is being defined and how it has been communicated to the citizen. Similarly, we do have a problem by definition with what may trigger the need for surveillance over an individual. A matter of interpretation is not good enough? In practice, some crimes or anti-social behavior now turn into an ‘act of terror’ by definition or interpretation? Citizens may not even understand their commitment to an act of terror or being a part of a society of which status is turned to be suspected of terroristic activity by the administration. Grey lines everywhere. It seems politicians have created an extrajudicial tool to ensure sovereign access to ultimate power over the citizen. Why the ultimate control?

How are the surveillance technologies and methods overviewed? How are the periods of surveillance regulated by law and human rights? There has been a vast increase of reports coercive measures are indeed producing pain, suffering, and even fatal injuries. The suspects are receiving rough treatment over prolonged periods of time but never accused.

Although the idea of temporality is not expressed in the derogation provisions of the ICCPR or the European Human Rights Convention, it has been understood to have been implied by the notion of emergency. According to the U.N. Human Rights Committee, article four of the ICCPR requires that measures derogating from the provisions of the Covenant . . . be of an exceptional and temporary nature”” – “Informal” Suspencion of Normal Processes: The “WAR ON TERROR” as an Autoimmunity Crisis by A. ADDIS, Boston University Law Review.

How is this informality being monitored? How is it supervised no coercive measure or interrogation method consist of an element of torture, cause pain or suffering in the targeted? By observation, most of the suspects will never be accused. Is it possible that being a target of coercive measures is a worse option than imprisonment? How are the rights and legal protection of suspects ensured? We have still countries where even the rights of the accused materialize poorly.

Every question addressed here points to a system error. The ultimate cost is borne by the citizen. We have totalitarian states disguised as democracies. It is the culture of execution and power balance, the relationship between the citizen and the administration. We must measure these things to correct them.

26.05.2021

The supervision of the Finnish police relies on internal self-supervision. Recently, there have been a number of court cases questioning the integrity of the entire National Bureau of Investigation. How does the sole internal monitoring compare among the European peer group? By observation of the public reports, news, and personal experience there is a need for a European authority for investigation of police practices to improve and support the moral standards. An external unit, in particular.

The police would not investigate reports of electronic warfare attacks targeting citizens. This has been addressed to the National Police Commissioner Seppo Kolehmainen. No response has been received. Whether this is rather a matter of national security, the activity may continue uninterrupted and the targeted civilians suffer pain, psychological illnesses, even fatalities. On many occasions, the police have reportedly annulled and questioned the mental health of citizens who have requested an investigation on their constant concern. There are reports some individuals have been taken to mental institutions or mental evaluation by force while others proposed to visit their therapist or doctor suggesting an issue with mental health. Kolehmainen has been addressed. No response has been received. Police do not possess the capability to assess the mental health of an individual. What sort of guidance has been given to police in view of this vastly growing issue?How the citizen reporting DEW and resonance attacks should be minded according to police, whether the practice is indeed consistent with this?

The emergency services in Finland are operated by Emergency Response Centres managed by the Ministry of the Interior in cooperation with the Ministry of Social Affairs and Health ie the police and healthcare functions. We would like to understand what sort of guidance there is given to the police and healthcare in terms of individuals who suffer the symptoms of electromagnetic attacks?

The permission granting process for police’s coercive measures by the District Court of Helsinki, in particular, requires monitoring. Since the judges do not know the individuals whose surveillance is on the table the decisions are made on an application basis. How is this process monitored externally? How many times an extension on an existing permission can be granted? How is it controlled the coercive measures are not being used for business, political or personal interests? How is the resilience of individual police officers and the judges, in particular, is being monitored in terms of corruption?

The Finnish police maintain formal and informal databases of citizens, involving profiles of them. This information is not available to the citizen by data access request. Is informal reporting used in cross-governmental communication?

Reports exist the NBI maintains a form of co-operation with the equivalent of Russia. Is this co-operation is indeed approved and formal?

Documentary Evidence of Covert Electronic-Weapon and Neurotechnology Use By US Government on Americans Series (2) The Limited Effects Technology (LET) Program Report | JPSG, OOTW/LE Programs, 1996

RAE (Report, Analysis, Op-Ed) | Ramola D | Posted January 30, 2020

Documentary Evidence since 1994 of Covert High-Tech Electronic-Weapon and Neurotechnology Use in Targeted Surveillance, Experimentation, Operations by US Government on Americans: A Series

(1) The DOD/DOJ Memorandum of Understanding on OOTW/LE, 1994

(2) The Limited Effects Technology (LET) Program Report | JPSG, OOTW/LE Programs, 1996

Unremarked in mainstream media, deliberately hidden from wider readership, there have been a series of declassified document FOIA-releases over the past few years which astonishingly reveal many facets of the now-known covert use of electronic-weapon and neurotechnology surveillance, experimentation, weapons-tests, and operations on the American public by various agencies and departments of the US Government and their contractors.

Similarity with Covert Global High-Tech Policing Operations: Similar operations have been unleashed worldwide, as reported extensively at this site and others online earlier. Some documentation in the public domain testifies to this global program, and will be reported more fully here shortly. For now, please see this Twitter thread, which discloses NATO High-Tech Non Lethal Weapon/Neuro Policing operations in Europe and discusses also how Non-Lethal Weapons Testing & Neuro Surveillance have been unleashed inside the USA:

Thread on Non-Lethal DEW Operations in USA, Europe, world, with references to US, NATO documents, articles 

Click to access US-and-NATO-Weapons-Testing-Thread.pdf

This series aims to address the public disclosures in recent FOIA releases of ongoing US Government use of Electronic Weapons and Neurotechnologies on Americans.

“Electronic Weapon” herein refers to the spectrum weapons used in Electronic Warfare as defined by the Department of Defense (DOD) in documents, particularly relates to anti-personnel weapons, includes all labeled as non-lethal-weapon, less-than-lethal weapon, psychotronic weapon, neuroweapon, next generation and emerging technologies, and includes RFID (Radio Frequency IDentification) and BCI (Brain Computer Interface) tech.


(2) The Limited Effects Technology (LET) Program Report | JPSG, OOTW/LE Programs, 1996

PDF: The Limited Effects Technology (LET) Program Report | JPSG, OOTW/LE Programs, 1996

Recent document releases into the public domain include this Limited Effects Technology Program Report (linked above) released by the US Department of Defense on FOIA request on May 31, 2019 to Harun Krasna via Muckrock News, on a multi-document request made in January 2018, where initial notice of delays from the DOD FOI Office (until September 2018) suggesting high volume of responsive records seems to have petered out by May 2019 into return of a single report from DARPA, as their final response letter shows.

This FOIA request was made in January 2018 and asked DOD for “Copies of all research reports, annual reports, and indices of the Joint Program Steering Group (JPSG) as established by the 1994 MOU between the Department of Justice and Department of Defense, dating from 1994 to the present.”

(NOTE: The same request was sent by Mr. Krasna to the Department of Justice in January 2018 and yielded several documents in February 2018, including the 1994 DOD-DOJ MOU reported here earlier. Of note, this writer had also queried the DOJ for this very same 1994 MOU in 2015, and was at that time denied this document, citing “no responsive records” and several claimed exemptions.)

The purpose of this article is to report on the structure, disclosure, and highlights of this JPSG LET Program Report, and offer insight into its content with an eye to more fully informing the American public what the implications and ramifications are regarding the use of anti-personnel military weaponry by domestic law enforcement and military branches on the American public, which is what this JPSG LET Program Report is premised on.

Notable About This Foia-Request Response

  1. DARPA chose to return one single document, after a 1.5 year delay, on this multi-document request for documents dating back (from 2018, time of request) to 24 years. (This should not be found acceptable to the American public—other reports obviously exist and are being withheld; DARPA should be queried again.)

  2. This document is dated 1996; no recent reports were released by DARPA; no notice of the ending of these JPSG joint DOD-DOJ programs has been given in this May 2019 response.

  3. This document is not redacted and is released in full, which implies that the disclosure of technology and policy in this document is acceptable now to DARPA; this is in line with the slow release of information on Non Lethal Weapons, Electronic Warfare, and Neuroweaponry the DOD has made online and in print—via notice of programs, weapons, conferences, articles, and recorded lectures in public-domain documents and sites online–in recent years. However it also implies the JPSG (a DOD-DOJ entity) chooses currently to reveal what’s in this document as applicable to Law Enforcement—which could be a way of corralling tacit public consent to Law Enforcement use by thus publishing notice of this insidious and pernicious weaponry.

  4. It is essential therefore for Media, human and civil rights groups to take note now of the disclosure here and ask further questions, examine implications for all, and delve deeper into what is really at stake with this “Limited Effects Technology Program.”

Basic Structure of This Limited-Effects Technology Report

This 9-page report with the JPSG Defense-Justice logo on the cover and naming David Fields as the Program Manager is divided into the following sections:

Background

Program Thrusts

The Limited Effects Technology Program

Electric Stun Projectile

Laser Surveillance and Dazzler System

Handheld Laser Dazzler

Pyrotechnic Devices

Acoustic Study

Summary

The Section Titled “Background”

Notable from the information in this section titled “Background” is the following:

  1. This Limited Effects Technology Program is acknowledged to be a JPSG program resulting from the MOU from 1994, reported earlier.

  2. The need for such a joint program merging the efforts of Defense and Justice in developing technology applicable to both is being rationalized and legitimized by recourse to stated historical reference of common “need” as technology requirements for both “converge.” This is assertion which is neither specific, transparent, nor explicatory. It is presumption which seeks to hide the fact that what is being discussed here, as the immediate technological lead-up to the 1994 DOD-DOJ MOU, discussed here, demonstrates, are Remote Human Access-and-Control Neuro/Bio Weapons—Non Lethal Weapons and Neurotechnologies (to some extent revealed in “Program Thrusts”), which are arguably highly invasive of bodily and brain privacy, integrity, health, and safety.

Please see the section Some Context to this MOU in Article 1 of this series for historic Non Lethal/EMF Spectrum & Acoustic/Neuro/Bio Weapons-Development background to the MOU and all technology programs the MOU has given rise to.

  1. Examples given of operations sharing this need are “the (Defense) provision of humanitarian assistance, peacekeeping, countering the flow of drugs into the United States, counterterrorism, etc.–and (Justice) law enforcement forces engaged in LE operations.” We are expected to agree that military operations, even “peacekeeping” (which should not be considered a military activity in the first place: weapons cannot “peacekeep,” they subjugate) share a common need for “limited effects” tech i.e., silent Human Access Weapons—which, it should be noted, are not being named as such here. This notion of “need” is presumption, and emblematic of coercion of consent.

  2. The Need to Limit Force or apply only a “minimum amount of force” as primary principle of action is posited here—again without corroboration from real-life where war casualties and police violence abound—as a severe constraint to military and police ability to function. The solution to this false claim (false because it does not seem to be a real-life principle by which either police or military adheres) then funnels down to Non Lethals or Limited-Effects weapons, which are being characterized as force-limiting weapons within a claimed hierarchy of severity which completely ignores the unethical, human-rights-violating aspects of bio-hacking and neuro-hacking weapons, which is what they are (as will be seen shortly). More accurately, this section should be headed The Need to Be Seen to Limit Force, with Public-Image-Boosting Non-Visible Weapons.

  3. Common Threats posit militarized drug-smugglers and terrorists with access to military and LE Tech, which in real-life is made possible (as we understand now from much investigative and whistleblowing reportage including from journalist Gary Webb, LAPD investigator and government whistleblower Michael Ruppert and others) by gun-running, drug-running, and open arms sales by government, military, CIA, mafia, and private-sector alike, which makes this a circular argument: Military and LE fuel the arms/police weapons industry which creates these weapons, as well as tools such as electro-optic imaging devices to aid night vision goggles and Electronic Weapon countermeasures. This circular view also promises endless escalation via blackmarket sales of new weapons. “The criminals have our guns so we need new guns” could go on forever.

  1. Common Missions which name the War on Drugs and the War on Terrorism imply that these are both military campaigns just as much as law enforcement campaigns, which would explain both the military-style DEA and LE SWAT team “drug” raids on homes, terrorizing children and families, and the non-lethal weapons-operations via DOD/USAF weapons-testing contracts on people wrongfully labeled “terrorists” as ensured by the Omnibus Counterterrorism Act of 1995 after the Oklahoma Bombing (a staged insider event, as per whistleblower evidence), and later the Patriot Act of 2001 post 9/11 (another staged insider event, as per much public analysis and testimonial). Yet, in mainstream media and government press releases, these missions are not disclosed as such—the military aspect kept hidden–with much secrecy especially attending the field testing aspect of otherwise openly-disclosed non-lethal weapons testing contracts inside America.

  2. The most significant disclosure from this section comprises notice of 1) the members of the Joint Program Steering Group, as deriving from DARPA, the National Institute of Justice, the FBI, the Bureau of Prisons, and the US Army; 2) their ability to engage at any point in R&D of the weapons mentioned here; 3) the notion that they could participate in “demonstrations” of this technology just as much as developments. Are demonstrations then, what people are reporting today as 24/7 silent microwave/milliwave/infra-red/neurotech weapons operations in their neighborhoods, with use of drones, small planes, satellites, helicopters, zooming cars, parked vans and cars, antennas, cell towers, smart meters, backpack stalkers? (These also appear to be weapons-testing activities, weapons-training activities, and weapons-operations activities.)

  3. Also significant is the information that the Limited Effects Technology Program is only one part of a multi-technology program established by the JPSG to address joint tech priorities of Defense and Justice in 1995. The other tech programs are described in Program Thrusts.

The Section Titled “Program Thrusts”

This section in the LET report discusses the actual technology programs of the JPSG, names certain technologies being developed, tested, and used in training, reveals that most if not all of these are Remote Human Access spectrum and sonic technologies, yet maintains quite some obscurity in disclosing certain of these technologies, for example using vague terms like “communications security technologies.”

It is interesting indeed that this document titled The Limited Effects Technology Program Report in actuality presents information on all JPSG DOD-DOJ programs (or all deemed safe to record), yet focuses only on some LE tech, and uses the same opening Background section to preface notice of all JPSG programs—which implies commonality of context and nature of weaponry, i.e., Non-Lethal, Remote Human Access/Control (as will be seen below).

Significant, in this section, are the following.

  1. The JPSG Program—the most essential program ensuring DOD-DOJ liaison re. “advanced technology development” as per the 1994 DOD-DOJ MOU—focuses on 7 technology areas, which, on close perusal, cover quite a bit of territory. This program in other words is being used to develop, test, and demonstrate sophisticated and secretive wireless, remote, radiation, EMF spectrum, acoustic, bio-communications detection, monitoring, tracking, and communications technologies with major implications for all individuals and the entire urban environment.

  2. The first six program areas are presented only in summary, with slightly more elaboration of the Limited Effects Technology program which titles the report. Notably, even this seventh section is not comprehensive in its coverage of the LET it purports to cover: the devices highlighted do not comprise the whole of the LET program, only that portion DARPA is willing to put in a document clearly intended for eventual public-release (after 25 years!) into the public-domain, which has happened now. (More on this subject in the LET Program section below.) 

  3. Concealed Weapons Detection:

Concealed- Weapons-Detection technologies the JPSG reports here it seeks to develop are “unobtrusive” —read, concealable in plain sight–systems which can detect weapons of various kinds, including those with little to no metallic content, from over 9 meters—27 feet, width of a couple rooms–away. Initial efforts were to cover stationary devices—but clearly this 1996 wording suggests mobile devices would also be developed.

Actual detection technologies in process then in 1996 included:

3.1 An X-ray sensor: which refers to sensor technology; X-ray sensors are variously used in medical/dental radiography and in scanning systems as in airport scanners for people or baggage.

They are possibly also used in Backscatter X-ray technology as reportedly carried in NYPD vans, about which NYPD, although sued by ACLU, was protected by the NY Appeals Court from divulging much about, while companies contracting with the US Government to produce “Z-Backscatter-Vans” offer more information on the X-ray imaging of vehicles they do;

3.2. Combined passive millimeter wave and infra-red sensors: which are sensors used in scanning systems which can detect objects by their relative millimeter wave glow or infra-red heat signature profile, literally see through clothes better than X-rays and give rise to images highly invasive of personal privacy. Both millimeter wave sensors and infra-red sensors are energy sensors, detecting bio-field energy and thermal signatures; the distance from which such sensors can be used is a matter for further research. Some infra-red sensors are used in cameras mounted on aircraft and satellites.

Interestingly, a document online from the Air Force Research Lab, written by an apparent contractor, Decision-Science Applications Inc., found online after the bulk of this article was written, reports in 1998 on Concealed Weapons Detection programs run on grants from the NIJ and DARPA--which suggests a possible connection to these JPSG programs, while revealing that NIJ and DARPA were funding the Air Force Research Lab, which in turn funded a private contractor, in a chain of inter-agency connections–and points to sensor technologies being intentionally developed to penetrate clothing.

Concealed Weapon Detection Program, AFRL Report/https://apps.dtic.mil/dtic/tr/fulltext/u2/a359699.pdf

https://www.millivision.com/technology.html

Camera with Infra-red sensor showing heat signatures/https://www.wisegeek.com/what-is-infrared-imaging.htm#

3.3 Combined ultrasound and radar sensors: which translates to:

a) Ultrasonic sensors: the use of high-frequency ultrasonic pulsed transmitter/receiver sensors to send and receive waves in echo from materials to determine their composition or proximity (used in a variety of industries including healthcare, agriculture, target-tracking of animals or humans from UAVs or manned aircraft, water-level sensing, car or obstacle detection), used in short-range, up to 10-meters application;

b) Radar sensors used in short and long range (up to 100 meters) object detection, tracking target movement, collision avoidance in cars, and to detect materials with guided wave radar or special antennas which ultrasonics may miss, such as softer, powdery, foamier, dustier materials, using either Doppler pulses or frequency-modulated continuous wave radar.

https://www.maxbotix.com

3.4 Low Frequency Magnetic sensor: Magnetic sensors use a variety of physical effects related to magnetism, such as eddy current sensing, measuring small relative changes in earth’s magnetic field created by variations in magnetic material, to detect flaws in metal, movement of metals (as in weapons) carried on a person’s body, movement of large metallic objects such as cars, etc. Magnetic sensors detect metal carried on persons when radar alone, stopped by metallic-walls or reflective insulation barriers, is not enough.

Low magnetic fields relate to biofields; low frequency magnetic sensors can pick up low frequency (ELF, ULF body resonance frequency below 10 Hz, below 30 KHz) magnetic fields as indicated in rise and fall of chest cavity; this capacity is used in earthquake life-detection and through-wall surveillance in combination with radar sensors.

Then there are super-conducting quantum interference devices (SQUIDs) which also pick up very low emfs, such as brain ELFs.

MEMS and nanosensors using thin film magnetic technology also exist. (On this subject: Radar sensors used in prisons are taking recourse to radar tagging to distinguish inmates from  guards—implying the use of nanosensors in tracking, which appear to be of different kinds.)

Through-the-wall surveillance technologies/https://www.ncjrs.gov/pdffiles1/nij/07_01.pdf

 

Squid/Wikipedia

Finally, this section’s disclosure on then-current use notes that the X-Ray sensor was being “demonstrated”–meaning, operated–in a correctional institution in California—a prison or juvenile detention center. The use of sensor and imaging technologies in correctional and detention institutions must be thoroughly investigated, in relation to the bioeffect harms from such technology usage.

What Is Not Being Explicitly Stated But Implied In This Entire Section?

  1. These sensor technologies are being tested on populations as per the 1994 DOD-DOJ MOU in joint military-police programs, which means they are being used silently and experimentally on people.

  1. All sensor technologies, unless passive, require emission as well as reception of signal. This means that people—unwittingly, without being informed—are being subjected to X-rays, ultrasound radiation, millimeter wave technologies, radar technologies, ULFs, ELFS, and magnetic fields, at short-range and long-range, close-in and remote, ostensibly for weapons-detection testing purposes, in any number and type of environments, including but not limited to airports, train stations, public areas, and private homes. These technologies could be directed at people from inside buildings and homes, from inside cars, pickups, trucks, vans, from mountings in public locations, from parked vehicles in parking-lots and from moving vehicles while driving.

  1. Sensor technologies being tested at short and long range include low frequency magnetic sensors which track biofields, breathing activity, body resonance emfs, and low frequency brainwaves, plausibly using superconducting quantum interference and tunneling technologies, and comprising earthquake-life-detection monitoring or through-wall-surveillance as described in various other public documents, and plausibly also Remote Neural Monitoring or neurosurveillance, of the kind spoken about 28 years ago in the ex-NSA employee John St. Clair Akwei lawsuit against the NSA.

  1. As in the found document Silent Weapons for Quiet Wars, which posits the surreptitious use of socio-economic weapons of degradation to disable and disarm entire populations without their conscious awareness, the surreptitious testing of sensor technologies on populations is essentially the leveling of silent military spectrum weapons technologies on the bodies of citizens, without their knowing.

  1. The surreptitious leveling and usage of silent military spectrum weapons of bodily and brain monitoring, assault, and modification is precisely what thousands of reporting victims of EMF/Neuro DEW crimes worldwide—often labeled and dismissed as Targeted Individuals—are currently reporting, both inside the USA and out. Could it be that the testing of sensor technologies in concealed weapons detection constitutes one aspect of this surreptitious assault on citizens?

  1. Factually speaking, the disclosure in this document along with the disclosure in the 1994 DOD-DOJ MOU that these technologies are being tested is, at minimum, evidence that invisible, spectrum technologies are being operated and tested on the bodies of people, from a distance and from close-by, exactly as thousands of highly credentialled and credible people– often labeled as “Targeted Individuals” and falsely characterized for credibility-disappearance as “Mentally Ill” by mainstream Govt-propaganda-pushing media–are reporting.

4.Geolocation/Navigation/Communications:

Three aspects to location, ID, and tracking technology are being covered in these JPSG programs, as delineated in this section on Geo-Location/Navigation/Communications in the LET Program Report:

4.1 Locating or precision-finding, precision-targeting of specific people, objects, or vehicles—this implicates GPS (Global Positioning Satellite) and other satellite technologies, including handheld satellites, for GPS-tracking of RFID human/object tags, cell phones; as well as human/object RFID/other, Nano/Micro tagging technologies to facilitate GPS-tracking, in other words, Surveillance and Tagging-for-Surveillance technologies.

4.2 Identifying or pinpointing identity of individuals & things—this suggests Identifying Biometric Surveillance & Tagging-for-ID- Surveillance: Facial/Gait/Iris/Fingerprint/Body/DNA/Other Recognition Surveillance; Unique RFID Tagging (Nano/micro biosensors & object tags) & WBANS (Wireless Body Area Networks) for Identification. Again, Surveillance and Tagging-for-Surveillance technologies. Involves Biometric Data Collection.(Law Enforcement has long been involved in this.)

4.3 Monitoring or tracking movement of people and things—this suggests Surveillance & Tagging-for-Surveillance: Audio/Visual Surveillance using microphones and cameras; Cyber Surveillance of computers; Through-Wall Surveillance with RF/ULF/Magnetic sensor technologies; Medical/Health monitoring & continuous detection of RF/other Implants & WBANs using Radar, Wifi; ISR (Intelligence, Surveillance, Reconnaissance) surveillance using Radar from drones, spy/commercial planes, satellites, ground vehicles; Tagging-for-Surveillance: Unique RF/Spectrum & Nano/Micro tagging (correctional, medical) technologies, CCTL—Continuous Clandestine Tracking and Locating (military, intelligence) technologies; Sensor technologies (as discussed in the previous Concealed Weapons-Detection section). Again, Surveillance and Tagging-for-Surveillance technologies. (USAF, AFRL, USMC are currently conducting Non Lethal Weapons tests and ISR tests using these.)

Notably, “reduction of power consumption” is mentioned as a DARPA interest in tracking technologies; this might account for the increased development of passive or inert nanosensors which can be activated or energized by energy signals sent to them, rather than relying on inbuilt battery packs.

4.4 The two JPSG efforts mentioned here include Tagging, as discussed above, very slightly referenced with this line about tiny wireless sensors, termed “devices,” notably marked “modular” as in implantable WBANs, which do indeed have modules or nodes in a network. These are not just object-tagging devices, they are human-tagging devices.

Military tracking of objects and humans using sensors

 

The fully-implanted and centrally-monitored human

 

Sensors at level of cell, molecule, DNA

And this is not a slight JPSG effort at all: Tagging and sensor technologies constitute multi-billion dollar businesses and are intimately linked to all aspects of Geo-Location, Navigation, and Communications, as discussed above. Again, here too, DARPA should be more definitively and minutely questioned about these tagging technologies and how they are being used inside America, on Americans—especially since thousands of Americans, as also people worldwide, are reporting violative, non-consensual RFID micro and nano implants in their bodies.  

4.5 The first JPSG effort mentioned here, Soldier 911, is mentioned in DARPA literature as an emergency radio to help find soldiers in crisis.

However from the description in the LET report, it also sounds like a handheld satellite linked in to an emergency response network, functioning as a device to locate, identify, and track “the movement of individuals and vehicles,” which, if an additional feature (undisclosed in DARPA literature) on this device, is only possible through the use of pre-tagging of said individuals and vehicles with sensor and tagging technologies–or the use of SIGINT Remote Neural Monitoring, as described in the John St. Clair Akwei lawsuit vs the NSA in 1992, in the case of humans.

5. Sniper DetectionSniper Detection systems as mentioned here were intended to be of various kinds, including manually-portable, bodily-worn, and vehicle-mounted.

These systems, as stated above in the LET Program report–being explored and tested publicly from 1996 on–involve sensors: acoustic sensors, infra-red sensors, and integrated infrared-acoustic and infrared-laser sensors.

Interestingly, this section appears to be discussing technologies for detection of actual gunshot or sniper fire—not non-lethal fire, not spectrum-weapon-related shots. However the detection technologies themselves are spectrum technologies.

Brief research of these detection technology sensors indicates that acoustic, infra-red, and laser technologies are being developed and used by militaries to determine with pin-point precision the direction and location of fire from a weapon after a first shot. Sensors today are becoming highly sophisticated with universities (working on military grants, partnering with private firms) also involved in developing bio-mimetic systems of detection, using neural network learning and studying how bats and dolphins process sound and vibration.

It is notable that this program of Sniper Detection has been included as a JPSG program in this Limited-Effects Technology report as one of the multi-technology program thrusts of the JPSG.

JPSG, we recall, is the Joint Program Steering Group formed by the 1994 DOD-DOJ MOU employing parties from both Defense and Justice in mutually-relevant matters and projects of security and law enforcement, OOTW and LE, intending to jointly develop and test “advanced technologies” of common interest.

Some Undisclosed Conclusions

1. Could it be therefore that Sniper Detection is related to matters of Mass Shooters, the phenomenon of supposedly crazed “lone gunmen”–plausibly mind-control victims of MK ULTRA RHIC-EDOM (radio hypnosis intra-cerebral electronic dissolution of memory) radio-hypnosis—shooting up people in random settings, as well as the Live Action Drills with Active Shooters run by the Department of Homeland Security?

If so, this offers a connection not merely between the DOD and DOJ but also with the DHS; all three departments are in some way involved in these sniper detection programs.

This also offers a connection to War on Terror programs and funding, since mass shooters are characterized internally as Domestic Terrorists—even if their “Manchurian Candidate” creation is by covert agencies in Defense/Justice/DHS/CIA, undercover of Live Action Drills, for purposes of driving Agenda 21/2030 Gun Control agendas, as is often surmised by many analysts.

2. Further, the JPSG efforts noted here to develop sensors, in its inclusion of biomimetic systems and neuroscience research, now used in sniper detection in the field, may well involve the use of neuroprosthetics, as indicated by the acknowledged use of cochlear implants in medical and neuroscience research over several decades by a Defense contractor, Biomimetic Systems, Inc.

 

3. It is plausible therefore—and a matter for further investigation—that the non-consensual use and implantation of cochlear and other neurological implants—which numerous citizens have come forward to report, over the last three to four decades–for the study of neural networks and auditory processes has accompanied the JPSG efforts in this area of Sniper Detection.

6. Information Technology:While this section is quite opaque, a few conclusions can be drawn:

  1. The JPSG states that it is addressing the needs for instant and secure communications needs in LE and Military by taking advantage of advances in civilian and govt-sponsored IC technologies. This would not however require a separate program to do so, unless undisclosed advances were being acquired.

  1. These advances, hinted at but not specified, could include Artificial Intelligence, Machine Learning, autonomous systems, cybernetics, cognitive computing, Internet of Things, Internet of Humans, lesser-known Neuro/Bio-communications technologies such as V2K (Voice to Skull) and Synthetic Telepathy, Hive Minds and Brain Nets revealed by whistleblowers like Richard Alan Miller and Robert Duncan (while some brain projects are openly revealed by public-domain DARPA information and known to exist via academic/government focus in US and worldwide), robotics, nanotechnology, the miniaturization of electronics, quantum computing, and other aspects of modern ICT which are left unnamed here. Simulating all 100 billion neural connections of brain on future supercomputers/https://www.kurzweilai.net/new-algorithm-will-allow-for-simulating-neural-connections-of-entire-brain-on-future-exascale-supercomputers

    Brainternet-Connecting a Brain to the Internet as an IOT device/Video: https://www.youtube.com/watch?v=LSdN–axYbA

This possibility—of such undisclosed advanced projects being part of the IT program sketchily noted here–is once more underlined by the opaque disclosure of “innovative exploitation” of existing ICT infrastructure intended in the creation of interagency crisis management systems.

  1. Communications security technology” in common parlance includes encryption and authentication technologies which today include biometrics and RFID microchips, but is not further specified in this section.


Considering that the rollout of biometrics (iris, fingerprint, face, voice recognition) at airports and borders is being overseen by TSA, a part of DHS, and that DNA is collected by LE at jails and detention centers, it can be safely concluded that any joint program of Defense and Justice in this area would indeed encompass all of these certainly exploitative technologies.

  1. “Sharing information among agencies” points to shared information from different databases collected by different parties, including DNA collection databases managed by LE, and recently exposed for massive privacy violations. Police databases are apparently highly insecure, and corrupt officers have made it a practice to sell databases to private companies for thousands of dollars, a practice revealed by recent news articles, including by Chief Jones on Ramola D Reports.

Information Sharing across Law Enforcement/RAND report/https://www.rand.org/pubs/research_reports/RR645.html

Law enforcement investigators seek out private DNA databases/Mashable

Police Are Collecting DNA From People Without Telling Them/Futurism

Police use of surveillance technology raises privacy concerns/MintPressNews

Across US, police officers abuse confidential databases/AP

Agencies Behaving Badly: Government Surveillance and Privacy Act Violations/Jurist

Ramola D Reports| Report # 120: Retired Police Chief Daymond Jones on Policing in America Today

  1. To conclude, the opacity of this section on Information Technology appears to hide much. It is entirely possible that non-consensual, clandestine implantation of RFIDs, as part of developments in Military/LE cybernetics, telemetry, biometrics, neuroinformatics in “innovative exploitation” of communications security technologies, is being executed by this JPSG program—as reported by high numbers of Americans. Again, this presents therefore an issue to be examined further with DARPA and the Justice Department.

7. Personnel Armor:This section, like the Sniper Detection section, seems to pertain explicitly to lethal weapons and not non-lethal or spectrum weapons.

However, it notes that lethal weapons threats—bullets from rifles and handguns—affect OOTW and LE operations both.

Protection from rifle bullets via advanced lightweight body armor in the course of OOTW/LE operations of any kind appears to be the focus here; the implication appears to be that such operations could involve rifle threats; it is possible therefore that this pertains, as also the Sniper Detection section, to mass shooters and the weapons (assault weapons, rifles) some have used, as well as to regular LE activities, which do involve lethal exertion of force, warranted or unwarranted, in situations of gun violence.

It’s interesting that this has been designated an area for Defense-Justice collaboration; plenty of Defense contractors exist who research and develop body armor, as any cursory inquiry into the market shows. LE also has a dedicated market producing police gear. For the JPSG to enter this arena suggests a corralling of new Federal funds perhaps, or some kind of development of new technology – countermeasure shielding for spectrum technology? – that is not being fully disclosed here. Note that what is being stated above as aspects of this program are presented as inclusions (“efforts include”), not all-encompassing and exclusive.

8.Biomedical Technology:

This is also a relatively opaque section suggesting telemedicine application in penitentiaries and OOTW rescue operations, which implies audio-video consultation and data transmission of medical detail perhaps but does not expand on the suggestions implicit in the label of “biomedical technology” which could include medical telemetry, meaning implants, body area networks, biosensors, and implanted biomonitors, at nano- and micro-levels, to aid in remote patient monitoring and other telehealth initiatives.

New Atlas article, 2018/https://newatlas.com/profusa-health-monitoring-biosensors/53870/

To reiterate, the incidence of such biomedical implants found to have been non-consensually implanted in what can only be understood to be undisclosed and covert human experimentation and tracking operation projects involving variably, academic, medical, and military/Intelligence personnel has been reported in large numbers by Americans as also people worldwide. It is possible therefore that the opacity of the language in this section obscures the larger truths of such non-consensual implantation being part and parcel of a plethora of telehealth processes and technologies being tested silently on people.

This latter possibility in fact has increasingly been reported by people experiencing invasive radar activation of non-consensual implants within contexts of seemingly being probed in public by a rotating army of stalkers masquerading as community monitors and healthcare workers.

9. Limited Effects Technologies:


Significant, from this brief introduction (further screenshotted below):

  1. As noted earlier, this section, which titles the report and occupies 5 of the 9 pages of this report yet details only one portion of the multi-technology JPSG program.
  2. Further, its detailing is incomplete, as indicated by the language in the opening section.

  1. Crowd control and deterrence devices being studied and developed under this LET program are presented here as innocuous, benign, and needed—as per a nonspecific claim of need. There is no indication however of actual studies to establish they are such, or actually “eyesafe” or “less lethal” as stated.

A significant fact to note is the language referring to “sponsoring” and “funding” programs and projects to develop these limited-effects technologies, which means JPSG is handing out grants and contracts to Defense/LE contractor companies to develop these weapons. This might well be the protocol by which all JPSG programs work, and could explain the AFRL contract with Decision-Sciences Applications, Inc. on NIJ and DARPA grants, mentioned above in the Concealed Weapons Detection section. 

Electric Stun Projectile

This “effort” relates to a physical projectile using wireless, gas, or “conventionally propelled” means intended to electrically shock and stun a human target, as Tasers also do. Hardly a “Limited Effect” weapon, this is a stun gun intended to be used as a  shock-defence if a soldier or LE officer is attacked. Note that the intent is still incapacitation, blunt trauma, high impact force–but using an electrical charge, not a high-velocity bullet. 

Developed in San Diego, tested on the Marine Corps, probably rolled out and in use now, post 1997. Notice that the photograph is blacked out almost and reveals nothing. DARPA is not going out of its way to provide clear information here.

A look into Jaycor, the company, online, now subsumed into Titan Corporation, a larger Defense contractor engaged in large-scale DEW, satellite, and navigational systems manufacture, reveals their interest in other counter-personnel stun-gun non-lethal weapons and crowd-control devices. Titan Corporation is therefore now manufacturing both large-scale DEWs to take out battleships and smaller-scale non-lethal weapons (being characterized here as “Limited-Effects”) to take out human beings, or fell them for a while–no doubt with damages, as “crowd-control.”

Laser Surveillance and Dazzler System

While blinding lasers were banned by the European Parliament in 1995, the use of lasers to dazzle and disorient human targets did not stop, as BOSS, developed by the US Air Force’s Phillips Lab in Albuquerque, New Mexico demonstrates. It is interesting that this surveillance and dazzler system was developed for and presumably funded by the JPSG at an Air Force laboratory.

From Defense Review, 2005/Laser_Battlefield_Optical_Surveillance_System_BOSS

Notably, this system 1) involves the use of infra-red thermal sensors to find targets plus lasers to dazzle targets, 2) can be applied remotely from a considerable distance, and 3) intends both a psychological effect in alerting targeted individuals to being targeted by way of Show-of-Force bright illumination and the physical effect of deleterious uber-brighting or dazzling of the target’s eyes.

Again, not exactly Limited Effects, but labeled as such.

Finally, it is notable that further integration of this “Limited Effect” optical sensor-and-weapon system with acoustic sniper detection systems already developed under JPSG (as indicated above also by the AFRL/Decision-Sciences Applications 1998 Report) was also being explored in 1996, further evidence that sensor and “non-lethal” spectrum technologies were being developed and tested by the JPSG for multiple uses.

Handheld Laser Dazzler

Also developed by the US Air Force’s Phillips Lab, the handheld laser dazzler—whether portable in a backpack or camouflaged as a flashlight—demonstrates that non-lethal energy weapons, including lasers, promising limited-effects were being made by the JPSG on a smaller scale, at lesser power, for purposes of portability and ease of use.

Portable Handheld Laser Dazzlers/https://www.tech-lasers.com/dazzlers/portable

Again, as per the 1994 DOD-DOJ MOU, the non-lethal Spectrum/Acoustic sensor-and-weapon technologies being developed by the joint Defense-Justice partnership here were being tested—are being tested, have been tested for the past 25 years—and “demonstrated” on real targets.

Pyrotechnic Devices

The publishing of flash-bang devices designed to fast-bloom-smoke, dazzle, whistle, and other such is the one consistent element that disclosure on non-lethal weapons has maintained. Unwilling to speak openly of radar and sonic devices with silent and invisible physical bio-effects on humans, literature from the Joint Non Lethal Weapons Program has not refrained from pointing openly to these dazzle and vibrate devices, in obvious attempts to misdirect focus away from the far deadlier bio-hacking and neuro-hacking devices of non-lethal sensor technologies and neuroweapons.

Acoustic Study

This is evidence that infra-sound (below 20 Hz, the threshold of human hearing) weaponry for crowd-control was being researched in 1996 and tested on people, specifically to determine the biological effects of such transmissions, and explore means of incapacitating individuals for crowd-control purposes with infra-sound.

Prior information, available online, shows that infrasound had long been known to produce bio-effects and brain-effects–nausea, disorientation, brain fog–in humans, since Dr. Gavreau’s discoveries and experiments with infrasound in the 1950s, and efforts had already been made to create devices and systems to use infrasound in a weaponized way against humans, as in the published US Patent 3612211, screenshotted below.  

A salient point to note is that infrasound weapons (like other emerging weapons technologies) had been reviewed in the 1970s by United Nations conferences on disarmament, and efforts had been made, particularly by the Soviet Union, to halt the development of all such new weapons then seen as weapons of mass destruction. The US and UK were prominent naysayers to this plan in 1978 at the Conference of the Committee on Disarmament, where Hungary presented a paper on infrasound weapons and their effects. Now it appears that not only were such weapons not halted in development between 1978 and 1996, DARPA was arranging in 1996 for further development and testing of these dangerous acoustic weapons, long known to harm human bodies and brains.

The Section Titled Summary

While this document has touched on major program areas of the JPSG, its title and detail elaborate the more obvious flash-bang aspects of the “Limited-Effects Technology” program, while the Summary remains opaque. Notable however is the casual mention of “corrections” being aligned with the main parties involved in these joint programs, as in “military, law enforcement, and corrections” as the primary “user communities” being awarded “new, more effective tools,” with little description or specificity on the nature or kind of tools, and no summation of the high points of this document.

However, some definite conclusions can be reached regarding this entire document, in addition to all noted above at end of sections.

CONCLUSIONS

  1. DARPA returned this one 1996 document to a multi-document request on JPSG programs begun 25 years ago, after 25 years.

  2. This is not a fully disclosive document; much is being obscured, summarized, glossed over.

  3. The Limited-Effects Technology program is only one of several JPSG programs mentioned in this document.

  4. All these JPSG programs need to be understood, as stated, as deriving from the 1994 DOD-DOJ MOU which announced the testing and demonstration of “advanced technologies.” That MOU followed on the heels of a classified Non-Lethal Weapons conference in 1993, and several decades of development and study of Non-Lethal technologies and “Psycho-Corrective” Neurotechnologies. (See Background & Context, MOU.)

  5. The need to limit force is reiterated as primary motivator in bringing DOD and DOJ together in a quest to find and use common modalities in wars on drugs and terrorism—a need which points directly to Anti Personnel Non Lethal Weapons—which are EMF Spectrum and Acoustic Weapons.

These JPSG OOTW/LE programs therefore are definitely focused on Non Lethal Weapons, that is, EMF Spectrum and Acoustic Weapons, which, by nature of the physical bio-effects they have on humans’ bodies and brains, are also Bioweapons and Neuroweapons—not mentioned as such in this document, but elsewhere disclosed, as for instance, by Debra Schnelle at the 2019 Blue Ribbon Emerging Biodefense Conference as Neuro Cognitive Weapons, by Dr. James Giordiano as Neuroweapons in numerous lectures, and discussed at length in the declassified US Army document Bio-Effects of Selected Non-Lethal Weapons as Bioweapons and Neuroweapons, with intended damage to the human body and human brain.

  1. The JPSG comprises members from DARPA, US Army, National Institutes of Justice, Bureau of Prisons, and the FBI. Stands to reason that each of these institutions therefore—and their overseers, the Department of Defense and the Justice Department and leaders, the Secretary of Defense Mark Esper and the Attorney-General William Barr–is fully cognizant of the JPSG programs developing and testing sensor-and-weapon technologies on the streets of America described in this report.

  2. Further, each of these institutions is being permitted to participate in all aspects of the RDA (Research, Development, Acquisition) spectrum, meaning it is acknowledged that these non lethal neuro/bio EMF/acoustic technologies can be tested and demonstrated by the Bureau of Prisons (on prisoners), FBI, and NIJ (on watchlisted citizens? on unwitting members of the public at airports, train stations, hospitals, stores, roadways?) just as much as by DARPA and the US Army (on military personnel? On civilians near military bases? on “indefinite detainees”?) and just as much as jointly developed.

  3. Concealed weapons-detection technologies being developed indicate that people—unwittingly, without being informed—are being subjected to X-rays, ultrasound radiation, millimeter wave technologies, radar technologies, ULFs, ELFS, and magnetic fields, at short-range and long-range, close-in and remote, ostensibly for weapons-detection testing purposes, in any number and type of environments, including but not limited to airports, train stations, public areas, and private homes. These technologies could also be directed at people from inside buildings and homes, from cars, pickups, trucks, vans, from mountings in public locations, from parked vehicles in parking-lots and from moving vehicles while driving.

  4. Sensor technologies for weapons-detection being tested at short and long range include low frequency magnetic sensors which plausibly track biofields, breathing activity, body resonance emfs, and low frequency brainwaves, using superconducting quantum interference and tunneling technologies, and comprising through-wall earthquake-life-detection monitoring, remote neural monitoring, and the surveillance and monitoring of brain states and emotion states.

  5. GPS Tracking and identification technologies being tested and developed imply tagging-for-surveillance sensor technologies inclusive of RFID microchips, WBANs, biosensors, and nanosensors, and include monitoring and surveillance technologies such as different kinds of radar being tested and operated under ISR and military/Air Force Non Lethal Weapons Testing programs.

  6. Sensor technologies being developed for sniper detection, based on biomimetic systems, could include the use of cochlear implants and other neuroprosthetics in the study of auditory and neurological processes, as indicated by companies developing such systems.

  7. Innovative exploitation” of IT communications infrastructure & new technology here could include hive-minding AI projects, nanobots, Brain Nets, quantum computing, and synthetic telepathy, among other undisclosed technologies, involving non-consensual, clandestine implantation of RFIDs and BCI Tech, as well as biometrics/DNA data collection and sharing—as part of developments in Military/LE cybernetics and telemetry, and as reported today by high numbers of Americans.

  8. Personnel armor” being developed as a JPSG program could include research and development of countermeasure shielding for spectrum and acoustic non-lethal bio/neuroweapons, although not expressly stated here.

  9. Biomedical technology initiatives involving telemedicine and telehealth could include medical telemetry, meaning implants, body area networks, biosensors, and implanted biomonitors, of nano- and micro-levels, to aid in remote patient monitoring and other telehealth initiatives. Non-consensual implantation may well be part and parcel of a plethora of telehealth processes and technologies being tested silently on people, in prisons, as noted, and elsewhere.

  10. Limited-effects technologies being developed and tested under JPSG include electric stun projectiles, dazzling laser devices of both mountable and portable kinds, and other crowd-control devices.

  11. Acoustic devices using infrasound to produce physical effects for use in crowd-control to “incapacitate” was being studied at an Air Force Laboratory—and possibly being field-tested and “demonstrated” on populations to provide the needed “hard evidence” mentioned here.

  1. Factually speaking, the disclosure in this document along with the disclosure in the 1994 DOD-DOJ MOU that these technologies are being tested is, at minimum, incontrovertible evidence that invisible, spectrum technologies are being operated and tested on the bodies of people, from a distance and from close-by, exactly as thousands of highly credentialled and credible people– often labeled as “Targeted Individuals” and characterized for credibility-disappearance as “mentally ill” by mainstream Govt-propaganda-pushing media –are reporting.

  2. This document’s disclosure therefore—notwithstanding that much of its details have been withheld–is profoundly important in establishing that non-lethal weapons and sensor technologies, specifically EMF Spectrum and Acoustic Bio/Neuro Weapons have been developed, demonstrated and tested on populations under the aegis of joint Defense-Justice JPSG programs, since 1994.

Related

Documentary Evidence since 1994 of Covert High-Tech Electronic-Weapon and Neurotechnology Use in Targeted Surveillance, Experimentation, Operations by US Government on Americans: (1) The DOD/DOJ Memorandum of Understanding on OOTW/LE, 1994

Public Disclosure on Neuro Weapons and Neuro Technologies In Use Today

Extrajudicial Targeting Technologies (Weapons Use/Tests/Abuse); Biometric Surveillance, Non Lethal Weapons, Neuroweapons

False-Claim of Mental Illness in the Microwave, Millimeter Wave, Other “Non Lethal” Weapons Testing on Citizens in USA & Worldwide

Ramola D/No Longer True: The NSA “Isn’t Getting Violent Internally in the US”: Millions Today in US Are Targeted with RF/Scalar/Sonic Weapons, Nano Weapons, Neuro Weapons, Chem/Bio Weapons