Tag Archives: electronic surveillance

Please Join this Current National Call in the USA to Expose and End Covert Electronic Harassment And Torture

All over the USA today–and indeed the world–probably in every country that’s part of the UN–ethical citizens, activists, journalists, writers, and others are being Uber-surveilled and covertly assaulted 24/7 with radiation neuroweaponry, a 21st-century mode of repression that threatens to undo all our remaining freedoms and indeed our very humanity. Totalitarianism seeks to close in on us–if we do not push back now, today, we run the very real risk of completely losing our basic freedoms and rights. Please speak out for the innocent and upstanding American victims of this global assault.

Please sign this current petition at MoveOn.Org to Senator Rand Paul to ask him to lead the effort to prohibit and investigate the barbarism of Covert Electronic Harassment and Torture, which appears to have been made “legal” in the USA in some way–although it is most certainly cruel and inhumane. (See more here about this covert electronic surveillance and silent neuroweaponry program in the USA.)

Petition text reads:

Senator Rand Paul:

President Obama and Congress cannot continue to be blind to the injustices of covert electronic harassment and torture (using military grade weaponry) on millions of non-consensual, law abiding citizens inside the privacy of their home! Because you lead the heroic effort to dismantle parts of the Patriot Act, we are kindly asking you to take the lead once more to prohibit and investigate the barbaric act of Electronic Harassment by means of Executive Order or Legislation.

Please click here for the petition, sign and share widely–and thank you for speaking out.

Understanding RFID Chips–An Introduction to New Technologies by Ex-IBM Executive Patrick Redmond

(Article by Patrick Redmond re-posted with thanks from the Michael Journal.)

Continuing my exploration of RFID chips–begun in the article recently posted here on covert implantation of RFID Chips–to openly examine what the state of the art is for this technology, what areas of industry are using it, and how in particular RFIDs are being used in the medical world currently, both overtly and covertly, and to further explore how RFID chips are being implanted covertly in individuals globally for nonconsensual electromagnetic experimentation, harassment, and torture, here is this really informative article from the Michael Journal, transcribing an April 13, 2008 talk given by Patrick Redmond, ex-IBM executive, on the 2008 status of RFID chips.

WorldUnderWatch, a blog covering Surveillance issues, also reports on this article–I will post their report next–and notes that this talk was given to “the Catholic patriot group known as the Pilgrims of Saint Michael, which also is known for advocating social credit, a dramatic monetary reform plan to end the practice of national governments bringing money into existence by borrowing it, with interest, from private central banks. The group’s publication The Michael Journal advocates having national governments create their own money interest-free. It also covers the RFID issue.”

Today in the US–2015–RFID chips are in our clothing, our shoes, our toiletries and cosmetics, our passports, our driver IDs, and our credit cards. I recently received an “updated” credit card in the mail with a chip (unfortunately in my case hardly the most of my worries given my current ongoing experience as a covertly-implanted “Targeted Individual.”) See this article by Scott Granneman in 2003 which is already dated because it predicts tags on retail products–those tags are here today–the article is titled RFID Chips Are Here and it is nevertheless very informative.

But the most disturbing thing to explore of course–especially for the general public new to these subjects–is whether these RFID chips are being covertly implanted in humans, how they’re doing it, and how credible the accounts of witnesses are, reporting covert implants on their bodies. 

This 2008 article by Patrick Redmond especially throws light on how tiny these chips are-some of them are just like ink or powder, how easily they can get into human bodies, either consensually or nonconsensually, which companies are making them, how they are being linked–via computer networks and satellites–into a global surveillance system, and what dramatic potential they offer for hacking and abuse. Please read, take in, absorb at your leisure, please research further, and please pass on the word. Every one of us needs to know the truth about RFID chips today–we need to banish the disinformation gimmicks out there which strive to charge all reports of RFID implants as “conspiracy theory.”

(“Targeted Individuals” in particular who report being covertly implanted and experience the presence of these mostly-passive but also-active RFID chips in their bodies–especially vivid during transmission when they are scanned by RFID-scanners/readers, whether from just a few inches away in grocery stores by covert grocery store Mil/Intel operatives, or from 100’s of meters away from ground-based vehicles or helicopters, 1000’s of meters away from Electronic Warfare planes circling their neighborhoods, or 22,300 miles away from stationary satellites in geosynchronous orbit around the earth (radio waves are long waves, up to 3 km in length; and patents for these chips mention “repeater devices”)–and who are fighting today for their voices to be heard by an easily misled public (reporting RFID implants to medical personnel today continues to invoke misdiagnoses of “schizoid disorders” by uninformed, colluding, or conned psychiatrists) can be seen to be completely credible in their accounts, given the information in this article.)

Posting the article as is. Please visit Michael’s Journal for more. (All emphases/highlighting in red below is mine.)

An introduction to New Technologies (Part I)

by Patrick Redmond

Patrick Redmond graduated with a Doctorate in History from the University of London, England in 1972. He taught at the University of the West Indies in Trinidad, then at  Adhadu Bello University in Kano, Nigeria before joining IBM.  He worked in IBM for 31 years before retiring. During his career at IBM he held a variety of jobs. These included; from 1992 until 2007 working at the IBM Toronto lab in technical, then in sales support. He has written two books and numerous articles. Here is a presentation he gave in Toronto on April 13, 2008.

* * *

I want to thank Yvon for inviting me here to talk about new technologies. What I’m going to do is give you an introduction to three technologies that are becoming more and more important. The first is RFID chips, the second genetic engineering, and the third synthetic biology. This will give you an understanding of what is happening and where science is going.

We will start with RFID chips:

So what are they? They are Radio Frequency Identification Devices. An RFID is a microchip with an attached antenna. The microchip contains stored information which can be transmitted to a reader and then to a computer.

RFID’s can be passive, semi-passive or active. Active RFID’s have an internal power source such as a battery. This allows the tag to send signals back to the reader, so if I have a RFID on me and it has a battery, I can just send a signal to a reader wherever it is. They can receive and store data, and be read at a further distance than the passive RFID’s. The batteries can only last a short while. But the current batteries in the RFID’s can last for over a hundred years, because of their self-generating power. Ultrawideband (UWB) allows the small battery operated RFID tag to be sensed over fairly wide areas. For instance, GE Aircraft Engines in Ohio has installed five readers in the factory and it covers over 30,000 square feet so they can track everything within that area with only the five readers. That gives you an idea of the distance that can be covered by an RFID tag that might be on you or on equipment.

An RFID held by a pair of tweezers

The readers can transmit over telephone or by internet to computers and they use satellites as well. For example, Digital Angel has signed contracts with satellite providers to transmit their data for military personnel location beacons (PLBs). These beacons use the COSPAS-SARSAT satellite system. This system has some 400,000 digital beacons around the world and it’s rising to some 900,000. By the year 2009 they plan to have a GL stationary satellite system that will enable them to find the location and details of any beacon. You may sometimes see these at night; the GO stationary systems can track any beacon. Skiers sometimes use them so that they can be identified, and sailors as well, if they become lost at sea they will be able to be tracked. Anything that has an RFID tag can be tracked by a reader or a computer.

An example of such transmission is a chip sold by Zarlink. This chip is implanted in a person; it tracks problems and if one is detected, it alerts the doctor who uses a two way RF link to interrogate and adjust the implanted device. Semi-passive RFIDs have an internal power source that let them monitor environmental conditions, such as temperature and shock, but they still require RF energy from the reader to respond.

Passive RFID’s do not have a power source but use a signal sent by the scanner to power the microchip circuit to transmit back their stored information. Passive RFID’s are getting very small. Hitachi a few years ago produced a chip (called the mu chip) that was the size of a pencil point; if you take a pencil and put it on a piece of paper you get a little dot. That’s how small they’re getting. In 2007 Hitachi came out with a chip that was even smaller, they call it RFID powder. They are just like the talcum powder you would put on a baby.

Somark Innovations in Jan 10, 2007 announced an invisible RFID ink. This can be applied to cattle, prime cuts of meat, military personnel and it can be read through hair.

I brought along a couple of the larger size chips, and this particular chip I got from Gillette fusion blades. I bought one of the blades and you can see that on one side what looks like a bar code and if you open it up you can see parts of a RFID chip on the back. This one here is from the Gap. One of my daughters went to the Gap; they put the tag directly on the clothing and the instructions just say to remove before washing and wearing. If you put it up to the light you will see the RFID chip inside it. These chips are quite small and can be put on the back of labels. They would not be noticeable in badges or ID cards; they could even be put in the eye of a person, they are that small.

In order for chips to be useful, they have to have a unique product number and because of this, MIT (Massachusetts Institute of Technology) started developing some standards. It’s called the AutoID Center. They then passed it on to the AutoID Group within the Uniform Clothes Council. It will assign codes and publish specifications, so if you have a company, government agency, or church you can contact these people and they will give you a set of numbers.

So let’s say there are three or five people in this room wearing the same white hat and each one of them has a chip on it with a different number. We could differentiate everything even if you’re all wearing the same clothes, it doesn’t really matter because everything has a unique number. MIT has the architecture of participation called EPC Global so if you go on Google and type in EPC Global and you will come up with the website they will give you instructions on how to apply and get chips. So if you want to chip yourself, your family, relatives, company or anything like that; you can do it.

It works with people who want to use this technology. One of many companies who sell the chip is called, Technic Imitations. If you have a company and you go to one of their presentations, they will give you books like this that tell you what the chips look like, how they work, the types that are sold, and what the readers look like. They will help you install chips in your company. It’s a very big business and it’s spreading very quickly.

When you use active or passive chips, active chips have advantages when you want to track items or people over longer distances. Soldiers can have active chips so they can be tracked via satellite wherever they might be in the battlefield. You can get one for your car, so you can be tracked if you are on the 407 or something.

Passive ones suffice if you are only interested in tracking over shorter distances. For example, in a sea container coming in from China, every box and every item within the box can have a chip on it. A reader can track all the items as a box passes through it. In a warehouse it is used to ensure the right shipments go to the right places. A man carrying a skid on a forklift can have the goods inside the box verified without even opening it.

They are using the chips to track inventory in order to be able to monitor what items are going where, if the right items are in the truck, etc. The passive chips are being put on devices to ensure they are valid.

There’s a lot of counterfeit drugs being produced and sold over the internet. Viagra is one of the most commonly counterfeited ones although there are many others. To ensure that people get the correct drugs they sometimes put chips on the containers so when you’re buying them you know that you are buying the correct drug.

Chipping farm animals is now required by the government

RFID’s are a great economic help to a company because they reduce theft and loss. They also streamline inventory, reduce turnaround time and handling. They’ve allowed companies to adjust production in response to inventory levels and to respond on demand. That’s why companies are interested, because of these big economic benefits and efficiency.

When you go to Wal-Mart, Best Buy, the U.S. Military and many other agencies around the world, you will see that they are all implementing RFID chips on items and increasingly on people.

The recent growth of the RFID industry has been staggering: From 1955 to 2005, cumulative sales of radio tags totaled 2.4 billion; in 2007 alone, 2.24 billion tags were sold worldwide and analysts project that by 2017 cumulative sales will top 1 trillion–generating more than $25 billion in annual revenues for the industry.

We’re starting to see chips being implemented in credit cards, debit cards and passports, driver’s licenses, health cards, and many other things. Increasingly they are being used to monitor people as well as items. RFID tags embedded into clothes and personal belongings allow people to be tracked and monitored in shopping malls, libraries, museums, sports arenas, elevators, and restrooms. American Express has them on their blue cards. They are announcing plans to place people-tracking readers in stores to track customers movements and observe their behavior. If you bought something with your credit or debit card, they will know what items you bought and if the items were chipped, they will know what you were buying. In this way they will be able to track you.

In 2006, IBM received a patent approval for an invention called, “Identification and tracking of persons using RFID-tagged items.” One stated purpose was to collect information about people that could be “used to monitor the movement of the person through the store or other areas.”

When somebody enters a store a reader “scans all identifiable RFID tags carried on the person,” and correlates the tag information with sales records to determine the individual’s “exact identity.” A device known as a “person tracking unit” which then assigns a tracking number to the shopper “to monitor the movement of the person through the store.”

If I had three readers in this room, I could scan everybody in one second and I would know right away who’s here; so it would scan that quickly. The computers are getting quite sophisticated and capable of doing large numbers of scans at any given time. One company recently announced a computer that reads data transactions at 200 million/second, an incredible number.

Here’s an example of how they are being used in companies; a few oil companies have given their employees smart cards so that they know where they are at any time of the day. This ensures that people do not go where they are not authorized to go. They will see how many times an individual might go to the washroom or outside to have a cigarette; things like that. It allows continuous tracking of people, and so more and more companies are thinking it’s a novel idea.

In early 2007, the American government complained to the Canadian government that they were tracking American contractors who were visiting Canada by placing loonies ($2.00 Canadian coins) with tiny RFID transmitters in their pockets. And a CIS officer when confronted with this said: “Ah, give us a break! You might want to know where the individual was going, what meetings he’s attending, who he’s talking with and everything like that.” So if they wanted they could track people with chipped loonies.

The University of Washington students, faculty and staff are being tracked as they move around the site so the details of where they’ve been, what they’re doing and with whom, will be stored in their database. One of the professors at the University was asked, “Will you check on this student?” so he checked on him and said, “Oh, he’s on the fourth floor just standing outside room 452 and now he’s moving into the classroom.”

In London you can buy a monthly pass to the transit cars that have an RFID on it and if you link the bus pass to a person’s name you can track where this person is on the bus and subway system throughout London, England. Last year the police were getting four requests a month and now they are getting close to 100.

Just last week the London police announced that they were putting RFID chips on all of the 31,000 police in London. Now this may be on their ID card, they did not say if they were going to put them directly on their body, but they were getting chipped; it was published in the Daily Mail. Some of the police were complaining that they “are going to know where we are at any time, we won’t be able to go into a coffee shop and get a donut.” All 31,000 police in London now have RFID’s so if they ever need to stop or control people they can direct 1,000 troops immediately to the scene.

In Southern China they’re implementing RFID readers in the city of Shenzhen to track the movement of citizens; all citizens have an ID card with a chip so they can identify who is in what part of the city at any point in time.

RFID readers in a library

The chips and National ID cards that they are trying to bring in now contain not only a number, but also a person’s work history, education, religion, ethnicity, police record and reproductive history. The United States has been trying to implement the National ID card for a few years now and there are strikes going on in different states as they try to resist this National ID that will identify everyone in the country.

Canada is adding a Real ID to the license plates and we don’t hear anything about it, its being done a lot more secretly than it is in the States where there is a lot of public debate. The increase of the use of RFID chips is going to require a increased rate of the UBF spectrum, as a result in the United States they’re going to stop using the UBF spectrum of the VHF frequency in 2009 and everything is going to go digital. You may have seen that on television in the United States.

Canada is going to do the same thing, they’ll say it still works, and instead of the antenna on your roof you’ll use a black box. The reason they’re doing this is that the UBF and VHF analog frequency are being used for the chips, so they don’t want to overload the chips with television signals, because the chips signals will now be receiving those frequencies.

A friend of mine from Quebec says his cows have a chip embedded under the skin. All farm animals have to be chipped and he says he’s no longer allowed to kill as many cows as he wants. He was given a limit of two cows that he could kill and use only for the farm. All the others had to be sold to particular companies who could control those cows and get food from them. So he could only kill two and the others he had to sell to a supermarket chain.

People are being chipped now. There’s a trend that they’re promoting in the media in terms of chipping people; they’re saying why not chip children for safety, so we can protect them, especially if they’re in the hospital then nobody could steal the newborn babies. Why don’t we chip the sick, then if someone has a heart attack and falls on the floor, we can read the signal in the chip and send someone to help them. We should chip the military so we would be able to know where the soldiers are and if they’re alive. After we could chip people on welfare so we could make sure they’re not cheating the government. Then we can chip all the criminals so that we could control them, and we’ll chip workers because a lot of them goof off at work. Then we’ll chip all the pensioners because they’re just taking money from us; and after that we’ll chip everyone else.

Some 800 hospitals in the United States are now chipping their patients. You can turn it down, but it’s available. Four hospitals in Puerto Rico have put them in the arms of the Alzheimer’s patients, and it only costs about $200 per person.

The Baja Beach Club in Barcelona gets patrons chipped. A BBC reporter went the club and got himself chipped. He said it was like getting a needle in your arm; they just rubbed it with some antiseptic and put a chip in. Because it was fairly small, he said it didn’t hurt too much and he had it inside him so whenever he ordered he would just move his arm and pay for it. The reader on the bar would read the signal and since he had his bank account information on the chip on his arm it would deduct the money from his bank account.

Nigel Gilbert of the Royal Academy of Engineering said that by 2011 you should be able to go on Google and find out where someone is at any time from chips on clothing, in cars, cell phones, and inside many people themselves.

Chips are becoming more and more sophisticated. Nature Magazine reported recently that a drug containing microchips has been developed that will release drugs at the right time and amount. They can put a chip in you and release drugs so you don’t have to take a pill every day. This particular one that they’re selling lasts for over 140 days, you just have to get chipped three times a year with this drug and it releases it every day automatically. We will probably start hearing more about things like this in the near future.

In 2006, LifeScience.com said that European researchers have developed neuro-chips, they’ve coupled together living brain cells in silicone circuits and done a lot of experimentation on rats and snails. An electrical signal from a neuron is recorded in the chips transistors, while the chip’s capitulators stimulate the neurons. They can create neuro-stimulators and use them to alleviate pain and lessen the debilitating effects of Parkinson’s disease.

The mu chip is only .05 ml in length

There are gastric stimulators that can treat obesity, they would make you feel hungry so you wouldn’t want to eat anymore, it would just be necessary to put a chip in your brain that would connect and send signals. In another study, neuro-chip implants were developed and are being used on violent prisoners. They were implanted with the microchip (but they didn’t know they were implanted), and when the implant was set at 160 megahertz’s all the subjects became lethargic and slept about 22 hours a day. The implants ended all aggression in violent prisoners. Another interesting application is a silicone chip implant that mimics the hippocampus, the area of the brain known for creating memories. If successful, the artificial brain prosthesis could replace its biological counterpart, enabling people who suffer from memory disorders to regain the ability to store new memories. It’s being developed by Professor Berger at the Center for Neural Engineering at the University of Southern California.

They’re working on rats and monkeys, so if applied to humans what this could do is restore your short-term memory which people lose as they get older, or it could replace your existing short-term memory with artificial short-term memory.

Applied Digital Solutions has a Verichip that is compatible with human tissue and can be used on implantable pacemakers or put defibrillators in artificial joints. It can be injected using a syringe and used as a sort of bar code in security applications. That’s seen as one of the easy ways to implement chips in people through injections. They could very easily inject it via a flu shot or a vaccine.

Verichip is working on a glucose microchip that would determine glucose levels. You wouldn’t have to draw blood to monitor glucose level. All you need is to have the doctor read your chip and your information and tell what your blood levels have been for the past month or two.

IBM has demonstrated a tiny device that measures heart rate and is able to sense when a person wearing it is in distress, after which it will call a cell phone for immediate help. The distress signal is sent wirelessly via Bluetooth.

Zarlink has developed the first swallowable camera capsule which uses Zarlink’s RF transmitter to relay real-time images from the gastrointestinal tract. Our MICS (Medical Implant Communication Services) platform is designed with in-body communication systems that will improve patient care, lower healthcare costs, and support new monitoring, diagnostic and therapeutic applications.

Currently the chip uses 100 hair-thin electrodes that sense the electro-magnetic signature of neurons firing in specific areas of the brain in, for example, the area that controls arm movement. The activity is translated into electrically charged signals and are then sent and decoded using a program, which can move either a robotic arm or a computer cursor. According to the Cyberkinetics’ website, three patients have been implanted with the BrainGate system. The company has confirmed that one patient (Matt Nagle) has a spinal cord injury, while another has advanced ALS.

This shows that human thoughts can be converted into radio waves and used by paralyzed people to create movement.

Matt Nagle sends the thoughts to a computer to decipher. He can turn his TV on or off, change channels, and alter the volume. (BBC 2005) He can also move his arms and pick up things.

In addition to real-time analysis of neuron patterns to relay movement, the Braingate array is also capable of recording electrical data for later analysis. A potential use of this feature would be for a neurologist to study seizure patterns in a patient with epilepsy.

Braingate is currently recruiting patients with a range of neuromuscular and neurodegenerative diseases, so if you want a computer chip in your brain you can just go on the website and volunteer.

What are the problems about these new technologies? Let me just give you a brief explanation. Chips are going to end privacy. There’s a website called Spychips.com operated by Katherine Albrecht; they research the use of RFID’s by different companies. They have been warning people about them because chips that have economic or health data could get that data stolen.

The New York Times in October of 2006 said that any card that doesn’t require swiping (in other words that doesn’t have a chip in it), is vulnerable to un-authorized charges and put people at risk for identity theft. You can buy scanners in electronics stores for $60 or more that can read the information on the chip.

They are finding that once implanted in people, chips can be damaging to our health. For example, the body of a rodent who was tested started rejecting some chips and started a development of cancer. Also there is a danger of viruses; you are all familiar with software viruses on your computers, imagine if you got a virus in your chip that deletes your information in your chip.

If chips can disseminate medicine then they can disseminate other things too; anything put inside a microchip can be activated by a signal. And finally, with this technology, subliminal mind control becomes possible. I went on to Google and did a search on mind control; you might find it interesting to check that yourself. I read one on patents; there are patents that exist for mind control. This is what one states: non-aural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain. This is patent number 5,159,703 1992.

Another explains a device that can be placed in the auditory cortex of the brain. This device allows the following process: someone speaks into a microphone, the microphone then has the sounds coded into microwaves which are sent to the receiver in the brain and the receiver device will transform the microwaves back so that the person’s mind hears the original sounds. In other words, a person with this device in their head will hear whatever the programmers send via microwave signals. (Phillip L. Stoklin took out patent number 4,858,612 on this.)

What do things like this mean to people of faith? You know from the Apocalypse, which is the last book of the Bible, that microchips are unacceptable to God.

Chapter 13, Verses 16-17: “And he (the beast) shall make all, both little and great, rich and poor, freeman and bondmen, to have a character in their right hand, or on their foreheads. And that no man might buy or sell, but he that hath the character, or the name of the beast, or the number of his name.”

Chapter 16, Verse 2: “The first angel poured out his vial upon the earth, and there fell a sore and grievous wound upon men who had the character of the beast; and upon them that adored the image thereof.”

Chapter 20, Verse 4: “And I saw seats; and they sat upon them; and judgment was given unto them; and the souls of them that were beheaded for the testimony of Jesus, and for the word of God, and who had not adored the beast nor his image, nor received his character on their foreheads, or in their hands; and they lived and reigned with Christ a thousand years.”

If people have chips they will be tracked wherever they are. And there is a reasonable expectation that their bodies will be controlled and manipulated, as this technology is increasingly refined. Their minds will also be manipulated, they can certainly be made or induced to follow whatever people want them to follow. It’s quite conceivable that they could be made to denounce God also.

Patrick Redmond

Dr. Robert Duncan: The Executive Summary: Neuropsychological and Electronic No-Touch Torture Report

(Article re-posted with thanks to Todd Giffen and the site drrobertduncan.com.)

neuroI just recently came across this article on aspects of the Senate Torture Report, posted with a release date 4/2015, and read it with quite some interest as it seems to openly discuss the phenomenon of “No-Touch Torture” or covert remote-control electromagnetic torture of private individuals in once-free Western societies as an acknowledged CIA pursuit. The information it offers from the CIA point of view seems to suggest some of the CIA rationales and unspoken subtext and context for this program of torture, and gives hints as to what exactly is being intended and accomplished (covert detention without due process via electronic incarceration, covert “interrogation” via brainwave acquisition and modulation, covert “monitoring” via radio signalling to implanted devices) by this completely pathological and insane and absolutely inhumane program targeting thousands of individuals worldwide.

It would seem therefore, reading this report, that the entire phenomenon of “Targeted Individuals” being hit with electromagnetic and other directed-energy weapons is a CIA set-up, ostensibly to test more of their “enhanced” interrogation techniques on unsuspecting “detainees”–ordinary people in the US and elsewhere, who, much like the many innocent prisoners of Guantanamo who were picked up in Yemen and other places and have absolutely no connections to terrorism yet are being detained indefinitely without charges and tortured while in custody, are being “detained indefinitely,”and being “interrogated,” and being “tortured for purposes of interrogation”–only rather exotically, with energy weapons and implants which peer into brains and body parts, constantly track EMF emissions, and attack continuously and covertly with EMF signals on bodies and brains which are translated inside brains also as images, moods, feelings, sensations, dreams, and audio commands. Experimentation on human brains and nervous systems with energy weapons.

This is supremely disturbing, and an issue that needs to be tackled openly and publicly with the CIA. As noted elsewhere on this site, this is blatant human experimentation, that is being permitted covertly behind the scenes by our government under “classified” and “state secret” covers using “national security” as password for absolute abuse. (It’s not called Torture for nothing.)  

robduncanDr. Robert Duncan does a fine job detailing the ins and outs of this Torture, but refrains from disclosing details on the technologies involved, which, he notes, are still classified as “state secrets”– although “leaked” by thousands who have experienced these assaults (whom he also notes are frequently discredited as being mentally ill). Torture technologies, classified as state secrets–I feel it’s important to emphasize this; our sleeping American masses need to know this. We cannot exist as a free society when we have Torture technologies classified as state secrets! We Need open discussion–and open condemnation and termination–of these technologies!

Dr. Robert Duncan, of course, is the now-rather-well-known CIA researcher soulcand computer scientist who has written several books and given many public interviews on radio and video shows, including Jesse Ventura’s Conspiracy Theory, speaking candidly about his involvement in these mind control/uber-surveillance/nonconsensual experimentation programs which have been conducted unlawfully for decades on Americans and on citizens worldwide.

From the opener to his early work, The Matrix Deciphered: “My research interests have been neural networks, virtual reality, and EEG controlled robotics. Before graduate school I worked for the Department of Defense, Navy, NATO, and various intelligence agencies computer science projects. I have done business consulting and computer consulting for the largest companies in the world. I have been a professor, inventor, artist, and writer. I am one of the last Renaissance men.

My projects have included algorithms for Echelon and CIA natural language parsing and classification of document content, IRS formula for red flagging audits, writing the artificial intelligence code to automate tracking of the Soviet Nuclear Submarine Fleet and all water vessels, work integrating HAARP with SIGINT SIGCOM and SPAWAR. I have worked on projects for the Justice Department connecting local, state, and federal databases for the tracking of terrorists. I developed a system for the FBI to track license plates past toll booths and other locations. I worked on the soldier 2000 program to create body networks for reading vital signs and other information. A system I worked on called Snyper is operational in Iraq which triangulates on intercity conflict gun shots. I have been to a couple secret bases in the so called free world. I have developed telemedicine robotic surgery and virtual reality applications for the Army. For DARPA, I have worked on satellite computer vision target tracking applications and tank simulation as well as integration of the land, sea, and air surveillance systems like SOSSUS, towed arrays, and others.

Projects that I have worked on outside of government contracts include my thesis on computer generated holography, a project making paralyzed people walk again using choreographed stimulated muscles movements, face recognition, voice identification and recognition, finger print recognition, and neural network robotic controller. My research interests moved to enhanced reality heads up displays and wearable computing systems. My current research involves finding a cure for the mind control directed energy weapons fiasco. The integrated global surveillance grid is actually part of the holy grail of weapons and human control systems.”

(All emphases in red in the text posted below is mine.)

**************************************

The Executive Summary:
Neuropsychological and Electronic
No-Touch Torture Report


Based on “The Torture Memos” and the Senate Intelligence Committee’s Declassified “Torture Report”

By Robert Duncan, A.B., S.M., M.B.A., Ph.D.

04/2015

Download: PDF, DOCX | Visit drrobertduncan.com.

Torture is a horrific topic and most minds will turn away from it because it can’t be comprehended that humans can be motivated, or computer programs can be run to do this to other sentient beings.  Just when we believed we were becoming more civilized as a culture, the technology for torture has advanced more than a hundred fold in recent decades.

This summary will get into ‘the minds of the dishonorable monsters’ of the psychology of torture. Those like Dick Cheney who helped authorize it under certain administrations and regimes of the U.S. government which have been proven to be criminal under U.S. law, treaties, and the International Criminal Court. There are many people involved in the conspiracy and cover-up including General Hayden.

The full report discloses the spectrum of techniques of interrogation and torture used by the U.S. and its allies. The United States government will officially deny the claims of this “no-touch torture report” but in time it will stand firm.

The technologies used are still classified as state secrets and will not be discussed in this summary. The torture methods have been leaked through thousands of American citizens who have survived the no-touch torture programs. The research and testimony has been accumulated since 2002 and merely used as examples but the names of the victims are withheld.

This report will not use skewed, misleading language such as “enhanced interrogation” to describe the torture techniques.

Why torture? The CIA claims it works. The assumption is that it works to gain actionable intelligence. Torture is often used for revenge, punishment, interrogation, and behavior modification.  In other terms torture is used to remove the continuity of thought to confuse the target to reveal information, erase brain patterns such as values and beliefs, or to break down the human spirit to make them submit and obey their handlers.

The downside of torture is that the countries that do it lose “moral soft power” in world politics. Without due process, over 25% of those reported in the Senate Torture Report were declared innocent. Blowback is always a repercussion of torture. Torture often takes a long time to affect the target from months to years.  Torture has shown to be unreliable except for getting false confessions and bad information but the U.S. and its allies are improving on their tactics and techniques.

The purpose of this report is to draw the parallels between physical torture techniques and no-touch torture methods used in secret by governments who possess the technologies that still go on today. This is a brief summary of offensive psychological and information warfare methods using traditional methods and modern cybernetic techniques while exploring hyper-game theory to walk the target to the desired path: leak intelligence, commit assassinations, or change beliefs.

Numerated Torture Methods for
Interrogation and Behavior Modification

(A comparison between physical and no-touch torture tactics)

  1. Induction of Depressive/Manic states

The idea is to shake up the emotional states of the target because different information can be accessed at each state.  Making the target feel despair and helplessness is the objective. This cycle of hope building and then breaking is done in many ways.  The techniques between the physical methods and the no-touch technological methods are similar. Speech is very important during this process of emotional manipulation. Such examples are, “We have imprisoned you without due processes or hope of it. You are indefinitely detained.” Hope building examples include, “Sorry. We have mistaken you for someone else. You will be compensated for false imprisonment and torture.”   The main difference between the cybernetic technology and physical is that emotional state clusters can be entrained into the target mind which speeds up the process. The communication is done differently but perceived as human speech. In the no-touch torture methods it is helpful if the target is labeled with mental illness that is being created for discrediting purposes so as not to draw human rights groups’ attention.

  1. Memory Erasure

The military and CIA have been researching memory erasing drugs for half a century.  The focus of this summary report is on interrogation. Memory erasure is an important technique during interrogation. It is used in combination with sleep deprivation.  There are many drugs that have been developed for physical memory erasure. One such interrogation method requires acquiring information from the target while on these drugs and recording the subject. After a sleeping cycle, the interrogator claims that the target has confessed. Of course the target remembers nothing of their conversation. The interrogator will play samples of the subject’s conversation back to them making the subject believe that the interrogator knows more than they do.  Similar techniques are used in the wireless, no-touch torture and interrogation programs. The cybernetic methods of memory erasure have additional purposes.  The memory erasure can be used on the cybernetic target to make the target believe people have broken in and moved their belongings. While physical black bag jobs do occur, it is a way to make the target more paranoid.

  1. Electricity and Shocks

Pain and fear of death are common tactics during interrogation. Shocking by electricity is a traditional method of torture and exposed in the CIA’s secret prisons.  Shocking the testicles and nipples are the most common due to their sensitivity. Interestingly, the thousand of interviews of no-touch torture involves “stings” and “shocks” to various parts of their bodies over long durations.

  1. Fear and Terror

There are many techniques to induce extreme fear in the target.  In physical renditions dogs, power drills, guns, insects, mutilation, blow torches, water boarding, suffocation, mock burials, and mock executions are just a few the United States government have used.  Remember that many targets of torture die from the physical effects. It is torture to death.
Let us compare the no-touch torture methods used to inflict the same terror and mental anguish.  In several of these techniques the target needs to hear their handler’s voice.  This report does not describe the technologies used to broadcast voices to the target at a distance. While the subject can be broadcast mental images to their mind using hypnosis and other suggestions as well as visual entrainments, the more invasive controls of the brain manipulation technologies can be used to entrained the brain’s autonomic nervous systems such as not breathing causing the target to not be able to sleep from fear of suffocation equivalent to water boarding. The neural linguistic programming can add fears such as heart attack, stroke, and cancer threats. Even motor cortex mapping can cause twitches in any part of the body. One example used a swift neck movement with a voice transmission, “We are trying to break your neck.” Directed energy effects such as Active Denial System can make the target feel that they are on fire indefinitely without the target dying from burns. Maximum pain and torture weapons have been evolving. Every drug effect can be artificially induced into the target mind including those of poisons.

  1. Imprisonment and Isolation

Isolation is commonly used as punishment in prisons. Many whistleblowers like Bradley Manning suffer this condition. In soft interrogation it is used to get the target to talk to their interrogator since humans have the need for companionship. In no-touch torture the target is driven from their friends and family using different techniques in order to isolate them so that the electronic mind control has more effect on their psyche.  Like in Guantanamo, the target becomes isolated losing their job and medical care. Part of the method involves slander in their community. They end up on the most part in poverty and paranoid about doctors and other people from false correlations that are purposefully induced into their lives. Isolation is also a form of sensory deprivation which will be discussed later. Days and weeks lose their meaning.

  1. Sexually Disturbing Tailored Pornography

The Summary of the Senate Torture Report disclosed the disgusting revelations that in the secret torture prisons the targets were forced to perform homosexual acts on each other against their will and religion in order not to be beaten or killed. This is a common break down tactic of belief systems and the human will. In no-touch torture the techniques are more psychologically specialized for each target. Most common examples include homosexual targets that are forced with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are forced to view child pornography in their minds. And vice versa is true, that heterosexual targets are forced to view homosexual sexual acts like in the secret U.S. torture prisons.

  1. Mutilation

Also mentioned in the declassified report on torture was mutilation of the human. Cutting the naked target’s penis and scrotum, pulling nails or teeth is common.  In no-touch torture mutilation is done by trickery.  Let us look at a couple examples. There have been several targets who believed that the microwave hearing effect and other voice induction methods were done by microchips implanted in their teeth or ears. They had all their teeth pulled because they believed it was a technology called bone conductance. Others have poked out their ear drums in the belief they had micro implants in their ears. There are many more examples of trickery used to make the targets mutilate themselves.

  1. Personal and Spiritual Defamation

In physical torture the CIA and other groups use propaganda and defamation of character for those they oppose. For detainees they try to disenfranchise the target from their religion. They will defecate on their Bible or Koran for example. They might say, “Why is your God not saving you?”  In no touch torture and behavior modification they might try to make an atheist believe in god. It is just a mechanism to alter belief systems for control and experimentation. Perhaps the target may wish to confess their secrets to a “voice of god weapon”. Information warfare covers the gamut of electronic communication as well. The government training exercise uses language like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”, “use deception”, “ruin business relationships”, and “post negative information on appropriate forums” – in a malicious effort to target bloggers, activists, journalists, social event organizers and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.

  1. Psychological Intimidation

This is a topic for a target at the beginning of the trials and programs. Physical break-ins are common even if the target has an alarm system. The NSA has used stalking of foreign officials in the past for economic gain. The FBI does black bag jobs to invade a home without a warrant. The point is to let the target know they are being watched and to increase their paranoia. The NSA easily hacks all computer systems and causes harm to the victim’s intellectual property and their relationships from that endpoint. In the no touch torture false correlations between pain and a neighbor coming home can be induced.

  1. Rape

Rape is a common practice in torture. It causes much psychological trauma. In the United States methods of rape in their military and CIA secret prisons it is often relabeled. It is commonly done by prods but “rectal rehydration” is the more common misnomer. Often they call it forced feeding through the rectum but it is meant to induce psychological scaring and trauma. Several have died from the technique due to rectal bleeding.  In no-touch torture the psychological trauma of simulated rape takes on different forms. Using technique often called EEG-heterodyning the targets will receive molestation effects of their genitals. In men this can be the anus and genitals. Similarly women can be wirelessly raped by the analogous function of perception.

  1. Dietary Manipulation, Forced Weakness and Sickness

The idea behind dietary manipulation is to weaken the target. This is easily done in a physical setting but in no-touch the hunger trigger needs to be suppressed. Sometimes a false correlation between eating food and sickness is induced to make the target believe they are being poisoned. However, poisoning is common in physical renditions too.

  1. Repetition

Verbal breakdown is most important during interrogations and torture. Obviously speaking the language of the target is necessary. This is why there are interrogators in all languages. Repetition is an important neural linguistic programming interrogation tactic to influence the target mind. During the breakdown process, threats to kill and to torture the target’s family or friends are common. Repetitious questioning and breakdown phrases are automated in both the physical and no-touch versions of torture. An interesting technology that is used for no-touch torture is called chatter bots. Chatter bots, an artificial intelligence program, automate much of the repetition so that the interrogators don’t drive themselves crazy during the neural linguistic torture and programming phases. Let us not forget the Chinese Water Torture, a single drop of water on the forehead of the detainee for months. Repetition is a form of torture.

  1. Sensitization of Pain Impulses

While the reverse can be obtained, optimizing perceived pain and misery is the objective in torture. Each trauma adds to the overall misery throughout life.  Optimization of pain has been studied by the military and intelligence agencies. In the past the CIA has used drugs such as LSD to enhance fear and terror in the subject. Other methods such as hypnosis can increase perceived pain and the power of suggestion such as telling the subject his pinky finger is going to be cut off before it is done. In no-touch torture the same psychological manipulations are exerted. Subliminal and overt suggestions are often told to the subject before the directed energy or EEG heterodyning pain inductions in order to maximize their effectiveness.

  1. Sensory Overload and Deprivation

Again, this technique of overloading or depriving the human of sensory stimulus is ubiquitous in torture around the world not just in U.S. secret prisons. Torture subjects in the United States have reported the use of repetitive bad music and noise campaigns. An unusual torture technique used in the U.S. secret prisons was of a use of a plastic suit filled with ice while they beat the target.  Ultra bright lights for days on end in the prison and hot/cold temperature changes in the environment are frequent. In no-touch torture, the target’s brain is forced to release dopamine which causes pupil dilatation. This acts as a sensory overload. For example the non-lethal microwave weapons research done by a professor in University of Nevada has shown this capability. Body metabolism can be altered with these weapons causing cold and hot flashes.  Targets of no-touch torture often hear endless tinnitus.

  1. Sexual Humiliation and Lack of Privacy

Often used in common prisons is a lack of privacy. It is both necessity for security and a form of sexual humiliation. Also in prison many people are raped. No-touch torture offers the same sexual humiliation and lack of privacy by using through wall radar, cameras, and EEG visual cloning to let the target know they are being watched. Degrading comments are often used on the no-touch torture subjects while they are naked or in the bathroom.

  1. Maximum Sensory Pain Techniques

Basic torture involves brutalization, i.e. physical strikes, kicks in the groin, pepper spray or tear gas, etc. Anything that involves maximum pain is the objective. Amazingly, these same basic tortures can be done wirelessly into the human mind. All forms of sickness have been reported without any real illness behind the suffering.  All suffering can be entrained into the minds of no-touch torture subjects.

  1. Sleep Deprivation

This is the number one torture method along with the popularity in the press of water boarding.  This is done in every country that uses torture. The United States is number one in torture since they are currently the world’s only superpower.  A repetitive sleep deprivation cycle is generally done 180 hrs/7.5 days at a time in the physical renditions, or in no-touch torture five days awake and two days of sleep.  Sleep deprivation accomplishes the objective of memory loss during interrogation and induces hallucinations which help with the interrogation process. In behavior modification and programming it is necessary too.

  1. Stress Positions

Keeping detainees handcuffed above their head and to walls so that they must stand for days is a common ploy in torture. These types of poses are called stress positions. They can be mimicked in no-touch torture. An example of one such trick requires the target to believe they can deflect radar energy using pots or pans and that it is directional. The target is being given an ample amount of pain until their hands and arms are spread apart holding the pans trying to block the signals. They must maintain that position in order to get any relief from the torture signals. However the stress position itself is physical torture. Often accompanying this technique are voices saying to the target, “You are doing it to yourself.”

We will finish off this summary of U.S. and its allies’ torture, interrogation, and behavior modification experimentation with ideas of why they are done to the general public and falsely accused detainees.  Anyone can be put into these programs. Justice and rule of law does not exist at the highest levels of government. Treaties are worthless because the #1 agreement in the rules of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead by example.

No-touch torture uses the same interrogation tactics as physical interrogations but with some new twists. Techniques such as “Jeff and Mutt” a.k.a. “Good Cop Bad Cop” are used. The bad cop tortures the target and the good cop tries to gain their trust. In mind control, trust games are commonly employed to manipulate the beliefs of the target.  Creating hatred of groups through false correlations and deception is a common CIA method of trickery.

In the CIA programs, the target is put through these phases as written in the documentation, “Disorient and confuse the target. Use them for our purposes, and then dispose of them in any way possible.” We can only surmise by our sample set of a thousand people what “dispose” means: prison, suicide, or perhaps a mental hospital.  Coercing and torturing people to suicide is very common. Both tactics in physical or no-touch torture involves plausible deniability.

The no-touch interrogations are better than physical rendition techniques for exposing support networks. Traditional NSA tracking of email and phones calls are useful but if the targets are taken into a secret prison they can’t contact their networks. In no-touch torture, the target will contact everyone who might help them. Then those relationships can be destroyed to isolate the target. All these techniques rely on the target having a fear of death and pain.

Deception is very important during interrogation. In physical interrogations the targets are often drugged. This creates the confusion necessary to pull off certain trickery. In terrorist interrogations, for example, the CIA uses fake newspapers to make the target believe whatever event they were suspected of plotting had already happened, obviously looking for a confession.  Sometimes the government in charge of the torture is looking for a political gain through a false confession. None-the-less false flag operations are commonly used in both forms of torture and interrogation.  The trick is to make the target believe another foreign country is doing it to them. In no-touch torture the trick is to make them believe someone related to them is behind their suffering.

Voice transformation and morphing is an interesting technology also used in both physical and wireless interrogations. It is a form of deception used against a target to trick them into believing that they are speaking to real people that they know. It has been used in war to trick generals.  Obviously spoofing email and other identities on internet forums can be used in this manner too.

Finally, the topic of human experimentation for improving weapons, torture, interrogation, and social disruption methods will be breached.  Most of the techniques mentioned above work most effectively if the target has no SERE training (Survival, Evasion, Resistance and Escape) or psychological understanding of the methods to influence the human mind. Unfortunately, every sample point in the world’s society needs to be studied to improve the weapons systems. This is why many random people are put into the torture and mind control experiments. There are some devious uses of a secret army of remote controlled assassins in every country in the world. The samples must include different education, language, culture, and economic factors.  Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it. No-touch torture is much more complex than physical torture. Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary to test on innocent targets. Often the subject will be taunted by the statement, “Try to stop us.” This statement forces the torture subject to try to figure out shielding and jamming techniques to stop the wireless torture and helps the weapons designers to improve on the system.

However, the psychological and perceived physical pain is only half the story with no-touch torture. It also involves a set of scripts, mind games if you will, to walk the target to murder and/or suicide. This is called “Hyper Game Theory”.  It is used in war games to determine how to control your enemies and targets.  Game Theory can be used on governments, individuals, or for determining propaganda to alter cultures. The experiments on the public provide a means to test the efficacy of these scripts and determine under what circumstances to use them.

One last comment on why “We must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex” as President Eisenhower warned. During these torture programs run by the United States and its allies, accurate “truth” data points need to be used to judge the efficiency of the interrogation methods. This is why there is a dispute between the CIA and Senate Intelligence Committee reports about the usefulness of torture. Subterfuge by the CIA hacking into the senate oversight committee’s computers is a big deal; a rogue agency has been formed. Data fusion centers, Homeland Security Data Fusion Centers, NSA, and FBI collect data on Americans. This data in turn is used during torture and interrogation of Americans in no-touch torture.

Ex-CIA and MI5 Agent and Whistleblower Carl Clark Reveals Covert Electromagnetic Torture of Civilians by Intel Agencies in US/UK/Europe/Asia with Directed Energy “Non-Lethal” Neuroweapons

(Text of interview re-posted with thanks from Stopeg.com and Rudy2’s Multilingual blog–links below.)ECC-cover of Torture, Asian and Global Perspectives

In my quest to post information of note relating to the ongoing and blatant global holocaust of covert persecution and assault of innocent and ethical civilians and veterans (“Targeted Individuals”) with ElectroMagnetic Radiation (EMR) Neuroweapons, Scalar Weapons, Sonic Weapons, Directed Energy Weapons, wrongfully-named “Non-Lethal” Weapons, and all other misnomers for what Tim Rifat rightfully calls “a fearsome array of mind control weapons” possessed and used today by unscrupulous governments, militaries, and Intel agencies, I am re-posting in excerpt this extraordinary 2010 whistleblower testimony interview with ex-agent Carl Clark of Norfolk, England, who worked with Secret Services in many countries in Europe, Asia, and the US, including the CIA, Mossad, MI5, and others.

raum and zeitIn this interview he reveals his experience and thoughts on the subject of covert electromagnetic torture of civilians, whether political dissidents or not, by American, British, European, and Israeli Intelligence agencies, surveillance and harassment activities in which he participated once as an employee, and which he experienced himself on his person after he left the Services.

This interview appeared in the German magazine Raum & Zeit, 4/2010, and is posted here in text form from Rudy2’s Multilingual blog; the pdf is linked from StopEg.com, with thanks to both; the translation from German to English is noted on the pdf as by Cyborg Nicholson on PeacePink.

*****************

From the start of the interview:

Interview with Carl Clark, Norfolk, England.

Armin Gross: Matters related to the secret services are usually not disclosed. You want to bring them out in the open though. Who did you work for?

Carl Clark: I worked freelance from 1980 to 2003 for various secret services. I worked for the American Central Intelligence Agency (CIA) up to 1997. I then worked for the Israeli Secret Services, Mossad and for the Anti-Defamation League (ADL), a US organisation against discrimination and defamation of Jews.  I was also employed by MI 5, a subgroup of the British Secret Services.  I later moved to the Police Secret Services as well as to the secret services of an investigation laboratory.  I was deployed in European operations in Paris, Zurich, Berlin, Dusseldorf, Munich, Madrid, Lyon, Bilbao and Moscow.

Armin Gross: What were your main assignments?

Carl Clark: An important assignment was to infiltrate certain groups to obtain inside information about them. I would join certain groups, make friends with some of the members and then proceed to ruin their lives.

Armin Gross: What kind of groups were they?

Carl Clark: First and foremost criminal gangs and drug cartels.  I provided information about the National Front, Nazis or skinheads to Israeli Secret Services. What they were interested in were names, addresses, meeting places, projects and objectives. I tracked individual targets for the CIA.

****************************

From the section on Microwave Weapons onward:

MICROWAVE WEAPONS

Armin Gross: Did you also use such weapons?

Carl Clark: No. I was responsible for surveillance. Colleagues from special departments did this. However, I was at times on site when these weapons were deployed.

Armin Gross: Can you describe in more detail how the deployment of weapons took place?

Carl Clark: It’s a bit like what takes place in a science fiction movie. People can be tracked anywhere by radar, satellite, a base station and complimentary computer programs. For example, three radar devices would sometimes be positioned in the vicinity of the target.  The radar emits electromagnetic waves, some of which pick up the target and the result is then evaluated. My friends who work in the special department could then follow the target all day on their computers. This form of localising the target made it easy to deploy the weapons accurately. My colleagues could see exactly where to aim and also observe how the target reacted.

Armin Gross: What effect did the weapons have on the targets?

Carl Clark: They create heat, inner burns, pain, nausea, fear. Sometimes traces are left on the skin, but mostly not.  If the targets go to the doctor, they get told everything is OK. Take into account, this was the situation ten years ago. This technology has advanced considerably since then.

Armin Gross: What is the objective of such attacks?

Carl Clark: The aim is to intimidate certain people, for example people who make a lot of noise. I myself was under attack for three years after opting out. I’m virtually sure that weapons were used against me in 2003/2004 which provoked strong aggression. I almost killed somebody on two occasions, once a neighbour who was a pleasant elderly lady.

ATTEMPTS TO DRIVE PEOPLE TO INSANITY

Armin Gross: Do you think it’s possible to directly influence feelings by weaponising electromagnetic rays?

Carl Clark: Without doubt. We know that living organism is sensitive to electromagnetic radiation. Elementary life processes within cells function by biogenic electromagnetic oscillation. Frequencies from the exterior can damage or change these processes. There have already been far-reaching attempts at influencing body, mind and soul through frequencies within the framework of military research. It’s possible to provoke fear, aggression, nervousness or forgetfulness in this way. In combination with other interventions, a target can be driven insane. For example, radiofrequency can be manipulated so that the target hears his own name on the radio or his computer shows his name time and again. Voices are also specifically transmitted to a target commenting on his activities.  For example, I heard a voice in the morning after getting up which said “Get up and injure somebody”.

Armin Gross: People are actually being driven to psychic extremes then?

Carl Clark: Yes, the undoubted goal is to have select people end up in psychiatric institutions. If a target seeks help by going to the police or to the doctor, they don’t get taken seriously.  Some doctors and hospitals actually work together with the Secret Services. Diagnostic directives permit a patient who feels persecuted or hears voices to be classified as schizophrenic.

Armin Gross: Hospitals cooperate with the Secret Services?

Carl Clark:  Yes, certainly. Large companies too. That’s why one lives dangerously if one carries out investigations on large companies.  The American State protects large companies like MacDonald’s, Coca-Cola and certain pharmaceutical enterprises. These companies also have FBI agents at their disposal for matters related to industrial espionage. The Freemasons who are widespread within the CIA also play a major role.

ENORMOUS SURVEILLANCE NET

Armin Gross: Do you know in which countries individuals are under surveillance and are being assaulted by energy weapons?

Carl Clark: The USA, Germany, China, North Korea, Russia, France and England, normally without the official knowledge of the particular government. But unofficially, I believe that government personnel must be involved in some way or know something about the goings-on.

Armin Gross: Do you know how many people are under surveillance?

Carl Clark: There are about 5,000 in England under surveillance and about 15,000 overseeing the operation. Apart from the large Secret Service agencies, there are 300 or 400 minor Secret Service agencies which were formed by former policemen or former Secret Service agents. They have permission from the Home Office to spy, take photographs and procure information. Their employees are well paid.

Armin Gross:  Was it a problem for you to switch from one Secret Service agency to another?

Carl Clark: No. It was always a positive move from my new employer’s viewpoint as I could always provide information to him about my previous Secret Service agency. The large Secret Service agencies mistrust each other totally. I earned more money as a result.

OPTING OUT

Armin Gross: Why did you opt out?

Carl Clark: I saw that what I was doing was wrong. The last two targets that were allocated to me had done nothing. They were not political, quite normal, nice people, not criminal or economically dangerous. The only reason I could come up with for them having been selected as targets was their DNA or their blood.  There has recently been a lot of research done in this area. The DNA is associated with the finest details of our character. The Human Genomes Project between 1993 and 2004 analyzed all chemical base pairs which make up human DNA, also collecting the genetic data of people from isolated communities in danger of extinction (Human Genomes Diversity Project).  The results were then all compared and correlated. Our employers were always very keen on DNA analyses of the people under surveillance. It was always one of our most important tasks in the initial period of surveillance to organize DNA or blood analyses of these individuals.

*********************

Please visit Rudy2’s Multilingual Blog for the entire text of the interview, and also for translations in different languages, including French, Italian, and Spanish. Or visit Stopeg.com for the pdf of the translated interview.

2015: Asymmetric Stealth Warfare Fully Operative All Across the USA Today

Asymmetric Stealth Warfare Against the US Population Fully Operative Today: Electronic Warfare, Cyber Warfare, Microwave Warfare, Aerosol Warfare, Chemical Warfare, Bio Warfare, Psychological Warfare, Neighborhood Robotizing–19 Signs It’s In Your Neighborhood

Please click on the link above for the full article–posted as a page under Human Rights.

Global Movement to Raise Awareness of Covert Harassment and Surveillance

Covert Harassment and Continuous Electronic Surveillance–invasive body, mind, and behavior assaults/neural and muscular manipulation/Electronic Warfare–with deadly, lethal, and inhumane radio and microwave, sonic, and scalar “non-lethal” weapons is being executed worldwide on innocent civilians and veterans by unscrupulous corporate governments, militaries, and Intel agencies–a phenomenon that is increasingly being exposed by those being assaulted, the rare human rights advocates and organizations willing to speak out, and the rare journalists writing about it. This effort is now being magnified a hundredfold by the newly-established International Conference on Covert Harassment, co-organized by Peter Mooring, founder and director of STOPEG, Stop Electronic Weapons and Gangstalking, profiled and interviewed here on the show Real Politik by writer and reporter James Tracy. Many thanks to James Tracy for this original post at Memory Hole Blog, and to The PPJ Gazette for re-posting.

Are All Americans Being Covertly RFID-Chipped?

The recent post here on RFID Chips has been updated and linked as a page, linked under Ethics in 21st Century Sci/Tech.

Are All Americans Being Covertly RFID-Chipped? Thirty Percent of Americans in a Cross-USA Study Found to be RFID-Chipped