MIND CONTROL TECHNOLOGY COLUMNS WRITTEN BY MIND CONTROL TECHNOLOGY DOMAIN EXPERTS
I included some mind control technology columns written by mind control technology experts, in this section along with the links and actual content of the columns in case the links don’t work. These experts have been trying to educate Americans for a long time and failing because the slavish main stream media which is completely infiltrated and controlled by CIA and NSA Terrorists, brainwashes and programs americans to fill their brains with useless celebrity and political gossip.
1) “Give me the money and three months,” “and I’ll be able to affect the behavior of eighty percent of the people in this town without their knowing it.” – Dr. Elizabeth Rauscher
By Harry V. Martin and David Caul
Copyright, Napa Sentinel, 1991
…In California, it was discovered by Dr. Adey that animal brain waves could be altered directly by ELF fields. It was found that monkey brains would fall in phase with ELF waves. These waves could easily pass through the skull, which normally protected the central nervous system from outside influence.
In San Leandro, Dr. Elizabeth Rauscher, director of Technic Research Laboratory, has been doing ELF/brain research with human subjects for some time. One of the frequencies produces nausea for more than an hour. Another frequency, she calls it the marijuana frequency, gets people laughing. “Give me the money and three months,” she says, “and I’ll be able to affect the behavior of eighty percent of the people in this town without their knowing it.”….
The American public was never informed that the military had planned to develop electromagnetic weapons until 1982, when the revelation appeared in a technical Air Force magazine.
The magazine article stated, “….specifically generated radio-frequency radiation (RFR) fields may pose powerful and revolutionary anti-personnel military trends.” The article indicated that that it would be very easy to use electromagnetic fields to disrupt the human brain because the brain, itself, was an electrically mediated organ. If further indicated that a rapidly scanning RFR system would have a stunning or killing capability over a large area. The system was developable.
Navy Captain Dr. Paul E. Taylor read a paper at the Air University Center for Aerospace Doctrine, Research and Education, at Maxwell Air Force Base, Alabama. Dr. Taylor was responsible for the Navy’s Radiation Laboratory and had been studying radiation effects on humans. In his paper, Dr. Taylor stated, “The ability of individuals to function (as soldiers) could be degraded to such a point that would be combat ineffective.” The system was so sophisticated that it employed microwaves and millimeter waves and was transportable by a large truck.
Lawrence Livermore National Laboratory in the South Bay, are working on the development of a “brain bomb”. A bomb could be dropped in the middle of a battlefield which would produce microwaves, incapacitating the minds of soldiers within a circumscribed area.
Applications of microwave technology in espionage were available for over 25 years. In a meeting in Berkeley of the American Association for the Advancement of Science as early as 1965, Professor J. Anthony Deutsch of New York University, provided an important segment of research in the field of memory control. In layman terms, Professor Deutsch indicated that the mind is a transmitter and if too much information is received, like too many vehicles on a crowded freeway, the brain ceases to transmit. The Professor indicated that an excess of acetyl choline in the brain can interfere with the memory process and control. He indicated excess amounts of acetyl choline can be artificially produced, through both the administration of drugs or through the use of radio waves. The process is called Electronic Dissolution of Memory (EDOM). The memory transmission can be stopped for as long as the radio signal continues.
As a result, the awareness of the person skips over those minutes during which he is subjected to the radio signal. Memory is distorted, and time-orientation is destroyed.
According to Lincoln Lawrence, author of Were We Controlled, EDOM is now operational. “There is already in use a small EDOM generator/transmitter which can be concealed on the body of the person. Contact with this person, a casual handshake or even just a touch, transmits a tiny electronic charge plus an ultra-sonic signal tone which for a short period will disturb the time-orientation of the person affected….it can be a potent weapon for hopelessly confusing evidence in the investigation of a crime.”
Thirty years ago, Allen Frey discovered that microwaves of 300 to 3000 megahertz could be “heard” by people, even if they were deaf, if pulsed at a certain rate. Appearing to be originating just in back of the head, the sound boomed, clicked, hissed or buzzed, depending upon the frequency. Later research has shown that the perception of the waves take place just in front of the ears. The microwaves causes pressure waves in the brain tissue, and this phenomenon vibrates the sound receptors in the inner ear through the bone structure. Some microwaves are capable of directly stimulating the nerve cells of the auditory pathways. This has been confirmed with experiments with rats, in which the sound registers 120 decibels, which is equal to the volume of a nearby jet during takeoff. Aside from having the capability of causing pain and preventing auditory communication, a more subtle effect was demonstrated at the Walter Reed Army Institute of Research by Dr. Joseph C. Sharp. Dr. Sharp, himself, was the subject of an experiment in which pulsed microwave audiograms, or the microwave analog of the sound vibrations of spoken words, were delivered to his brain in such a way that he was able to understand the words that were spoken. Military and undercover uses of such a device might include driving a subject crazy with inner voices in order to discredit him, or conveying undetectable instructions to a programmed assassin.
But the technology has been carried even a step further. It has been demonstrated by Dr. Ross Adey that microwaves can be used to directly bring about changes in the electrical patterns of different parts of the brain. His experiments showed that he could achieve the same mind control over animals as Dr. Delgado did in the bull incident. Dr. Delgado used brain implants in his animals, Dr. Adey used microwave devices without preconditioning. He made animals act and look like electronic toys.
2) THE SHOCKING MENACE OF SATELLITE SURVEILLANCE – by John Fleming
My Comment: Satellites today can remotely read the private thought processes of tens of thousands of targets simultaneously.
Unknown to most of the world, satellites can perform astonishing and often menacing feats. This should come as no surprise when one reflects on the massive effort poured into satellite technology since the Soviet satellite Sputnik, launched in 1957, caused panic in the U.S. A spy satellite can monitor a person’s every movement, even when the “target” is indoors or deep in the interior of a building or traveling rapidly down the highway in a car, in any kind of weather (cloudy, rainy, stormy). There is no place to hide on the face of the earth. It takes just three satellites to blanket the world with detection capacity. Besides tracking a person’s every action and relaying the data to a computer screen on earth, amazing powers of satellites include reading a person’s mind, monitoring conversations, manipulating electronic instruments and physically assaulting someone with a laser beam. Remote reading of someone’s mind through satellite technology is quite bizarre, yet it is being done; it is a reality at present, not a chimera from a futuristic dystopia! To those who might disbelieve my description of satellite surveillance, I’d simply cite a tried-and-true Roman proverb: Time reveals all things (tempus omnia revelat).
As extraordinary as clandestine satellite powers are, nevertheless prosaic satellite technology is much evident in daily life. Satellite businesses reportedly earned $26 billion in 1998. We can watch transcontinental television broadcasts “via satellite,” make long-distance phone calls relayed by satellite, be informed of cloud cover and weather conditions through satellite images shown on television, and find our geographical bearings with the aid of satellites in the GPS (Global Positioning System). But behind the facade of useful satellite technology is a Pandora’s box of surreptitious technology. Spy satellites–as opposed to satellites for broadcasting and exploration of space–have little or no civilian use–except, perhaps, to subject one’s enemy or favorite malefactor to surveillance. With reference to detecting things from space, Ford Rowan, author of Techno Spies, wrote “some U.S. military satellites are equipped with infra-red sensors that can pick up the heat generated on earth by trucks, airplanes, missiles, and cars, so that even on cloudy days the sensors can penetrate beneath the clouds and reproduce the patterns of heat emission on a TV-type screen. During the Vietnam War sky high infra-red sensors were tested which detect individual enemy soldiers walking around on the ground.” Using this reference, we can establish 1970 as the approximate date of the beginning of satellite surveillance–and the end of the possibility of privacy for several people.
The government agency most heavily involved in satellite surveillance technology is the Advanced Research Projects Agency (ARPA), an arm of the Pentagon. NASA is concerned with civilian satellites, but there is no hard and fast line between civilian and military satellites. NASA launches all satellites, from either Cape Kennedy in Florida or Vandenberg Air Force Base in California, whether they are military-operated, CIA-operated, corporate-operated or NASA’s own. Blasting satellites into orbit is a major expense. It is also difficult to make a quick distinction between government and private satellites; research by NASA is often applicable to all types of satellites. Neither the ARPA nor NASA makes satellites; instead, they underwrite the technology while various corporations produce the hardware. Corporations involved in the satellite business include Lockheed, General Dynamics, RCA, General Electric, Westinghouse, Comsat, Boeing, Hughes Aircraft, Rockwell International, Grumman Corp., CAE Electronics, Trimble Navigation and TRW.
The World Satellite Directory, 14th edition (1992), lists about a thousand companies concerned with satellites in one way or another. Many are merely in the broadcasting business, but there are also product headings like “remote sensing imagery,” which includes Earth Observation Satellite Co. of Lanham, Maryland, Downl Inc. of Denver, and Spot Image Corp. of Reston, Virginia. There are five product categories referring to transponders. Other product categories include earth stations (14 types), “military products and systems,” “microwave equipment,” “video processors,” “spectrum analyzers.” The category “remote sensors” lists eight companies, including ITM Systems Inc., in Grants Pass, Oregon, Yool Engineering of Phoenix, and Satellite Technology Management of Costa Mesa, California. Sixty-five satellite associations are listed from all around the world, such as Aerospace Industries Association, American Astronautical Society, Amsat and several others in the U.S.
Spy satellites were already functioning and violating people’s right to privacy when President Reagan proposed his “Strategic Defense Initiative,” or Star Wars, in the early 80s, long after the Cuban Missile Crisis of 1962 had demonstrated the military usefulness of satellites. Star Wars was supposed to shield the U.S. from nuclear missiles, but shooting down missiles with satellite lasers proved infeasible, and many scientists and politicians criticized the massive program. Nevertheless, Star Wars gave an enormous boost to surveillance technology and to what may be called “black bag” technology, such as mind reading and lasers that can assault someone, even someone indoors. Aviation Week & Space Technology mentioned in 1984 that “facets of the project [in the Star Wars program] that are being hurried along include the awarding of contracts to study…a surveillance satellite network.” It was bound to be abused, yet no group is fighting to cut back or subject to democratic control this terrifying new technology. As one diplomat to the U.N. remarked, “‘Star Wars’ was not a means of creating heaven on earth, but it could result in hell on earth”.
The typical American actually may have little to fear, since the chances of being subjected to satellite surveillance are rather remote. Why someone would want to subject someone else to satellite surveillance might seem unclear at first, but to answer the question you must realize that only the elite have access to such satellite resources. Only the rich and powerful could even begin to contemplate putting someone under satellite surveillance, whereas a middle- or working-class person would not even know where to begin. Although access to surveillance capability is thus largely a function of the willfulness of the powerful, nevertheless we should not conclude that only the powerless are subjected to it. Perhaps those under satellite surveillance are mainly the powerless, but wealthy and famous people make more interesting targets, as it were, so despite their power to resist an outrageous violation of their privacy, a few of them may be victims of satellite surveillance. Princess Diana may have been under satellite reconnaissance. No claim of being subject to satellite surveillance can be dismissed a priori.It is difficult to estimate just how many Americans are being watched by satellites, but if there are 200 working surveillance satellites (a common number in the literature), and if each satellite can monitor 20 human targets, then as many as 4000 Americans may be under satellite surveillance. However, the capability of a satellite for multiple-target monitoring is even harder to estimate than the number of satellites; it may be connected to the number of transponders on each satellite, the transponder being a key device for both receiving and transmitting information. A society in the grips of the National Security State is necessarily kept in the dark about such things. Obviously, though, if one satellite can monitor simultaneously 40 or 80 human targets, then the number of possible victims of satellite surveillance would be doubled or quadrupled.A sampling of the literature provides insight into this fiendish space-age technology. One satellite firm reports that “one of the original concepts for the Brilliant Eyes surveillance satellite system involved a long-wavelength infrared detector focal plane that requires periodic operation near 10 Kelvin.” A surveillance satellite exploits the fact that the human body emits infra-red radiation, or radiant heat; according to William E. Burrows, author of Deep Black, “the infrared imagery would pass through the scanner and register on the [charged-couple device] array to form a moving infrared picture, which would then be amplified, digitalized, encrypted and transmitted up to one of the [satellite data system] spacecraft…for downlink [to earth].” But opinion differs as to whether infrared radiation can be detected in cloudy conditions. According to one investigator, there is a way around this potential obstacle: “Unlike sensors that passively observe visible-light and infra-red radiation, which are blocked by cloud cover and largely unavailable at night, radar sensors actively emit microwave pulses that can penetrate clouds and work at any hour.” This same person reported in 1988 that “the practical limit on achievable resolution for a satellite-based sensor is a matter of some dispute, but is probably roughly ten to thirty centimeters. After that point, atmospheric irregularities become a problem.” But even at the time she wrote that, satellite resolution, down to each subpixel, on the contrary, was much more precise, a matter of millimeters–a fact which is more comprehensible when we consider the enormous sophistication of satellites, as reflected in such tools as multi-spectral scanners, interferometers, visible infrared spin scan radiometers, cryocoolers and hydride sorption beds.
Probably the most sinister aspect of satellite surveillance, certainly its most stunning, is mind-reading. As early as 1981, G. Harry Stine (in his book Confrontation in Space), could write that Computers have “read” human minds by means of deciphering the outputs of electroencephalographs (EEGs). Early work in this area was reported by the Defense Advanced Research Projects Agency (DARPA) in 1978. EEG’s are now known to be crude sensors of neural activity in the human brain, depending as they do upon induced electrical currents in the skin. Magneto-encephalographs (MEGs) have since been developed using highly sensitive electromagnetic sensors that can directly map brain neural activity even through even through the bones of the skull. The responses of the visual areas of the brain have now been mapped by Kaufman and others at Vanderbilt University. Work may already be under way in mapping the neural activity of other portions of the human brain using the new MEG techniques. It does not require a great deal of prognostication to forecast that the neural electromagnetic activity of the human brain will be totally mapped within a decade or so and that crystalline computers can be programmed to decipher the electromagnetic neural signals.
In 1992, Newsweek reported that “with powerful new devices that peer through the skull and see the brain at work, neuroscientists seek the wellsprings of thoughts and emotions, the genesis of intelligence and language. They hope, in short, to read your mind.” In 1994, a scientist noted that “current imaging techniques can depict physiological events in the brain which accompany sensory perception and motor activity, as well as cognition and speech.” In order to give a satellite mind-reading capability, it only remains to put some type of EEG-like-device on a satellite and link it with a computer that has a data bank of brain-mapping research. I believe that surveillance satellites began reading minds–or rather, began allowing the minds of targets to be read–sometime in the early 1990s. Some satellites in fact can read a person’s mind from space.
Also part of satellite technology is the notorious, patented “Neurophone,” the ability of which to manipulate behavior defies description. In Brave New World, Huxley anticipated the Neurophone. In that novel, people hold onto a metal knob to get “feely effects” in a simulated orgy where “the facial errogenous zones of the six thousand spectators in the Alhambra tingled with almost intolerable galvanic pleasure.” Though not yet applied to sex, the Neurophone–or more precisely, a Neurophone-like-instrument–has been adapted for use by satellites and can alter behavior in the manner of subliminal audio “broadcasting,” but works on a different principle. After converting sound into electrical impulses, the Neurophone transmits radio waves into the skin, where they proceed to the brain, bypassing the ears and the usual cranial auditory nerve and causing the brain to recognize a neurological pattern as though it were an audible communication, though often on a subconscious level. A person stimulated with this device “hears” by a very different route. The Nuerophone can cause the deaf to “hear” again. Ominously, when its inventor applied for a second patent on an improved Neurophone, the National Security Agency tried unsuccessfully to appropriate the device.
A surveillance satellite, in addition, can detect human speech. Burrows observed that satellites can “even eavesdrop on conversations taking place deep within the walls of the Kremlin.” Walls, ceilings, and floors are no barrier to the monitoring of conversation from space. Even if you were in a high rise building with ten stories above you and ten stories below, a satellite’s audio surveillance of your speech would still be unhampered. Inside or outside, in any weather, anyplace on earth, at any time of day, a satellite “parked” in space in a geosynchronous orbit (whereby the satellite, because it moves in tandem with the rotation of the earth, seems to stand still) can detect the speech of a human target. Apparently, as with reconnaissance in general, only by taking cover deep within the bowels of a lead-shielding fortified building could you escape audio monitoring by a satellite.
There are various other satellite powers, such as manipulating electronic instruments and appliances like alarms, electronic watches and clocks, a television, radio, smoke detector and the electrical system of an automobile. For example, the digital alarm on a watch, tiny though it is, can be set off by a satellite from hundreds of miles up in space. And the light bulb of a lamp can be burned out with the burst of a laser from a satellite. In addition, street lights and porch lights can be turned on and off at will by someone at the controls of a satellite, the means being an electromagnetic beam which reverses the light’s polarity. Or a lamp can be made to burn out in a burst of blue light when the switch is flicked. As with other satellite powers, it makes no difference if the light is under a roof or a ton of concrete–it can still be manipulated by a satellite laser. Types of satellite lasers include the free-electron laser, the x-ray laser, the neutral-particle-beam laser, the chemical-oxygen-iodine laser and the mid-infra-red advanced chemical laser.
Along with mind-reading, one of the most bizarre uses of a satellite is to physically assault someone. An electronic satellite beam–using far less energy than needed to blast nuclear missiles in flight–can “slap” or bludgeon someone on earth. A satellite beam can also be locked onto a human target, with the victim being unable to evade the menace by running around or driving around, and can cause harm through application of pressure on, for example, one’s head. How severe a beating can be administered from space is a matter of conjecture, but if the ability to actually murder someone this way has not yet been worked out, there can be no doubt that it will soon become a reality. There is no mention in satellite literature of a murder having been committed through the agency of a satellite, but the very possibility should make the world take note.
There is yet another macabre power possessed by some satellites: manipulating a person’s mind with an audio subliminal “message” (a sound too low for the ear to consciously detect but which affects the unconscious). In trying thereby to get a person to do what you want him to do, it does not matter if the target is asleep or awake. A message could be used to compel a person to say something you would like him to say, in a manner so spontaneous that noone would be able to realize the words were contrived by someone else; there is no limit to the range of ideas an unsuspecting person can be made to voice. The human target might be compelled to use an obscenity, or persons around the target might be compelled to say things that insult the target. A sleeping person, on the other hand, is more vulnerable and can be made to do something, rather than merely say something. An action compelled by an audio subliminal message could be to roll off the bed and fall onto the floor, or to get up and walk around in a trance. However, the sleeping person can only be made to engage in such an action for only a minute or so, it seems, since he usually wakes up by then and the “spell” wears. It should be noted here that although the “hypnotism” of a psychoanalyst is bogus, unconscious or subconscious manipulation of behavior is genuine. But the brevity of a subliminal spell effected by a satellite might be overcome by more research. “The psychiatric community,” reported Newsweek in 1994, “generally agrees that subliminal perception exists; a smaller fringe group believes it can be used to change the psyche.” A Russian doctor, Igor Smirnov, whom the magazine labeled a “subliminal Dr. Strangelove,” is one scientist studying the possibilities: “Using electroencephalographs, he measures brain waves, then uses computers to create a map of the subconscious and various human impulses, such as anger or the sex drive. Then. through taped subliminal messages, he claims to physically alter that landscape with the power of suggestion.” Combining this research with satellite technology–which has already been done in part–could give its masters the possibility for the perfect crime, since satellites operate with perfect discretion, perfect concealment. All these satellite powers can be abused with impunity. A satellite makes a “clean getaway,” as it were. Even if a given victim became aware of how a crime was effected, no one would believe him, and he would be powerless to defend himself or fight back.
And this indeed is the overriding evil of satellite technology. It is not just that the technology is unrestrained by public agencies; it is not just that it is entirely undemocratic. The menace of surveillance satellites is irresistible; it overwhelms its powerless victims. As writer Sandra Hochman foresaw near the beginning of the satellite age, though seriously underestimating the sophistication of the technology involved: Omniscient and discrete, satellites peer down at us from their lofty orbit and keep watch every moment of our lives… From more than five-hundred miles above earth, a satellite can sight a tennis ball, photograph it, and send back to earth an image as clear as if it had been taken on the court at ground zero. Satellites photograph and record many things…and beam this information, this data, back to quiet places where it is used in ways we don’t know. Privacy has died.” This terror is in the here and now. It is not located in the mind of an eccentric scientist or futurologist. Satellite surveillance is currently being abused. Thousands of Americans are under satellite surveillance and have been stripped of their privacy. And presently they would have little or no recourse in their struggle against the iniquity, since technology advances well ahead of social institutions.
The powers of satellites, as here described, especially lend themselves to harassment of someone. The victim could be a business or political rival, an ex-spouse, a political dissident, a disliked competitor, or anyone who for whatever reason provokes hatred or contempt. Once the target is a “signature,” he can almost never escape a satellite’s probing eyes. (As an article in Science explained, “tiny computers…check the incoming signals with computerized images, or ‘signatures,’ of what the target should like.”) As long as his tormentor or tormentors–those with the resources to hire a satellite–desire, the victim will be subject to continuous scrutiny. His movements will be known, his conversations heard, his thoughts picked clean, and his whole life subjected to bogus moralizing, should his tormentor diabolically use the information gained. A sadist could harass his target with sound bites, or audio messages, directly broadcast into his room; with physical assault with a laser; with subliminal audio messages that disturb his sleep or manipulate persons around him into saying something that emotionally distresses him; with lasers that turn off street lights as he approaches them; with tampering with lamps so that they burn out when he hits the switch; and in general with the knowledge gained acquired through the omniscient eyes and ears of satellites. In short, a person with access to satellite technology could make his victim’s life a living nightmare, a living hell.
How you could arrange to have someone subjected to satellite surveillance is secretive; it might even be a conspiracy. However, there seem to be two basic possibilities: surveillance by a government satellite or surveillance by a commercial satellite. According to an article in Time magazine from 1997, “commercial satellites are coming online that are eagle-eyed enough to spot you–and maybe a companion–in a hot tub.” The Journal of Defense & Diplomacy stated in 1985 that “the cost of remote sensors is within the reach of [any country] with an interest, and high-performance remote sensors (or the sensor products) are readily available. Advances in fourth-generation (and soon fifth-generation) computer capabilities. especially in terms of VHSIC (very-high-speed integrated circuits) and parallel processing, hold the key to rapid exploitation of space-derived data. Wideband, low-power data relay satellites are, at the same time, providing support for communication needs and for relay of remote sensor data, thus providing world-wide sensor coverage.” In addition, The New York Times reported in 1997 that “commercial spy satellites are about to let anyone with a credit card peer down from the heavens into the compounds of dictators or the back yards of neighbors with high fences.” “To date [the newspaper further noted] the Commerce Department has issued licenses to nine American companies, some with foreign partners, for 11 different classes of satellites, which have a range of reconnaissance powers.” But this last article discussed photographic reconnaissance, in which satellites took pictures of various sites on earth and ejected a capsule containing film to be recovered and processed, whereas the state of the art in satellite technology is imaging, detection of targets on earth in real time. Currently, industry is hard at work miniaturizing surveillance satellites in order to save money and be in a position to fill the heavens with more satellites.
Yet no source of information on satellites indicate whether the abuse of satellite surveillance is mediated by the government or corporations or both. More telling is the following disclosure by the author of Satellite Surveillance (1991): “Release of information about spy satellites would reveal that they have been used against U.S. citizens. While most of the public supports their use against the enemies of the U.S., most voters would probably change their attitudes towards reconnaissance satellites if they knew how extensive the spying has been. It’s better…that this explosive issue never surfaces.” Few people are aware of the destruction of the rights of some Americans through satellite surveillance, and fewer still have any inclination to oppose it, but unless we do, 1984 looms ever closer. “With the development of television and the technical device to receive and transmit on the same instrument, private life came to an end”
3) Mind Control? Scientists Have Discovered How To Use Nanoparticles To Remotely Control Behavior
Mind Control? Scientists Have Discovered How To Use Nanoparticles To Remotely Control Behavior!
By Michael Snyder, on July 8th, 2010
Are we moving into a time when the extraordinary advances that have been made in the fields of nanotechnology, neurology, psychology, computer science, telecommunications and artificial intelligence will be used by governmental authorities to control the population? Already, governments around the world are using the threat of “terror” as an excuse to watch us, track us, scan all of our electronic communications and force us to endure “security measures” that are so extreme that even George Orwell could have never dreamed them up. So what is going to happen one day when some crazed individual actually does set off a weapon of mass destruction in a major city? The temptation to use these emerging technologies to control the public will become almost irresistible. At this point “mind control” is still a dirty word to many, but after the next couple of “9/11 style events” the general population will be crying out for something to be done to ensure their security. When society experiences a complete and total meltdown in the years ahead, governments around the world will be tempted to do just about anything, including using mind control, to restore order. That is why some of the most recent advances in the field on nanotechnology are so chilling.
In particular, what a team of researchers at the University at Buffalo have discovered is truly alarming. The following is an excerpt from their recent news release….
Clusters of heated, magnetic nanoparticles targeted to cell membranes can remotely control ion channels, neurons and even animal behavior, according to a paper published by University at Buffalo physicists in Nature Nanotechnology.
Using nanoparticles to remotely control animal behavior?
It doesn’t take a doctorate to understand the implications of such a technology.
What if “nanobots” that had the capacity to control human minds were programmed to search out and attach themselves to key areas of the human brain?
Such “nanobots” would be far too small to even be seen by the human eye, and people could become “infected” with these creatures without even knowing it.
Hordes of these nanobots could be released into the atmosphere or in public areas and infect thousands (or even millions) and nobody might even realize it.
If governments could find a way to use nanobots to remotely control the minds of the general population, a mass mind control program could be implemented without the general public even realizing what is going on.
Yes, this is just how scary this technology is.
But it gets even worse.
You see, when it comes to nanotechnology we are dealing with something far more dangerous than we can even imagine.
For example, if something goes horribly wrong and we develop speed-breeding self-assembling nanobots that get out of control, they could theoretically devour all life on Earth in fairly short order.
Think of the scene at the end of the recent Keanu Reeves movie entitled “The Day The Earth Stood Still” and multiply it by about a million.
But even if such a scenario never plays out, the mind control potential of nanotechnology is bad enough.
Not that other mind control technologies aren’t equally as dangerous.
The truth is that all kinds of mind control technologies are being developed.
Video game makers are busy developing games that you control not with a joystick or a gamepad but rather with your brain waves. So could such a technology someday be used in reverse?
Of course most people by now have heard of MK-ULTRA and other mind control programs that were developed by the CIA and other U.S. government agencies.
The U.S. government insists that all such programs have been discontinued.
But are they telling the truth?
And what are other governments around the world developing in secret?
There are other mind control technologies out there that are incredibly dangerous as well.
In fact, there are many who suggest that electromagnetic waves could potentially be used to control thoughts and influence behavior. Think of what just one terrorist could do with such technology.
But one of the most disturbing developments of all is the increasingly rapid merger of men and machines that is now taking place.
People have been looking for ways to stay more “connected” to the Internet for a long time, and now some are actually suggesting that we should find a way to directly connect our brains to the Internet. A recent article on the website of the Science Channel put it this way….
What if it were possible to connect your brain to the Internet, either wirelessly or through a cable, download digital information at high speed, and then translate it automatically into a chemical form that could be stored by your brain cells as memory?
The same article explained what some of the benefits from such a connection might be….
If you could pump data directly into your gray matter at, say, 50 mbps — the top speed offered by one major U.S. internet service provider — you’d be able to read a 500-page book in just under two-tenths of a second.
But what about the dangers?
What if the Internet could end up controlling you?
Or what if a really bad computer virus was downloaded into your brain?
Think it can’t happen?
Well, British researcher Mark Gasson infected an RFID chip in his hand with a computer virus and found that the virus-infected chip implanted in his hand was able to contaminate external systems.
Imagine if that started happening on a large scale.
And someday it might.
Especially as we approach the time that futurists refer to as “The Singularity”.
The Singularity is hard to define, but basically many futurists believe that the merging of man and technology is happening at such an increasingly rapid pace that at some point the new “transhumans” will become virtually incomprehensible to normal human beings. The idea is that by merging man and machines, transhumans will become smarter, stronger, healthier and more powerful than we could have ever dreamed possible.
So will men and computers fully merge someday?
Let’s hope not.
But even now, an increasing number of people are developing ways to tag humans with RFID microchips.
In fact, one company called Somark has developed a breakthrough in chipless RFID ink. Their “RFID tattoos” are applied using a geometric array of micro-needles and a reusable applicator with a one-time-use ink capsule.
So how easy is it to apply one of these RFID tattoos?
Well, it takes about 5 to 10 seconds to tattoo an animal or a human. Once the tattoo has been applied, an RFID reader can read it from up to four feet away.
But who needs a tattoo? IBM has actually announced that they have developed a “bar code reader” that can read your DNA.
Very frightening stuff.
The truth is that the vast majority of people do not want their DNA scanned and they do not want RFID chips implanted into them.
But RFID chips are being implanted into people more than ever before.
The reality is that microchipping of humans is becoming quite commonplace in the United States. For example, RFID implants are being implanted in thousands of elderly Americans living with Alzheimer’s disease who are at risk of wandering off and getting lost. In addition, RFID chips are being implanted into many people who are chronically ill so that doctors can access their medical information quickly in an emergency.
The truth is that there are some people who are quite eager to be chipped. One columnist named Don Tennant recently published an article entitled “Chip Me – Please!” in which he expressed his excitement that Barack Obama’s new health law may include coverage for RFID chip implants that contain patient identification and health information. In fact, Tennant makes the following stunning admission in his article….
All I can say is I’d be the first person in line for an implant.
So is this our future?
Is everyone going to be taking lots of microchips and implants?
Will there come a day when microchips and implants are made mandatory?
After all, what better way to truly identify someone? Identification cards and papers can be forged or can get lost. But if you implant someone with a microchip how are they going to lose that?
However, we all know that the potential for abuse of all of the technologies mentioned in this article is just too great. If someday a tyrannical regime gets a hold of these kinds of ultra-powerful technologies the results could be absolutely nightmarish.
4) Can A Satellite Read Your Thoughts? – Physics Revealed
Can A Satellite Read Your Thoughts? – Physics Revealed
Most people, when they hear of Synthetic Telepathy, especially by means of satellite, jump to the immediate conclusion that such things are not possible. If they were, we would have heard of them, right?
Looking back at the history of classified technology, places and events shows a wide range of time periods where things are kept secret. Stealth aircraft are just one example, the F-117 Nighthawk was not publicly acknowledged until 1988 although it had been in operation for over six years. Documents sealed for “National Security” purposes can be hidden away for up to 70 years. So, it would be really surprising if certain technologies were not classified as you read this.
Whilst you can hide certain technology to an extent, what becomes very difficult to hide as time passes is the physics of a given technology. An example would be a nuclear device. Whilst you could, in theory, hide a given nation’s development of a nuclear bomb, the physics still shows that nuclear fission/fusion is possible. Thus, if you weigh up the various factors that are required to create a nuclear device, you can make an educated guess as to the likelihood a nation has such technology.
With this in mind, I decided to look at the transceiver and the physics involved in that process. Its all well and good claiming that a satellite can read thoughts, but how does the physics stack up?
Does The Brain Transmit Like A Radio
To understand this, we first need to look at how antennas work, its relationship to neurons and what similarities, if any, exist. Coming from a QED angle, if you take a look at figure 1 we can get a better viewpoint of how a moving charge creates an EM wave. As the electrical field moves towards the bottom of the picture, virtual photons are radiating magnetic energy into free space. As per Maxwell’s equations, a changing magnetic field will induce a changing electrical field resulting in a free standing EM wave. This is a good applet that shows how a moving charge produces electromagnetic radiation.
So, what is the connection with neurons? Information is processed by the brain in the form of electro-chemical interactions. That is, every perception you have sends electrical signals to the brain that are routed to specific areas that deal with them. The neuron has a long strand called an axon, along this axon propagates an electrical charge. With a resting potential of -70mV an action potential moves along the axon, in a millisecond, elevating it to a voltage of +30mV which drops off over a few milliseconds. This makes an action potential a form of alternating current with an almost triangular waveform. As such, this produces a very weak form of modulated electromagnetic radiation or radio source.
For the astute reader, it means that a neuron is a type of transducer.
Can You Hear Me Now?
So, whenever you have a thought, feeling, speak or our heart beats, tiny little radio emissions are being made by the brain that emanate into free space. The real questions are, given modern technology can these signals be detected and does a method exist of associating them with particular functions? That is, whilst signals in this power range may be detectable, is there something unique about the signals that can be used to differentiate between different roles?
Let’s deal with first problem, detection. I tracked down an example of satellite sensitvity to radio frequencies that should act as a baseline. The following data is from NASA’s Jet Propulsion Lab:
The sensitivity of our deep-space tracking antennas located around the world is truly amazing. The antennas must capture Voyager information from a signal so weak that the power striking the antenna is only 10 exponent -16 watts (1 part in 10 quadrillion). A modern-day electronic digital watch operates at a power level 20 billion times greater than this feeble level.
So, does the brain emit radio waves at a power level greater than 0.0000000000000001 Watts after several hundred miles?
To answer this we must turn to this scientific paper. From this paper, we can observe the charge per square centimeter which is around 22-29 microamperes. We can perform some rough math on these figures that will reveal the answer to our question. The equations are rough and leave out a lot of additional factors, that said, the final figures will not be far from the truth and will probably under-estimate the capabilities of current
So, using the formula Watts = Voltage x Amperage, we get the following peak power:
0.003 V x 0.0000029 A = 0.0000000087 Watts/cm2
So, at source, the weak radio emission of a cubic centimeter of brain matter is well within the detectable limits of the satellite. We now need to project that into space and determine the signal strength at orbital distances. To do this, we need to apply the inverse square law to the emission and the formula is provided in figure 2. So, the formula would be (disregarding gain):
(0.000087 Watts/m2) / (4PI x (500000m^2)) =
0.000087 / 3141592653589.7932384626433832795 =
This is fine, its somewhat larger than our baseline, but nothing that cannot be accounted for. Firstly, we need to identify the frequency range. As noted before, due to Maxwell’s equations the motion of the action potential results in a changing electrical field. In turn, this results in a changing magnetic field and thus a free space radio wave.
Typical frequencies for an action potential are in the range of 0-500Hz which will result in free space waves in this range, known as the SLF and ELF Band. This somewhat matches up with experimental evidence that shows humans do broadcast signals on the ELF band. This scientific paper and others show that SLF/ELF reception gear and antennas are of a practical form factor to be placed upon a satellite. An array of such satellites (see figure 3) would use the principle of aperture synthesis to create a type of space-born Very Large Array.
Given that the Ohio State’s radio telescope had a sensitivity, in 1977, of 2 ×10^-22 W m-2 per channel and the VLA is described as being 100 times as sensitive, any signals we are producing could be heard loud-and-clear by a space-borne array. This arrangement would provide for a very high resolution of brain activity.
What’s more, the development time line for this technology places the capability to detect brainwaves as far back as the early 1970’s. Given an average lifespan for a satellite as 5 years, with an initial deployment during 1970, the satellite technology would be in its 8th generation today.
So, we can detect the signals but now it must be processed.
There is a significant difference between detecting a signal, or signal range, and being able to process that information and make sense of it. To do this, we need to find unique patterns in a signal that would allow us to isolate individuals and isolate neural activity we can categorize.
The three main characteristics of a wave are its amplitude, frequency and phase. To be able to detect a single person, in a crowd for example, we need to find something unique about the waves the are emanating. This allows us to eliminate the noise and only have information regarding a single person.
There are a number of ways this can be achieved. In a satellite array, examining the timing of signals received across the array, on a given frequency range, will provide you with both the location (in 3D) and the coding of the neuron structure. From this, the function of the cluster can be inferred by comparison with generalizable signals in a database.
A cluster of neurons will broadcast across a given range of frequencies, slightly out of phase and with slight variation in amplitude. The characteristics are dictated to by the rate of neuronal firing, the timing of neuronal firing and the amount of energy in the neuron at the time. Given that neurons are biological and the unique structure of a cluster, the statistical likelihood of the wave characteristics being identical between different people would be quite low. Thus, from a technical viewpoint, pattern analysis lies at the heart of the development of a lexicon.
Now, we have our signals, we know what they mean, all that’s left is to scale the process up, allowing us to track thousands of targets in real-time. The only real limit here is processing horse power and satellites.
In answer to our original question, it is technically possible for a satellite to detect your thoughts, your emotions and your perceptions and pass that information to a computer for interpretation. I bet that comes as quite a shock.
The only ever real restriction was the receiver sensitivity in the SLF/ELF band. The whole tinfoil hat brigade will be pleased, but will ultimately feel stupid as waves in the SLF/ELF band cannot be blocked by tinfoil hats. Even in the deepest tube stations, you would be heard perfectly from orbital distances.
So, given that it is technically possible, the questions now become which governments
Do you see the benefit to intelligence gathering? are using it and why was the public not informed?
There will be a lot of raised eyebrows in the world tonight.
5) Synthetic Telepathy – The Hidden Truth BY MichAEL DWYER
Michael Dwyer 21.05.2010 11:50
The following article is an entry that appeared on Wikipedia. Within the last 24 hours a major “edit war” broke out and it appeared, at least to me, that the information was being suppressed. The article goes into depth about a field of espionage that employs a technology known as “silent sound” or “Synthetic telepathy”. If you’re interested in high tech espionage, this makes for a very good read.
Synthetic telepathy Synthetic telepathy also known as techlepathy or psychotronics) is a term used to describe the process in brain-computer interfaces by which human thought (as electromagnetic radiation) is intercepted, processed by computer and a return signal generated that is perceptible by the human brain. (ref 1,2,3,4) ==History==
In 1967, Edmond M. Dewan published a paper in Nature demonstrating the control of Alpha waves, turning them on and off, to produce Morse code. (ref 5) Using an EEG machine, Dewan and his fellow researchers were able to send words and phrases by thought alone.
In 1976, Robert G. Malech was awarded United States Patent 3951134 for remotely monitoring and altering brainwaves using radio.(ref 6) This patent makes reference to demodulating the waveform, displaying it to an operator for viewing and passing this to a computer for further analysis.
In 1988, Farwell, L.A. & Donchin, D. produced a paper describing a method of transmitting linguistic information using the P300 response system. (ref 7) This system combined matching observed information to what the subject was thinking of. In this case, being able to select a letter from the alphabet that the subject was thinking of. In theory, any input could be used and a lexicon constructed.
United States Patent 6,011,991, granted January 4, 2000, describes a method of monitoring an individual’s brain waves remotely, for the purposes of communication. Filed December 7, 1998, the patent outlines a system that monitors an individual’s brainwaves via a sensor, then transmits this, specifically by satellite, to a computer for analysis. This analysis would determine if the individual was attempting to communicate a “word, phrase, or thought corresponding to the matched stored normalized signal”.(ref 8)
Approaches to synthetic telepathy can be categorized into two major groups, passive and active. Like sonar, the receiver can take part or passively listen.
Passive reception is the ability to “read” a signal without first broadcasting a signal. This can be roughly equated to tuning into a radio station, the brain generates electromagnetic radiation which can be received at a distance. That distanced is determined by the sensitivity of the receiver, the filters used and the bandwidth required. Most universities would have limited budgets and receivers such as EEG (and similar devices) would be used. A related military technology is the surveillance system TEMPEST, the effective range of which is classified. (ref 9) Given that US Congress attempted to enact a bill in Oct 2001 banning these type of devices as “space weapons”, (ref 10) may indicate that fluctuations in the human magnetic field can be intercepted by satellite.
Robert G. Malech’s approach requires a modulated signal to be broadcast at the target. The method uses an active signal which is interfered with by the brain’s modulation. Thus, the return signal can be used to infer the original brainwave. This approach does expose the transmitter, but is ultimately required for generating return signals that can be processed by the brain.
The research of Farwell, L.A. & Donchin, D, is the first public revelation that could lead to a generic lexicon being developed, however, this is implied in the work of Robert G. Malech in 1976.
==Current research== Current research, as of 2010, is being driven by military for “covert speech”, however, given that much of this is unclassified, it would suggest that the bulk of the research was performed much earlier and dedicated to the field of intelligence gathering during the cold war. Additional reports suggest that a version is deployed in combat zones to demoralize enemy troops and a smaller number of reports indicate a potential use to undermine governments and cause public unrest. (ref 11, 12) Today, the driving force appears to be silent communication with battlefield troops. A mere $4 million was provided to DARPA for the fiscal year 2009/2010 to develop such a system called “Silent Talk”. (ref 13) Much of the research is being conducted at The Cognitive NeuroSystems Lab at UC Irvine. (ref 14) A further $4 million was allocated by the Army to the University of California to investigate computer-mediated “synthetic telepathy”.(ref 15) The research aims to detect and analyze the word-specific neural signals, using EEG, which occur before speech is vocalized, and to see if the patterns are generalizable. (ref 16) The research is part of a wider $70 million project that began in 2000 which aims to develop hardware capable of adapting to the behavior of its user.(ref 17) Quite apart from linguistic information, images have been extracted from the brain. Researchers at Japan’s ATR Computational Neuroscience Laboratories have been able to reconstruct images that a subject can currently see. The ultimate goal of the unclassified project is to view both retinal and imagined images in real-time, including dreams. (ref 18) ==Computer Mediation===
Computer mediation falls into two basic categories, interpretative and interactive. Interpretative mediation is the passive analysis of signals coming from the human brain. A computer “reads” the signal then compares that signal against a database of signals and their meanings. Using statistical analysis and repetition, false-positives are reduced over time. Interactive mediation can be in a passive-active mode, or active-active mode. In this case, passive and active denote the method of reading and writing to the brain and whether or not they make use of a broadcast signal. Interactive mediation can also be performed manually or via artificial intelligence.
Manual interactive mediation involves a human operator producing return signals such as speech or images. A.I. mediation leverages the cognitive system of the subject to identify images, pre-speech, objects, sounds and other artifacts, rather than developing A.I. routines to perform such activities. A.I. based systems may incorporate natural language processing interfaces that produce sensations, mental impressions, humor and conversation to provide a mental picture of a computerized personality. Not only can this A.I hold a conversation via the internal monologue but it may also perform routing of information to and from specific groups or individuals. This provides a broad range of potential applications from acting as a communications system to conducting interrogations. This latter form is currently being researched at UC Irvine for an unclassified US military project. (ref 19) Given the high value to espionage and counter-terrorism, it is likely that such a system is already deployed in a classified manner. ==Military Uses==
In a military context, the first obvious uses is to both read and write information to the internal monologue. This provides two major areas of interest, the first being two-way communication for field agents and the second is the intelligence gathering and interrogation. A fundamental problem arises when using the system for communication purposes, in that, it is impossible to authenticate the source of the transmission. Synthetic telepathy has limited uses as a communication system unless direct-contact headset systems are used and supported by encrypted channels. As such, standard radios are more effective in combat situations. Synthetic telepathy also requires the thought stream to be processed which results in a minor lapse of attention, rather like a daydream, that could have deadly consequences on the battlefield.
With respect to intelligence gathering and interrogations, synthetic telepathy has a wide range of drawbacks and limitations. What it does provide is the ability to read the internal monologue (or anything that causes electrical change/radiation) and the trick is to get the subject to “voice” their memories and cross-reference that with their emotional state. In other words, basic psychological manipulation is a key factor and makes the technology not much more reliable than a standard lie-detector test. In practice, passive monitoring of the internal monologue over a long time period (months-years) is probably the most effective method of intelligence gathering.
The capability to put a person into a state of hypnosis is often touted by conspiracy theorists. In actual fact, the suggestive capabilities of synthetic telepathy use a different mechanism, basic impulses and sensations. This is merely a different form of writing to the brain. To formulate thought, the brain has a pipeline through which information is processed. (ref 20) At its most basic, impulses guide human behavior and manipulation of these impulses provides a strategic advantage in both combat and political situations. By altering the motivational factors of a target subject or group, it makes it easier to guide their higher level decision making process.
Crowd or riot control can be achieved by generating impulses that are essentially common to all humans, resulting in the dispersion of crowds or a willingness to co-operate with authorities. This type of synthetic telepathy is arguably a political tool as it suppresses dissent (ref 21)
Amnesia (retrograde and anterograde) can be induced as any active signal is essentially interferring with normal operations of the brain. Thus, transfer from shortterm to longterm memory can be inhibited. (ref 22) Vision and auditory systems could also be compromised, as with any neural processing system, corruption of the inputs would result in halucinations, much like the effects of LSD. With a proper interface to such regions, events such as “alien abductions” or “seeing God” could be faked quite readily and “mental illness” used as a cover for the extraction of information. (ref 23, 24, 25)
==Silent Sound Spread Spectrum (SSSS/S-Quad)==
ITV News Service, in March 1991, produced a report of ultrasound piggybacked on a commercial radio broadcast (100Mhz) aimed at entraining the brains of Iraqi troops and creating feelings of despair. (ref 26) This has been related to United States Patent 5,159,703 awarded to Oliver M. Lowery which refers to a “silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain, typically through the use of loudspeakers, earphones or piezoelectric transducers.”(ref 27)
Human hearing is roughly in the range of 20Hz-20,000Hz (20 kHz), although a human adult will lose the ability to hear the higher ranges as they grow older. In addition, most cheap radios have a limited frequency response range (ref 28) that will be unable to reproduce silent sound as encoded originally making it ineffective. As such, an alternative explanation for the effectiveness of S-Quad is provided in human biology: 1. Cells amplifying radio signals at certain frequencies. 2. Cells can demodulate voice on a basic carrier wave. This is not as strange as it seems, it has been noted for a long time that fillings, or dental braces, can result in radio stations being heard in the mouth of an individual. (ref 29)
Conspiracy theory and popular science fiction would have the world believe that the human mind can be remotely controlled. That individuals can be turned into mindless automatons and directly controlled by computers to produce sleepers or assassins. (ref 30) The reality is much less clear.
Interfacing remotely to write to the brain is performed using electrical interference rather like crosstalk (electronics). (ref 31) Much like a drill next to a television, the interference pattern is processed by the brain as information, a variant which induces sensations and feelings is known as Transcranial Magnetic Stimulation. (ref 32) As such, an externally generated monologue will be weaker than the internal monologue of the target subject due to a lesser signal strength. An over-powering signal would interrupt a wide range of neural functions that could impact critical autonomic systems resulting in death. Two possible methods exist that could result in an individual killing another through the use of synthetic telepathy. The first is to leverage the natural behavior of the target subject, that is, use an individual who would kill another. The second is to induce psychotic symptoms and diminish their mental control (ref 33, 34) In both cases, the underlying mechanics are the same, to provide impulses and sensations that urge the individual to commit murder. This is not hypnosis, but merely physiological manipulation without the knowledge of the target. Another area of interest and arguably more feasible, is the manipulation of political figures. (ref 35)Thoughts, sensations and impulses can be combined to influence political and personal decision making processes. A similar process can be used to effect the population at large to drive agendas or to maintain power for certain groups, undermining free will and self-expression. (ref 36) As the technology matures and expands to regimes throughout the globe, this will be a major source of concern for governments world-wide. Finally, we come to the area of interrogations which can be conducted remotely whilst an individual or groups is conducting their normal daily business. The internet is saturated with such reports (ref 37) and as a possible side-effect is psychosis, it is quite likely that at least some of them are accurate.
The term “psychotronic”, short for psycho-electronic ( ref 38) was used in the proposed Bill H.R. 2977 Space Preservation Act of 2001, which listed “psychotronic” as a list of possible spaceborne weapons which would be banned by the Act (ref 39)
In 2001, President Vladimir V. Putin signed into law a bill making it illegal to employ “electromagnetic, infrasound … radiators” and other weapons of “psychotronic influence” with intent to cause harm.
As a completely unnatural event, it is arguable that this type of technology when employed in interrogations would be classified as “cruel or unusual”. Further to this, A.I. mediated events such as mock executions or death threats would also violate the Geneva convention, International law and laws of most nations in the developed world. Counter-claims focusing on National Security would be invalid as criminal activity is, in itself, a gross violation of National Security.
The European Parliament adopted a resolution on January 28, 1999, 28.1.99 Environment, security and foreign affairs A4-0005/99: 23. Calls on the European Union to seek to have the new ‘non-lethal’ weapons technology and the development of new arms strategies also covered and regulated by international conventions … 27. Calls for an international convention introducing a global ban on all developments and deployments of weapons which might enable any form of manipulation of human beings ==In The Media==
60 Minutes correspondent Lesley Stahl interviewed Tom Mitchell of Carnegie Mellon University on his work in “Thought Identification” using fMRI. (ref 40) The segment, published Jan. 4, 2009 and available on the CBS website, shows associate producer Meghan Frank having his thoughts identified by computer. (ref 41) The segment shows that a generalizable pattern exists in the human brain that can be used to identify thoughts without training a computer for each individual with 100% accuracy. ==Further Reading==
Dr Nick Begich – Controlling the Human Mind, Earth Pulse Press Anchorage – isbn=1-890693-54-5}} Walter Bowart – http://www.scribd.com/doc/24531011/Operation-Mind-Control John Marks – In Search of the Manchurian Candidate, publisher WW Norton & Co, 1979, isbn=0-393-30794-8
1. http://www.msnbc.msn.com/id/27162401/ – Army developing ‘synthetic
articleshow/3596708.cms – US army developing synthetic telepathy
– Army Sinks Millions Into “Synthetic Telepathy” Research
– Tips and Tricks for Mind Control from the US Military
5. http://cnslab.ss.uci.edu/muri/research.html#Dewan – MURI: Synthetic
– Apparatus and method for remotely monitoring and altering brain waves
7. http://cnslab.ss.uci.edu/muri/research.html#FarwellDonchin – MURI:
– Communication system and method including brain wave analysis and/or use
of brain activity
9. http://www.sst.ws/tempstandards.php?pab=1_1 – TEMPEST measurement
10. http://www.govtrack.us/congress/billtext.xpd?bill=h107-2977 – Space
Preservation Act of 2001
11. http://www.raven1.net/silsoun2.htm – PSY-OPS WEAPONRY USED IN THE
PERSIAN GULF WAR}}
12. Wall, Judy, “Military Use of Mind Control Weapons”, NEXUS, 5/06, Oct-Nov
13. Soldier-Telepathy” Drummond, Katie – Pentagon Preps Soldier Telepathy
14. http://cnslab.ss.uci.edu/muri/research.html – MURI: Synthetic Telepathy
15. Soldier-Telepathy” Drummond, Katie – Pentagon Preps Soldier Telepathy
16. Soldier-Telepathy” Drummond, Katie – Pentagon Preps Soldier Telepathy
17. Noah, Shachtman – Pentagon’s PCs Bend to Your Brain –
Scientists extract images directly from brain
19. http://cnslab.ss.uci.edu/muri/research.html#Overview – MURI: Synthetic
20. http://cnslab.ss.uci.edu/muri/research.html#ImaginedSpeechProduction –
MURI: Synthetic Telepathy
of selected non-lethal weapons
22. http://www.informaworld.com/smpp/content~db=all~content=a785359968 –
Partial Amnesia for a Narrative Following Application of Theta Frequency
23. http://www.wired.com/wired/archive/7.11/persinger.html – This Is Your
Brain on God
The NSA & Synthetic Telepathy
Journal of Psycho-Social Studies – Vol 2 (2) 2003 – On the Need for New
Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology
by Dr. Carole Smith
Eleanor White – New Devices That ‘Talk’ To The Human Mind Need Debate,
Silent subliminal presentation system
| – Understanding Loudspeaker Frequency Response
29. http://answers.google.com/answers/threadview?id=367925 – Q: Radio
signals picked up by tooth fillings
30. http://cbcg.org/gjcs1.htm| – God’s Judgment Cometh Soon
31. http://www.patentgenius.com/patent/6587729.html – Apparatus for audibly
communicating speech using the radio frequency hearing effect
32. http://www.psychology.nottingham.ac.uk/staff/lpxdts/TMS%20info.html –
Transcranial Magnetic Stimulation
SYNTHETIC TELEPATHY AND THE EARLY MIND WARS
34. http://newdawnmagazine.com.au/Article/Brain_Zapping_Part_One.html –
35. http://genamason.wordpress.com/2009/10/18/more-on-synthetic-telepathy/ –
More on synthetic telepathy
36. http://newdawnmagazine.com.au/Article/Brain_Zapping_Part_One.html –
37. http://daprocess.com/01.welcome.html – DaProcess of A Federal
Investigation PG 1 of 4
-Journal of Psycho-Social Studies – Vol 2 (2) 2003 – On the Need for New
Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology
by Dr. Carole Smith
39. http://www.govtrack.us/congress/billtext.xpd?bill=h107-2977 – Space
Preservation Act of 2001
40. http://www.cbsnews.com/stories/2008/12/31/60minutes/main4694713.shtml –
60 Minutes: Incredible Research Lets Scientists Get A Glimpse At Your
41. http://www.cbsnews.com/video/watch/?id=5119805n&tag=related;photovideo –
60 Minutes: Video – Mind Reading
6) Microchip Implants, Mind Control, and Cybernetics – by Dr. Rauni Kilde
By Rauni-Leena Luukanen-Kilde, MD
Former Chief Medical Officer of Finland
December 6, 2000
In 1948 Norbert Weiner published a book, Cybernetics, defined as a neurological communication and control theory already in use in small circles at that time. Yoneji Masuda, “Father of the Information Society,” stated his concern in 1980 that our liberty is threatened Orwellian-style by cybernetic technology totally unknown to most people. This technology links the brains of people via implanted microchips to satellites controlled by ground-based supercomputers.
The first brain implants were surgically inserted in 1974 in the state of Ohio, USA and also in Stockholm, Sweden. Brain electrodes were inserted into the skulls of babies in 1946 without the knowledge of their parents. In the 1950s and 60s, electrical implants were inserted into the brains of animals and humans, especially in the U.S., during research into behavior modification, and brain and body functioning. Mind control (MC) methods were used in attempts to change human behavior and attitudes. Influencing brain functions became an important goal of military and intelligence services.
Thirty years ago brain implants showed up in X-rays the size of one centimeter. Subsequent implants shrunk to the size of a grain of rice. They were made of silicon, later still of gallium arsenide. Today they are small enough to be inserted into the neck or back, and also intravenously in different parts of the body during surgical operations, with or without the consent of the subject. It is now almost impossible to detect or remove them.
It is technically possible for every newborn to be injected with a microchip, which could then function to identify the person for the rest of his or her life. Such plans are secretly being discussed in the U.S. without any public airing of the privacy issues involved. In Sweden, Prime Minister Olof Palme gave permission in 1973 to implant prisoners, and Data Inspection’s ex-Director General Jan Freese revealed that nursing-home patients were implanted in the mid-1980s. The technology is revealed in the 1972:47 Swedish state report, Statens Officiella Utradninger (SOU).
Implanted human beings can be followed anywhere. Their brain functions can be remotely monitored by supercomputers and even altered through the changing of frequencies. Guinea pigs in secret experiments have included prisoners, soldiers, mental patients, handicapped children, deaf and blind people, homosexuals, single women, the elderly, school children, and any group of people considered “marginal” by the elite experimenters. The published experiences of prisoners in Utah State Prison, for example, are shocking to the conscience.
Today’s microchips operate by means of low-frequency radio waves that target them. With the help of satellites, the implanted person can be tracked anywhere on the globe. Such a technique was among a number tested in the Iraq war, according to Dr. Carl Sanders, who invented the intelligence-manned interface (IMI) biotic, which is injected into people. (Earlier during the Vietnam War, soldiers were injected with the Rambo chip, designed to increase adrenaline flow into the bloodstream.) The 20-billion-bit/second supercomputers at the U.S. National Security Agency (NSA) could now “see and hear” what soldiers experience in the battlefield with a remote monitoring system (RMS).
When a 5-micromillimeter microchip (the diameter of a strand of hair is 50 micro-millimeters) is placed into optical nerve of the eye, it draws neuroimpulses from the brain that embody the experiences, smells, sights, and voice of the implanted person. Once transferred and stored in a computer, these neuro-impulses can be projected back to the person’s brain via the microchip to be re-experienced. Using a RMS, a land-based computer operator can send electromagnetic messages (encoded as signals) to the nervous system, affecting the target’s performance. With RMS, healthy persons can be induced to see hallucinations and to hear voices in their heads.
Every thought, reaction, hearing, and visual observation causes a certain neurological potential, spikes, and patterns in the brain and its electromagnetic fields, which can now be decoded into thoughts, pictures, and voices. Electromagnetic stimulation can therefore change a person’s brainwaves and affect muscular activity, causing painful muscular cramps experienced as torture.
The NSA’s electronic surveillance system can simultaneously follow and handle millions of people. Each of us has a unique bioelectrical resonance frequency in the brain, just as we have unique fingerprints. With electromagnetic frequency (EMF) brain stimulation fully coded, pulsating electromagnetic signals can be sent to the brain, causing the desired voice and visual effects to be experienced by the target. This is a form of electronic warfare. U.S. astronauts were implanted before they were sent into space so their thoughts could be followed and all their emotions could be registered 24 hours a day.
The Washington Post reported in May 1995 that Prince William of Great Britain was implanted at the age of 12. Thus, if he were ever kidnapped, a radio wave with a specific frequency could be targeted to his microchip. The chip’s signal would be routed through a satellite to the computer screen of police headquarters, where the Prince’s movements could be followed. He could actually be located anywhere on the globe.
The mass media has not reported that an implanted person’s privacy vanishes for the rest of his or her life. S/he can be manipulated in many ways. Using different frequencies, the secret controller of this equipment can even change a person’s emotional life. S/he can be made aggressive or lethargic. Sexuality can be artificially influenced. Thought signals and subconscious thinking can be read, dreams affected and even induced, all without the knowledge or consent of the implanted person.
A perfect cyber-soldier can thus be created. This secret technology has been used by military forces in certain NATO countries since the 1980s without civilian and academic populations having heard anything about it. Thus, little information about such invasive mind-control systems is available in professional and academic journals.
The NSA’s Signals Intelligence group can remotely monitor information from human brains by decoding the evoked potentials (3.50HZ, 5 milliwatt) emitted by the brain. Prisoner experimentees in both Gothenburg, Sweden and Vienna, Austria have been found to have evident brain lesions. Diminished blood circulation and lack of oxygen in the right temporal frontal lobes result where brain implants are usually operative. A Finnish experimentee experienced brain atrophy and intermittent attacks of unconsciousness due to lack of oxygen.
Mind control techniques can be used for political purposes. The goal of mind controllers today is to induce the targeted persons or groups to act against his or her own convictions and best interests. Zombified individuals can even be programmed to murder and remember nothing of their crime afterward. Alarming examples of this phenomenon can be found in the U.S.
This “silent war” is being conducted against unknowing civilians and soldiers by military and intelligence agencies. Since 1980, electronic stimulation of the brain (ESB) has been secretly used to control people targeted without their knowledge or consent. All international human rights agreements forbid nonconsensual manipulation of human beings — even in prisons, not to speak of civilian populations.
Under an initiative of U.S. Senator John Glenn, discussions commenced in January 1997 about the dangers of radiating civilian populations. Targeting people’s brain functions with electromagnetic fields and beams (from helicopters and airplanes, satellites, from parked vans, neighboring houses, telephone poles, electrical appliances, mobile phones, TV, radio, etc.) is part of the radiation problem that should be addressed in democratically elected government bodies.
In addition to electronic MC, chemical methods have also been developed. Mind-altering drugs and different smelling gasses affecting brain function negatively can be injected into air ducts or water pipes. Bacteria and viruses have also been tested this way in several countries.
Today’s super technology, connecting our brain functions via microchips (or even without them, according to the latest technology) to computers via satellites in the U.S. or Israel, poses the gravest threat to humanity. The latest supercomputers are powerful enough to monitor the whole world’s population. What will happen when people are tempted by false premises to allow microchips into their bodies? One lure will be a microchip identity card. Compulsory legislation has even been secretly proposed in the U.S. to criminalize removal of an ID implant.
Are we ready for the robotization of mankind and the total elimination of privacy, including freedom of thought? How many of us would want to cede our entire life, including our most secret thoughts, to Big Brother? Yet the technology exists to create a totalitarian New World Order. Covert neurological communication systems are in place to counteract independent thinking and to control social and political activity on behalf of self-serving private and military interests.
When our brain functions are already connected to supercomputers by means of radio implants and microchips, it will be too late for protest. This threat can be defeated only by educating the public, using available literature on biotelemetry and information exchanged at international congresses.
One reason this technology has remained a state secret is the widespread prestige of the psychiatric Diagnostic Statistical Manual IV produced by the U.S. American Psychiatric Association (APA) and printed in 18 languages. Psychiatrists working for U.S. intelligence agencies no doubt participated in writing and revising this manual. This psychiatric “bible” covers up the secret development of MC technologies by labeling some of their effects as symptoms of paranoid schizophrenia.
Victims of mind control experimentation are thus routinely diagnosed, knee-jerk fashion, as mentally ill by doctors who learned the DSM “symptom” list in medical school. Physicians have not been schooled that patients may be telling the truth when they report being targeted against their will or being used as guinea pigs for electronic, chemical and bacteriological forms of psychological warfare.
Time is running out for changing the direction of military medicine, and ensuring the future of human freedom.
This article was originally published in the 36th-year edition of the Finnish-language journal SPEKULA (3rd Quarter, 1999). SPEKULA (circulation 6500) is a publication of Northern Finland medical students and doctors of Oulu University OLK (Oulun Laaketieteellinen Kilta). It is mailed to all medical students of Finland and all Northern Finland medical doctors.