Tag Archives: Electronic Warfare

Electronic Warfare and Neuro-Warfare on Civilians Worldwide

My thanks and appreciation to Paul and Mindy Marko of Pine Cone Utopia for this interview yesterday and their speedy production of the video, which is posted online already at Youtube.

We covered a wide range of subjects, including the subject of my own wrongful targeting/surveillance/non-consensual experimentation experience (covered earlier last year at Washington’s Blog), the fact that electromagnetic weapons are being used covertly, under classified and “public safety” covers by local Law Enforcement, the subject of ongoing classified non-consensual experimentation, the invidiousness of our current laws which permit those under surveillance to be experimented on by the Military and by the CIA, media treachery in failing to report on these matters and choosing in fact to spout Government propaganda and lies instead about “Targeted Individuals” being delusional and paranoid and schizophrenic (while fusion centers and the Military pummel them with electromagnetic weapons), and the deadly evils of secrecy which permit all manner of abuse of civilians.

My keen interest these days is to inform and educate all members of the public that we are living today–and have been, for a long time–in the Age of Electronic Warfare and the Age of Neurowarfare, and that these weapons, which use stealth, invisibility, classification, secrecy, and Military Deception & PsyOps (witness media antics) as tools to keep them hidden from view, are here in our neighborhoods and local police stations (worldwide), and are in fact quite likely being used on Everyone, as illness-inducers, and as tools of Secret Policing.

Many researchers note that the Military and Intel agencies have gone to extreme lengths, even greater than with The Manhattan Project, to conceal public awareness of these electromagnetic weapons. The only reason for that could be that they think they’ve found their Golden Goose here which will keep on laying golden eggs of increased funding for surveillance and increased funding for Electronic Warfare while offering then a foolproof, plausibly-deniable way to prey on civilians, assault civilians, use civilians (for instance in false-flag shootings), and control civilians and communities–all in secret, with antennas, concealed generators, through-wall surveillance devices, concealed and portable DEWs, satellites, and drones. All the more reason to expose the use and abuse of these weapons, now, if we are to retrieve our humanity and shut down these inhumane programs of Surveillance which are in fact Torture, Bodily Assault, and Slow-Kill or Assassination programs, and hold the arbitrators of these anti-human programs fully accountable. 

Memorandum to President Donald J. Trump on Domestic US Torture Programs Running Under Cover of Surveillance

“We will seek friendship and goodwill with the nations of the world, but we do so with the understanding that it is the right of all nations to put their own interests first.

We do not seek to impose our way of life on anyone, but rather to let it shine as an example.

We will shine for everyone to follow.”

–President Donald J. Trump, Inauguration Day Address, 1/20/2017

donald-trump-inauguration-3a

Memorandum on Domestic US Torture Programs

Running Under Cover of Surveillance

Covert US Military/Intel/Justice Physical Mutilation of the Population

EMF Weapons, Neuro-Weapons, Bio-Terrorism, & Organized Stalking

Date: 25 January 2017

To President Donald J. Trump

Dear Mr. President,

We unite in asking you to act to terminate immediately the ongoing covert programs of Electronic Warfare and COINTELPRO-based domestic terrorism that are currently being run by the US Intelligence agencies, US Military, US Homeland Security, and their contractors in the name of Electronic “Surveillance” and National Security against the American population.

As you enter this office for the first week, it is possible the Deep State and unelected shadow government that apparently hovers behind all those elected to the government of the United States will present these covert programs to you as normative Intelligence and surveillance activity necessary for the preservation of National Security.

As Intelligence analysts, human rights activists, advocates, whistleblowers, writers, scientists, victims, and highly productive and accomplished members of society with varied science, arts, and humanities backgrounds in critical thinking, systems analysis, engineering, education, healthcare, law, and Intelligence, we are here to inform you otherwise: These are NOT normative Intelligence and Surveillance activities. Using the deadly weapons of Electronic Warfare, these are organized Terror programs, committing the most horrific crimes and human rights violations, causing grievous bodily harm to countless numbers of innocent citizens.

Surveiling and assaulting neither terrorists nor spies but the best and brightest, most productive, and most accomplished Americans, as well as whistle-blowers and activists, these programs seriously destabilize our civil society, are at risk of irreversibly degenerating the economic output of our country, and have already become our most shameful export abroad.

Situation On the Ground in Continental USA

Thanks to the trillions of dollars poured annually into Covert Operations funding, the carte blanche given to Intelligence and Military agencies, both pre- and post-911, and the convenience of classification and concealment of all manner of dubious activities as necessary for National Security, fraud, waste, and corruption at the highest levels of Government is now endemic. Corrupt factions in Intelligence agencies and in Military departments are now openly committing war crimes and crimes against humanity in acts of direct enmity against the American people.

  1. In the name of the War on Terror, a superior trafficking operation has been unleashed by the US Military, Department of Homeland Security, and the CIA on American citizens:

Current military and Intelligence directives (5240.1R, the NDAA, EO 12333, and the CIA’s AR 2-2) together permit the US military to detain citizens indefinitely, and to use those Americans “under surveillance” for experimentation purposes. This is used for an outright, public enslavement and torture of a large fraction of the US population.

The creation of Joint Targeting operations, Fusion Centers, Regional Information and Sharing Systems (RISS) programs with privatized Intelligence centers, as well as “Community Policing” and “Neighborhood Watch” initiatives have permitted a network of immoral and depraved operatives from Law Enforcement, the Intelligence agencies, and the military, using the guise of “national security” to conduct financially rewarding no-holds-barred human testing for the pharma, surveillance, and weapons industries, as well as to live out their personal sadism and depravity. It is a telling characteristic that the victims of these crimes are 70-80% women. The sex ratio is indicative of sexual violence and war crimes.

Meanwhile, an ever increasing army of civilian, quasi “Law Enforcement” personnel, sometimes taken from the dregs of society, is being trained, round the clock and used in set-up 24/7 operations, on those innocent Americans being targeted.

  1. In the name of the War on Terror, and masquerading as necessary Electronic Surveillance, condoned and orchestrated by US Homeland Security and the US Department of Justice, the most deadly weapons of Electronic Warfare are being routinely used on civilians under so-called surveillance inside their own homes including:
    • directed-energy and microwave weapons,
    • infrasonic and ultrasonic weapons,
    • military radar weapons,
    • neuro-weapons,
    • infections with biological or synthetic self-replicating nanotechnology agents (“smart dust”) that aid the readout of brain activity.

These are military weapons of war, designed to incapacitate, degrade, and destroy human organs, nerves, bodies, and brains; they are further being used inhumanely, in non-stop, 24/7 scenarios of attack.

In addition, CIA/DIA/DARPA/NSA agents also run covert interrogation exercises, mind control operations, and behavior modification programs (extensions of MK ULTRA and the original Nazi death-camp experiments) on their brains.

A vast apparatus of sophisticated stealth Electronic Warfare and Signals Intelligence equipment carried on planes, drones, helicopters, satellites, cell towers, ground-vehicles—and involving the complicity of all Intelligence agencies, such as the NRO, NGSA, and Federal agencies such as the FAA and NASA is being used for this purpose.

Those being hit with Electronic Warfare weapons are also being subjected daily to COINTELPRO actions or “Zersetzung”—organized stalking, crowding, mobbing, obstructing, brighting, flashing, noise harassment carried out by the FBI’s Infragard, as well as US Neighborhood Watch groups.

These are joint US Military and Intelligence programs of domestic torture, hidden under cover of biometric surveillance, physical surveillance, and electronic surveillance by a cynical and corrupt Homeland Security/Department of Justice mechanism, which has permitted the use of cover-story labels to conceal the use of violence on American citizens.

  1. In the name of the War on Terror, in 2017, American neighborhoods and communities have been transformed from calm, peaceful, and neighborly communities into predator vs. prey, i.e. divided holdouts of covert spying, snitching, Electronic Warfare, smear campaigns, and studied COINTELPRO attacks on neighbors, planned and coordinated through federal government-sponsored intelligence, information and command centers at the national and local levels, such as the Regional Information Sharing System (RISS), the U.S. Department of Justice, and the network of Fusion Centers.

At core of these attacks are the innocent Americans being wrongfully targeted and defamed as extremists, terrorists, spies, enemy combatants: often the most upright in communities, people of conscience and community spirit, integrity and accomplishment, entrepreneurship and creativity, innocence and impeccable character, people targeted not for their potential for criminality but for their innate power as attractors and disseminators of positive community influence.

The coterie of criminals from inside the FBI/DHS/CIA/NSA and local Law Enforcement and RISS centers involved in these programs openly lie in neighborhoods to name these innocents terrorists or spies, open investigations on innocents, start slander and defamation campaigns on innocents, and then corral whole communities into helping them surveil, spy, sabotage, and slander them, under threat of high fines and jail time.

By these means, whole lives are destroyed: employment is sabotaged, lies are circulated, and families are torn apart.

Neighbors become collaborators and complicit when they let Electronic Weapons operators freely enter their neighborhoods and homes, using their driveways and properties to install antennas and conduct tracking operations.

Collaborators are paid handsomely and bribed with home renovations, new cars, and tickets to luxury holidays and ball games. They are also trained in the operation of certain equipment, including cell phones to direct pulsed radiation attacks, which they now turn on their innocent neighbor.

This rewards and entrenches corrupt behavior in a manner that will utterly splinter and disintegrate our society for decades to come. Worst of all, this system of routine horrific abuses has developed a life of its own whereby ever more vindictive acts are committed and the perpetrators on the ground take free licence to do whatever they like at the expense of economically productive members in our society. Their excesses include electronic rape.

  1. Psychiatry has been roped in as political tool to subjugate those reporting these programs by naming them delusional, a verdict that Law Enforcement and CIA-controlled media then run with.

It must be stressed that the national silence on this issue as well as the distortions of reportage we see in mainstream-media mention of “Targeted Individuals” who report abusive surveillance programs is directly related to the vampiric control of major media that the CIA exerts, and their deliberate promotion of deception in coverage, in order to keep these violent, mutilatory programs of Electronic Weapon use on citizens clandestine and concealed.

Corruption at the levels of Law Enforcement and the Department of Justice, and the use of weaponized psychiatry combined with indiscriminate smears and slander of the victims has prevented the situation from being remedied.

A Public Scandal Of International Proportions

This has now become a proliferating and self-perpetuating industry of premeditated, systematic mutilation of some of the most productive members of our society.

By getting rid of people of conscience and integrity, whistleblowers, and activists in communities—through these extreme means of public torture and humiliation—it appears that the covert operators in Intelligence and military agencies running these programs seek more and more to create docile, deceitful, and pliable populations, people who will believe the official lie, people who will turn on their own friends and neighbors, people who will assist in stoning the innocent to death.

The extent and sadism of these deliberate bodily and brain assaults—which essentially involve the use of military weapons of war on peaceful, non-combatant, unarmed civilians, peacefully residing in their own country–amount to crimes against humanity being perpetrated against the American people.

And sadly, these Nazi death-camp programs of torture have become USA’s most prominent export along with our bombs, missiles, and drones.

To the disgrace of all Law-Enforcement, victims have been pleading for support publicly on social media for years. By now, the situation has gone beyond a disgrace and has become a public scandal of international proportions that is threatening the stability of our societies. Without a doubt, this problem is destroying the best and brightest in our nation and will inevitably affect the economic and creative capabilities of the US. This already sets us back in the race with other nations and seriously exposes the US to the danger of a hostile takeover.

Silent Holocaust Taking Place Inside the US

Please see attached here:

1) The Executive Summary: Neuropsychological and Electronic No-Touch Torture Report (Based on “The Torture Memos” and the Senate Intelligence Committee’s Declassified “Torture Report”) By Robert Duncan, A.B., S.M., M.B.A., Ph.D.

2) NSA whistleblower Karen Stewart’s succinct summation of what has happened to America today:

Under former President Bush and now continued under President Obama, what apparently started decades ago as illegal and clandestine programs of experiments on human subjects, such as the CIA’s MK ULTRA, has resulted in the proliferation of Defense Contractors such as Lockheed Martin, Raytheon, General Dynamics, and others, making secret agreements with Federal agencies such as DOD, DIA, NSA, DHS, etc., to allow them and related laboratories and universities to expand inhumane experimentation programs such as illegal experiments for Directed Energy Weapons on unwitting and non-consenting American citizens.

The scam goes like this, random people, or people who are dissidents or whistleblowers are purposely mislabeled as “terrorists” and put on an Enemies List, which is then turned over to Defense Contractors to target under perverted interpretations of NDAA and PAA.

This allows them to engage the Military and Law Enforcement in either the active harassment and torture of individuals illegally targeted for fraudulent cause, or it gives the Defense Contractors carte blanche to commit criminal assault upon innocent citizens while demanding (unconstitutionally) that Police stand down and do nothing to help their victims.

Please read the full statement here.

Please Act Now To Stop These Crimes Against Humanity in the USA and Worldwide

To stop these crimes against humanity we, the undersigned, request that you immediately:

  • Stop all of these surveillance, testing, and experimentation programs.
  • Stop and revoke all mandates permitting the US military to test weapons on citizens.
  • Repeal and revoke all civil and military directives which permit non-consensual experimentation on Americans.
  • Call out the National Guard to confiscate all portable EMF-weapons and radar/sonic/scalar surveillance devices, and haul off to prison anyone – including Feds, law enforcement, etc., found with them as they violate many many sections of 18 USC in regard to weapons of mass destruction.
  • Freeze all programs of surveillance being run by any and every agency in the DOJ and Homeland Security apparatus.
  • Force the open publication of the list of names of all people who have been targeted with organized stalking, EMF and neuroweapons by agencies at the federal, state, and local level for the past thirty years.
  • Compel disclosure of the medical parameters of these classified, covert, special access surveillance and torture programs from all Universities and research institutions, all Defense and Intelligence contractors, departments, and agencies.
  • Compel disclosure to each victim of his/her file containing what experiments have been conducted, what has been injected or implanted, what nanotechnology has been administered, and provide immediate, fully-compensated medical help in scanning/implant removal, radiation-damage treatment, & taking other medical/health measures against the long-term consequences of these crimes.
  • Fully re-imburse to victims all medical costs and family funeral expenses sustained during the course of these torture programs, and plan to provide continuous compensation for all victims’ health expenses until death.
  • Cut funding for all surveillance programs currently being run on named American citizens.
  • Cut all covert operations funding for any and every agency, in particular the CIA.
  • Compel mainstream media to fully and openly detail these programs of torture on citizens.
  • Root out all personnel employed in these programs, starting from the top.
  • Set in motion a Congressional investigation, to fully uncover and disclose details of these programs.
  • Dismantle all agencies and military groups whose record shows shameless participation in these crimes against humanity.
  • Work closely with your counterparts and with agencies abroad to ensure the same results of restoration of human rights and freedoms, worldwide.

These crimes against humanity need to be stopped if the United States of America wants to retain its national resilience and keep the goodwill of its partners worldwide.

You have an opportunity today to set right many historic wrongs. Much is made of America’s history of slavery. Yet this reality on the ground today shows us, that with the stealth weapons of Electronic Warfare and Neurowarfare, slavery has entered a new phase.

You have said:

There should be no fear — we are protected, and we will always be protected.

We will be protected by the great men and women of our military and law enforcement and, most importantly, we are protected by God.

…We will make America safe again.”

–President Donald J. Trump, Inauguration Day Address, 1/20/2017

But there are NO laws on the books today in the USA—land of the free and home of the brave—to prevent non-consensual experimentation on humans. Americans today are enslaved and are exporting this medieval travesty into every corner of the world.

Your children and grandchildren are just as much at risk as ours.

Please act today to put an end to these horrific, shameful crimes against humanity which are tearing apart our society.

Sincerely,

Ramola D, USA
Author, Journalist, Activist

Karen Melton Stewart, USA
NSA Intelligence Analyst, Ret.

Dr. Katherine Horton, Germany
Particle Physicist, Systems Analyst

Ricardo Camilo López, USA
Theoretical Physicist, Math & Science Teacher, Semiotician

Paul Baird, BEc. LLB, Australia
Human Rights Advocate

Eyerly Felder, USA
Human Rights Activist, Foster Parent, Podcast Host and Journalist

Rosanne Marie Schneider, USA
Author of “Surveillance, Torture and Control in the Modern World”
Former Artist, Animal Rescuer, and International Business Owner | Now Victim

Regis Burke, MSW, USA

Leo E. Garcia, USA

Teresa Bender, R.N., ASN, Harrisburg, PA, USA
Graduated Magna Cum Laude. Phi Theta Kappa member.
Service connected disabled veteran of USAF, 1989-1993.
Honorably discharged. Served during First Gulf War.
Interviewed by news media in West Virginia. Video on YouTube link: “Adult Bullying, West Virginians speak out”. Also participated in Targeted Individual awareness video titled “Targeted Individuals, A Plea for Help”, filmed in NJ in 2014.

Robert I. Walker, USA
Human Rights Activist, Vietnam Veteran, Christian

Seth Farber, Ph.D., USA
Author, Psychologist

Gregory A Mann, USA
Former Marine, Retired Dept. Of Defense
Combined service 27 years.Whistleblower.

Margaret Zawodniak, RN, BSN, USA

Amy L, USA
Licensed Massage Therapist

Joseph Quevedo, B.S. International Business, USA
Certified Logistics Technician

Mariana Maritato M.S., CCC-SLP, C-PESL, HC, Poland

Herman Winston, USA
US Army Veteran, Ex-Police Officer, Mechanic

Dr. Millicent Black, MACM, MMFT, USA
Refuge From the Storm Church, Columbia, TN
Pastor, Activist, Researcher

Tracy A. Wellons, USA
Biomedical Research Scientist

Kenneth Peartree, USA
Senior Master Sergeant, US Air Force (Ret.)

Virginia Sealey, USA
Louisiana State University graduate, Health and Physical Education.
Commercial Real Estate Broker (Ret.)

Captain Gary W. Kassbaum M.M., Canada
Senior Regional Investigator – Marine, Transportation Safety Board

Alec Devere Rafter, NYU Graduate, B.F.A., USA
Actor, Writer, Musician

Ben Colodzin Ph.D., California, USA
H-SCADA profiler (Human-Supervisory Control and Data
Acquisition Systems) for targeted victims

Paul Grigun, USA

Thomas A. Dickey, USA
U.S. Army, Retired

Mr. Robert Vincent Leaf, USA
HVAC Technician, App.

Mike Patrick, USA

Mandi (Deedee) Durrence, USA
Self-Employed, Construction, Farming

Barbara Hyseni, USA
Sergeant in the US Air Force
Christian Ordained Minister

Geri Kemp, BS in Business/Finance, MPA, USA
Certified Business Official, Educational Facilities Planning,
School Business Management (Ret.)
National Youth Equestrian Program Organizer

Denise S. Pompl, USA

Donna Stanley, USA
Mother, daughter, grandmother, friend, American, Retired Corrections Officer

Lori Tolbert-Carroll, USA

Charmaine Thomas, USA

Guy Potter, USA
35-year victim

Ms. Maura Sheehan, RN, BSN

Rochelle Jones, USA
Ordained Minister, CA

Juanita Hardnett, GA, USA

Sherri M Guarnieri, USA

Edith Diane Schutza, TX, USA

Michele Kimbrough, USA
Retired, Department of Corrections

Kola Boof
Award-Winning Novelist and Television Writer

Bonnie Hunt, USA
Retired Comm. College Instructor, College Lecturer,
and HS Teacher, MBA, MS, CPA (Inactive)

Jeaneine M. Heaney, USA
Christian

Arlene Johnson BA, MLS, USA
Publisher/Author | http://www.truedemocracy.net

Cathy L. Wright, M.S., CCC-SLP, USA
B.A. in English, B.S. in Communication Sciences and Disorders,
M.S. in Communication Disorders.
Speech-Language Pathologist. Whistleblower.

Angela Farrell, USA
BS, Psychology, BSW from West Virginia University.
National Sales Award 2005, 2008. Pharmaceutical representative.
Currently: Yoga , aerobic and Silver Sneaker instructor YMCA.
Health and wellness instructor.

Mrs. Sherri A. Marquis, AA Business, BA Legal Studies, MS Mgmt, RI, USA
U.S. Navy Journalist – 12.5 years, honorably discharged with service-connected disability.
Dept.of Defense (Navy, Army, Marine Corps) Contract Specialist/Contracting Officer, GS-13, 8 years, WHISTLEBLOWER
Lockheed Martin Enterprise Information Systems (Orlando) and Missiles and Fire Control (Orlando) Intellectual Property Paralegal and Contracting Officer
Currently: unemployed, blacklisted, isolated, tortured and psychologically injured

Leila M S Gutowski, RN BS, BSN, VA, USA

Cheryl Weinrich, VA, USA
Former employee of SAIC, Inc., Employed from 2000 to 2010.
Contracted out 2009-’10 as a Document Control Specialist and Courier with the Missile Defense Agency.
Former student at Northern Virginia Community College, Annandale and Alexandria, VA, 1982 to 2000: Travel and Tourism, Psychology and Information Technology.

Lorenzetta Whitfield, USA
Lillian Whitfield, USA
Tanya Whitfield, USA
(Sisters targeted since May 2013)

John Thomas Christiana, USA
BS Degree CSULB; MS Degree, Kaplan Univ, 4.0; Law Student, 2L
Everest Summiter | Human Rights Advocate
Targeted Individual Victim | Federal Lawsuit Plaintiff

John Leon Anderson, CT, USA
13-year victim

Nina Elhawary Duvall, USA
Drug Alcohol Tech | Working with Ms. Massie Munroe on her campaign and book.

Mark Mandigo, USA

Muguet Burgos, CCNY, USA
Photographer

Innocentia Merchant, UK

Jessica Charpentier, MA, USA

Charles Pak, USA
Disabled Iraq Veteran 2004-2008
Tortured victim of remote technology 2007-current

Dominic Friscia, USA

Alicia Ogburn, and children, PA, USA

Amy Anderson, CA
Human Rights Activist

Constance Hannah Rose, Pacifica, CA
Artist, Author (The Joy Thieves)
Creative Director and Entrepreneur

Edward L. Spencer, MD
Neurology Retired, Researcher, Author

Dianne Renee Chandler
B.B.A. Business Administration
M.S.S. Strategic Studies, U.S. Army War College
M.S. Acquisition and Contract Management
LTC , USAR retired Veteran 28 years Service tortured victim since 2012 after filing an EEO complaint Dianne Chandler vs. Secretary of the Army John M. McHugh

Kathleen Haston, BA Psychology, USA

William Brock, Boston, MA, USA

Patrick Cleary, USA
B.S. Communication Arts from Cornell University, 1991.
Disabled teacher, social worker, and activist.

Harold Hubbard, disabled, USA

Marina Ragsdale, USA
Crew member at McDonald’s | Victim

Jeannette Eileen Fess, USA
Former Realtor | Victim

Takele Erko, Ethiopia
BSc. Chemistry | TI for 6 years

Dr. Helen Tsigounis, Australia
Author of “The Red Back Web”: http://docdro.id/dOiUm27
Targeted 20 years.

Caroline Coon, Tiburon, CA
Owner of store “Little Black Dress”

Marina Abramycheva, NY, USA

Agnieszka Kubicka, USA
26 years old | Student, Restaurant Worker

Tiffany Fusini, BA in Sociology and Gender Studies
Neuro-Behavioral Specialist

Mečislav Chorzempa, Computer Programmer, Czech Republic

Judith Greschus, Detmold-Germany
Acknowledged politically persecuted person of the GDR regime(certificate “C”)

Elke Malone, Germany
55 years, Educator

Thomas Steinke, USA
Independent Contractor
OTR Truck Driver

Andrew Furey, PA, USA

Terrance Bass, USA
Retired Musician and Marketing Professional

Geoffrey Beattie, N.I., UK

Ricki Leggett, USA
Victim for 15 years.

Stanley Heavrin, Louisville, KY, USA

Debra Matheny, Hibbing, Minnesota, USA
Anti Public Corruption Activist, Investigative Blogger, 3 generations of targets. My daughter and granddaughter, murdered.

Mr. Adair Rutherford Buckner, I.

Edgard Rene Romero Cruz
Creative genius, Artist, Mind Slave.

Dagmar Palmerova, Prague, Czech Republic
Degree in Economics

Beth Ruegg, USA
Targeted victim for decades

Paul Lucas, BSBA, Finance and Accounting, USA
Senior Accountant/Analyst for International Corporation

Nathan Entrekin, USA
Graphics/Media Artist, LDS church member

Laura Entrekin, USA
CNA Manager, LDS church member

Mr. Tobin Dresser, Bend, Oregon, USA
Freelance Writer

Andrea McCoy, BA, USA

Patricia Angulo, USA
Intake Clinical Coordinator, Personal Trainer, Aunt, Case Manager

Gülay Daricili (female), Germany
Certified Interpreter and Lecturer

Lisa R. Becker, Milwaukee, WI
BS, Human Environment & Design, graduated with honors in 1989.
Under surveillance since college, tortured with electronic surveillance since 2007.

Toshiko Namiki, Japan

Dolly Guenthner, USA
Whistleblower on the City of Elizabethtown, KY municipality to the FBI reporting $50 million fraud on the KY Retirement System–which turned out to be more than $1 billion fraud which still continues.
Terminated employee from the City of Elizabethtown, after 20+ years

 

Alan J. Bellina, USA
Amy L. Bellina, USA

Mary Fehr, New Mexico, USA
Retired journeyman CNC machinist
TI 2 years +
Catapulted into surveillance program by Ohio Neighborhood Watch

Darleen Palmeira, Kapaa, Hawaii
Targeted since 2015

Helmut Michael, Germany
I support the memorandum.
As to our personal experience:
https://www.youtube.com/watch?v=oMqWfh7TZhI

Stephen O Neill, Sligo, Ireland
Targeted since 2005

Susan C., USA
Associate Underwriter

Ursula J. Barboza, USA
Juris Doctor (1995), M.A. Library and Information Science (2008)

Heide Klebsattel, Gutach/Germany
Designer
TI since 2010

Benjamin Miller, Jersey City, New Jersey, USA

Robert Stephen Spicer, USA
1-year aware TI

Michael McKay
B.S./B.A. UC Davis International Relations/Japanese
M.S. SFSU Physics

Linda L. Jensen (Maiden name, Christopherson/first marriage, Vegoe)
Musician, poet, educator of young people, legal and medical secretary, missionary, mother, grandmother, gardener.
Also an author, and activist for the rights of individuals for justice, “life, liberty and pursuit of happiness” in accordance with the Declaration of Independence of the United States of America.

Oskar Svärd, Master’s in Political Science, Sweden

Gabriele Plank, Munich, Germany
65 years old, Teacher, German Gymnasium

Mr. Christian Pfeifer, Luckenwalde, Germany

James F. Lico, USA
BS, Computer Science, Associate’s Degrees in Biology, Electronic Engineering
Retired Software Support Specialist, Systems Administrator
Targeted since 2010

Donna Wilkinson, USA
Retired

Chloe V. Rose, USA
Service connected 90% disabled Gulf War veteran, USN.
Honorably discharged 1980-1991.

Kathryn Sorensen USA
Retired Financial Management
Recovery Agent

Martina Pearce, Sales Manager

Leonard Loch, Hamburg, Germany.
Merchant, Graduate in Business Administration.
Targeted since 2003.

Kimberly Buckner, USA
Researcher, Whistleblower, Human Rights Advocate

Connie Hicks, USA

Marcus George Hopkins, NM & MN, USA
Ba.Sc. Wildlife Science
Heavily targeted for 6 years by group of technologically advanced, vicious criminals, including a corrupt NSA, FBI and Private Investigator Employee(s)

Steve Granite, USA
General labor
30-year victim

Bennetta McKenzie, IL, USA
AUTISM MOM – Bachelors in Accounting, MBA, CPA
Targeted 14 years

J. McKenzie, IL, USA
Autistic college student, Mathematics major

Clint McLean, MS, Computer Science (distinction), South Africa

Marie-Luise von Neuberg, Karlsruhe,Germany

Detlef Müller, Minden, Germany
TI for more than 30 years

Paolo Fiora, London, United Kingdom
Director, LESAG, London End Stalking Action Group

Atsuko Miyata, Japan
Mother, wife, homemaker, landlord
Victim for 28+years

Dr. Cherie Larsson, Ph.D, MBA, BA, Florida, USA
Ph.D in industrial Organizational Psychology

Irina Wickholm, Russia
Victim, and Human Rights Activist

Tera Wills, Ph.D, College Professor, USA
Ph.D. in combination of Nuclear Engineering and Radiochemistry, University of Arkansas
(40 years in US/from Iran)
Targeted since 2012

Liuda Balcius, USA/Lithuania
Author, Blind Social Worker, Teacher of the Blind, Humanitarian and Adventurer
Blind victim of reprehensible directed energy weapons
and unconscionable chemical poisonings for more than 20 years.
Looking forward someday to a peaceful, private life without pain and torture.

Catherine (Kate) Ryan, R.N. Retired
Former Representative in Consumer Electronics
Activist/Whistleblower of an Extraordinary Rendition site in Italy, inappropriate planned disposal of PCBs through insert in bathroom tiles.
SOA Watch/Supporter, Runs Support Group for TIs in New England

Slawomir Wiktor, MA (Magister) Philosophy, Poland
TI for 7 years, Activist with Polish TI association, STOPZET

Zofia Filipiak, Poland
President, Polish TI Association STOPZET

Brandon Armstrong, USA
Truck Driver. Targeted American.

Danuta Gajewska,Poland
Teacher

Gretta Fahey, Newbrook, Claremorris, Ireland
A Targeted Individual for fourteen years.

Mrs. Hadia Fehlauer, Leimen, Germany
62 years old, Housewife and former Translator

Mr. Frank Hennrich, Walldorf, Germany
54 years old, dipl.-Cosmology Physicist, IT-product Owner

Mrs. Angelika Nowatzki, Großaitingen, Germany
66 years old, Housewife

Mr. Stefan Prechtel, Crailsheim, Germany

Lori Budd, ME, USA
Accountant
Targeted since 2005

Shelly Hoyle,WA,USA

Jane Kiesel, USA

Debra Poulsen, USA

Carmen de los Santos, USA
Information Technology Technician
Internal Revenue Service

Dr. Matthew Aaron, USA
Neurobiologist, Geneticist, Science Journalist

Debra Anda, Minneapolis, Minnesota
Generational victim of COINTELPRO
Mother Murdered 1970’s
Life of chaos, peace In Christ Jesus

(An updated version of this memo, on an ongoing basis, will be maintained on this page at The Everyday Concerned Citizen. Please send an email anytime to ramolad@hushmail.com if you wish to sign this memo. Please share this information — which is being suppressed by corporate, mainstream, CIA-controlled media — widely. Stand up for America today, and for all of humanity worldwide, add your name, and inform others. These crimes Must be publicized the world over, and publicly addressed. )

Currently Updated: 3-24-2017

Pdf for Download: Memo to President Trump on Domestic US Torture Programs Running Under Cover of Surveillance–3-24-2017

Dave Case, Electronic Engineer, Invents an Electronic Counter-Measure for High-Frequency Ringing in Ears or Tinnitus

by Ramola D/Posted 11/9/2016

Dave Case, an Electronics Engineer and inventor, recently disclosed on a call-in talk show for those Americans and others worldwide being covertly targeted and assaulted with directed-energy weapons (DEWs) and neuro-monitoring technologies—in fact the same one featuring interviews by Ella Felder with well-known NSA whistleblowers William Binney and Kirk Wiebe covered here earlier—that he had developed an electronic countermeasure to combat tinnitus, or high-frequency ringing in ears that many people experience today.

What is Tinnitus?

According to the Mayo Clinic website, “Tinnitus (TIN-ih-tus) is the perception of noise or ringing in the ears. A common problem, tinnitus affects about 1 in 5 people. Tinnitus isn’t a condition itself — it’s a symptom of an underlying condition, such as age-related hearing loss, ear injury or a circulatory system disorder.”

Information on numbers from hear.it.org tells us: “According to ATA, the American Tinnitus Association, 45 million Americans are struggling with tinnitus. In Germany the “Deutsche Tinnitus-Liga” estimates that 19 million Germans have experienced tinnitus, and that 2.7 million Germans have persistent tinnitus, of which 1 million have very severe tinnitus. The British Tinnitus Association estimates that 10% of the UK population suffers from tinnitus.”

Coping strategies or anti-depressants offer relief, according to information at health websites.

Tinnitus as High-Frequency Technology Used in Covert Assault

But there are other aspects to tinnitus few outside the military and Intelligence world know about.

In this twenty-first century of Electronic Warfare (Operation, Testing, and Training), those who are being assaulted by DEWs in particular (in illegal, criminal, covert systems of surveillance and harassment being kept concealed by the global Surveillance State in collusion with mainstream media, co-opted psychiatry, and silenced communities) know that the tinnitus they have suddenly begun to experience is an externally-induced rather than natural or inherently-arising physical health condition, so this news of a countermeasure has evoked much interest.

Many who are being thus technologically assaulted report either a continuous high-pitched frequency or being woken continually at night at specific intervals by such high-pitched sounds or ringing.

Dave himself has experienced this tinnitus, and relays that his experience began after he tried to patent a certain invention of his, involving the use of photonic processes in computers, and found that the NSA already had a patent for this light technology, classified Top Secret. He believes that he began to be externally targeted with sophisticated remote electronic technology, and, in his own current analysis of these EMF (Electro Magnetic Field) or scalar signal assaults on human bodies, says the GPS satellite system is the primary system being used for neural information transmission to and from human targets.

Signals Intelligence, Radiation Intelligence, the NSA, Neuro-Surveillance, and Targeted Individuals

Mr. Case points to the information on Signals Intelligence now known worldwide contained in the lawsuit against the NSA filed by ex-NSA employee, John St. Clair Akwei (excerpted in parts below, from scanned graphics of a 2009 publication in MindNet Journal), which points to advances in neuro-technology, radar, satellite technology, and bio-surveillance that is still carefully being kept out of the corporate press and concealed under labels of classification and secrecy, while being secretly legitimized for use by the Department of Justice, as uncovered by researchers such as Dr. Nick Begich, and explored here earlier.

sigint-1a

Excerpt/John St.Clair Akwei vs. NSA, Fort Meade, MD

According to this information, the NSA is perfectly aware that all human brains give off brain waves which can be picked up, every human brain has a unique brain resonance signature, and, under the right conditions, all human brains can be covertly surveilled, monitored, entrained, and modified remotely.

emf1a

Excerpt/John St. Clair Akwei vs. NSA, Fort Meade, MD

From this lawsuit and other sources, we learn that mind-reading is no longer fiction, mind control is no longer a myth, mind and behavior modification continue to be an active fixation with the CIA (with its grisly history of MK ULTRA experiments), and, under the broad umbrella of Neuro-Surveillance, the NSA–and DARPA, and the CIA and the FBI, and possibly the DHS and the TSA and the DEA too—is most definitely engaging in it.

nsa-1a2

Excerpt/John St. Clair Akwei vs. NSA, Fort Meade, MD

Herein lies the secret of neuro-targeting and the entire phenomenon of Targeted Individuals (TIs), desperate attempts to conceal which and whom continue apace—although, thanks to the commitment today of mind control and TI activists, ethical scientists and whistleblowers, podcasters, and writers worldwide, awareness of these advances in neuro-technology as well as of the whole unsavory phenomenon of non-consensual human experimentation continues to surface and spread.

The Bio-Relevant Feedback Loop

Targeting humans with remote electromagnetic or scalar wave technologies apparently requires a lot of specific detail. In order to target a human body remotely, Mr. Case says, a great deal of data is picked up first, related to body temperature, brain resonance frequencies, the skin dielectric, and so on. High-frequency signals sent to targets, and modulated specifically for each target, rely on something called a bio-relevant feedback loop which relays physiological data from the target back to the supercomputer running the system.

When the modulated high-energy signals are directed at the target, he suggests, the skin acts as a transducer, absorbing the high-energy signals and transforming these into audio signals which traverse the body and impact the brain, much in the modality of the Neurophone, an invention from 1958 by Patrick Flanagan which can send phase-modulated electrical signals via the skin into the nervous system to be reformed into audio signals by phase-cancellation in the brain, meaning the brain then hears sound–without the ear being involved.

This sound can range from high-frequency ringing or tinnitus to a clarity of music or voices, now being delivered remotely, without material apparatus. Readers—and in particular, psychiatrists, audiologists, otolaryngologists, neurologists–should note that this essentially means that voices in your head, music in your head, or a tinny ringing in your ears no longer means you have suddenly plunged into old age, a hearing breakdown, or that old, passé (and, many contend, false) psychiatric construct of “schizophrenia,” but that physical, electrical signals carrying audio waveforms could be deliberately being directed at your body—a phenomenon that perfectly sane “Targeted Individuals” who report harassment with voice-to-skull or “V2K” technology have long spoken about and are all too familiar with.

Countermeasure Disrupts the Bio-Relevant Feedback Loop

solar-truck1

Dave’s Solar Truck

Dave Case, who has been an inventor and engineer from a very young age, and has invented solar-powered engines and gadgets, including a solar truck that has run 3000 miles “without a penny in fuel,” knew that the key to distorting the high-frequency signals being sent to his brain lay in disrupting the bio-relevant feedback loop.

solar-truck-news-001bTo do this, he devised a method using an oscillator to create a similar but differently-phase-modulated sound to the tinnitus, so that the external signals could no longer activate the expected bio-feedback loops, given the distortions being introduced by the oscillator.

This distortive sound was recorded on a CD, and comprises the countermeasure that Dave offers today to all those being targeted. He cites 29 recipients who have offered testimonials to the efficacy of this device (some below).

solar-polaris1

Dave’s Solar Polaris

Conversation with Dave Case

My recent conversation with Dave Case on this subject is below, as well as his contact information, below the interview.

Dave, you had mentioned, that as an Electronics Engineer, you have come up with a countermeasure for the tinnitus and induced sounds/ringing in ears that many “Targeted Individuals” experience. Can you first give us a sense of your background and experience and interests as an Electronics Engineer, so we understand your expertise in this subject?

I started learning Electronics at age 6. By my teens I had made my own chemistry set, boom box, electronic door lock, servo motor, and I was electro-plating coins, making hydrogen from water, etc. I got my degree in Electronic Engineering and began to invent things such as my magnetic levitator, and a photonic processor (light operated computer), and other projects.

answer-1-exp1You were recently on a call-in talk show where you mentioned that you discovered that your invention had already been patented—was it this exactly or something close? You also mentioned an NSA lawsuit—can we find this online, where can we find more information on this lawsuit, and what was the crux of it, why was the NSA interested in your invention?

solar-polaris-news-001aWhile trying to patent the photonic processor I was attacked by an agency with extremely high technology, I got an electronic sounding tinnitus (pulse code modulation) in both ears debilitating me. I lost everything and could not make a living. I found out later that the NSA already has light-operating computers and it was classified top secret.

The NSA lawsuit in question was not mine. (But the one filed by John St. Clair Akwei.)

I knew that the electronics they were using (on me) could be stopped but how, so I began to make something that sounded just like the tinnitus to confuse their attack system. I built a new type of oscillator that made a similar sound and as soon as I put on the headphones and played the strange sound I was free. I have since cured over 34 people by sending this sound on CDs for free to any one with the artificial tinnitus .

Can you tell us a bit about the technology you think is being used, your understanding of how these sounds are being induced? Is this V2K or synthetic telepathy or the Frey effect? Are electromagnetic signals/ultrasonics being sent to people’s ears, or auditory cortex, or is a cochlear implant involved?

In my opinion, the GPS satellite system is the main carrier for neural information transmission and my CD interferes with what is called a bio-relevant-feedback loop used to send bio-data to their super computers from the target, this feedback loop is vital to target a person.

Without the feedback loop, the system breaks down and the target is freed. I do think they are using constructive interference methods that cause large increases in power density at the target only, making it hard to detect with Hertzian type meters.

What kind of frequencies are we talking about? Can they be measured, and if so how? You mentioned the skin being used as a transducer. I understand transducers convert energy from one form to another. Can you explain this a bit more, including telling us what kind of transduction is involved?

Yes, the high energy delivery system takes advantage of the skin as a transducer, when this energy hits the water in the skin, the modulation is transformed into audio and travels throughout the body. My CD vibrates the skin contaminating their signal and then real-time adjustments and timing are lost.

How did you yourself come to this subject? I understand you have experienced this auditory effect yourself.

I did not know before I was attacked that the NSA was testing these weapons of warfare on U.S. citizens. You just don’t hear about it on the news.

I traced times and dates of when I was attacked and it led me to OPERATION “CLEAN SWEEP” 1997-1998.

(From a historical listing of Mind Control projects at a few sites online including here, Operation Clean Sweep was a NSA/CIA operation experimenting with mass behavior modification that was run nationwide in the United States in 1997-98, aiming at “electromagnetic resonant induction and mass population control.” Data on emotional wavelengths emanating from people was collected through helicopter probes following media events, and was re-broadcast in order to recreate event scenarios and re-stimulate population emotional levels. The re-broadcast was effected “possibly through GWEN network or cellular tower frequencies, co-ordinated from NBS in Colorado.”)

You have mentioned testimonies from people who have used your CD. How should it be used, exactly, and can we hear a bit about what these people say?

The CD works best when played all night every night while sleeping on head phones that go to 24 khz.The most interesting thing is if we stop listening to the CD, the tinnitus will try to recover indicating this is an automated system we are knocking out every night. I think the GPS is a huge automated scan and track weapon (multi-function ) guided by Artificial Intelligence.

letter1.jpg

Testimonial

letter2.PNG

Testimonial

letter3

Testimonial

Finally, given that so many are being assaulted covertly with electromagnetic or ultrasonic energy weapons, since you have a deeper understanding of electronics and radio frequencies than most, can you share with us a little more of your understanding about these frequencies? Most of us understand that our bio-resonance and brain-resonance frequencies are at the low end of the scale between 5-30 Hz, while signals sent in on wi-fi or portable surveillance radar devices may use higher frequencies as carriers; can you explain a bit how this may work?

nsa-2a

Excerpt/John St. Clair Akwei vs. NSA, Fort Meade, MD

These constructive interference systems are not bound by Newtonian physics and are almost 100% efficient in energy transference. The College of the Army says psychotronics can be delivered to the enemy though existing wiring or water pipes (used as transducer) in your house. Another way to think of it is wave construction using pieces or pulses assembled only at the target, so they can deliver 5 hz or 9000 MHz depending on results needed.

In closing, what is your best advice re. shielding from these radiation and sonic attacks? Do you have other advice to share?

One of only a few things to stop these weapons is superconductive material, but it is not feasible yet. Soil does lessen it but it takes 350 feet of soil. Other than that you must have an active countermeasure like my CD.

To contact Dave Case for more information or for a free copy of his CD to counter tinnitus, please send him a text message with your name and mailing address at 573-300-1579.

Please note, recent momentous news from World CACH (World Coalition Against Covert Harassment) also offers extensive hope for those being assaulted with V2K technology: a new shielding device, to be presented soon by Magnus Olsson, has been developed with military grade technologies to combat V2K, please see the link below for the World CACH newsletter with this announcement.

Related:

World CACH Newsletter, 31st Oct 2016/(Magnus Olsson Soon To Release Highly Effective Military Grade V2K Shielding Technology Developed with Approval of Russian Ministry of Defense)

NSA Whistleblower Powerhouses William Binney and Kirk Wiebe Stand Up to Support “Targeted Individuals” Worldwide

Whistleblower Nation/NSA Whistleblowers William Binney & Kirk Wiebe speak on Targeted Individuals— Ella’s conference call with NSA whistleblowers Bill Binney and Kirk Weibe/Youtube vide0

John St. Clair Akwei vs the NSA Lawsuit 

The Neurophone by Patrick Flanagan and Gael-Crystal Flanagan

World CACH, Sweden/Mind Control NSA We Have No Secrets (Anymore)

Paul Baird/Categories of Surveillance/Harassment Technologies (with further information on the Neurophone)

Paul Baird/Secret Mind Reading Technologies

Targeted Individuals Canada/Stages of Electronic Harassment

Re-posting of this article in full or part with attribution and linkback is welcomed. Please share widely.

Secret Policing Inside the United States of America: “Domestic Adversaries” and Covert Electronic Weapons

New page added, in sequel to the earlier post probing US Department of Justice involvement in Directed-Energy Weapons/radiation neuroweaponry/electronic warfare weapons experimentation and assault under cover of Electronic Surveillance on citizens:

How Secret Policing With Deadly “Non-Lethal” EMF/Scalar/Sonic Neuroweaponry Has Been Installed Domestically Inside the US, & Globally

Neuro Crime (Pre Crime) and Neuro Warfare (Brain Modification) Are Being Studied and C/overtly Tested — ChurchCommittee 2.0 Production: The Neuro Revolution

Riveting video introduction to advances in neuroscience research in the areas of neurocrime and neurowarfare, by the ChurchCommittee Production company, profiling two recent books on the subject, Neuro Revolution by Zack Lynch with Byron Laursen and Undue Risk, Secret State Experiments on Humans by Jonathan D. Moreno, and discussing developments in academic and black-budget covert neuroscience research which seek application in such 21st-century fields as lie/truth detection, brain fingerprinting, neuro-stimulation, and neuro-modification.

This is research on emerging technologies which we’d do well as concerned citizens to follow more closely because the implications for society are immense. Especially significant to note is that a lot of this research has to do with remotely-harvested electromagnetic brain waves, while other aspects cover microchip and neurochip-related neuro-interventions (transmission, reception, stimulation, modification).

For one, the on-record research that’s been uncovered and is budgeted openly is now neuroRevolutionZackLynchbeing used in the development of neurotechnologies such as lie-detection and brain-mapping/fingerprinting being marketed and tested by the law enforcement/security industry. This includes the interestingly-named Project Hostile Intent technology which reads brainwaves at airports, a fact seemingly glossed over in early disclosures and news reports of this technology, as this 2007 UK article would seem to suggest.

Brain wave reading is also being carried out by satellites, hovering many hundreds of kilometres away; “research into computer-analysis of brainwaves detected by satellites without the subject’s knowledge” was/is a DARPA project underseen by neuroscientist Dr. Amy Kruse, Tech Consultant to DARPA’s director, currently underway, which seeks to detect terrorist intent/behavior as recorded in brain EMFs. Remote reading of human minds is no longer science fiction, as many psychologists and psychiatrists confronting and dismissing accounts of c/overt assault by today’s covert subjects of human experimentation in neuroscience by unethical neuroscientists (“Targeted Individuals“) have been led to believe; if satellites can pick up brain waves and labs can decipher thought and word patterns via EMF wave analysis, I think we can safely conclude human minds are being read remotely today. DARPA’s stated intent is to monitor the moods and mental states of soldiers in the field, to assist commanders in allocating human resources to the next gory task of battlefield mayhem should one soldier’s mental or emotional states go into overdrive or confusion mode and prevent him from acting in concert to complete whatever “combat-“related task he’s been directed to do.

(This DARPA/NRO (satellite) (NRO is the National Reconnaissance Office, responsibleUndue Risk for satellites) remote reading of minds might be part of the NSA’s Signals Intelligence project, which is explored here in this 2011 article speculating on Russ Tice’s intended/never completed revelations to Congress regarding illegal Special Access Programs from his work on electronic intelligence gathering for the NSA/DIA : Is the NSA Conducting Electronic Warfare on Americans?)

Then there’s off-the-record research uncovered by Moreno which suggests that the $68 billion budget set aside by the DoD for scientific research and possibly $6 billion Black Ops research budget is being used to rope in the vast academic network of Universities to engage in research with private Defense corporations–such as Lockheed Martin and Honeywell–that’s being intentionally aimed at not merely reading the human mind, but in developing weaponry targeted to alter the human mind–via such niceties as Neurochip implants, pulsed ultrasound helmets, Electronic Brain Link technologies, microwave radiation weapons, and Extremely Low Frequency radiation weapons. This joint network of private and academic entities is also engaged in the affairs of a new alphabet initiative, the NIA or Neurotechnology for Intelligence Analysts–an initiative aimed at enhancing human imaging capabilities with advanced assistive neurotechnology techniques (which appear to include human-brain-computer interfaces as well as neuroimplants and optical implants), a little  on which can be found here.

Black Ops research, of course, is not publicly divulged. DARPA’s openly-published research, though, and the open doings of neuroscientists should be enough cause for concern. For those paying attention, think about it: Google wants to blanket us with wifi from space; the Federal govt recently issued gag orders to NOAA and the National Weather Service and the US Department of Commerce regarding, it seems, talking about the weather/geoengineering/chem trails/agency plans, chem trails are raining heavy-metal nanotechnology down on us, while smart meters, cell phones, cell towers and other EMF sources bathe us in constant radiation, satellites, we’re being told here, are picking up brain waves, quantum supercomputing is no longer a secret, and thousands of people worldwide are reporting c/overt assaults with DEWs and EMF/scalar/sonic neuroweapons. Among the technologies being reported by insiders and whistleblowers such as Dr. Robert Duncan and Dr. Richard Alan Miller are hiving-mind technologies, EEG cloning, EEG heterodyning, synthetic telepathy, and electronic brain links–all technologies aimed at reading human minds, connecting human minds, influencing human minds, invading human minds, and altering human minds. Should we be worried, d’you think?

Many thanks to ChurchCommittee TwoPointO, to whose channel on Youtube you can subscribe, and let’s hope a lot more journalists and filmmakers will cover this subject–shall keep reporting here.

 

 

 

 

Understanding RFID Chips–An Introduction to New Technologies by Ex-IBM Executive Patrick Redmond

(Article by Patrick Redmond re-posted with thanks from the Michael Journal.)

Continuing my exploration of RFID chips–begun in the article recently posted here on covert implantation of RFID Chips–to openly examine what the state of the art is for this technology, what areas of industry are using it, and how in particular RFIDs are being used in the medical world currently, both overtly and covertly, and to further explore how RFID chips are being implanted covertly in individuals globally for nonconsensual electromagnetic experimentation, harassment, and torture, here is this really informative article from the Michael Journal, transcribing an April 13, 2008 talk given by Patrick Redmond, ex-IBM executive, on the 2008 status of RFID chips.

WorldUnderWatch, a blog covering Surveillance issues, also reports on this article–I will post their report next–and notes that this talk was given to “the Catholic patriot group known as the Pilgrims of Saint Michael, which also is known for advocating social credit, a dramatic monetary reform plan to end the practice of national governments bringing money into existence by borrowing it, with interest, from private central banks. The group’s publication The Michael Journal advocates having national governments create their own money interest-free. It also covers the RFID issue.”

Today in the US–2015–RFID chips are in our clothing, our shoes, our toiletries and cosmetics, our passports, our driver IDs, and our credit cards. I recently received an “updated” credit card in the mail with a chip (unfortunately in my case hardly the most of my worries given my current ongoing experience as a covertly-implanted “Targeted Individual.”) See this article by Scott Granneman in 2003 which is already dated because it predicts tags on retail products–those tags are here today–the article is titled RFID Chips Are Here and it is nevertheless very informative.

But the most disturbing thing to explore of course–especially for the general public new to these subjects–is whether these RFID chips are being covertly implanted in humans, how they’re doing it, and how credible the accounts of witnesses are, reporting covert implants on their bodies. 

This 2008 article by Patrick Redmond especially throws light on how tiny these chips are-some of them are just like ink or powder, how easily they can get into human bodies, either consensually or nonconsensually, which companies are making them, how they are being linked–via computer networks and satellites–into a global surveillance system, and what dramatic potential they offer for hacking and abuse. Please read, take in, absorb at your leisure, please research further, and please pass on the word. Every one of us needs to know the truth about RFID chips today–we need to banish the disinformation gimmicks out there which strive to charge all reports of RFID implants as “conspiracy theory.”

(“Targeted Individuals” in particular who report being covertly implanted and experience the presence of these mostly-passive but also-active RFID chips in their bodies–especially vivid during transmission when they are scanned by RFID-scanners/readers, whether from just a few inches away in grocery stores by covert grocery store Mil/Intel operatives, or from 100’s of meters away from ground-based vehicles or helicopters, 1000’s of meters away from Electronic Warfare planes circling their neighborhoods, or 22,300 miles away from stationary satellites in geosynchronous orbit around the earth (radio waves are long waves, up to 3 km in length; and patents for these chips mention “repeater devices”)–and who are fighting today for their voices to be heard by an easily misled public (reporting RFID implants to medical personnel today continues to invoke misdiagnoses of “schizoid disorders” by uninformed, colluding, or conned psychiatrists) can be seen to be completely credible in their accounts, given the information in this article.)

Posting the article as is. Please visit Michael’s Journal for more. (All emphases/highlighting in red below is mine.)

An introduction to New Technologies (Part I)

by Patrick Redmond

Patrick Redmond graduated with a Doctorate in History from the University of London, England in 1972. He taught at the University of the West Indies in Trinidad, then at  Adhadu Bello University in Kano, Nigeria before joining IBM.  He worked in IBM for 31 years before retiring. During his career at IBM he held a variety of jobs. These included; from 1992 until 2007 working at the IBM Toronto lab in technical, then in sales support. He has written two books and numerous articles. Here is a presentation he gave in Toronto on April 13, 2008.

* * *

I want to thank Yvon for inviting me here to talk about new technologies. What I’m going to do is give you an introduction to three technologies that are becoming more and more important. The first is RFID chips, the second genetic engineering, and the third synthetic biology. This will give you an understanding of what is happening and where science is going.

We will start with RFID chips:

So what are they? They are Radio Frequency Identification Devices. An RFID is a microchip with an attached antenna. The microchip contains stored information which can be transmitted to a reader and then to a computer.

RFID’s can be passive, semi-passive or active. Active RFID’s have an internal power source such as a battery. This allows the tag to send signals back to the reader, so if I have a RFID on me and it has a battery, I can just send a signal to a reader wherever it is. They can receive and store data, and be read at a further distance than the passive RFID’s. The batteries can only last a short while. But the current batteries in the RFID’s can last for over a hundred years, because of their self-generating power. Ultrawideband (UWB) allows the small battery operated RFID tag to be sensed over fairly wide areas. For instance, GE Aircraft Engines in Ohio has installed five readers in the factory and it covers over 30,000 square feet so they can track everything within that area with only the five readers. That gives you an idea of the distance that can be covered by an RFID tag that might be on you or on equipment.

An RFID held by a pair of tweezers

The readers can transmit over telephone or by internet to computers and they use satellites as well. For example, Digital Angel has signed contracts with satellite providers to transmit their data for military personnel location beacons (PLBs). These beacons use the COSPAS-SARSAT satellite system. This system has some 400,000 digital beacons around the world and it’s rising to some 900,000. By the year 2009 they plan to have a GL stationary satellite system that will enable them to find the location and details of any beacon. You may sometimes see these at night; the GO stationary systems can track any beacon. Skiers sometimes use them so that they can be identified, and sailors as well, if they become lost at sea they will be able to be tracked. Anything that has an RFID tag can be tracked by a reader or a computer.

An example of such transmission is a chip sold by Zarlink. This chip is implanted in a person; it tracks problems and if one is detected, it alerts the doctor who uses a two way RF link to interrogate and adjust the implanted device. Semi-passive RFIDs have an internal power source that let them monitor environmental conditions, such as temperature and shock, but they still require RF energy from the reader to respond.

Passive RFID’s do not have a power source but use a signal sent by the scanner to power the microchip circuit to transmit back their stored information. Passive RFID’s are getting very small. Hitachi a few years ago produced a chip (called the mu chip) that was the size of a pencil point; if you take a pencil and put it on a piece of paper you get a little dot. That’s how small they’re getting. In 2007 Hitachi came out with a chip that was even smaller, they call it RFID powder. They are just like the talcum powder you would put on a baby.

Somark Innovations in Jan 10, 2007 announced an invisible RFID ink. This can be applied to cattle, prime cuts of meat, military personnel and it can be read through hair.

I brought along a couple of the larger size chips, and this particular chip I got from Gillette fusion blades. I bought one of the blades and you can see that on one side what looks like a bar code and if you open it up you can see parts of a RFID chip on the back. This one here is from the Gap. One of my daughters went to the Gap; they put the tag directly on the clothing and the instructions just say to remove before washing and wearing. If you put it up to the light you will see the RFID chip inside it. These chips are quite small and can be put on the back of labels. They would not be noticeable in badges or ID cards; they could even be put in the eye of a person, they are that small.

In order for chips to be useful, they have to have a unique product number and because of this, MIT (Massachusetts Institute of Technology) started developing some standards. It’s called the AutoID Center. They then passed it on to the AutoID Group within the Uniform Clothes Council. It will assign codes and publish specifications, so if you have a company, government agency, or church you can contact these people and they will give you a set of numbers.

So let’s say there are three or five people in this room wearing the same white hat and each one of them has a chip on it with a different number. We could differentiate everything even if you’re all wearing the same clothes, it doesn’t really matter because everything has a unique number. MIT has the architecture of participation called EPC Global so if you go on Google and type in EPC Global and you will come up with the website they will give you instructions on how to apply and get chips. So if you want to chip yourself, your family, relatives, company or anything like that; you can do it.

It works with people who want to use this technology. One of many companies who sell the chip is called, Technic Imitations. If you have a company and you go to one of their presentations, they will give you books like this that tell you what the chips look like, how they work, the types that are sold, and what the readers look like. They will help you install chips in your company. It’s a very big business and it’s spreading very quickly.

When you use active or passive chips, active chips have advantages when you want to track items or people over longer distances. Soldiers can have active chips so they can be tracked via satellite wherever they might be in the battlefield. You can get one for your car, so you can be tracked if you are on the 407 or something.

Passive ones suffice if you are only interested in tracking over shorter distances. For example, in a sea container coming in from China, every box and every item within the box can have a chip on it. A reader can track all the items as a box passes through it. In a warehouse it is used to ensure the right shipments go to the right places. A man carrying a skid on a forklift can have the goods inside the box verified without even opening it.

They are using the chips to track inventory in order to be able to monitor what items are going where, if the right items are in the truck, etc. The passive chips are being put on devices to ensure they are valid.

There’s a lot of counterfeit drugs being produced and sold over the internet. Viagra is one of the most commonly counterfeited ones although there are many others. To ensure that people get the correct drugs they sometimes put chips on the containers so when you’re buying them you know that you are buying the correct drug.

Chipping farm animals is now required by the government

RFID’s are a great economic help to a company because they reduce theft and loss. They also streamline inventory, reduce turnaround time and handling. They’ve allowed companies to adjust production in response to inventory levels and to respond on demand. That’s why companies are interested, because of these big economic benefits and efficiency.

When you go to Wal-Mart, Best Buy, the U.S. Military and many other agencies around the world, you will see that they are all implementing RFID chips on items and increasingly on people.

The recent growth of the RFID industry has been staggering: From 1955 to 2005, cumulative sales of radio tags totaled 2.4 billion; in 2007 alone, 2.24 billion tags were sold worldwide and analysts project that by 2017 cumulative sales will top 1 trillion–generating more than $25 billion in annual revenues for the industry.

We’re starting to see chips being implemented in credit cards, debit cards and passports, driver’s licenses, health cards, and many other things. Increasingly they are being used to monitor people as well as items. RFID tags embedded into clothes and personal belongings allow people to be tracked and monitored in shopping malls, libraries, museums, sports arenas, elevators, and restrooms. American Express has them on their blue cards. They are announcing plans to place people-tracking readers in stores to track customers movements and observe their behavior. If you bought something with your credit or debit card, they will know what items you bought and if the items were chipped, they will know what you were buying. In this way they will be able to track you.

In 2006, IBM received a patent approval for an invention called, “Identification and tracking of persons using RFID-tagged items.” One stated purpose was to collect information about people that could be “used to monitor the movement of the person through the store or other areas.”

When somebody enters a store a reader “scans all identifiable RFID tags carried on the person,” and correlates the tag information with sales records to determine the individual’s “exact identity.” A device known as a “person tracking unit” which then assigns a tracking number to the shopper “to monitor the movement of the person through the store.”

If I had three readers in this room, I could scan everybody in one second and I would know right away who’s here; so it would scan that quickly. The computers are getting quite sophisticated and capable of doing large numbers of scans at any given time. One company recently announced a computer that reads data transactions at 200 million/second, an incredible number.

Here’s an example of how they are being used in companies; a few oil companies have given their employees smart cards so that they know where they are at any time of the day. This ensures that people do not go where they are not authorized to go. They will see how many times an individual might go to the washroom or outside to have a cigarette; things like that. It allows continuous tracking of people, and so more and more companies are thinking it’s a novel idea.

In early 2007, the American government complained to the Canadian government that they were tracking American contractors who were visiting Canada by placing loonies ($2.00 Canadian coins) with tiny RFID transmitters in their pockets. And a CIS officer when confronted with this said: “Ah, give us a break! You might want to know where the individual was going, what meetings he’s attending, who he’s talking with and everything like that.” So if they wanted they could track people with chipped loonies.

The University of Washington students, faculty and staff are being tracked as they move around the site so the details of where they’ve been, what they’re doing and with whom, will be stored in their database. One of the professors at the University was asked, “Will you check on this student?” so he checked on him and said, “Oh, he’s on the fourth floor just standing outside room 452 and now he’s moving into the classroom.”

In London you can buy a monthly pass to the transit cars that have an RFID on it and if you link the bus pass to a person’s name you can track where this person is on the bus and subway system throughout London, England. Last year the police were getting four requests a month and now they are getting close to 100.

Just last week the London police announced that they were putting RFID chips on all of the 31,000 police in London. Now this may be on their ID card, they did not say if they were going to put them directly on their body, but they were getting chipped; it was published in the Daily Mail. Some of the police were complaining that they “are going to know where we are at any time, we won’t be able to go into a coffee shop and get a donut.” All 31,000 police in London now have RFID’s so if they ever need to stop or control people they can direct 1,000 troops immediately to the scene.

In Southern China they’re implementing RFID readers in the city of Shenzhen to track the movement of citizens; all citizens have an ID card with a chip so they can identify who is in what part of the city at any point in time.

RFID readers in a library

The chips and National ID cards that they are trying to bring in now contain not only a number, but also a person’s work history, education, religion, ethnicity, police record and reproductive history. The United States has been trying to implement the National ID card for a few years now and there are strikes going on in different states as they try to resist this National ID that will identify everyone in the country.

Canada is adding a Real ID to the license plates and we don’t hear anything about it, its being done a lot more secretly than it is in the States where there is a lot of public debate. The increase of the use of RFID chips is going to require a increased rate of the UBF spectrum, as a result in the United States they’re going to stop using the UBF spectrum of the VHF frequency in 2009 and everything is going to go digital. You may have seen that on television in the United States.

Canada is going to do the same thing, they’ll say it still works, and instead of the antenna on your roof you’ll use a black box. The reason they’re doing this is that the UBF and VHF analog frequency are being used for the chips, so they don’t want to overload the chips with television signals, because the chips signals will now be receiving those frequencies.

A friend of mine from Quebec says his cows have a chip embedded under the skin. All farm animals have to be chipped and he says he’s no longer allowed to kill as many cows as he wants. He was given a limit of two cows that he could kill and use only for the farm. All the others had to be sold to particular companies who could control those cows and get food from them. So he could only kill two and the others he had to sell to a supermarket chain.

People are being chipped now. There’s a trend that they’re promoting in the media in terms of chipping people; they’re saying why not chip children for safety, so we can protect them, especially if they’re in the hospital then nobody could steal the newborn babies. Why don’t we chip the sick, then if someone has a heart attack and falls on the floor, we can read the signal in the chip and send someone to help them. We should chip the military so we would be able to know where the soldiers are and if they’re alive. After we could chip people on welfare so we could make sure they’re not cheating the government. Then we can chip all the criminals so that we could control them, and we’ll chip workers because a lot of them goof off at work. Then we’ll chip all the pensioners because they’re just taking money from us; and after that we’ll chip everyone else.

Some 800 hospitals in the United States are now chipping their patients. You can turn it down, but it’s available. Four hospitals in Puerto Rico have put them in the arms of the Alzheimer’s patients, and it only costs about $200 per person.

The Baja Beach Club in Barcelona gets patrons chipped. A BBC reporter went the club and got himself chipped. He said it was like getting a needle in your arm; they just rubbed it with some antiseptic and put a chip in. Because it was fairly small, he said it didn’t hurt too much and he had it inside him so whenever he ordered he would just move his arm and pay for it. The reader on the bar would read the signal and since he had his bank account information on the chip on his arm it would deduct the money from his bank account.

Nigel Gilbert of the Royal Academy of Engineering said that by 2011 you should be able to go on Google and find out where someone is at any time from chips on clothing, in cars, cell phones, and inside many people themselves.

Chips are becoming more and more sophisticated. Nature Magazine reported recently that a drug containing microchips has been developed that will release drugs at the right time and amount. They can put a chip in you and release drugs so you don’t have to take a pill every day. This particular one that they’re selling lasts for over 140 days, you just have to get chipped three times a year with this drug and it releases it every day automatically. We will probably start hearing more about things like this in the near future.

In 2006, LifeScience.com said that European researchers have developed neuro-chips, they’ve coupled together living brain cells in silicone circuits and done a lot of experimentation on rats and snails. An electrical signal from a neuron is recorded in the chips transistors, while the chip’s capitulators stimulate the neurons. They can create neuro-stimulators and use them to alleviate pain and lessen the debilitating effects of Parkinson’s disease.

The mu chip is only .05 ml in length

There are gastric stimulators that can treat obesity, they would make you feel hungry so you wouldn’t want to eat anymore, it would just be necessary to put a chip in your brain that would connect and send signals. In another study, neuro-chip implants were developed and are being used on violent prisoners. They were implanted with the microchip (but they didn’t know they were implanted), and when the implant was set at 160 megahertz’s all the subjects became lethargic and slept about 22 hours a day. The implants ended all aggression in violent prisoners. Another interesting application is a silicone chip implant that mimics the hippocampus, the area of the brain known for creating memories. If successful, the artificial brain prosthesis could replace its biological counterpart, enabling people who suffer from memory disorders to regain the ability to store new memories. It’s being developed by Professor Berger at the Center for Neural Engineering at the University of Southern California.

They’re working on rats and monkeys, so if applied to humans what this could do is restore your short-term memory which people lose as they get older, or it could replace your existing short-term memory with artificial short-term memory.

Applied Digital Solutions has a Verichip that is compatible with human tissue and can be used on implantable pacemakers or put defibrillators in artificial joints. It can be injected using a syringe and used as a sort of bar code in security applications. That’s seen as one of the easy ways to implement chips in people through injections. They could very easily inject it via a flu shot or a vaccine.

Verichip is working on a glucose microchip that would determine glucose levels. You wouldn’t have to draw blood to monitor glucose level. All you need is to have the doctor read your chip and your information and tell what your blood levels have been for the past month or two.

IBM has demonstrated a tiny device that measures heart rate and is able to sense when a person wearing it is in distress, after which it will call a cell phone for immediate help. The distress signal is sent wirelessly via Bluetooth.

Zarlink has developed the first swallowable camera capsule which uses Zarlink’s RF transmitter to relay real-time images from the gastrointestinal tract. Our MICS (Medical Implant Communication Services) platform is designed with in-body communication systems that will improve patient care, lower healthcare costs, and support new monitoring, diagnostic and therapeutic applications.

Currently the chip uses 100 hair-thin electrodes that sense the electro-magnetic signature of neurons firing in specific areas of the brain in, for example, the area that controls arm movement. The activity is translated into electrically charged signals and are then sent and decoded using a program, which can move either a robotic arm or a computer cursor. According to the Cyberkinetics’ website, three patients have been implanted with the BrainGate system. The company has confirmed that one patient (Matt Nagle) has a spinal cord injury, while another has advanced ALS.

This shows that human thoughts can be converted into radio waves and used by paralyzed people to create movement.

Matt Nagle sends the thoughts to a computer to decipher. He can turn his TV on or off, change channels, and alter the volume. (BBC 2005) He can also move his arms and pick up things.

In addition to real-time analysis of neuron patterns to relay movement, the Braingate array is also capable of recording electrical data for later analysis. A potential use of this feature would be for a neurologist to study seizure patterns in a patient with epilepsy.

Braingate is currently recruiting patients with a range of neuromuscular and neurodegenerative diseases, so if you want a computer chip in your brain you can just go on the website and volunteer.

What are the problems about these new technologies? Let me just give you a brief explanation. Chips are going to end privacy. There’s a website called Spychips.com operated by Katherine Albrecht; they research the use of RFID’s by different companies. They have been warning people about them because chips that have economic or health data could get that data stolen.

The New York Times in October of 2006 said that any card that doesn’t require swiping (in other words that doesn’t have a chip in it), is vulnerable to un-authorized charges and put people at risk for identity theft. You can buy scanners in electronics stores for $60 or more that can read the information on the chip.

They are finding that once implanted in people, chips can be damaging to our health. For example, the body of a rodent who was tested started rejecting some chips and started a development of cancer. Also there is a danger of viruses; you are all familiar with software viruses on your computers, imagine if you got a virus in your chip that deletes your information in your chip.

If chips can disseminate medicine then they can disseminate other things too; anything put inside a microchip can be activated by a signal. And finally, with this technology, subliminal mind control becomes possible. I went on to Google and did a search on mind control; you might find it interesting to check that yourself. I read one on patents; there are patents that exist for mind control. This is what one states: non-aural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain. This is patent number 5,159,703 1992.

Another explains a device that can be placed in the auditory cortex of the brain. This device allows the following process: someone speaks into a microphone, the microphone then has the sounds coded into microwaves which are sent to the receiver in the brain and the receiver device will transform the microwaves back so that the person’s mind hears the original sounds. In other words, a person with this device in their head will hear whatever the programmers send via microwave signals. (Phillip L. Stoklin took out patent number 4,858,612 on this.)

What do things like this mean to people of faith? You know from the Apocalypse, which is the last book of the Bible, that microchips are unacceptable to God.

Chapter 13, Verses 16-17: “And he (the beast) shall make all, both little and great, rich and poor, freeman and bondmen, to have a character in their right hand, or on their foreheads. And that no man might buy or sell, but he that hath the character, or the name of the beast, or the number of his name.”

Chapter 16, Verse 2: “The first angel poured out his vial upon the earth, and there fell a sore and grievous wound upon men who had the character of the beast; and upon them that adored the image thereof.”

Chapter 20, Verse 4: “And I saw seats; and they sat upon them; and judgment was given unto them; and the souls of them that were beheaded for the testimony of Jesus, and for the word of God, and who had not adored the beast nor his image, nor received his character on their foreheads, or in their hands; and they lived and reigned with Christ a thousand years.”

If people have chips they will be tracked wherever they are. And there is a reasonable expectation that their bodies will be controlled and manipulated, as this technology is increasingly refined. Their minds will also be manipulated, they can certainly be made or induced to follow whatever people want them to follow. It’s quite conceivable that they could be made to denounce God also.

Patrick Redmond

Dr. Robert Duncan: The Executive Summary: Neuropsychological and Electronic No-Touch Torture Report

(Article re-posted with thanks to Todd Giffen and the site drrobertduncan.com.)

neuroI just recently came across this article on aspects of the Senate Torture Report, posted with a release date 4/2015, and read it with quite some interest as it seems to openly discuss the phenomenon of “No-Touch Torture” or covert remote-control electromagnetic torture of private individuals in once-free Western societies as an acknowledged CIA pursuit. The information it offers from the CIA point of view seems to suggest some of the CIA rationales and unspoken subtext and context for this program of torture, and gives hints as to what exactly is being intended and accomplished (covert detention without due process via electronic incarceration, covert “interrogation” via brainwave acquisition and modulation, covert “monitoring” via radio signalling to implanted devices) by this completely pathological and insane and absolutely inhumane program targeting thousands of individuals worldwide.

It would seem therefore, reading this report, that the entire phenomenon of “Targeted Individuals” being hit with electromagnetic and other directed-energy weapons is a CIA set-up, ostensibly to test more of their “enhanced” interrogation techniques on unsuspecting “detainees”–ordinary people in the US and elsewhere, who, much like the many innocent prisoners of Guantanamo who were picked up in Yemen and other places and have absolutely no connections to terrorism yet are being detained indefinitely without charges and tortured while in custody, are being “detained indefinitely,”and being “interrogated,” and being “tortured for purposes of interrogation”–only rather exotically, with energy weapons and implants which peer into brains and body parts, constantly track EMF emissions, and attack continuously and covertly with EMF signals on bodies and brains which are translated inside brains also as images, moods, feelings, sensations, dreams, and audio commands. Experimentation on human brains and nervous systems with energy weapons.

This is supremely disturbing, and an issue that needs to be tackled openly and publicly with the CIA. As noted elsewhere on this site, this is blatant human experimentation, that is being permitted covertly behind the scenes by our government under “classified” and “state secret” covers using “national security” as password for absolute abuse. (It’s not called Torture for nothing.)  

robduncanDr. Robert Duncan does a fine job detailing the ins and outs of this Torture, but refrains from disclosing details on the technologies involved, which, he notes, are still classified as “state secrets”– although “leaked” by thousands who have experienced these assaults (whom he also notes are frequently discredited as being mentally ill). Torture technologies, classified as state secrets–I feel it’s important to emphasize this; our sleeping American masses need to know this. We cannot exist as a free society when we have Torture technologies classified as state secrets! We Need open discussion–and open condemnation and termination–of these technologies!

Dr. Robert Duncan, of course, is the now-rather-well-known CIA researcher soulcand computer scientist who has written several books and given many public interviews on radio and video shows, including Jesse Ventura’s Conspiracy Theory, speaking candidly about his involvement in these mind control/uber-surveillance/nonconsensual experimentation programs which have been conducted unlawfully for decades on Americans and on citizens worldwide.

From the opener to his early work, The Matrix Deciphered: “My research interests have been neural networks, virtual reality, and EEG controlled robotics. Before graduate school I worked for the Department of Defense, Navy, NATO, and various intelligence agencies computer science projects. I have done business consulting and computer consulting for the largest companies in the world. I have been a professor, inventor, artist, and writer. I am one of the last Renaissance men.

My projects have included algorithms for Echelon and CIA natural language parsing and classification of document content, IRS formula for red flagging audits, writing the artificial intelligence code to automate tracking of the Soviet Nuclear Submarine Fleet and all water vessels, work integrating HAARP with SIGINT SIGCOM and SPAWAR. I have worked on projects for the Justice Department connecting local, state, and federal databases for the tracking of terrorists. I developed a system for the FBI to track license plates past toll booths and other locations. I worked on the soldier 2000 program to create body networks for reading vital signs and other information. A system I worked on called Snyper is operational in Iraq which triangulates on intercity conflict gun shots. I have been to a couple secret bases in the so called free world. I have developed telemedicine robotic surgery and virtual reality applications for the Army. For DARPA, I have worked on satellite computer vision target tracking applications and tank simulation as well as integration of the land, sea, and air surveillance systems like SOSSUS, towed arrays, and others.

Projects that I have worked on outside of government contracts include my thesis on computer generated holography, a project making paralyzed people walk again using choreographed stimulated muscles movements, face recognition, voice identification and recognition, finger print recognition, and neural network robotic controller. My research interests moved to enhanced reality heads up displays and wearable computing systems. My current research involves finding a cure for the mind control directed energy weapons fiasco. The integrated global surveillance grid is actually part of the holy grail of weapons and human control systems.”

(All emphases in red in the text posted below is mine.)

**************************************

The Executive Summary:
Neuropsychological and Electronic
No-Touch Torture Report


Based on “The Torture Memos” and the Senate Intelligence Committee’s Declassified “Torture Report”

By Robert Duncan, A.B., S.M., M.B.A., Ph.D.

04/2015

Download: PDF, DOCX | Visit drrobertduncan.com.

Torture is a horrific topic and most minds will turn away from it because it can’t be comprehended that humans can be motivated, or computer programs can be run to do this to other sentient beings.  Just when we believed we were becoming more civilized as a culture, the technology for torture has advanced more than a hundred fold in recent decades.

This summary will get into ‘the minds of the dishonorable monsters’ of the psychology of torture. Those like Dick Cheney who helped authorize it under certain administrations and regimes of the U.S. government which have been proven to be criminal under U.S. law, treaties, and the International Criminal Court. There are many people involved in the conspiracy and cover-up including General Hayden.

The full report discloses the spectrum of techniques of interrogation and torture used by the U.S. and its allies. The United States government will officially deny the claims of this “no-touch torture report” but in time it will stand firm.

The technologies used are still classified as state secrets and will not be discussed in this summary. The torture methods have been leaked through thousands of American citizens who have survived the no-touch torture programs. The research and testimony has been accumulated since 2002 and merely used as examples but the names of the victims are withheld.

This report will not use skewed, misleading language such as “enhanced interrogation” to describe the torture techniques.

Why torture? The CIA claims it works. The assumption is that it works to gain actionable intelligence. Torture is often used for revenge, punishment, interrogation, and behavior modification.  In other terms torture is used to remove the continuity of thought to confuse the target to reveal information, erase brain patterns such as values and beliefs, or to break down the human spirit to make them submit and obey their handlers.

The downside of torture is that the countries that do it lose “moral soft power” in world politics. Without due process, over 25% of those reported in the Senate Torture Report were declared innocent. Blowback is always a repercussion of torture. Torture often takes a long time to affect the target from months to years.  Torture has shown to be unreliable except for getting false confessions and bad information but the U.S. and its allies are improving on their tactics and techniques.

The purpose of this report is to draw the parallels between physical torture techniques and no-touch torture methods used in secret by governments who possess the technologies that still go on today. This is a brief summary of offensive psychological and information warfare methods using traditional methods and modern cybernetic techniques while exploring hyper-game theory to walk the target to the desired path: leak intelligence, commit assassinations, or change beliefs.

Numerated Torture Methods for
Interrogation and Behavior Modification

(A comparison between physical and no-touch torture tactics)

  1. Induction of Depressive/Manic states

The idea is to shake up the emotional states of the target because different information can be accessed at each state.  Making the target feel despair and helplessness is the objective. This cycle of hope building and then breaking is done in many ways.  The techniques between the physical methods and the no-touch technological methods are similar. Speech is very important during this process of emotional manipulation. Such examples are, “We have imprisoned you without due processes or hope of it. You are indefinitely detained.” Hope building examples include, “Sorry. We have mistaken you for someone else. You will be compensated for false imprisonment and torture.”   The main difference between the cybernetic technology and physical is that emotional state clusters can be entrained into the target mind which speeds up the process. The communication is done differently but perceived as human speech. In the no-touch torture methods it is helpful if the target is labeled with mental illness that is being created for discrediting purposes so as not to draw human rights groups’ attention.

  1. Memory Erasure

The military and CIA have been researching memory erasing drugs for half a century.  The focus of this summary report is on interrogation. Memory erasure is an important technique during interrogation. It is used in combination with sleep deprivation.  There are many drugs that have been developed for physical memory erasure. One such interrogation method requires acquiring information from the target while on these drugs and recording the subject. After a sleeping cycle, the interrogator claims that the target has confessed. Of course the target remembers nothing of their conversation. The interrogator will play samples of the subject’s conversation back to them making the subject believe that the interrogator knows more than they do.  Similar techniques are used in the wireless, no-touch torture and interrogation programs. The cybernetic methods of memory erasure have additional purposes.  The memory erasure can be used on the cybernetic target to make the target believe people have broken in and moved their belongings. While physical black bag jobs do occur, it is a way to make the target more paranoid.

  1. Electricity and Shocks

Pain and fear of death are common tactics during interrogation. Shocking by electricity is a traditional method of torture and exposed in the CIA’s secret prisons.  Shocking the testicles and nipples are the most common due to their sensitivity. Interestingly, the thousand of interviews of no-touch torture involves “stings” and “shocks” to various parts of their bodies over long durations.

  1. Fear and Terror

There are many techniques to induce extreme fear in the target.  In physical renditions dogs, power drills, guns, insects, mutilation, blow torches, water boarding, suffocation, mock burials, and mock executions are just a few the United States government have used.  Remember that many targets of torture die from the physical effects. It is torture to death.
Let us compare the no-touch torture methods used to inflict the same terror and mental anguish.  In several of these techniques the target needs to hear their handler’s voice.  This report does not describe the technologies used to broadcast voices to the target at a distance. While the subject can be broadcast mental images to their mind using hypnosis and other suggestions as well as visual entrainments, the more invasive controls of the brain manipulation technologies can be used to entrained the brain’s autonomic nervous systems such as not breathing causing the target to not be able to sleep from fear of suffocation equivalent to water boarding. The neural linguistic programming can add fears such as heart attack, stroke, and cancer threats. Even motor cortex mapping can cause twitches in any part of the body. One example used a swift neck movement with a voice transmission, “We are trying to break your neck.” Directed energy effects such as Active Denial System can make the target feel that they are on fire indefinitely without the target dying from burns. Maximum pain and torture weapons have been evolving. Every drug effect can be artificially induced into the target mind including those of poisons.

  1. Imprisonment and Isolation

Isolation is commonly used as punishment in prisons. Many whistleblowers like Bradley Manning suffer this condition. In soft interrogation it is used to get the target to talk to their interrogator since humans have the need for companionship. In no-touch torture the target is driven from their friends and family using different techniques in order to isolate them so that the electronic mind control has more effect on their psyche.  Like in Guantanamo, the target becomes isolated losing their job and medical care. Part of the method involves slander in their community. They end up on the most part in poverty and paranoid about doctors and other people from false correlations that are purposefully induced into their lives. Isolation is also a form of sensory deprivation which will be discussed later. Days and weeks lose their meaning.

  1. Sexually Disturbing Tailored Pornography

The Summary of the Senate Torture Report disclosed the disgusting revelations that in the secret torture prisons the targets were forced to perform homosexual acts on each other against their will and religion in order not to be beaten or killed. This is a common break down tactic of belief systems and the human will. In no-touch torture the techniques are more psychologically specialized for each target. Most common examples include homosexual targets that are forced with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are forced to view child pornography in their minds. And vice versa is true, that heterosexual targets are forced to view homosexual sexual acts like in the secret U.S. torture prisons.

  1. Mutilation

Also mentioned in the declassified report on torture was mutilation of the human. Cutting the naked target’s penis and scrotum, pulling nails or teeth is common.  In no-touch torture mutilation is done by trickery.  Let us look at a couple examples. There have been several targets who believed that the microwave hearing effect and other voice induction methods were done by microchips implanted in their teeth or ears. They had all their teeth pulled because they believed it was a technology called bone conductance. Others have poked out their ear drums in the belief they had micro implants in their ears. There are many more examples of trickery used to make the targets mutilate themselves.

  1. Personal and Spiritual Defamation

In physical torture the CIA and other groups use propaganda and defamation of character for those they oppose. For detainees they try to disenfranchise the target from their religion. They will defecate on their Bible or Koran for example. They might say, “Why is your God not saving you?”  In no touch torture and behavior modification they might try to make an atheist believe in god. It is just a mechanism to alter belief systems for control and experimentation. Perhaps the target may wish to confess their secrets to a “voice of god weapon”. Information warfare covers the gamut of electronic communication as well. The government training exercise uses language like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”, “use deception”, “ruin business relationships”, and “post negative information on appropriate forums” – in a malicious effort to target bloggers, activists, journalists, social event organizers and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.

  1. Psychological Intimidation

This is a topic for a target at the beginning of the trials and programs. Physical break-ins are common even if the target has an alarm system. The NSA has used stalking of foreign officials in the past for economic gain. The FBI does black bag jobs to invade a home without a warrant. The point is to let the target know they are being watched and to increase their paranoia. The NSA easily hacks all computer systems and causes harm to the victim’s intellectual property and their relationships from that endpoint. In the no touch torture false correlations between pain and a neighbor coming home can be induced.

  1. Rape

Rape is a common practice in torture. It causes much psychological trauma. In the United States methods of rape in their military and CIA secret prisons it is often relabeled. It is commonly done by prods but “rectal rehydration” is the more common misnomer. Often they call it forced feeding through the rectum but it is meant to induce psychological scaring and trauma. Several have died from the technique due to rectal bleeding.  In no-touch torture the psychological trauma of simulated rape takes on different forms. Using technique often called EEG-heterodyning the targets will receive molestation effects of their genitals. In men this can be the anus and genitals. Similarly women can be wirelessly raped by the analogous function of perception.

  1. Dietary Manipulation, Forced Weakness and Sickness

The idea behind dietary manipulation is to weaken the target. This is easily done in a physical setting but in no-touch the hunger trigger needs to be suppressed. Sometimes a false correlation between eating food and sickness is induced to make the target believe they are being poisoned. However, poisoning is common in physical renditions too.

  1. Repetition

Verbal breakdown is most important during interrogations and torture. Obviously speaking the language of the target is necessary. This is why there are interrogators in all languages. Repetition is an important neural linguistic programming interrogation tactic to influence the target mind. During the breakdown process, threats to kill and to torture the target’s family or friends are common. Repetitious questioning and breakdown phrases are automated in both the physical and no-touch versions of torture. An interesting technology that is used for no-touch torture is called chatter bots. Chatter bots, an artificial intelligence program, automate much of the repetition so that the interrogators don’t drive themselves crazy during the neural linguistic torture and programming phases. Let us not forget the Chinese Water Torture, a single drop of water on the forehead of the detainee for months. Repetition is a form of torture.

  1. Sensitization of Pain Impulses

While the reverse can be obtained, optimizing perceived pain and misery is the objective in torture. Each trauma adds to the overall misery throughout life.  Optimization of pain has been studied by the military and intelligence agencies. In the past the CIA has used drugs such as LSD to enhance fear and terror in the subject. Other methods such as hypnosis can increase perceived pain and the power of suggestion such as telling the subject his pinky finger is going to be cut off before it is done. In no-touch torture the same psychological manipulations are exerted. Subliminal and overt suggestions are often told to the subject before the directed energy or EEG heterodyning pain inductions in order to maximize their effectiveness.

  1. Sensory Overload and Deprivation

Again, this technique of overloading or depriving the human of sensory stimulus is ubiquitous in torture around the world not just in U.S. secret prisons. Torture subjects in the United States have reported the use of repetitive bad music and noise campaigns. An unusual torture technique used in the U.S. secret prisons was of a use of a plastic suit filled with ice while they beat the target.  Ultra bright lights for days on end in the prison and hot/cold temperature changes in the environment are frequent. In no-touch torture, the target’s brain is forced to release dopamine which causes pupil dilatation. This acts as a sensory overload. For example the non-lethal microwave weapons research done by a professor in University of Nevada has shown this capability. Body metabolism can be altered with these weapons causing cold and hot flashes.  Targets of no-touch torture often hear endless tinnitus.

  1. Sexual Humiliation and Lack of Privacy

Often used in common prisons is a lack of privacy. It is both necessity for security and a form of sexual humiliation. Also in prison many people are raped. No-touch torture offers the same sexual humiliation and lack of privacy by using through wall radar, cameras, and EEG visual cloning to let the target know they are being watched. Degrading comments are often used on the no-touch torture subjects while they are naked or in the bathroom.

  1. Maximum Sensory Pain Techniques

Basic torture involves brutalization, i.e. physical strikes, kicks in the groin, pepper spray or tear gas, etc. Anything that involves maximum pain is the objective. Amazingly, these same basic tortures can be done wirelessly into the human mind. All forms of sickness have been reported without any real illness behind the suffering.  All suffering can be entrained into the minds of no-touch torture subjects.

  1. Sleep Deprivation

This is the number one torture method along with the popularity in the press of water boarding.  This is done in every country that uses torture. The United States is number one in torture since they are currently the world’s only superpower.  A repetitive sleep deprivation cycle is generally done 180 hrs/7.5 days at a time in the physical renditions, or in no-touch torture five days awake and two days of sleep.  Sleep deprivation accomplishes the objective of memory loss during interrogation and induces hallucinations which help with the interrogation process. In behavior modification and programming it is necessary too.

  1. Stress Positions

Keeping detainees handcuffed above their head and to walls so that they must stand for days is a common ploy in torture. These types of poses are called stress positions. They can be mimicked in no-touch torture. An example of one such trick requires the target to believe they can deflect radar energy using pots or pans and that it is directional. The target is being given an ample amount of pain until their hands and arms are spread apart holding the pans trying to block the signals. They must maintain that position in order to get any relief from the torture signals. However the stress position itself is physical torture. Often accompanying this technique are voices saying to the target, “You are doing it to yourself.”

We will finish off this summary of U.S. and its allies’ torture, interrogation, and behavior modification experimentation with ideas of why they are done to the general public and falsely accused detainees.  Anyone can be put into these programs. Justice and rule of law does not exist at the highest levels of government. Treaties are worthless because the #1 agreement in the rules of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead by example.

No-touch torture uses the same interrogation tactics as physical interrogations but with some new twists. Techniques such as “Jeff and Mutt” a.k.a. “Good Cop Bad Cop” are used. The bad cop tortures the target and the good cop tries to gain their trust. In mind control, trust games are commonly employed to manipulate the beliefs of the target.  Creating hatred of groups through false correlations and deception is a common CIA method of trickery.

In the CIA programs, the target is put through these phases as written in the documentation, “Disorient and confuse the target. Use them for our purposes, and then dispose of them in any way possible.” We can only surmise by our sample set of a thousand people what “dispose” means: prison, suicide, or perhaps a mental hospital.  Coercing and torturing people to suicide is very common. Both tactics in physical or no-touch torture involves plausible deniability.

The no-touch interrogations are better than physical rendition techniques for exposing support networks. Traditional NSA tracking of email and phones calls are useful but if the targets are taken into a secret prison they can’t contact their networks. In no-touch torture, the target will contact everyone who might help them. Then those relationships can be destroyed to isolate the target. All these techniques rely on the target having a fear of death and pain.

Deception is very important during interrogation. In physical interrogations the targets are often drugged. This creates the confusion necessary to pull off certain trickery. In terrorist interrogations, for example, the CIA uses fake newspapers to make the target believe whatever event they were suspected of plotting had already happened, obviously looking for a confession.  Sometimes the government in charge of the torture is looking for a political gain through a false confession. None-the-less false flag operations are commonly used in both forms of torture and interrogation.  The trick is to make the target believe another foreign country is doing it to them. In no-touch torture the trick is to make them believe someone related to them is behind their suffering.

Voice transformation and morphing is an interesting technology also used in both physical and wireless interrogations. It is a form of deception used against a target to trick them into believing that they are speaking to real people that they know. It has been used in war to trick generals.  Obviously spoofing email and other identities on internet forums can be used in this manner too.

Finally, the topic of human experimentation for improving weapons, torture, interrogation, and social disruption methods will be breached.  Most of the techniques mentioned above work most effectively if the target has no SERE training (Survival, Evasion, Resistance and Escape) or psychological understanding of the methods to influence the human mind. Unfortunately, every sample point in the world’s society needs to be studied to improve the weapons systems. This is why many random people are put into the torture and mind control experiments. There are some devious uses of a secret army of remote controlled assassins in every country in the world. The samples must include different education, language, culture, and economic factors.  Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it. No-touch torture is much more complex than physical torture. Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary to test on innocent targets. Often the subject will be taunted by the statement, “Try to stop us.” This statement forces the torture subject to try to figure out shielding and jamming techniques to stop the wireless torture and helps the weapons designers to improve on the system.

However, the psychological and perceived physical pain is only half the story with no-touch torture. It also involves a set of scripts, mind games if you will, to walk the target to murder and/or suicide. This is called “Hyper Game Theory”.  It is used in war games to determine how to control your enemies and targets.  Game Theory can be used on governments, individuals, or for determining propaganda to alter cultures. The experiments on the public provide a means to test the efficacy of these scripts and determine under what circumstances to use them.

One last comment on why “We must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex” as President Eisenhower warned. During these torture programs run by the United States and its allies, accurate “truth” data points need to be used to judge the efficiency of the interrogation methods. This is why there is a dispute between the CIA and Senate Intelligence Committee reports about the usefulness of torture. Subterfuge by the CIA hacking into the senate oversight committee’s computers is a big deal; a rogue agency has been formed. Data fusion centers, Homeland Security Data Fusion Centers, NSA, and FBI collect data on Americans. This data in turn is used during torture and interrogation of Americans in no-touch torture.