Tag Archives: electronic monitoring

Alfred Lambremont Webre/NewsInsideOut: Model Statute banning AI Artificial Intelligence​/Directed Energy​​ Technologies to Entrain or Torture Humans

Re-posted, with many thanks, from Alfred Webre’s NewsInsideOut.Com, which recently posted a tribute to Dr. Rauni Luukanen-Kilde, where this draft was included. A tremendous joint effort from Alfred Webre, Dr. Kilde, and others, the draft of the Model Statute below offers a means to use existing legal systems internationally and domestically within countries, at the UN, EU, and others, to establish a ban on all pernicious neurotechnologies and neuroweaponry being used, tested, and operated currently in Brain Entrainment of humans, remote manipulation of humans, infliction of harm to humans, and torture of humans, in addition to all other New Age technologies such as aerosol weapons, ELF weapons, scalar weapons currently being used worldwide by Global Military/Intelligence entities via an Artificial Intelligence network in the vast, planned, and calculated subjugation of humanity.

From Exopolitics.blog.com: Alfred was General Counsel to the New York City Environmental Protection Administration, a futurist at Stanford Research Institute (where he directed the proposed 1977 Carter White House extraterrestrial communication study), and was a NGO delegate to the United Nations and the UNISPACE conference. He was also a an Administrator of the Brownsville Community Health Center in the Lower Rio Grande Valley of Texas as well as a Judge on the Kuala Lumpur War Crimes Tribunal.

Alfred has been active in public broadcasting in the United States (WBAI-FM) and Canada (Vancouver Coop Radio); public interest counter intelligence (Assassination Information Bureau); deconstruction of the Transhumanist Agenda; the peaceful uses of outer space (Institute for Cooperation in Space); Life on Mars (Mars Anomaly Research Society); multidimensional online education (Omniversity in development); and news  (NewsInsideOut.com; Exopolitics.com).

The note below, preceding the statute, is taken from Alfred Webre’s NewsInsideOut post on Feb 8, 2016: Legislate and Enforce Ban on AI Artificial Intelligence/Directed Energy Technologies to Entrain or Torture Humans

(Color highlights below added by me, only for emphasis.)

***

Model Statute banning AI Artificial Intelligence​/directed energy​​ technologies to entrain or torture humans

http://exopolitics.blogs.com/exopolitics/2015/10/model-statute-banning-ai-artificial-intelligence-technologies-to-entrain-or-torture-humans.html

A most powerful mechanism to defeat sentient predatory AI Artificial Intelligence is to restore and enforce Universal, natural, international, humanitarian, and criminal law so that AI Artificial Intelligence and its AI-entrained infrastructure of compromised humans cannot carry out its destructive Agenda and acts against humanity and Earth using technology and violations of fundamental human rights.

Dr. Rauni Kilde and others worked with me in developing this Model Statute that can be adopted and enforced in international, regional (European Union), national, provincial and municipal jurisdictions to do so.

Please take this Model Statutes to the United Nations, the EU, the Parliaments of Poland and other nations, the municipalities of the world such as Brussels and let us stop the Transhumanist Agenda and predatory AI Artificial Intelligence.

Thank you.

Model Statute banning AI Artificial Intelligence technologies to entrain or torture humans

MODEL STATUTE

MODEL STATUTE concerning weapons systems operating on new physics principles used by AI Artificial Intelligence to entrain humans and/or to torture or inflict other cruel, inhuman or degrading treatment including electronic weapons, electromagnetic weapons, magnetic weapons, directed energy weapons, geophysical weapons, wave-energy weapons, frequency weapons, genetic weapons, scalar weapons, psychotronic weapons, chemtrail aerosol weapons, implant weapons, nanotechnology weapons, high frequency active aural high altitude ultra low frequency weapons, information technology weapons.

EUMODEL STATUTE FOR THE EUROPEAN UNION

Council Regulation (EC) No _________________ of _________, 201_

Council Regulation (EC) No _________________ of _________, 201_ concerning weapons systems operating on new physics principles used by AI Artificial Intelligence to entrain humans and/or to torture or inflict other cruel, inhuman or degrading treatment including but not limited to electronic weapons, electromagnetic weapons, magnetic weapons, directed energy weapons, geophysical weapons, wave-energy weapons, frequency weapons, genetic weapons, scalar weapons, psychotronic weapons, chemtrail aerosol weapons, implant weapons, nanotechnology weapons, high frequency active aural high altitude ultra low frequency weapons, information technology weapons.

Official Journal _______________________________________

Council Regulation (EC) ________________________________

of ______________ 201_

concerning weapons systems operating on new physics principles used to torture or inflict other cruel, inhuman or degrading treatment including but not limited to electronic weapons, electromagnetic weapons, magnetic weapons, directed energy weapons, geophysical weapons, wave-energy weapons, frequency weapons, genetic weapons, scalar weapons, psychotronic weapons, chemtrail aerosol weapons, implant weapons, nanotechnology weapons, high frequency active aural high altitude ultra low frequency weapons, information technology weapons.

(hereinafter collectively referred to as “new physics torture weapons”).

THE COUNCIL OF THE EUROPEAN UNION,

Having regard to the Treaty establishing the European Community, and in particular Article 133 thereof,

Having regard to the proposal from the Commission,

Whereas:

(1) Pursuant to Article 6 of the Treaty on European Union, respect for human rights and fundamental freedoms constitutes one of the principles common to the Member States. In view of this, the Community resolved in 1995 to make respect for human rights and fundamental freedoms an essential element of its relations with third countries.

(2) Article 5 of the Universal Declaration of Human Rights, Article 7 of the International Covenant on Civil and Political Rights and Article 3 of the European Convention for the Protection of Human Rights and Fundamental Freedoms all lay down an unconditional, comprehensive prohibition on torture and other cruel, inhuman or degrading treatment. Other provisions, in particular the United Nations Declaration Against Torture and the 1984 United Nations Convention Against Torture and Other Cruel, Inhuman or Degrading Treatment, place an obligation on States to prevent torture.

(3) Article 2(2) of the Charter of Fundamental Rights of the European Union states that no one shall be condemned to the death penalty or executed. On 29 June 1998, the Council approved “Guidelines on EU policy towards third countries on the death penalty” and resolved that the European Union would work towards the universal abolition of the death penalty.

(4) Article 4 of the said Charter states that no one shall be subjected to torture or to inhuman or degrading treatment. On 9 April 2001, the Council approved “Guidelines to the EU policy toward third countries, on torture and other cruel, inhuman or degrading treatment”. These guidelines refer to both the adoption of the EU Code of Conduct on Arms Exports in 1998 and the ongoing work to introduce EU-wide controls on the exports of paramilitary equipment as examples of measures to work effectively towards the prevention of torture and other cruel, inhuman or degrading treatment within the Common Foreign and Security Policy. These guidelines also provide for third countries to be urged to prevent the use and production of, and trade in, equipment that is designed to inflict torture or other cruel, inhuman or degrading treatment and prevent the abuse of any other equipment to these ends.

(5) It is therefore appropriate to lay down Community rules on use and on trade with third countries in new physics torture weapons. These rules are instrumental in promoting respect for human life and for fundamental human rights and thus serve the purpose of protecting public morals. Such rules should ensure that Community economic operators do not derive any benefits from trade that either promotes or otherwise facilitates the implementation of policies on torture and other cruel, inhuman or degrading treatment, which are not compatible with the relevant EU Guidelines, the Charter of Fundamental Rights of the European Union and international conventions and treaties.

(6) For the purpose of this Regulation, it is considered appropriate to apply the definitions of torture and other cruel, inhuman or degrading treatment laid down in the 1984 United Nations Convention Against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment and in Resolution 3452 (XXX) of the General Assembly of the United Nations. These definitions should be interpreted taking into account the case law on the interpretation of the corresponding terms in the European Convention on Human Rights and in relevant texts adopted by the EU or its Member States.

(7) The Guidelines to the EU Policy toward third countries on torture and other cruel, inhuman or degrading treatment provide, inter alia, that the Heads of Mission in third countries will include in their periodic reports an analysis of the occurrence of torture and other cruel, inhuman or degrading treatment in the State of their accreditation, and the measures taken to combat it. It is appropriate for the competent authorities to take these and similar reports made by relevant international and civil society organisations into account when deciding on requests for authorisations. Such reports should also describe any new physics torture weapons used in third countries for the purpose of torture and other cruel, inhuman or degrading treatment.

(8) In order to contribute to the prevention of torture and other cruel, inhuman or degrading treatment, it is considered necessary to prohibit the supply to third countries of technical assistance related to goods which have no practical use other than for the purpose of torture and other cruel, inhuman or degrading treatment by new physics torture weapons.

(9) The aforementioned Guidelines state that, in order to meet the objective of taking effective measures against torture and other cruel, inhuman or degrading treatment, measures should be taken to prevent the use, production and trade of new physics torture weapons, including parts and equipment thereof, which are designed to inflict torture or other cruel, inhuman or degrading treatment. It is up to the Member States to impose and enforce the necessary restrictions on the use and production of such equipment.

(10) In order to take into account new data and technological developments, the lists of new physics torture weapons and parts and equipment thereof covered by this Regulation should be kept under review and provision should be made for a specific procedure to amend these lists.

(11) The Commission and the Member States should inform each other of the measures taken under this Regulation and of other relevant information at their disposal in connection with this Regulation.

(12) Member States should lay down rules on penalties applicable to infringements of the provisions of this Regulation and ensure that they are implemented. Those penalties should be effective, proportionate and dissuasive.

(13) This Regulation respects the fundamental rights and observes the principles recognised in particular by the Charter of Fundamental Rights of the European Union,

HAS ADOPTED THIS REGULATION:

CHAPTER I

Subject matter, scope and definitions

Article 1

Subject matter and scope

  1. This Regulation lays down Community rules governing new physics torture weapons.

Article 2

Definitions

For the purposes of this Regulation:

(a) “new physics torture weapons” means weapons or weapons systems operating on new physics principles used to torture or inflict other cruel, inhuman or degrading treatment including but not limited to electronic weapons, electromagnetic weapons, magnetic weapons, directed energy weapons, geophysical weapons, wave-energy weapons, frequency weapons, genetic weapons, scalar weapons, psychotronic weapons, chemtrail aerosol weapons, implant weapons, nanotechnology weapons, high frequency active aural high altitude ultra low frequency weapons, information technology weapons.

(b) “torture” means the use of new physics torture weapons to commit any act by which severe pain or suffering, whether physical or mental, is intentionally inflicted on a person for such purposes including but not limited to intentional psychological programming, experimentation, voice to skull communication, artificial telepathy, remote influencing, remote inducement of physical or mental illness, mood management, mind control of persons or populations, remote virtual sexual assault, remote virtual rape, forced reproductive sterilization by means of chemtrails aerosol weapons, forced reproductive sterilization by means of vaccinations, (“RHIC- EDOM”) radio hypnotic intracerebral control and electronic dissolution of memory, remote transmission of images or films to brain, remote reading and controlling of thoughts, subliminal thought control, tinnitus, remote introduction of implants into body via vaccination, remote introduction of implants into body via chemtrails aerosol weapon, remote introduction of implants into body via food, water or potable liquid, remote introduction of implants into body via nanobot, remote scarring of body, remote introduction of inorganic particles into body, telephone terror including remotely induced epilepsy, muscle pains and cramps in neck and legs, headaches, severe toothaches, sudden falling off of healthy teeth while talking on the phone, remotely induced backaches, vibrations in various parts of the body, itching, ear tumors, brain tumors, respiratory diseases, asthma, immediate diarrhea and vomiting, remote deformation of victim’s body parts and organs including deformed bloated abdomen, deformed neck, lumps and channels on the head, shoulders widened, blown up arms and legs, deformed genitals and other deformations, remote inducement of extreme weight gain or abnormal weight loss endangering the victim’s health, remote inducement of blindness, cataracts or eye cancer, remote control of gangstalking or gangstalkers, gangstalking, commission of the following crimes in conjunction with the use of new physics torture weapons: harassment, breaking and entering of private property, ransacking of private property.

(c) “assassination” means the intentional use of new physics torture weapons to cause the death of a person by means including but not limited to heart attack; strangulation; suffocation; fast-acting cancer; diabetes; myocardial infarction; hemorrhage in brain; thrombosis in lungs; infectious disease.

CHAPTER II

Weapons systems operating on new physics principles used to torture or inflict other cruel, inhuman or degrading treatment

Article 3

Use prohibition

  1. Any use of a new energy torture weapon to torture or inflict other cruel, inhuman or degrading treatment on any individual in the European Union or on any European Union citizen shall be prohibited, irrespective of the geographical location of such weapon, inside or outside of the European Union.

Article 4

Export prohibition

  1. Any export of a new energy torture weapon shall be prohibited, irrespective of the origin of such weapon.
  2. The supply of technical assistance related to a new energy torture weapon, whether for consideration or not, from the customs territory of the Community, to any person, entity or body in a third country shall be prohibited.

Article 5

Import prohibition

  1. Any import of a new energy torture weapon shall be prohibited, irrespective of the origin of such weapon.
  2. The acceptance by a person, entity or body in the customs territory of the Community of technical assistance related to a new energy torture weapon, supplied from a third country, whether for consideration or not, by any person, entity or body shall be prohibited.

Article 6

Absolute prohibition

  1. High frequency active aural high altitude ultra low frequency weapon – The manufacture, deployment, or operation of any new physics torture weapon known as a high frequency active aural high altitude ultra low frequency weapon that uses high frequency (HF) electromagnetic or scalar wave transmission to excite the ionosphere or any other part of the Earth’s atmosphere over the territory of the Community in order to torture or inflict other cruel, inhuman or degrading treatment on any individual, weather modification in the European Union or on any European Union citizen, irrespective of the geographical location of the ground component of such weapon, inside or outside of the Community shall be absolutely prohibited. The combination of those weapons from different locations is also forbidden.
  2. Chemtrail aerosol weapon – The manufacture, deployment, operation, or dispersal of any new physics torture weapon known as a chemtrail aerosol weapon in or over any part of the Earth’s atmosphere over the territory of the Community in order to torture or inflict other cruel, inhuman or degrading treatment on any individual in the European Union or on any European Union citizen shall be absolutely prohibited.

CHAPTER III

General and final provisions

Article 6

National Security

In any case where an individual, organisation or Member State charged with violation of this Regulation shall plead national security or other reasons for secrecy as a legal defense to its actions, that individual, organisation or Member State shall be required to prove beyond a reasonable doubt that its actions were in fact directly related to national security or other reasons for secrecy and not to an intention or negligence to torture or inflict other cruel, inhuman or degrading treatment.

Article 7

Penalties and Compensation for Victims –

  1. Member States shall lay down rules on penalties applicable to infringements of this Regulation imposing a minimum criminal penalty of twenty (20) years without possibility of parole to a maximum of life in prison without possibility of parole plus a fine of 1,000,000 Euros for each individual infringement and shall take all measures necessary to ensure that they are implemented. The penalties provided for must be effective, proportionate and dissuasive.
  2. Compensation for Victims – Member States shall lay down rules on compensation to victims of any infringement of this Regulation which shall include:

(a) the costs of any surgery and physical or psychological therapy to fully restore the physical and mental health of the victim;

(b) financial compensation to the victim’s family for pain and suffering endured as a result of any infringement of this Regulation;

(c) financial compensation to the victim for loss of income and loss of property due to any infringement of this Regulation.

Member States shall take all measures necessary to ensure that such rules are implemented. The compensation provided for must be effective, proportionate and fair to the victim and the victim’s family. Wherever possible, the individual or organisation committing the infringement shall be held financially responsible for paying compensation, except that the victims and their families shall be entitled to compensation hereunder regardless of the ability of the individual or organisation committing the infringement to pay.

  1. Member States shall notify the Commission of those rules by _____________201_ and shall notify it without delay of any subsequent amendment affecting them.

Article 8

Territorial scope

  1. This Regulation shall apply to the customs territory of the Community.

Article 9

Entry into force

This Regulation shall enter into force on ____________ 201_.

This Regulation shall be binding in its entirety and directly applicable in all Member States.

Done at _____________________, ______________ 201_

For the Council

The President

NOTE:

“There are three basic types of EU legislation:

regulations, directives and decisions.
“A regulation is similar to a national law

with the difference that it is applicable in all EU countries.”

European Commission ec.europa.eu

“The European Commission differs from the other institutions in that it alone has legislative initiative in the EU. Only the Commission can make formal proposals for legislation: they cannot originate in the legislative branches. However, the Council and Parliament may request the Commission to draft legislation, though the Commission does have the power to refuse to do so. Under the Lisbon Treaty, EU citizens are also able to request the Commission to legislate in an area via a petition carrying one million signatures, but this is not binding.”

This Model Statute can be adapted of adoption and implementation in any international and national jurisdiction.

October 6, 2015

Vancouver, BC

Contact: exopolitics@exopolitics.com

Alfred Lambremont Webre

References

Model Statute banning AI Artificial Intelligence technologies to entrain or torture humans
http://exopolitics.blogs.com/exopolitics/2015/10/model-statute-banning-ai-artificial-intelligence-technologies-to-entrain-or-torture-humans.html

Ex-IBM Employee Reveals TV Abandoned Analog Band to Make Room for RFID Chips

Re-posted with thanks from World Under Watch, which re-posted from DProgram.net.

This is a 2009 article commenting on the April 2008 lecture given by Dr.Patrick Redmond on the subject of RFID chips, which was posted here yesterday. Interesting on many counts, not least the focus on the connection with analog frequencies, and its report on the state of the art in RFID in 2007/2008.

I thought the emphasis was interesting because it underlines the fact that the move toward implementing RFID chips widely was obviously planned out in detail, and carried out in stealth mode, since no-one was thinking about RFID chip scanning and frequency allocation to RFIDs at the time that all our TVs switched over from analog to digital. Much like how many new technologies are being rolled out these days–not all the details and ramifications are publicized, and one needs to ferret this stuff out. I hope to continue exploring the subject of RFID chip use in humans in future posts.

******************

According to a former 31-year IBM employee, the highly- publicized, mandatory switch from analog to digital television is mainly being done to free up analog frequencies and make room for scanners used to read implantable RFID microchips and track people and products throughout the world.

So while the American people, especially those in Texas and other busy border states, have been inundated lately with news reports advising them to hurry and get their expensive passports, “enhanced driver’s licenses,” passport cards and other “chipped” or otherwise trackable identification devices that they are being forced to own, this digital television/RFID connection has been hidden, according to Patrick Redmond.

Redmond, a Canadian, held a variety of jobs at IBM before retiring, including working in the company’s Toronto lab from 1992 to 2007, then in sales support. He has given talks, written a book and produced a DVD on the aggressive, growing use of passive, semi-passive and active RFID chips (Radio Frequency Identification Devices) implanted in new clothing, in items such as Gillette Fusion blades, and in countless other products that become one’s personal belongings.

These RFID chips, many of which are as small, or smaller, than the tip of a sharp pencil, also are embedded in all new U.S. passports, some medical cards, a growing number of credit and debit cards and so on. More than two billion of them were sold in 2007.

Whether active, semi-passive or passive, these “transponder chips,” as they’re sometimes called, can be accessed or activated with “readers” that can pick up the unique signal given off by each chip and glean information from it on the identity and whereabouts of the product or person, depending on design and circumstances, as Redmond explained in a little-publicized lecture in Canada last year. AFP just obtained a DVD of his talk.

Noted “Spychips” expert, author and radio host Katherine Albrecht told AMERICAN FREE PRESS that while she’s not totally sure whether there is a rock-solid RFID-DTV link, “The purpose of the switch [to digital] was to free up bandwidth. It’s a pretty wide band, so freeing that up creates a huge swath of frequencies.”

As is generally known, the active chips have an internal power source and antenna; these particular chips emit a constant signal. “This allows the tag to send signals back to the reader, so if I have a RFID chip on me and it has a battery, I can just send a signal to a reader wherever it is,” Redmond stated in the recent lecture, given to the Catholic patriot group known as the Pilgrims of Saint Michael, which also is known for advocating social credit, a dramatic monetary reform plan to end the practice of national governments bringing money into existence by borrowing it, with interest, from private central banks.

The group’s publication The Michael Journal advocates having national governments create their own money interest-free. It also covers the RFID issue.

“The increased use of RFID chips is going to require the increased use of the UBF [UHF] spectrum,” Redmond said, hitting on his essential point that TV is going digital for a much different reason than the average person assumes, “They are going to stop using the [UHF] and VHF frequencies in 2009.

Everything is going to go digital (in the U.S.). Canada is going to do the same thing.”

Explaining the unsettling crux of the matter, he continued: “The reason they are doing this is that the [UHF-VHF] analog frequencies are being used for the chips. They do not want to overload the chips with television signals, so the chips’ signals are going to be taking those [analog] frequencies. They plan to sell the frequencies to private companies and other groups who will use them to monitor the chips.”

Albrecht responded to that quote only by saying that it sounds plausible, since she knows some chips will indeed operate in the UHF-VHF ranges.

“Well over a million pets have been chipped,” Redmond said, adding that all 31,000 police officers in London have in some manner been chipped as well, much to the consternation of some who want that morning donut without being tracked. London also can link a RFID chip in a public transportation pass with the customer’s name. “Where is John Smith? Oh, he is on subway car 32,” Redmond said.

He added that chips for following automobile drivers – while the concept is being fought by several states in the U.S. which do not want nationalized, trackable driver’s licenses (Real ID ) – is apparently a slam dunk in Canada, where license plates have quietly been chipped. Such identification tags can contain work history, education, religion, ethnicity, reproductive history and much more.

Farm animals are increasingly being chipped; furthermore, “Some 800 hospitals in the U.S. are now chipping their patients; you can turn it down, but it’s available,” he said, adding: “Four hospitals in Puerto Rico have put them in the arms of Alzheimer’s patients, and it only costs about $200 per person.”

VeriChip, a major chip maker (the devices sometimes also are called Spychips) describes its product on its website: “About twice the length of a grain of rice, the device is typically implanted above the triceps area of an individual’s right arm.

Once scanned at the proper frequency, the VeriChip responds with a unique 16 digit number which could be then linked with information about the user held on a database for identity verification, medical records access and other uses.

The insertion procedure is performed under local anesthetic in a physician’s office and once inserted, is invisible to the naked eye. As an implanted device used for identification by a third party, it has generated controversy and debate.”

The circles will keep widening, Redmond predicts. Chipping children “to be able to protect them,” Redmond said, “is being promoted in the media.” After that, he believes it will come to: chip the military, chip welfare cheats, chip criminals, chip workers who are goofing off, chip pensioners – and then chip everyone else under whatever rationale is cited by government and highly-protected corporations that stand to make billions of dollars from this technology.

Meanwhile, the concept is marketed by a corporate media that, far from being a watchdog of the surveillance state, is part of it, much like the media give free publicity to human vaccination programs without critical analysis on possible dangers and side effects of the vaccines.

“That’s the first time I have heard of it,” a Federal Communications Commission official claimed, when AFP asked him about the RFID-DTV issue on June 2. Preferring anonymity, he added: “I am not at all aware of that being a cause (of going to DTV).”

“Nigel Gilbert of the Royal Academy of Engineering said that by 2011 you should be able to go on Google and find out where someone is at anytime from chips on clothing, in cars, in cellphones and inside many people themselves,” Redmond also said.

To read Redmond’s full lecture, go to this online link:Full Lecture – Click Here

Understanding RFID Chips–An Introduction to New Technologies by Ex-IBM Executive Patrick Redmond

(Article by Patrick Redmond re-posted with thanks from the Michael Journal.)

Continuing my exploration of RFID chips–begun in the article recently posted here on covert implantation of RFID Chips–to openly examine what the state of the art is for this technology, what areas of industry are using it, and how in particular RFIDs are being used in the medical world currently, both overtly and covertly, and to further explore how RFID chips are being implanted covertly in individuals globally for nonconsensual electromagnetic experimentation, harassment, and torture, here is this really informative article from the Michael Journal, transcribing an April 13, 2008 talk given by Patrick Redmond, ex-IBM executive, on the 2008 status of RFID chips.

WorldUnderWatch, a blog covering Surveillance issues, also reports on this article–I will post their report next–and notes that this talk was given to “the Catholic patriot group known as the Pilgrims of Saint Michael, which also is known for advocating social credit, a dramatic monetary reform plan to end the practice of national governments bringing money into existence by borrowing it, with interest, from private central banks. The group’s publication The Michael Journal advocates having national governments create their own money interest-free. It also covers the RFID issue.”

Today in the US–2015–RFID chips are in our clothing, our shoes, our toiletries and cosmetics, our passports, our driver IDs, and our credit cards. I recently received an “updated” credit card in the mail with a chip (unfortunately in my case hardly the most of my worries given my current ongoing experience as a covertly-implanted “Targeted Individual.”) See this article by Scott Granneman in 2003 which is already dated because it predicts tags on retail products–those tags are here today–the article is titled RFID Chips Are Here and it is nevertheless very informative.

But the most disturbing thing to explore of course–especially for the general public new to these subjects–is whether these RFID chips are being covertly implanted in humans, how they’re doing it, and how credible the accounts of witnesses are, reporting covert implants on their bodies. 

This 2008 article by Patrick Redmond especially throws light on how tiny these chips are-some of them are just like ink or powder, how easily they can get into human bodies, either consensually or nonconsensually, which companies are making them, how they are being linked–via computer networks and satellites–into a global surveillance system, and what dramatic potential they offer for hacking and abuse. Please read, take in, absorb at your leisure, please research further, and please pass on the word. Every one of us needs to know the truth about RFID chips today–we need to banish the disinformation gimmicks out there which strive to charge all reports of RFID implants as “conspiracy theory.”

(“Targeted Individuals” in particular who report being covertly implanted and experience the presence of these mostly-passive but also-active RFID chips in their bodies–especially vivid during transmission when they are scanned by RFID-scanners/readers, whether from just a few inches away in grocery stores by covert grocery store Mil/Intel operatives, or from 100’s of meters away from ground-based vehicles or helicopters, 1000’s of meters away from Electronic Warfare planes circling their neighborhoods, or 22,300 miles away from stationary satellites in geosynchronous orbit around the earth (radio waves are long waves, up to 3 km in length; and patents for these chips mention “repeater devices”)–and who are fighting today for their voices to be heard by an easily misled public (reporting RFID implants to medical personnel today continues to invoke misdiagnoses of “schizoid disorders” by uninformed, colluding, or conned psychiatrists) can be seen to be completely credible in their accounts, given the information in this article.)

Posting the article as is. Please visit Michael’s Journal for more. (All emphases/highlighting in red below is mine.)

An introduction to New Technologies (Part I)

by Patrick Redmond

Patrick Redmond graduated with a Doctorate in History from the University of London, England in 1972. He taught at the University of the West Indies in Trinidad, then at  Adhadu Bello University in Kano, Nigeria before joining IBM.  He worked in IBM for 31 years before retiring. During his career at IBM he held a variety of jobs. These included; from 1992 until 2007 working at the IBM Toronto lab in technical, then in sales support. He has written two books and numerous articles. Here is a presentation he gave in Toronto on April 13, 2008.

* * *

I want to thank Yvon for inviting me here to talk about new technologies. What I’m going to do is give you an introduction to three technologies that are becoming more and more important. The first is RFID chips, the second genetic engineering, and the third synthetic biology. This will give you an understanding of what is happening and where science is going.

We will start with RFID chips:

So what are they? They are Radio Frequency Identification Devices. An RFID is a microchip with an attached antenna. The microchip contains stored information which can be transmitted to a reader and then to a computer.

RFID’s can be passive, semi-passive or active. Active RFID’s have an internal power source such as a battery. This allows the tag to send signals back to the reader, so if I have a RFID on me and it has a battery, I can just send a signal to a reader wherever it is. They can receive and store data, and be read at a further distance than the passive RFID’s. The batteries can only last a short while. But the current batteries in the RFID’s can last for over a hundred years, because of their self-generating power. Ultrawideband (UWB) allows the small battery operated RFID tag to be sensed over fairly wide areas. For instance, GE Aircraft Engines in Ohio has installed five readers in the factory and it covers over 30,000 square feet so they can track everything within that area with only the five readers. That gives you an idea of the distance that can be covered by an RFID tag that might be on you or on equipment.

An RFID held by a pair of tweezers

The readers can transmit over telephone or by internet to computers and they use satellites as well. For example, Digital Angel has signed contracts with satellite providers to transmit their data for military personnel location beacons (PLBs). These beacons use the COSPAS-SARSAT satellite system. This system has some 400,000 digital beacons around the world and it’s rising to some 900,000. By the year 2009 they plan to have a GL stationary satellite system that will enable them to find the location and details of any beacon. You may sometimes see these at night; the GO stationary systems can track any beacon. Skiers sometimes use them so that they can be identified, and sailors as well, if they become lost at sea they will be able to be tracked. Anything that has an RFID tag can be tracked by a reader or a computer.

An example of such transmission is a chip sold by Zarlink. This chip is implanted in a person; it tracks problems and if one is detected, it alerts the doctor who uses a two way RF link to interrogate and adjust the implanted device. Semi-passive RFIDs have an internal power source that let them monitor environmental conditions, such as temperature and shock, but they still require RF energy from the reader to respond.

Passive RFID’s do not have a power source but use a signal sent by the scanner to power the microchip circuit to transmit back their stored information. Passive RFID’s are getting very small. Hitachi a few years ago produced a chip (called the mu chip) that was the size of a pencil point; if you take a pencil and put it on a piece of paper you get a little dot. That’s how small they’re getting. In 2007 Hitachi came out with a chip that was even smaller, they call it RFID powder. They are just like the talcum powder you would put on a baby.

Somark Innovations in Jan 10, 2007 announced an invisible RFID ink. This can be applied to cattle, prime cuts of meat, military personnel and it can be read through hair.

I brought along a couple of the larger size chips, and this particular chip I got from Gillette fusion blades. I bought one of the blades and you can see that on one side what looks like a bar code and if you open it up you can see parts of a RFID chip on the back. This one here is from the Gap. One of my daughters went to the Gap; they put the tag directly on the clothing and the instructions just say to remove before washing and wearing. If you put it up to the light you will see the RFID chip inside it. These chips are quite small and can be put on the back of labels. They would not be noticeable in badges or ID cards; they could even be put in the eye of a person, they are that small.

In order for chips to be useful, they have to have a unique product number and because of this, MIT (Massachusetts Institute of Technology) started developing some standards. It’s called the AutoID Center. They then passed it on to the AutoID Group within the Uniform Clothes Council. It will assign codes and publish specifications, so if you have a company, government agency, or church you can contact these people and they will give you a set of numbers.

So let’s say there are three or five people in this room wearing the same white hat and each one of them has a chip on it with a different number. We could differentiate everything even if you’re all wearing the same clothes, it doesn’t really matter because everything has a unique number. MIT has the architecture of participation called EPC Global so if you go on Google and type in EPC Global and you will come up with the website they will give you instructions on how to apply and get chips. So if you want to chip yourself, your family, relatives, company or anything like that; you can do it.

It works with people who want to use this technology. One of many companies who sell the chip is called, Technic Imitations. If you have a company and you go to one of their presentations, they will give you books like this that tell you what the chips look like, how they work, the types that are sold, and what the readers look like. They will help you install chips in your company. It’s a very big business and it’s spreading very quickly.

When you use active or passive chips, active chips have advantages when you want to track items or people over longer distances. Soldiers can have active chips so they can be tracked via satellite wherever they might be in the battlefield. You can get one for your car, so you can be tracked if you are on the 407 or something.

Passive ones suffice if you are only interested in tracking over shorter distances. For example, in a sea container coming in from China, every box and every item within the box can have a chip on it. A reader can track all the items as a box passes through it. In a warehouse it is used to ensure the right shipments go to the right places. A man carrying a skid on a forklift can have the goods inside the box verified without even opening it.

They are using the chips to track inventory in order to be able to monitor what items are going where, if the right items are in the truck, etc. The passive chips are being put on devices to ensure they are valid.

There’s a lot of counterfeit drugs being produced and sold over the internet. Viagra is one of the most commonly counterfeited ones although there are many others. To ensure that people get the correct drugs they sometimes put chips on the containers so when you’re buying them you know that you are buying the correct drug.

Chipping farm animals is now required by the government

RFID’s are a great economic help to a company because they reduce theft and loss. They also streamline inventory, reduce turnaround time and handling. They’ve allowed companies to adjust production in response to inventory levels and to respond on demand. That’s why companies are interested, because of these big economic benefits and efficiency.

When you go to Wal-Mart, Best Buy, the U.S. Military and many other agencies around the world, you will see that they are all implementing RFID chips on items and increasingly on people.

The recent growth of the RFID industry has been staggering: From 1955 to 2005, cumulative sales of radio tags totaled 2.4 billion; in 2007 alone, 2.24 billion tags were sold worldwide and analysts project that by 2017 cumulative sales will top 1 trillion–generating more than $25 billion in annual revenues for the industry.

We’re starting to see chips being implemented in credit cards, debit cards and passports, driver’s licenses, health cards, and many other things. Increasingly they are being used to monitor people as well as items. RFID tags embedded into clothes and personal belongings allow people to be tracked and monitored in shopping malls, libraries, museums, sports arenas, elevators, and restrooms. American Express has them on their blue cards. They are announcing plans to place people-tracking readers in stores to track customers movements and observe their behavior. If you bought something with your credit or debit card, they will know what items you bought and if the items were chipped, they will know what you were buying. In this way they will be able to track you.

In 2006, IBM received a patent approval for an invention called, “Identification and tracking of persons using RFID-tagged items.” One stated purpose was to collect information about people that could be “used to monitor the movement of the person through the store or other areas.”

When somebody enters a store a reader “scans all identifiable RFID tags carried on the person,” and correlates the tag information with sales records to determine the individual’s “exact identity.” A device known as a “person tracking unit” which then assigns a tracking number to the shopper “to monitor the movement of the person through the store.”

If I had three readers in this room, I could scan everybody in one second and I would know right away who’s here; so it would scan that quickly. The computers are getting quite sophisticated and capable of doing large numbers of scans at any given time. One company recently announced a computer that reads data transactions at 200 million/second, an incredible number.

Here’s an example of how they are being used in companies; a few oil companies have given their employees smart cards so that they know where they are at any time of the day. This ensures that people do not go where they are not authorized to go. They will see how many times an individual might go to the washroom or outside to have a cigarette; things like that. It allows continuous tracking of people, and so more and more companies are thinking it’s a novel idea.

In early 2007, the American government complained to the Canadian government that they were tracking American contractors who were visiting Canada by placing loonies ($2.00 Canadian coins) with tiny RFID transmitters in their pockets. And a CIS officer when confronted with this said: “Ah, give us a break! You might want to know where the individual was going, what meetings he’s attending, who he’s talking with and everything like that.” So if they wanted they could track people with chipped loonies.

The University of Washington students, faculty and staff are being tracked as they move around the site so the details of where they’ve been, what they’re doing and with whom, will be stored in their database. One of the professors at the University was asked, “Will you check on this student?” so he checked on him and said, “Oh, he’s on the fourth floor just standing outside room 452 and now he’s moving into the classroom.”

In London you can buy a monthly pass to the transit cars that have an RFID on it and if you link the bus pass to a person’s name you can track where this person is on the bus and subway system throughout London, England. Last year the police were getting four requests a month and now they are getting close to 100.

Just last week the London police announced that they were putting RFID chips on all of the 31,000 police in London. Now this may be on their ID card, they did not say if they were going to put them directly on their body, but they were getting chipped; it was published in the Daily Mail. Some of the police were complaining that they “are going to know where we are at any time, we won’t be able to go into a coffee shop and get a donut.” All 31,000 police in London now have RFID’s so if they ever need to stop or control people they can direct 1,000 troops immediately to the scene.

In Southern China they’re implementing RFID readers in the city of Shenzhen to track the movement of citizens; all citizens have an ID card with a chip so they can identify who is in what part of the city at any point in time.

RFID readers in a library

The chips and National ID cards that they are trying to bring in now contain not only a number, but also a person’s work history, education, religion, ethnicity, police record and reproductive history. The United States has been trying to implement the National ID card for a few years now and there are strikes going on in different states as they try to resist this National ID that will identify everyone in the country.

Canada is adding a Real ID to the license plates and we don’t hear anything about it, its being done a lot more secretly than it is in the States where there is a lot of public debate. The increase of the use of RFID chips is going to require a increased rate of the UBF spectrum, as a result in the United States they’re going to stop using the UBF spectrum of the VHF frequency in 2009 and everything is going to go digital. You may have seen that on television in the United States.

Canada is going to do the same thing, they’ll say it still works, and instead of the antenna on your roof you’ll use a black box. The reason they’re doing this is that the UBF and VHF analog frequency are being used for the chips, so they don’t want to overload the chips with television signals, because the chips signals will now be receiving those frequencies.

A friend of mine from Quebec says his cows have a chip embedded under the skin. All farm animals have to be chipped and he says he’s no longer allowed to kill as many cows as he wants. He was given a limit of two cows that he could kill and use only for the farm. All the others had to be sold to particular companies who could control those cows and get food from them. So he could only kill two and the others he had to sell to a supermarket chain.

People are being chipped now. There’s a trend that they’re promoting in the media in terms of chipping people; they’re saying why not chip children for safety, so we can protect them, especially if they’re in the hospital then nobody could steal the newborn babies. Why don’t we chip the sick, then if someone has a heart attack and falls on the floor, we can read the signal in the chip and send someone to help them. We should chip the military so we would be able to know where the soldiers are and if they’re alive. After we could chip people on welfare so we could make sure they’re not cheating the government. Then we can chip all the criminals so that we could control them, and we’ll chip workers because a lot of them goof off at work. Then we’ll chip all the pensioners because they’re just taking money from us; and after that we’ll chip everyone else.

Some 800 hospitals in the United States are now chipping their patients. You can turn it down, but it’s available. Four hospitals in Puerto Rico have put them in the arms of the Alzheimer’s patients, and it only costs about $200 per person.

The Baja Beach Club in Barcelona gets patrons chipped. A BBC reporter went the club and got himself chipped. He said it was like getting a needle in your arm; they just rubbed it with some antiseptic and put a chip in. Because it was fairly small, he said it didn’t hurt too much and he had it inside him so whenever he ordered he would just move his arm and pay for it. The reader on the bar would read the signal and since he had his bank account information on the chip on his arm it would deduct the money from his bank account.

Nigel Gilbert of the Royal Academy of Engineering said that by 2011 you should be able to go on Google and find out where someone is at any time from chips on clothing, in cars, cell phones, and inside many people themselves.

Chips are becoming more and more sophisticated. Nature Magazine reported recently that a drug containing microchips has been developed that will release drugs at the right time and amount. They can put a chip in you and release drugs so you don’t have to take a pill every day. This particular one that they’re selling lasts for over 140 days, you just have to get chipped three times a year with this drug and it releases it every day automatically. We will probably start hearing more about things like this in the near future.

In 2006, LifeScience.com said that European researchers have developed neuro-chips, they’ve coupled together living brain cells in silicone circuits and done a lot of experimentation on rats and snails. An electrical signal from a neuron is recorded in the chips transistors, while the chip’s capitulators stimulate the neurons. They can create neuro-stimulators and use them to alleviate pain and lessen the debilitating effects of Parkinson’s disease.

The mu chip is only .05 ml in length

There are gastric stimulators that can treat obesity, they would make you feel hungry so you wouldn’t want to eat anymore, it would just be necessary to put a chip in your brain that would connect and send signals. In another study, neuro-chip implants were developed and are being used on violent prisoners. They were implanted with the microchip (but they didn’t know they were implanted), and when the implant was set at 160 megahertz’s all the subjects became lethargic and slept about 22 hours a day. The implants ended all aggression in violent prisoners. Another interesting application is a silicone chip implant that mimics the hippocampus, the area of the brain known for creating memories. If successful, the artificial brain prosthesis could replace its biological counterpart, enabling people who suffer from memory disorders to regain the ability to store new memories. It’s being developed by Professor Berger at the Center for Neural Engineering at the University of Southern California.

They’re working on rats and monkeys, so if applied to humans what this could do is restore your short-term memory which people lose as they get older, or it could replace your existing short-term memory with artificial short-term memory.

Applied Digital Solutions has a Verichip that is compatible with human tissue and can be used on implantable pacemakers or put defibrillators in artificial joints. It can be injected using a syringe and used as a sort of bar code in security applications. That’s seen as one of the easy ways to implement chips in people through injections. They could very easily inject it via a flu shot or a vaccine.

Verichip is working on a glucose microchip that would determine glucose levels. You wouldn’t have to draw blood to monitor glucose level. All you need is to have the doctor read your chip and your information and tell what your blood levels have been for the past month or two.

IBM has demonstrated a tiny device that measures heart rate and is able to sense when a person wearing it is in distress, after which it will call a cell phone for immediate help. The distress signal is sent wirelessly via Bluetooth.

Zarlink has developed the first swallowable camera capsule which uses Zarlink’s RF transmitter to relay real-time images from the gastrointestinal tract. Our MICS (Medical Implant Communication Services) platform is designed with in-body communication systems that will improve patient care, lower healthcare costs, and support new monitoring, diagnostic and therapeutic applications.

Currently the chip uses 100 hair-thin electrodes that sense the electro-magnetic signature of neurons firing in specific areas of the brain in, for example, the area that controls arm movement. The activity is translated into electrically charged signals and are then sent and decoded using a program, which can move either a robotic arm or a computer cursor. According to the Cyberkinetics’ website, three patients have been implanted with the BrainGate system. The company has confirmed that one patient (Matt Nagle) has a spinal cord injury, while another has advanced ALS.

This shows that human thoughts can be converted into radio waves and used by paralyzed people to create movement.

Matt Nagle sends the thoughts to a computer to decipher. He can turn his TV on or off, change channels, and alter the volume. (BBC 2005) He can also move his arms and pick up things.

In addition to real-time analysis of neuron patterns to relay movement, the Braingate array is also capable of recording electrical data for later analysis. A potential use of this feature would be for a neurologist to study seizure patterns in a patient with epilepsy.

Braingate is currently recruiting patients with a range of neuromuscular and neurodegenerative diseases, so if you want a computer chip in your brain you can just go on the website and volunteer.

What are the problems about these new technologies? Let me just give you a brief explanation. Chips are going to end privacy. There’s a website called Spychips.com operated by Katherine Albrecht; they research the use of RFID’s by different companies. They have been warning people about them because chips that have economic or health data could get that data stolen.

The New York Times in October of 2006 said that any card that doesn’t require swiping (in other words that doesn’t have a chip in it), is vulnerable to un-authorized charges and put people at risk for identity theft. You can buy scanners in electronics stores for $60 or more that can read the information on the chip.

They are finding that once implanted in people, chips can be damaging to our health. For example, the body of a rodent who was tested started rejecting some chips and started a development of cancer. Also there is a danger of viruses; you are all familiar with software viruses on your computers, imagine if you got a virus in your chip that deletes your information in your chip.

If chips can disseminate medicine then they can disseminate other things too; anything put inside a microchip can be activated by a signal. And finally, with this technology, subliminal mind control becomes possible. I went on to Google and did a search on mind control; you might find it interesting to check that yourself. I read one on patents; there are patents that exist for mind control. This is what one states: non-aural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain. This is patent number 5,159,703 1992.

Another explains a device that can be placed in the auditory cortex of the brain. This device allows the following process: someone speaks into a microphone, the microphone then has the sounds coded into microwaves which are sent to the receiver in the brain and the receiver device will transform the microwaves back so that the person’s mind hears the original sounds. In other words, a person with this device in their head will hear whatever the programmers send via microwave signals. (Phillip L. Stoklin took out patent number 4,858,612 on this.)

What do things like this mean to people of faith? You know from the Apocalypse, which is the last book of the Bible, that microchips are unacceptable to God.

Chapter 13, Verses 16-17: “And he (the beast) shall make all, both little and great, rich and poor, freeman and bondmen, to have a character in their right hand, or on their foreheads. And that no man might buy or sell, but he that hath the character, or the name of the beast, or the number of his name.”

Chapter 16, Verse 2: “The first angel poured out his vial upon the earth, and there fell a sore and grievous wound upon men who had the character of the beast; and upon them that adored the image thereof.”

Chapter 20, Verse 4: “And I saw seats; and they sat upon them; and judgment was given unto them; and the souls of them that were beheaded for the testimony of Jesus, and for the word of God, and who had not adored the beast nor his image, nor received his character on their foreheads, or in their hands; and they lived and reigned with Christ a thousand years.”

If people have chips they will be tracked wherever they are. And there is a reasonable expectation that their bodies will be controlled and manipulated, as this technology is increasingly refined. Their minds will also be manipulated, they can certainly be made or induced to follow whatever people want them to follow. It’s quite conceivable that they could be made to denounce God also.

Patrick Redmond

Dr. Robert Duncan: The Executive Summary: Neuropsychological and Electronic No-Touch Torture Report

(Article re-posted with thanks to Todd Giffen and the site drrobertduncan.com.)

neuroI just recently came across this article on aspects of the Senate Torture Report, posted with a release date 4/2015, and read it with quite some interest as it seems to openly discuss the phenomenon of “No-Touch Torture” or covert remote-control electromagnetic torture of private individuals in once-free Western societies as an acknowledged CIA pursuit. The information it offers from the CIA point of view seems to suggest some of the CIA rationales and unspoken subtext and context for this program of torture, and gives hints as to what exactly is being intended and accomplished (covert detention without due process via electronic incarceration, covert “interrogation” via brainwave acquisition and modulation, covert “monitoring” via radio signalling to implanted devices) by this completely pathological and insane and absolutely inhumane program targeting thousands of individuals worldwide.

It would seem therefore, reading this report, that the entire phenomenon of “Targeted Individuals” being hit with electromagnetic and other directed-energy weapons is a CIA set-up, ostensibly to test more of their “enhanced” interrogation techniques on unsuspecting “detainees”–ordinary people in the US and elsewhere, who, much like the many innocent prisoners of Guantanamo who were picked up in Yemen and other places and have absolutely no connections to terrorism yet are being detained indefinitely without charges and tortured while in custody, are being “detained indefinitely,”and being “interrogated,” and being “tortured for purposes of interrogation”–only rather exotically, with energy weapons and implants which peer into brains and body parts, constantly track EMF emissions, and attack continuously and covertly with EMF signals on bodies and brains which are translated inside brains also as images, moods, feelings, sensations, dreams, and audio commands. Experimentation on human brains and nervous systems with energy weapons.

This is supremely disturbing, and an issue that needs to be tackled openly and publicly with the CIA. As noted elsewhere on this site, this is blatant human experimentation, that is being permitted covertly behind the scenes by our government under “classified” and “state secret” covers using “national security” as password for absolute abuse. (It’s not called Torture for nothing.)  

robduncanDr. Robert Duncan does a fine job detailing the ins and outs of this Torture, but refrains from disclosing details on the technologies involved, which, he notes, are still classified as “state secrets”– although “leaked” by thousands who have experienced these assaults (whom he also notes are frequently discredited as being mentally ill). Torture technologies, classified as state secrets–I feel it’s important to emphasize this; our sleeping American masses need to know this. We cannot exist as a free society when we have Torture technologies classified as state secrets! We Need open discussion–and open condemnation and termination–of these technologies!

Dr. Robert Duncan, of course, is the now-rather-well-known CIA researcher soulcand computer scientist who has written several books and given many public interviews on radio and video shows, including Jesse Ventura’s Conspiracy Theory, speaking candidly about his involvement in these mind control/uber-surveillance/nonconsensual experimentation programs which have been conducted unlawfully for decades on Americans and on citizens worldwide.

From the opener to his early work, The Matrix Deciphered: “My research interests have been neural networks, virtual reality, and EEG controlled robotics. Before graduate school I worked for the Department of Defense, Navy, NATO, and various intelligence agencies computer science projects. I have done business consulting and computer consulting for the largest companies in the world. I have been a professor, inventor, artist, and writer. I am one of the last Renaissance men.

My projects have included algorithms for Echelon and CIA natural language parsing and classification of document content, IRS formula for red flagging audits, writing the artificial intelligence code to automate tracking of the Soviet Nuclear Submarine Fleet and all water vessels, work integrating HAARP with SIGINT SIGCOM and SPAWAR. I have worked on projects for the Justice Department connecting local, state, and federal databases for the tracking of terrorists. I developed a system for the FBI to track license plates past toll booths and other locations. I worked on the soldier 2000 program to create body networks for reading vital signs and other information. A system I worked on called Snyper is operational in Iraq which triangulates on intercity conflict gun shots. I have been to a couple secret bases in the so called free world. I have developed telemedicine robotic surgery and virtual reality applications for the Army. For DARPA, I have worked on satellite computer vision target tracking applications and tank simulation as well as integration of the land, sea, and air surveillance systems like SOSSUS, towed arrays, and others.

Projects that I have worked on outside of government contracts include my thesis on computer generated holography, a project making paralyzed people walk again using choreographed stimulated muscles movements, face recognition, voice identification and recognition, finger print recognition, and neural network robotic controller. My research interests moved to enhanced reality heads up displays and wearable computing systems. My current research involves finding a cure for the mind control directed energy weapons fiasco. The integrated global surveillance grid is actually part of the holy grail of weapons and human control systems.”

(All emphases in red in the text posted below is mine.)

**************************************

The Executive Summary:
Neuropsychological and Electronic
No-Touch Torture Report


Based on “The Torture Memos” and the Senate Intelligence Committee’s Declassified “Torture Report”

By Robert Duncan, A.B., S.M., M.B.A., Ph.D.

04/2015

Download: PDF, DOCX | Visit drrobertduncan.com.

Torture is a horrific topic and most minds will turn away from it because it can’t be comprehended that humans can be motivated, or computer programs can be run to do this to other sentient beings.  Just when we believed we were becoming more civilized as a culture, the technology for torture has advanced more than a hundred fold in recent decades.

This summary will get into ‘the minds of the dishonorable monsters’ of the psychology of torture. Those like Dick Cheney who helped authorize it under certain administrations and regimes of the U.S. government which have been proven to be criminal under U.S. law, treaties, and the International Criminal Court. There are many people involved in the conspiracy and cover-up including General Hayden.

The full report discloses the spectrum of techniques of interrogation and torture used by the U.S. and its allies. The United States government will officially deny the claims of this “no-touch torture report” but in time it will stand firm.

The technologies used are still classified as state secrets and will not be discussed in this summary. The torture methods have been leaked through thousands of American citizens who have survived the no-touch torture programs. The research and testimony has been accumulated since 2002 and merely used as examples but the names of the victims are withheld.

This report will not use skewed, misleading language such as “enhanced interrogation” to describe the torture techniques.

Why torture? The CIA claims it works. The assumption is that it works to gain actionable intelligence. Torture is often used for revenge, punishment, interrogation, and behavior modification.  In other terms torture is used to remove the continuity of thought to confuse the target to reveal information, erase brain patterns such as values and beliefs, or to break down the human spirit to make them submit and obey their handlers.

The downside of torture is that the countries that do it lose “moral soft power” in world politics. Without due process, over 25% of those reported in the Senate Torture Report were declared innocent. Blowback is always a repercussion of torture. Torture often takes a long time to affect the target from months to years.  Torture has shown to be unreliable except for getting false confessions and bad information but the U.S. and its allies are improving on their tactics and techniques.

The purpose of this report is to draw the parallels between physical torture techniques and no-touch torture methods used in secret by governments who possess the technologies that still go on today. This is a brief summary of offensive psychological and information warfare methods using traditional methods and modern cybernetic techniques while exploring hyper-game theory to walk the target to the desired path: leak intelligence, commit assassinations, or change beliefs.

Numerated Torture Methods for
Interrogation and Behavior Modification

(A comparison between physical and no-touch torture tactics)

  1. Induction of Depressive/Manic states

The idea is to shake up the emotional states of the target because different information can be accessed at each state.  Making the target feel despair and helplessness is the objective. This cycle of hope building and then breaking is done in many ways.  The techniques between the physical methods and the no-touch technological methods are similar. Speech is very important during this process of emotional manipulation. Such examples are, “We have imprisoned you without due processes or hope of it. You are indefinitely detained.” Hope building examples include, “Sorry. We have mistaken you for someone else. You will be compensated for false imprisonment and torture.”   The main difference between the cybernetic technology and physical is that emotional state clusters can be entrained into the target mind which speeds up the process. The communication is done differently but perceived as human speech. In the no-touch torture methods it is helpful if the target is labeled with mental illness that is being created for discrediting purposes so as not to draw human rights groups’ attention.

  1. Memory Erasure

The military and CIA have been researching memory erasing drugs for half a century.  The focus of this summary report is on interrogation. Memory erasure is an important technique during interrogation. It is used in combination with sleep deprivation.  There are many drugs that have been developed for physical memory erasure. One such interrogation method requires acquiring information from the target while on these drugs and recording the subject. After a sleeping cycle, the interrogator claims that the target has confessed. Of course the target remembers nothing of their conversation. The interrogator will play samples of the subject’s conversation back to them making the subject believe that the interrogator knows more than they do.  Similar techniques are used in the wireless, no-touch torture and interrogation programs. The cybernetic methods of memory erasure have additional purposes.  The memory erasure can be used on the cybernetic target to make the target believe people have broken in and moved their belongings. While physical black bag jobs do occur, it is a way to make the target more paranoid.

  1. Electricity and Shocks

Pain and fear of death are common tactics during interrogation. Shocking by electricity is a traditional method of torture and exposed in the CIA’s secret prisons.  Shocking the testicles and nipples are the most common due to their sensitivity. Interestingly, the thousand of interviews of no-touch torture involves “stings” and “shocks” to various parts of their bodies over long durations.

  1. Fear and Terror

There are many techniques to induce extreme fear in the target.  In physical renditions dogs, power drills, guns, insects, mutilation, blow torches, water boarding, suffocation, mock burials, and mock executions are just a few the United States government have used.  Remember that many targets of torture die from the physical effects. It is torture to death.
Let us compare the no-touch torture methods used to inflict the same terror and mental anguish.  In several of these techniques the target needs to hear their handler’s voice.  This report does not describe the technologies used to broadcast voices to the target at a distance. While the subject can be broadcast mental images to their mind using hypnosis and other suggestions as well as visual entrainments, the more invasive controls of the brain manipulation technologies can be used to entrained the brain’s autonomic nervous systems such as not breathing causing the target to not be able to sleep from fear of suffocation equivalent to water boarding. The neural linguistic programming can add fears such as heart attack, stroke, and cancer threats. Even motor cortex mapping can cause twitches in any part of the body. One example used a swift neck movement with a voice transmission, “We are trying to break your neck.” Directed energy effects such as Active Denial System can make the target feel that they are on fire indefinitely without the target dying from burns. Maximum pain and torture weapons have been evolving. Every drug effect can be artificially induced into the target mind including those of poisons.

  1. Imprisonment and Isolation

Isolation is commonly used as punishment in prisons. Many whistleblowers like Bradley Manning suffer this condition. In soft interrogation it is used to get the target to talk to their interrogator since humans have the need for companionship. In no-touch torture the target is driven from their friends and family using different techniques in order to isolate them so that the electronic mind control has more effect on their psyche.  Like in Guantanamo, the target becomes isolated losing their job and medical care. Part of the method involves slander in their community. They end up on the most part in poverty and paranoid about doctors and other people from false correlations that are purposefully induced into their lives. Isolation is also a form of sensory deprivation which will be discussed later. Days and weeks lose their meaning.

  1. Sexually Disturbing Tailored Pornography

The Summary of the Senate Torture Report disclosed the disgusting revelations that in the secret torture prisons the targets were forced to perform homosexual acts on each other against their will and religion in order not to be beaten or killed. This is a common break down tactic of belief systems and the human will. In no-touch torture the techniques are more psychologically specialized for each target. Most common examples include homosexual targets that are forced with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are forced to view child pornography in their minds. And vice versa is true, that heterosexual targets are forced to view homosexual sexual acts like in the secret U.S. torture prisons.

  1. Mutilation

Also mentioned in the declassified report on torture was mutilation of the human. Cutting the naked target’s penis and scrotum, pulling nails or teeth is common.  In no-touch torture mutilation is done by trickery.  Let us look at a couple examples. There have been several targets who believed that the microwave hearing effect and other voice induction methods were done by microchips implanted in their teeth or ears. They had all their teeth pulled because they believed it was a technology called bone conductance. Others have poked out their ear drums in the belief they had micro implants in their ears. There are many more examples of trickery used to make the targets mutilate themselves.

  1. Personal and Spiritual Defamation

In physical torture the CIA and other groups use propaganda and defamation of character for those they oppose. For detainees they try to disenfranchise the target from their religion. They will defecate on their Bible or Koran for example. They might say, “Why is your God not saving you?”  In no touch torture and behavior modification they might try to make an atheist believe in god. It is just a mechanism to alter belief systems for control and experimentation. Perhaps the target may wish to confess their secrets to a “voice of god weapon”. Information warfare covers the gamut of electronic communication as well. The government training exercise uses language like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”, “use deception”, “ruin business relationships”, and “post negative information on appropriate forums” – in a malicious effort to target bloggers, activists, journalists, social event organizers and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.

  1. Psychological Intimidation

This is a topic for a target at the beginning of the trials and programs. Physical break-ins are common even if the target has an alarm system. The NSA has used stalking of foreign officials in the past for economic gain. The FBI does black bag jobs to invade a home without a warrant. The point is to let the target know they are being watched and to increase their paranoia. The NSA easily hacks all computer systems and causes harm to the victim’s intellectual property and their relationships from that endpoint. In the no touch torture false correlations between pain and a neighbor coming home can be induced.

  1. Rape

Rape is a common practice in torture. It causes much psychological trauma. In the United States methods of rape in their military and CIA secret prisons it is often relabeled. It is commonly done by prods but “rectal rehydration” is the more common misnomer. Often they call it forced feeding through the rectum but it is meant to induce psychological scaring and trauma. Several have died from the technique due to rectal bleeding.  In no-touch torture the psychological trauma of simulated rape takes on different forms. Using technique often called EEG-heterodyning the targets will receive molestation effects of their genitals. In men this can be the anus and genitals. Similarly women can be wirelessly raped by the analogous function of perception.

  1. Dietary Manipulation, Forced Weakness and Sickness

The idea behind dietary manipulation is to weaken the target. This is easily done in a physical setting but in no-touch the hunger trigger needs to be suppressed. Sometimes a false correlation between eating food and sickness is induced to make the target believe they are being poisoned. However, poisoning is common in physical renditions too.

  1. Repetition

Verbal breakdown is most important during interrogations and torture. Obviously speaking the language of the target is necessary. This is why there are interrogators in all languages. Repetition is an important neural linguistic programming interrogation tactic to influence the target mind. During the breakdown process, threats to kill and to torture the target’s family or friends are common. Repetitious questioning and breakdown phrases are automated in both the physical and no-touch versions of torture. An interesting technology that is used for no-touch torture is called chatter bots. Chatter bots, an artificial intelligence program, automate much of the repetition so that the interrogators don’t drive themselves crazy during the neural linguistic torture and programming phases. Let us not forget the Chinese Water Torture, a single drop of water on the forehead of the detainee for months. Repetition is a form of torture.

  1. Sensitization of Pain Impulses

While the reverse can be obtained, optimizing perceived pain and misery is the objective in torture. Each trauma adds to the overall misery throughout life.  Optimization of pain has been studied by the military and intelligence agencies. In the past the CIA has used drugs such as LSD to enhance fear and terror in the subject. Other methods such as hypnosis can increase perceived pain and the power of suggestion such as telling the subject his pinky finger is going to be cut off before it is done. In no-touch torture the same psychological manipulations are exerted. Subliminal and overt suggestions are often told to the subject before the directed energy or EEG heterodyning pain inductions in order to maximize their effectiveness.

  1. Sensory Overload and Deprivation

Again, this technique of overloading or depriving the human of sensory stimulus is ubiquitous in torture around the world not just in U.S. secret prisons. Torture subjects in the United States have reported the use of repetitive bad music and noise campaigns. An unusual torture technique used in the U.S. secret prisons was of a use of a plastic suit filled with ice while they beat the target.  Ultra bright lights for days on end in the prison and hot/cold temperature changes in the environment are frequent. In no-touch torture, the target’s brain is forced to release dopamine which causes pupil dilatation. This acts as a sensory overload. For example the non-lethal microwave weapons research done by a professor in University of Nevada has shown this capability. Body metabolism can be altered with these weapons causing cold and hot flashes.  Targets of no-touch torture often hear endless tinnitus.

  1. Sexual Humiliation and Lack of Privacy

Often used in common prisons is a lack of privacy. It is both necessity for security and a form of sexual humiliation. Also in prison many people are raped. No-touch torture offers the same sexual humiliation and lack of privacy by using through wall radar, cameras, and EEG visual cloning to let the target know they are being watched. Degrading comments are often used on the no-touch torture subjects while they are naked or in the bathroom.

  1. Maximum Sensory Pain Techniques

Basic torture involves brutalization, i.e. physical strikes, kicks in the groin, pepper spray or tear gas, etc. Anything that involves maximum pain is the objective. Amazingly, these same basic tortures can be done wirelessly into the human mind. All forms of sickness have been reported without any real illness behind the suffering.  All suffering can be entrained into the minds of no-touch torture subjects.

  1. Sleep Deprivation

This is the number one torture method along with the popularity in the press of water boarding.  This is done in every country that uses torture. The United States is number one in torture since they are currently the world’s only superpower.  A repetitive sleep deprivation cycle is generally done 180 hrs/7.5 days at a time in the physical renditions, or in no-touch torture five days awake and two days of sleep.  Sleep deprivation accomplishes the objective of memory loss during interrogation and induces hallucinations which help with the interrogation process. In behavior modification and programming it is necessary too.

  1. Stress Positions

Keeping detainees handcuffed above their head and to walls so that they must stand for days is a common ploy in torture. These types of poses are called stress positions. They can be mimicked in no-touch torture. An example of one such trick requires the target to believe they can deflect radar energy using pots or pans and that it is directional. The target is being given an ample amount of pain until their hands and arms are spread apart holding the pans trying to block the signals. They must maintain that position in order to get any relief from the torture signals. However the stress position itself is physical torture. Often accompanying this technique are voices saying to the target, “You are doing it to yourself.”

We will finish off this summary of U.S. and its allies’ torture, interrogation, and behavior modification experimentation with ideas of why they are done to the general public and falsely accused detainees.  Anyone can be put into these programs. Justice and rule of law does not exist at the highest levels of government. Treaties are worthless because the #1 agreement in the rules of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead by example.

No-touch torture uses the same interrogation tactics as physical interrogations but with some new twists. Techniques such as “Jeff and Mutt” a.k.a. “Good Cop Bad Cop” are used. The bad cop tortures the target and the good cop tries to gain their trust. In mind control, trust games are commonly employed to manipulate the beliefs of the target.  Creating hatred of groups through false correlations and deception is a common CIA method of trickery.

In the CIA programs, the target is put through these phases as written in the documentation, “Disorient and confuse the target. Use them for our purposes, and then dispose of them in any way possible.” We can only surmise by our sample set of a thousand people what “dispose” means: prison, suicide, or perhaps a mental hospital.  Coercing and torturing people to suicide is very common. Both tactics in physical or no-touch torture involves plausible deniability.

The no-touch interrogations are better than physical rendition techniques for exposing support networks. Traditional NSA tracking of email and phones calls are useful but if the targets are taken into a secret prison they can’t contact their networks. In no-touch torture, the target will contact everyone who might help them. Then those relationships can be destroyed to isolate the target. All these techniques rely on the target having a fear of death and pain.

Deception is very important during interrogation. In physical interrogations the targets are often drugged. This creates the confusion necessary to pull off certain trickery. In terrorist interrogations, for example, the CIA uses fake newspapers to make the target believe whatever event they were suspected of plotting had already happened, obviously looking for a confession.  Sometimes the government in charge of the torture is looking for a political gain through a false confession. None-the-less false flag operations are commonly used in both forms of torture and interrogation.  The trick is to make the target believe another foreign country is doing it to them. In no-touch torture the trick is to make them believe someone related to them is behind their suffering.

Voice transformation and morphing is an interesting technology also used in both physical and wireless interrogations. It is a form of deception used against a target to trick them into believing that they are speaking to real people that they know. It has been used in war to trick generals.  Obviously spoofing email and other identities on internet forums can be used in this manner too.

Finally, the topic of human experimentation for improving weapons, torture, interrogation, and social disruption methods will be breached.  Most of the techniques mentioned above work most effectively if the target has no SERE training (Survival, Evasion, Resistance and Escape) or psychological understanding of the methods to influence the human mind. Unfortunately, every sample point in the world’s society needs to be studied to improve the weapons systems. This is why many random people are put into the torture and mind control experiments. There are some devious uses of a secret army of remote controlled assassins in every country in the world. The samples must include different education, language, culture, and economic factors.  Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it. No-touch torture is much more complex than physical torture. Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary to test on innocent targets. Often the subject will be taunted by the statement, “Try to stop us.” This statement forces the torture subject to try to figure out shielding and jamming techniques to stop the wireless torture and helps the weapons designers to improve on the system.

However, the psychological and perceived physical pain is only half the story with no-touch torture. It also involves a set of scripts, mind games if you will, to walk the target to murder and/or suicide. This is called “Hyper Game Theory”.  It is used in war games to determine how to control your enemies and targets.  Game Theory can be used on governments, individuals, or for determining propaganda to alter cultures. The experiments on the public provide a means to test the efficacy of these scripts and determine under what circumstances to use them.

One last comment on why “We must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex” as President Eisenhower warned. During these torture programs run by the United States and its allies, accurate “truth” data points need to be used to judge the efficiency of the interrogation methods. This is why there is a dispute between the CIA and Senate Intelligence Committee reports about the usefulness of torture. Subterfuge by the CIA hacking into the senate oversight committee’s computers is a big deal; a rogue agency has been formed. Data fusion centers, Homeland Security Data Fusion Centers, NSA, and FBI collect data on Americans. This data in turn is used during torture and interrogation of Americans in no-touch torture.

Global Movement to Raise Awareness of Covert Harassment and Surveillance

Covert Harassment and Continuous Electronic Surveillance–invasive body, mind, and behavior assaults/neural and muscular manipulation/Electronic Warfare–with deadly, lethal, and inhumane radio and microwave, sonic, and scalar “non-lethal” weapons is being executed worldwide on innocent civilians and veterans by unscrupulous corporate governments, militaries, and Intel agencies–a phenomenon that is increasingly being exposed by those being assaulted, the rare human rights advocates and organizations willing to speak out, and the rare journalists writing about it. This effort is now being magnified a hundredfold by the newly-established International Conference on Covert Harassment, co-organized by Peter Mooring, founder and director of STOPEG, Stop Electronic Weapons and Gangstalking, profiled and interviewed here on the show Real Politik by writer and reporter James Tracy. Many thanks to James Tracy for this original post at Memory Hole Blog, and to The PPJ Gazette for re-posting.

Are All Americans Being Covertly RFID-Chipped?

The recent post here on RFID Chips has been updated and linked as a page, linked under Ethics in 21st Century Sci/Tech.

Are All Americans Being Covertly RFID-Chipped? Thirty Percent of Americans in a Cross-USA Study Found to be RFID-Chipped

Analysis of Radio Frequency Identification (RFID) Chip Prevalence in 3 Discrete United States Populations

Re-blogged from Richard Presser’s Blog/Aug 19, 2015:

Analysis of Radio Frequency Identification (RFID) Chip Prevalence in 3 Discrete United States Populations.

******************

This post (linked above) points to a very interesting report on RFID chips found in Americans–the report by John Brugle, Ph. D, published on June 8, 2014 can be found also at this link at WITSCIENCE, the Wyoming Institute of Technology. Sample populations were selected randomly from 3 areas in the country, the Northeast, the Midwest, and the Southwest, and each of the 2,955 American volunteers was full-body-scanned for RFID chips–radio frequency microchips. Guess what rfid chipsthey found–that one in three, that’s thirty percent of the total number of people scanned, carried a microchip somewhere on their bodies, most often in their teeth.  The graphic here shows where else the chips were found, and how often–hands, knees, hips, and in implanted screws (teeth again?) and implanted birth control. Does that sound invasive enough?

The Implications?

Clearly, Americans are being implanted–and quite invasively–with microchips without their knowledge or consent, possibly by their very own dentists, doctors, and surgeons, during routine office visits or during scheduled surgeries for something else altogether. (Chips these days are super-tiny, and apparently can be inserted sub-dermally fairly easily. This can be researched online.)

For years, “Targeted Individuals” experiencing assaults on their bodies by Electromagnetic or sonic weapons have been reporting to medical personnel, local law enforcement, and psychiatrists the felt presence in their bodies of RFID chips, and clearly, they have very good reason for these accounts, as this report suggests.

“Targeted Individuals” Aren’t Delusional, Schizoid, or Schizophrenic for Reporting RFID chips and Covert EMR Weapon Assaults

There’s been a great push in mainstream media to discount the horrific experiences of “Targeted Individuals” being covertly assaulted, 24/7 with EMR and sonic weapons as a loony “belief” they held, at best, or, at worst, a delusion, a hallucination, a manifestation of “schizoid disorder” or “paranoid schizophrenia,” misdiagnoses freely handed out by either colluding or conned psychiatrists.

This report proves conclusively that people are being chipped without their knowledge or consent, all over the United States.

These people who are being chipped could include those who know and feel they are being covertly assaulted, as all “Targeted Individuals” do, by radio frequency  and microwave weapons, which use their RFID chips to identify them, to send assaultive resonant frequencies to, and thus to induce in their bodies the myriad of assaults “TIs” report, including organ damage, remote electromuscular shock, remote neural monitoring, remote heart attacks, and synthetic telepathy or V2K-Voice to Skull–voices induced within their brains, schizophrenia-style. Patents for all which weaponry exists, see this post for more.

Unconsenting Chipped Individuals Could Include You

But it could also include unaware Americans who return from doctor’s offices and dentist’s offices and hospital visits sicker than they went in, who suddenly develop mysterious chronic ailments, whether its “fibromyalgia,” or Lymes’ disease, or gum disease, or infertility, or rheumatoid arthritis, or multiple sclerosis, or irritable bowel syndrome, or whatever else, including cancer, symptoms and all stages of which can be induced by radio-frequency and microwave weapons, as all “TIs” attest.

Secret “Human Subject” Experimentation–Military-Grade Weapons, and the CIA/MKULTRA programs

These are being-kept-secret, covert weapons of Electronic Warfare, currently being tested and trained on whole populations, both in the US and worldwide. If you are thinking of the CIA and MKULTRA, you will not be far off the mark–humans are being experimented on today, in 2015, without consent.

Journalists in establishment media continue to fail us abysmally by refraining from reporting on what by all accounts continues to be and become a mass 21-st century holocaust. Alternative media is beginning to report more and more on this phenomenon however, and both European and American groups–the ICAACT and EUCACH in particular–working on exposing this tyranny are making progress, as the 2015 International Conference on Covert Harassment, scheduled to be held in Berlin in October, attests.

When Brian Williams reported glibly not so long ago on NBC that by 2017, all Americans would be microchipped, perhaps what he failed to add was–And you’ll never know it! For this microchipping of us has apparently been going on a long time, as this report reveals, and All of America is being targeted.

This seems to be a real turning-point report and I thank Richard Presser for drawing attention to it. I suspect every single misdiagnosed “Targeted Individual” would like to show this report to their psychiatrists and physicians.

We Need to Speak Out on Microchipping and Electronic Surveillance & Electronic Harassment

Surveillance on steroids, anyone? Our Brave New World has been spinning for a while now.

Covert assaults with EMR weapons are not being imagined by an imaginative few. Covert implants of RFID chips are not being imagined either–they are actually going on, covertly, all over the country. And Medical Personnel are involved, complicit, and complying with the Dirty Ops surveillance/harassment tactics of Mil/Intel in performing these RFID implants!

No American is safe, this seems to suggest, from one’s own doctor or dentist.

When is America–journalists, scientists, attorneys, the literate, the intellectually-aware, as well as everyone else, including the Doctors, maybe the few remaining ethical Doctors out there–going to put a Stop to this profound evil? Now is the time to stand up and be counted! Please take action, as and how you can, to combat this ongoing carnage. Please also spread this information widely, help keep America informed.