Defense Advanced Research Projects Agency (DARPA)

Technocracy XV: A Post Human World? (1)

By M.K. Styllinski

 “The Purpose of Biotechnology is the End of Death.”

Martine Rothblatt, CEO Therapeutics Corp.


101_1215

© infrakshun

The above quote sums up the whole drive behind transhumanism – fear of death and the (androgynous) bodycentrism as arbiter of consciousness.

It would be churlish in the extreme to say that aspects of new technologies in the realm of medicine do not have enormous potential. Researching cures for diseases and the general enhancement of human life are unquestionably benefits to be welcomed, yet, altruistic advancement is not the perception that dominates in centres of power and influence. The presumption of innocence has been discarded along with any notion of privacy and independence. It is the same persistent beliefs which are being enforced by societies’ self-proclaimed wardens that humanity needs micro-managing because, like an unruly child we will only resort to bad deeds unless we are placed in various forms of shackles – seen and unseen. Monitoring and tagging the population is proceeding in order to banish every trace of uncertainty; to prepare the masses for large-scale social, economic and even environmental upheaval.

To the techno-religious ideology that flows through the currents of a SMART Surveillance Society (SSS) it is transhumanism which is set to be at the forefront of humanity’s technological transformation. A Technocracy is closely embedded in such values despite genuine protestations to the contrary. Those that do reject such a notion are not likely to remain in the vanguard for very long.

everymantranshumanism

© infrakshun

Technology, like any other tool in human hands, can be an extraordinarily powerful and liberating way to actualise our inner realities and manifest our desires. Since this series is about how psychopaths infect creativity and flip it on its head to induce entropy, then we should be monitoring very closely where this particular revolution is heading. From so-called primitive society, to the agricultural, industrial, and now the Eco-Smart-Information Age, there are extraordinary opportunities with their attendant risks. As new “change agents” work to manage and transform the old world into a new technocratic vision for all, the probability of this new transformation evolving into something other than the cherished ideals hold futurists so rapt, is very real indeed.

Awareness of ponerology in this context does not negate SMART society but perhaps considerably modifies its soaring ideals. This doesn’t mean we return to living in mud huts either. It does however demand that we use discernment and discrimination when new paradigms come along offering the kind of ideological Utopias so familiar down through history. This also doesn’t mean that technological change will not offer radical transformation. It just depends exactly what trajectory we are following and whether or not its coordinates have already been mapped in advance.

A revealing talk was given by South Korean Dr. Seang-Tae Kim, President of National Information Society Agency (NIA), South Korea on October 25, 2011 on the emergence of SMART growth. He spoke about the “Mega Trend of Future Society” and its “Paradigm shift” which will lead to SMART technologies redesigning the world. He believes this heralds a more “human-oriented” focus stemming from the rise of an aging population and the awareness of networking and a “knowledge-based economy.” Theories of “High Concept” creativity and empathy he believes, must be integral to SMART emergence to function. “Consumers” will be “Pro-sumers” generating enormous wealth outside of the normal capitalist channels thus stimulating a new innovation philosophy across bi-lateral networks of merging digital and analogue systems. A “Dream Society” characterises the New Revolution and it is brimming with hope and energy.

Seang-Tae Kim believes that a new technological humanism or human-oriented society can turn the highly volatile risks of an aging population, geo-conflict and the threat of Climate Change into a more streamlined and cost effective vision. Indeed, it is inevitable, he opines, due to the global budget deficit that demands change and where traditional government must be transformed into open government by the power of the people. For Seang-Tae Kim and other SMART-transhumanists, he advocates people power which is beyond the Fordism of the factory-line toward a more promising Post-Bureaucratic Age. He believes that local society and feudalism, government power and industrial society must naturally give way to an open-source infrastructure, an “eco-system of new values”, and a “value oriented eco-system.” This will apparently be predicated on a “platform strategy” which naturally encourages group power. (For a fascinating book on open source software and infrastructure see The Open-Source Everything Manifesto: Transparency, Truth, and Trust by Robert David Steele).

Exciting as that sounds, can such system bypass the integration, dependency and invasive nature of the SMART Surveillance State (SSS) away from pathogenic control? Does an “open source everything” mixed with the philosophy of transhumanism represent an inevitable push away from State centralisation and bland techno-homogeneity? Or, is this merely an end-game reinvention of Empire at a higher turn of the spiral? If the latter, how can we avoid SSS ideals being vectored into the same old patterns? Denial of the dark side of human progress has persistently got us into collective pickles. Yet, we remain strangely blind to the fact.

Like the transformation of society, the metamorphosis of the human being is an integral part of transhumanism beliefs. Sandwiched between the SMART Grid implementation, post-modernism, cyber-activism and virtual reality, transhumanism, sees the merging of man and machine as just a cosmic nano-second away. Replacing an arthritic hip or elbow joint with the help of embedded nanotech is something desirable to most people. Yet, this is small fry for those who wish to use nano-devices and neuro-prostheses to change us into something other than human – a post human.

In March 2012, media entrepreneur Dmitry Itskov made the ambitious claim that he planned to ‘transplant’ a human mind into a robot body in 10 years. According to the Russian this would herald the next stage of science and a ‘new human body.’ The promise of an atheistic immortality is the driving force behind the project which Itskov claims has more than 30 scientists working on it. Uploading minds without surgery would be the next challenge where bodies are left behind in favour of cybernetic super-humans merging with a bio-genetic, virtual world of limitless potential. The project is modelled after the James Cameron movie Avatar where human soldiers use sophisticated technology to inhabit the bodies of human-alien hybrids as they embark on an invasion of another world. [1]

Taiwan

Smart Society Building design in Taiwan Source: From Danish http://www.almeresmartsociety.net/Design in a smart society – Dream or Reality?’

This is a fairly accurate description of the dreams of your average transhumanist who believes that the merging of man and machine offer the best of all evolutionary outcomes. While the transhumanism movement has many different permutations of opposing views there are some fundamental themes that remain sacrosanct:

  • The evolution of humanity
  • Biotechnological enhancement that will extend and exceed ordinary human capabilities
  • A focus on longevity, radical life extension and immortality
  • A focus on human happiness that can become a permanent state of mind with the help of technology.

Transhumanists see the rise of the machines as a chance to reach an integration and synthesis of biology, genetics, cybernetics, naotechnology and artificial intelligence. In doing so, they believe we will transcend the limitations of human biology and the fixity of the machine to become a hybrid superman with a vastly more intelligent brain thus leading to a quantum leap in human evolution, otherwise known as the “Singularity.” This is a culmination of human evolution that has reached its sell-by date and must become fused with a SMART world convergence of biotechnology, robotics, and biometrics, inaugurating the next and most decisive step ever in the history of human evolution: The Post-Human Age. The technological component of the singularity posits a robotic “intelligence explosion” based on an exponential curve of “recursive self-improvement.” which will either draw humanity – or those choosing such a fusion – into its slipstream.

Another form of aggregate swarm intelligence; a technocratic version of the Hive Mind rather than true freedom and individuality?

Transhumanists tell us we can alter the nature and meaning of strictly organic evolution. The combination of new cognitive tools interfacing with artificial intelligence, molecular biology and the modification of emotional and mental states means the list of potential “enhancements” is never-ending. Although there is a chic, techno-spirituality, even an obvious alchemical metaphor within transhumanist discourse, the movement has historically remained an atheist/materialist ideology as the name implies. The belief has more potent implications for its direction than the mechanics of the movement itself as we shall see.

Moving back to our old Fabian and Social Darwinist Mr. Julian Huxley, it was he who coined the term ‘transhumanism’ in 1957, fitting technocracy neatly into his well-watered vision of evolutionary humanism, the genetic legacy of which he can thank his grandfather, Darwinist Thomas Henry Huxley. Transcendence, in strictly materialist terms was the goal. Transhumanism provided the imagination, hope and intellectual rigour to seed a new ideology and its conceptual framework. The systems theory of cybernetics would play a large part in its development and the parallel evolution of ecology and new physics which would be taken up with a passion, decades later.

Acting as a bridge to New Age philosophies that would surface in the late 1960s-1970s, a fusion of ecology, transhumanism and the Human Potential Movement can now be seen. (The influential Barbara Marx-Hubbard is one such Elite-lauded advocate of “bad seed” transhumanism). Two of Huxley’s close friends John Burdon, Sanderson Haldane and John Desmond Bernal who were major shapers of transhumanist thought also happened to be members of the communist party. Whereas Huxley was passionate about eugenics and saw it as integral to the development of transhumanism as a whole, Haldane was a population geneticist. Whilst not comfortable with what he saw as the “poor science” of eugenic theory, he nevertheless permitted its inclusion in the transhumanist vision. J.D. Bernal’s expertise lay in crystallography and molecular biology and shared his friend’s desire to see a new social order based around a gradual engineering of the social organism.

Another dear friend of Huxley’s was our equally dedicated Fabian guru of the 1920s and 30s: H.G. Wells. The writer’s extraordinary books did not just offer a way to funnel his eerily accurate predictions into popular literature but also served as microcosms of technocratic ideals. Wells saw Technocracy as the ideal way to manage the masses and he was wholly dedicated to the principle of neo-Feudalism as the way to control the destiny of nations.

NPG x12102; Sir Julian Sorell Huxley by Wolfgang SuschitzkySir Julian Huxley and Barbara Marx-Hubbard

By the 1960s other names were caught up in promoting the philosophy in popular culture and academia such as Ray Kurzweil, Frank P. Tipler, Eric K. Drexler, Hans Moravec and Marvin Minsky, all of whom contributed richer and more diverse versions of transhumanism and the Singularity. According to some, the human species has the potential to flower but not before artificial intelligence (AI) has competed for supremacy with humanity. Once this has been thrashed out in true Terminator-trilogy-fashion then humanity can get on with being the cyber-sapiens or Marx-Hubbard’s New Age version of “Homo-Universalis” and presumably upload themselves into any sector they choose.

Transhumanism reached a watershed in 1998 with the founding of the World Transhumanist Association (WTA) by philosophers Nick Bostrom and David Pearce, closely followed by their “Transhumanism Declaration.” This helped to bring prominence to other organisations and groups such as Extropy Institute and the Singularity Institute for Artificial Intelligence. As the internet took off so did the transhumanist philosophy. Cyberspace was, after all, the natural medium for the propagation of the movement’s ideas.

Ray Kurzweil is perhaps the most well-known author, inventor and futurist introducing an almost evangelist fervour to his eschatological version of transhumanism. Kurzweil published The Age of Spiritual Machines, (1998) about the future of AI and biotechnology; Fantastic Voyage: Live Long Enough to Live Forever (2004) co-authored with medical doctor Terry Grossman and explored human health and nutrition; The Singularity is Near (2005) Transcend: Nine Steps to Living Well Forever (2009) and his latest How to Create a Mind: The Secret of Human Thought Revealed was published in 2012. All of the concepts contained in these books features in a recent documentary film Transcendent Man (2013)  exploring the life of Kurzweil.

What is more interesting however, February 2009 saw Kurzweil collaborate with Google and the NASA Ames Research Centre, to announce the creation of the Singularity University Training Centre for corporate executives and government officials. The mission of the university is to “assemble, educate and inspire a cadre of leaders who strive to understand and facilitate the development of exponentially advancing technologies and apply, focus and guide these tools to address humanity’s grand challenges”. [2] Ray Kurzweil does for transhumanism what Maurice Strong did for UN Agenda 21 since he appears to be on the advisory board of almost anything remotely AI or transhumanist-related. Which is why he is also on the board of Martine Rothblatt’s Therapeutics Corp.)

375px-Raymond_Kurzweil,_Stanford_2006_(square_crop)

Raymond Kurzweil at the Singularity Summit at Stanford in 2006 (wikipedia)

Moscow was the venue for the Global Future International Congress “A New Era for humanity” which took place in February of 2012 and in June 2013. Organised by the Global Future 2045 (GF2045) a non-profit organization that has: “… the goal of creating a network community with the world’s leading scientists in the field of life extension and to support them as an investment hub, contributing to various projects.” [3]

Hosted by Kurzweil, it offered an uncompromising vision of a future for post-humanity where bio /nanotechnology, AI, cognitive applications, and cybernetics would allow the mass replacement of our drearily inadequate selves. The distinguished panel of speakers and guests were writers, anthropologists, astrophysicists, NASA scientists, historians, sociologists, psychologists, philosophers and many others from specialist fields of technology. The message was yet another indication that the “accelerated” nature of technology and the “race to save the world” hadn’t lessened in its intensity, nor had the belief in technology as saviour.

On the website an introductory 7 minute video with a soaring orchestral score has a narrative which imparts the following nuggets to look forward to:

  • 2012: the emergence of new transhumanist movements & parties amid the on-going socio-economic crisis
  • 2012-2013: new centres for cybernetic technologies to radically extend life
  • 2014: The “race for immortality” starts
  • 2015: “Find ways to transfer our personality to an artificial carrier – the robotic human copy or “Avatar.”
  • 2015-2020: Robots to replace human manufacturing & labour, servant tasks; thought controlled robots to displace travel needs; flying cars, thought-driven communications implanted in bodies or “sprayed on skin.” timecover
  • 2025: The creation of an autonomous system providing life support for the brain that is capable of ‘interacting with the environment’; brains transplanted into avatar bodies greatly expanding life and allowing complete sensory experiences.
  • 2030-2035: Reverse-engineering of the human brain already being mapped out, wherein science comes “… close to understanding the principles of consciousness.”
  • By 2035: First successful transplantation of personality to other data receptacles and the “epoch of cybernetic immortality begins.”
  • 2040-2050: Bodies “… made of nano-robots” taking any shape, alongside holographic bodies.
  • 2045-2050: Drastic changes to the social structure and sci-tech development. Tipping the hat to the UN, conflict and violence is “not permitted.” Instead, the priority is given to “spiritual self-improvement.” “A New Era of neo-Humanity Dawns”…

According to the website: www.gf2045.com the Russian GF2045 group met to draft a: “resolution that will be submitted to the United Nations demanding the implementation of committees to discuss life extension Avatar projects as a necessary tool in the preservation of humankind.”

330px-Martine_Rothblatt

Martine Rothblatt in 2010. (wiki)

An attendee of the follow up conference in 2013 was aforementioned Martine Rothblatt founder and CEO (and fittingly transgender) of biotech company United Therapeutics Corp. Rothblatt has introduced the concept of “mind clones” where the human mind is created from a “mind-file” of our social networking data and other personality sources. S/he believes the capability to do so will be made possible in under twenty years time. She even used the personality of her dead wife to create a droid template example of what transhumanists would love to see as commonplace.  Cartesian dualism and atheist paradise? Or merely the next stage in our evolution?

Rothblatt sees “… the market opportunities as limitless” where everyone will be seeking to make a digital copy of their thoughts of their memories, thoughts and feelings to be made manifest in a droid of their making. Grabbing a slice of the artificial action, Rothblatt believes is inevitable: “We all want an i-phone, we all want a social media account and we are all going to want a mind clone.” [4]

Speak for yourself Martine.

And what would you know? Amazon and Google are extremely keen on this type of artificial intelligence.

(The concept of transgenderism and androgyny has an occult-esoteric element within transhumanist discourse, something  which Rothblatt appears to personify and something that will be explored further in the Occult Transhumanism).

To reiterate, it could be said that these imaginative interpretations of one possible future without awareness of the ponerological basis of psychopathy “demanding” anything (and worse still, receiving it) would be a recipe not for human freedom but more ways to welcome its opposite. An alternative future that is drawn from exactly the same technocratic tenets will be a decidedly Dystopian one and no less probable should we allow ourselves to be guided down these grandiose beliefs. That’s not to say we have not been affected positively by technology since the Industrial Revolution. Improvements in health and sanitation; air travel; photography; computers, medical advances and information technology have positively reshaped the world. Once again, it is the perception of reality that will define how these technological innovations are used and whether a healthy techno-culture can exist.

Biocomplexity_spiral

“The biocomplexity spiral is a depiction of the multileveled complexity of organisms in their environments, which is seen by many critics as the ultimate obstacle to transhumanist ambition.” (wikipedia)

The other problem with transhumanism is the adherence to a belief that evolution is dependent on machines to take us to the next level. Nature is inherently unpredictable and disruptive since that is the whole reason how non-linear evolution occurs – far from equilibrium. It is therefore outside human-implanted notions of intelligent design. Aside from obvious hubris, attempts to replicate, emulate nature may be partially possible, but to try and go beyond bio-complexity itself is to re-enact an unnecessary mythology which is Promethean/Luciferian in its ambition. 

There are many advocates who advise caution in the development of technology. Kurzweil, to be fair, does his fair share of warning the faithful of its potential slip into Darth Vader territory. Nonetheless, once the momentum gains more traction it is unlikely that any safeguards will be present, let alone feature as a primary component to secure an ethical and moral foundation. Indeed, as this series of posts has hopefully indicated, there are signs it is being absorbed into exactly the same mainframe of Official Culture and its overseeing Establishment.

At present, such an ideology is highly attractive to a variety of intelligent people, many of whom are sincere in their beliefs to improve societies. One advocate defined transhumanism in simplest terms as: “… the idea that human kind can use science and technology to become more than what we are and help those interested in doing the same and in protecting the freedom for all to decide for themselves how to be happy, in other words ‘Life, Liberty and the Pursuit of Happiness’.”  Surely, is this not something we ALL want? Unfortunately, the reality of transhumanism routinely goes way beyond such simple definitions, and their lies the problem since it plays into – and is promoted by – the more pathological elements of the movement.

Moreover, it is precisely this pathology to which transhumanism in particular lends itself, namely: clusters of psychopaths and social dominators straddling all social domains for whom this ideology undoubtedly appeals to the workings of their “machine minds”. Naturally, this won’t be acknowledged by its adherents since the dependence on our chosen belief tends to prohibit negative associations. Consequently, wealthy techno-psychopaths bring with them a great deal of charisma, PR and investment disbursed through the various connected branches that make up the movement: from Hollywood, media, social science and the military-corporate complex.

As rapid advances in AI, quantum computing, neurology and robotics continue then it is simple logic that the time will approach when a digital map of the human brain will be placed into machines and eventually surpassed just as Rothblatt has indicated. It is then that a potential separation will occur between two types of human beings, perhaps labelled the “organics” and the “post-humans” and in much the same way as normal people are unconsciously separated from a variety of psychopaths and sub-categories of the same.

If we are already embedded in the SMART infrastructure how likely is it that we will have a choice which breakaway civilisation to follow? Or, will “group consciousness”, communitarian “consensus” and SMART “efficiency” simply decide for you?

 


Notes

[1] ‘Who wants to live forever? Russian project aims to transplant a human brain into a ‘Davros’-style robot body within 10 years’ By Rob Waugh Daily Mail, March 2 2012.
[2] ‘The Singularity Is Near: Mind Uploading by 2045?’by Tanya Lewis, June 17, 2013. | ‘Future of Artificial Intelligence in Mind Clones’ bloomberg.com, https://www.youtube.com/watch?v=4bqZp9TPYVk
[3] FAQ | “Singularity University.” Singularityu.org. September 9, 2008.
[4] Gf2045.com

Advertisements

Technocracy XIV: Psycho-Civilised

“Technological progress has merely provided us with more efficient means for going backwards”

Aldous Huxley


Note: A re-read of ‘Satan’s Little Helpers VII: Mind War’ might be in order before we continue with the emergence of SMART society and its place in mass mind programming.

monitors1

The SMART-Surveillance Grid allows improvements in telecommunications, electricity provision and home functionality. It offers an exciting integration of eco-economics and energy saving technology along with the “Internet of Things” (IoT) and “Network of Things” (NoT) which is offering to revolutionise transport, communications and urban infrastructure as a whole. With embedded surveillance it permits advertisers, marketeers to access human minds as never before. Authorities can also tap in and use this consumerist techtopia to trap criminals and would-be “terrorists”. It requires that the State and Official Culture become so integrated through technology that the line will be blurred. Security and collectivism will be encouraged to a degree that compliance will be seen as good citizenship insofar as it maintains the urban environment and social provision. A new social contract will be loaded in favour of the State through a form of satiated servitude. (The Illuminist-Enlightenment thinkers would be well pleased).

So-called terrorists, dissidents/activists, protestors and ordinary citizens will need to be very concerned indeed on the road to SMART society as true individual thinking outside the box will slowly become frowned upon since it will not be conforming to the precept of a “psycho-civilised” society. The path of access to this dystopian view starts with ubiquitous surveillance.

As one short example illustrates, Britain’s Leeds-based Metropolitan Police Force is using a surveillance system procured from Datong plc., past customers of which have been the US Secret Service, the Ministry of Defence and unsavory regimes in the Middle East. The system is disguised as a mobile phone network which transmits a signal allowing the police or any other authority: “… to shut off phones remotely, intercept communications and gather data about thousands of users in a targeted area,” … “Strictly classified under government protocol as “Listed X”, it can emit a signal over an area of up to an estimated 10 sq.km, forcing hundreds of mobile phones per minute to release their unique IMSI and IMEI identity codes, which can be used to track a person’s movements in real time.” [1]

This is just one regional police force.

While the online company Amazon will track you via your Kindle reader for targeted advertising pathway prediction, the authorities will do the same based on the accumulated data to which it has access. It will not be for what you might buy, rather it will access what you may be thinking and your likely course of action on the “threat assessment” scale. There is precious little happening to prevent Google and other information technology companies from rolling out the SMART Internet of Things infrastructure which has enormous implications for a privacy and collective freedoms. Wi-Fi is destined to play a huge role.

militarysmartcityUrban law enforcement and Telephone towers with technology which allows multiple receive-transmit capability 

The social benefits of providing free access to Wi-Fi hot spots for those in low-income brackets and incentives for business travellers are shielding plans by the U.S. Department of Defence: “… to build robots that configure themselves into ad hoc wireless networks within urban areas” which were already well underway in 2007. Seizing control of internet communications and tracking individuals in urban areas is a necessary by-product of the technocratic SMART society. If that fails, the military are well placed to set up these Wi-Fi networks in a matter of hours or less. The Department of Defence (DOD) Homeland Security, Canadian, Israeli and NATO forces regularly conduct war-game exercises with Wi-Fi networks at the heart of operations. A DOD announcement for contractors as described by journalist Mark Baard discloses operations whereby:

“… soldiers will be able to drop robots, called LANdroids … when they arrive in a city. The robots will then scurry off to position themselves, becoming nodes for a wireless communications network…The Wi-Fi antennae dotting the urban landscape will serve not only as communications relays, but as transponders that can pinpoint the exact positions of individual computers and mobile phones…where GPS loses site of a device (and its owner), Wi-Fi will pick up the trail. The antennae will also relay orders to the brain-chipped masses, members of the British Ministry of Defense and the DOD believe.” [2]

As people become more accustomed to SMART technology and RFID tagging this will lead to the acceptance of our “need” to ensure greater technological “freedom.” As well as the technological capabilities of HAARP lying in the background in some form or another and married to these advances in technology, is it such a huge leap of imagination to think that once we are fully enmeshed in this SMART society where everything is habitually integrated that it would not be easy to begin directly assessing, monitoring and “downloading” material directly into the mass mind? Television has already served this purpose well, albeit in a more indirect fashion. With this in mind, though some have since expired and at least one is no longer listed (as of 1990) the US patent office listed the following successful registrations dating back to 1992:

U.S. Patent 5159703: Silent Subliminal Presentation System. (issued 1992) U.S. Patent 5507291: Method and an associated apparatus for remotely determining information as to a person’s emotional state. (issued 1996) U.S. Patent 5629678: Implantable transceiver – apparatus for Tracking and Recovering Humans. (issued 1997) U.S. Patent 6014080: Body worn active and passive tracking device (issued 2000) U.S. Patent 5868100: Fenceless Animal control system using GPS (Global Positioning Satellite) Location information. (issued 1999) [3]

US patent No. 5507291 filed on April 5, 1994 shows the level advancement at the public level. What goes on beyond top secret levels of the National Security State is anyone’s guess. The patent’s “abstract” is described as follows:

“In a method for remotely determining information relating to a person’s emotional state, an waveform energy having a predetermined frequency and a predetermined intensity is generated and wirelessly transmitted towards a remotely located subject. Waveform energy emitted from the subject is detected and automatically analyzed to derive information relating to the individual’s emotional state. Physiological or physical parameters of blood pressure, pulse rate, pupil size, respiration rate and perspiration level are measured and compared with reference values to provide information utilizable in evaluating interviewee’s responses or possibly criminal intent in security sensitive areas.” [4] [Emphasis mine]

And US patent No. 5159703, filed on December 28, 1989:

“A silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain, typically through the use of loudspeakers, earphones or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be conveniently recorded and stored on mechanical, magnetic or optical media for delayed or repeated transmission to the listener.” [5] [Emphasis mine]

In the late Lt. Colonel Michael Aquino’s book: Mind War he explores psychological operations in combination with emerging technologies such as EM waves, Silent Sound and ionospheric mind control. Let’s not underestimate the power inherent within the human body /mind complex. After all, the electrical energy that powers each cell in our bodies works out at 30 million volts per metre, the equivalent voltage of a bolt of lightning. [6]Power within can be, as it were, reverse-engineered. From a footnote in the same chapter if you didn’t catch the first time, read it again in this context:

“… the NSA’s electronic surveillance system can simultaneously follow and handle millions of people. Each of us has a unique bioelectrical resonance frequency in the brain, just like we have unique fingerprints. With electro-magnetic frequency (EMF) brain stimulation fully coded, pulsating electromagnetic signals can be sent to the brain, causing the desired voice and visual effects to be experienced by the target. This is a form of electronic warfare. U.S. astronauts were implanted before they were sent into space so their thoughts could be followed and all their emotions could be registered 24hrs a day. […]

“When a 5-micromillimeter microchip (the diameter of a strand of hair is 50 micromillometers) is placed into optical nerve of the eye, it draws neuroimpulses from the brain that embody the experiences, smells, sights and voice of the implanted person. Once transferred and stored in a computer, these neuroimpulses can be projected back to the person’s brain via the microchip to be re-experienced. Using a RMS, a land-based computer operator can send electromagnetic messages (encoded as signals) to the nervous system, affecting the target’s performance. With RMS, healthy persons can be induced to see hallucinations and to hear voices in their heads. Every thought, reaction, hearing and visual observation causes a certain neurological potential, spikes, and patterns in the brain and its electromagnetic fields, which can now be decoded into thoughts, pictures and voices. Electromagnetic stimulation can therefore change a person’s brainwaves and affect muscular activity, causing painful muscular cramps experienced as torture.”

Citizens Against Human Rights Abuse (CAHRA) supports many of the claims of systematic surveillance stalking and virtual torture from electromagnetic waves and interference. According to one researcher amongst many, Dr. Armen Victoria’s  1998 essay regarding ‘The Military Use of Electromagnetic Microwave and Mind Control Technologystates the capability of cloning human EEGs for targeted mind control purposes where a variety of emotional responses and instinctive reactions: “… have been identified and isolated from the EEG, as ’emotion signature clusters’. Their relevant frequencies and amplitudes have been measured, then the very frequency/amplitude cluster is synthesised and stored on another computer, each one of these negative emotions properly and separately tagged. ‘They are then placed on the Silent Sound carrier frequencies and will silently trigger the occurrence of the same basic emotion in another human being.” [7]

It appears that The Tri-Service Electromagnetic Advisory Panel (TERP) represents the interests of all three military services in the US. It is still conducting some of the most advanced research in the world which in turn, stems from the investigations made by the Russian pioneers in mind control technology during the early 1960s and 1970s. The U.S. Air Force has been researching ocular injury by exposure to millimetre wave system, bio-effects of High Power Microwave in low microwave regions (S band) and Radio Frequency Radiation (RFR). The use of High Power Microwave (HMP), by each of the military services seems to be commonplace. Judging by the wealth of research on the subject the US Navy is also getting extremely excited at the prospect of utilising electro-magnetic waves as a psychotronic weapon. We may then understand that the invasion of Iraq not only represented an opportunity to plunder a nation for resources and stake claim to a long held geopolitical prize, but to test out new developments in microwave weaponry and experiment with the latest PSYOPS.
As Guardian columnist John Sutherland put it: “The battlefield will be the testing ground for the US samurai. No more rhesus monkeys or pigs but real, live Iraqis.” [8]

According to Dr. Oliver Lowry who has had the dubious honour of working for the US military on several classified projects, Iraqi soldiers were the latest unwitting guinea pigs to further such advances, one of those being Silent Sound Spread Spectrum (SSSS), sometimes called SQUAD:

… According to statements made by captured and deserting Iraqi soldiers, however, the most devastating and demoralizing programming was the first known military use of the new, high-tech, type of subliminal messages referred to as ultra-high-frequency “Silent Sounds” or “Silent Subliminals”. Although completely silent to the human ear, the negative voice messages placed on the tapes alongside the audible programming by PSYOPS psychologists were clearly perceived by subconscious minds of the Iraqi soldiers and the silent messages completely demoralized them and instilled a perpetual feeling of fear and hopelessness in their minds. [9]

Humans are highly sensitive and susceptible to a variety of electromagnetic frequencies – natural or artificial. The human body is a highly sensitive package of water, bio-chemicals, and electromagnetic energies. The introduction and exposure to various kinds of external micro or EM waves of any kind whether from mobile phones RFIDs or even wind-farm infra-sound does and will have an effect on the human being in ways we do not understand. Consider also that the geo-magnetic sensitivity in animals and other living organisms concentrations of ferromagnetic material – most notably magnetite. The same levels of magnetite conductor / receptor bio-mineralization were discovered to exist in the human brain in the early 1990s. The authors of one paper say that the presence of the particles may account … for a variety of biological effects of low-frequency magnetic fields.” [10]

0117x

Electric field of the heart on the surface of the thorax, recorded by Augustus Waller (1887).

Weapons which target the mind and nervous system of selected individuals also has a long tradition. Reports of systematic mind stalking, harassment of individuals, testing and deployment of electronic and electromagentic devices (EMF) by government/outsourced agencies have been surfacing in the United States, North/South Korea and various countries in Europe. This has eroded human rights comprehensively with the added bonus for the persecutors that it is almost impossible to confirm and verify that which is literally “all in the mind”.

Though information in electronic/electromagentic or “non lethal Weaponry” is largely classified there is sufficient evidence from modern history and individual reports to reach the conclusion in a court of law that the targeted, micro-social use of behaviour modification technology is being used against individuals and activist groupings.

Interest in a variety of EMF weaponry had already begun at the beginning of the 20th Century with the genuis of Nikola Tesla and his experiments with radar and electrical energy. Concentrating and directing a beam of electromagnetic energy over a certain distance took hold of Tesla’s mind until his death in 1943. It seems the military-industrial complex heavily saturated in Nazi philosophy and science simply subverted Tesla’s genius and extended his advances in the field.

DARPA have been on the case since the Cold War with their 1958 research into combating Soviet advances in electromagnetic weapons and defenses. The capability to disrupt human emotions, inflict pain and fragment the personality was already well underway during pre and post-war experimentation under Operation MK-ULTRA, Project MONARCH, Project PANDORA and the development of PSYOPS and CoIntelpro emerging against the background of the civil rights movement of the 60s and 70s; behaviour modification had a new platform to play with.

Since that time with the enormous advances in “new concept” warfare there is every likelihood that a fusion of this military-intel science is not only being used as form of macro-social engineering and a monopoly of media-led propaganda, but the use of mass mind, ionosphere technology (fomerly labelled HAARP) to influence whole regions, even countries. It is therefore not a huge leap of imagination to recognise that the precision use of psychotronic weaponry to target selected individuals by the National Security State apparatus is in existence and heavily funded by black budgets.

Well in advance of the war on terror hoopla, Neo-Conservative regime change and the sky-rocketing increase in human/drug trafficking, mind control technologies were telegraphed to the military-intelligence faithful as the tool of choice to keep the world in line. The Strategic Studies Institute of the U.S. Army War College, published in 1994: ‘The Revolution in Military Affairs and Conflict Short of War’ by LTC James Kievit, Dr. Steven Metz. In the paper, the authors state the following drawn from their “hypothetical future scenario”:

The president was thus amenable to the use of the sort of psychotechnology which formed the core of the RMA (revolution in military affairs)… it was necessary to rethink our ethical prohibitions on manipulating the minds of enemies (and potential enemies) both international and domestic… Through persistent efforts and very sophisticated domestic ”consciousness raising”, old-fashioned notions of personal privacy and national sovereignty changed. As technology changed the way force was applied, things such as personal courage, face-to-face leadership, and the ‘warfighter’ mentality became irrelevant. […] Potential or possible supporters of the insurgency around the world were identified using the comprehensive Interagency Integrated Database. These were categorized as ‘potential’ or ‘active’, with sophisticated personality simulations used to develop, tailor and focus psychological campaigns for each“. So the Institute of Strategic Studies supposed that in the year 2000 those technologies would be that advanced that it will be possible to deprive human being of his freedom and adjust his personality to the needs of ruling elite. Most probably those technologies were at this level already in 1994.

Put this together with Synthetic Environments for Analysis and Simulation (SEAS), the SMART grid, MAIN CORE, biological and PSYOPS warfare and you begin to get the idea that the technology of assymetric warfare isn’t just about geostrategy to dis-empower traditional enemies such as Iran, Russia and China. It is about war against domestic population by stealth and in plain sight. According to Project Censored’s 2006 paper titled: ‘US Electromagnetic Weapons and Human Rights’ offers a broad brush synthesis of the field and confirms the black budget capabilities available since the Zio-Conservative false-flag coup of 9/11:

“Michael Vickers, senior adviser to the Secretary of Defensefor the 2005 Quadrennial Defense Review and principal strategist for the largest covert action program in the CIA’s history, recently testified on the importance of black operations: “US Special Operations Command’s (SOCOM) emphasis after 9/11 has been to make white SpecialOperations Forces (SOF) more gray and black SOF more black. It is imperative, however, that white and black SOF be integrated fully from a strategic perspective.” [11]

CongnitiveMappingSource: Petri Ticklen at http://alicefish.net/MindAttack.htm Original source: Against Electronic Mind-Control International /http://againstmindcontrol.tripod.com/liber.html

Since the war on terror propaganda has now made sure that activists, dissidents and indeed anyone overtly successful in criticising government policy is shut down, detained or harassed it is hardly shocking to discover that some of these covert programs have been targeting people for experimentation in CIA rendition centres, prisons, psychiatric wards and across the general public with immunity. Project Censored authors state:

“…Hundreds of people continue to assert that a person or persons, whom they do not know,have been targeting them with electromagnetic weapons in a widespread campaign of either illegal experimentation or outright persecution. These experiences involved a number of discrete phenomena:

  • Hearing voices when no one was present.
  • Feeling sensations of burning, itching, tickling, or pressure with no apparent physical cause.
  • Sleeplessness and anxiety as a result of “humming” or “buzzing”.
  • Loss of bodily control, such as twitching or jerking of an arm or leg suddenly and without control.
  • Unexpected emotional states, such as a sudden overwhelming feeling of dread, rage, lust or sorrow that passes as quickly as it arises. [12]

And the industry of non-lethal weaponry (NLW) is steadily increasing playing a dominant role in asymmetric warfare abroad as well as crowd control closer to home. The market for NLW will apparently double by 2020. [13] That means big money. Almost ten years ago:

“…the Air Force issued $24 million in contracts for “Electro Magnetic Effects Research and Development” to Northrup Gruman, Voss Scientific, Lockheed Martin, ElectroMagnetic Applications, and SAIC among others. The DOD viewed electromagnetic research and development as a key component in future wars as early as the 1990s. Emmett Paige Jr., Assistant Secretary of Defense for Command, Control, Communications and Intelligence declared in 1996 that, ‘Well over a decade ago, a Soviet general reportedly said something like ‘to prevail in the next conflict, one must control the electromagnetic spectrum.’ That statement proved true in the Bacca Valley and on deserts in Iraq. The Department of Defense is committed to ensuring that ‘in the next conflict it is we who will control the spectrum. We know its value’. Increasingly, the value of non lethal weapons continues to rise as they produce fewer images of death in the media than traditional weapons.’

In addition to DOD contractors, the realm of non-lethal weapons extends into the universities with millions of dollars in scholarships and research fellowships. Pennsylvania State University, sponsors the Institute for Non-Lethal Defense Technologies (INLDT), the University of Medicine and Dentistry of New Jersey has the Stress and Motivated Behavior Institute, University of New Hampshire houses the Non-lethal Technology Innovation Center, and many US military schools have classes directly related to non-lethal weapons technology. There are also numerous conferences each year hosted by the Department of Defense, contractors and universities. The business of non-lethal weapons is expanding and will continue to grow. In 2006, the Joint Non-Lethal Weapons Directorate received $43.9 million compared to $25.8 million in 2000. [14]

By 2011, this had increased to $138 million, reaching $140 million in 2013. [15] If we read the US Department of Defence’s Annual Non-Lethal Weapons Program Annual reports, it would leave you feeling suitably humbled and sentimental, beaming with national pride that Uncle Sam and its numerous military bases are making the world a less lethal. Apart from such delusions, what is more interesting is how such NLW advances are leaking into law enforcement and perceived “National Security.” A passage from Project’s Censored’s report concerning one Eldon Byrd a medical engineer, underscores this point:

“After working on the Polaris submarine, which carried long-range nuclear weapons, Byrd developed non-lethal weapons with reversible effects. He regarded this as a humanitarian alternative to ‘punching holesin people and having their blood leak out’ in battle. His inventions used magnetic fields at biologically active wave frequencies to affect brain function. Byrd could put animals to sleep at a distance and influence their movements. When the success of his research became evident, suddenly he was pulled off the project and it went “black.” He believes the electromagnetic resonance weapons he developed have been used for psychological control of civilians rather than for exigencies in battle. That is, to ensure his participation, he was uninformed about the true nature of the project. Byrd’s case also illustrates how morally tolerable operations may transition to morally intolerable operations, or at least rise above the atrocity line.” [16]

It is this intentional compartmentalisation and factional nature of operations and directives within military and  intelligence agencies which allows pathological leadership to develop.

Back in 2006, Congress and George W. Bush signed the Military Commission Act of 2006. which allowed torture and suspension of due process as acceptable. Since that time, torture apologists from law, academia and the military have come out to justify such actions as necessary for the “greater good” once again, trashing the very concept of the Universal Declaration of Human Rights and basic notions of conscience. The Anglo-American-Zionist Establishment is perfectly happy to use all and everything in its means to achieve its ends including the use of technology that cannot be detected nor recognised by Official Culture.

The somewhat infamous Dr. José Delgado Director of Neuropsychiatry at Yale University Medical School in the 1960s and 70s, and later Professor of Neurobiology in Madrid, Spain, had gained quite an internet following of shock and revulsion based around his similar pathological view of the capabilities of psychosurgery. He urged the U.S. government to make “control of the mind” a national goal. [17] He cheerily – and perhaps ill-advisedly – voiced his opinion and those of his superiors regarding the future:

“We need a program of psychosurgery for political control of our society. The purpose is physical control of the mind. Everyone who deviates from the given norm can be surgically mutilated. The individual may think that the most important reality is his own existence, but this is only his personal point of view. This lacks historical perspective. Man does not have the right to develop his own mind. This kind of liberal orientation has great appeal. We must electrically control the brain. Someday, armies and generals will be controlled by electric stimulation of the brain”. [18]

Dr. José Delgado was nothing if not thorough in his research. In 1965, The New York Times reported on Delgado’s successful experiment in the use of electronic implants connected to the motor nervous system of a bull – the unfortunate animal was stopped from charging by remote radio-control. The bizarre capabilities of surveillance was demonstrated when he surgically implanted a cat with an electronic implant which transmitted everything the poor moggy was seeing and hearing to a TV monitor.

The Doctor’s foray into publishing produced Physical Control of the Mind: Toward a Psycho-civilized Society (1969) which helped to confirm his Dr. Evil status on the net – not without justification. The doc is messianic in his belief that humans will undergo “psycho-civilization” by uploading the contents of their brains directly to machines and vice versa. With statements like that it is unlikely that he limited his experiments to animals. According to a 2001 interview for Cabinet magazine conducted by artists and writers Magnus Bärtås and Fredrik Ekman there are still many of Delgado’s descriptions in his own articles and reports of how he moved from animals to humans in contemporary American medical libraries. The reporters relate how Delgado, Dr. Mark, and other colleagues: “describe what was the first clinical use of Intracerebral Radio Stimulation (IRS) on a human being. The stimoceiver itself only weighed 70 grams and was held fast by a bandage.”

Dr. Jose Delgado, deep brain stimulation (DBS) researcher at Yale University and author of the book, Physical Control of the Mind (1986)

Dr. Jose Delgado, deep brain stimulation (DBS) researcher at Yale University and author of the book, Physical Control of the Mind (Third Edition: 1986)

In an article called “Radio Control Behavior” in the February 1969 issue of The Journal of Nervous and Mental Disease there are descriptions of patients who had undergone procedures to attach the device to their brains.

Case studies include:

… A black fourteen-year-old girl on the border of developmental disability who grew up in a foster home suddenly goes into a fury that leads to the death of her two stepsisters. A thirty-five-year old white industrial designer who ends up killing his wife and children flies into a rage when other motorists try to overtake him and he chases them and tries to run them off the road. Their aggressive behavior is supposed to be registered by the stimoceiver in the way a seismograph registers the earth’s tremors and the same stimoceiver is then to “turn them off” via the FM transmitter. [19]

In the interview Delgado admits that as far as he was aware nothing came of the IRS device due to the complexity of the brain and the unreliability of the mapping: “We never knew which parts of the brain we were stimulating with the stimoceiver. We didn’t even manage to prevent epileptic attacks, which we thought would be the simplest of things. We never found the area where epilepsy attacks originate.” [20]

The authors reveal their surprise at his: “casual attitude towards the stimoceiver which was heralded as a great contribution to science.” Although Delgado’s attitude conforms to later developments regarding the brains plasticity and almost holographic nature, normal practice for radar experiments in psychological control were to appropriate and integrate into covert programs. After all, mind control operations were/are still continuing. It was at the congressional hearings on the CIA sponsored MK-ULTRA operations that Delgado made his famous declaration of psychosurgery. It seems highly improbable that such experiments were ignored especially when they often yielded startling results.

To illustrate the effectiveness of electro-stimulation Delgado and his colleagues: “… orchestrated violent scenes in the lab” descriptions of which were captured in the book: The Brain Changers: Scientists and the New Mind Control (1973) by Maya Pine who relates one incident typical of the research in question:

As the film opens, the patient, a rather attractive young woman, is seen playing the guitar and singing “Puff, the Magic Dragon.” A psychiatrist sits a few feet away. She seems undisturbed by the bandages that cover her head like a tight hood, from her forehead to the back of her neck. Then a mild electric current is sent from another room, stimulating one of the electrodes in her right amygdala. Immediately, she stops singing, the brainwave tracings from her amygdala begin to show spikes, a sign of seizure activity. She stares blankly ahead. Suddenly she grabs her guitar and smashes it against the wall, narrowly missing the psychiatrist’s head. [21]

As the authors delved deeper into the experiments on people Delgado became suspicious and tense. He terminated the interview not long after. Rather than regretting his time of psychosurgery innovation it is likely that Delgado was feeling petulant about being left out of the loop after his data was integrated into the continuing experimentation. He may have had considerable lack of success with the vagaries of brain plasticity but his work on animals was highly valued during the parallel mind control work of MK-ULTRA and other operations. Though unconfirmed, it is thought that Delgado worked on Project PANDORA as part of the CIA’s experiments into electromagnetic modulation with particular attention to scrambling the minds of soldiers on the battlefield. It was at exactly the same time that the CIA began to conduct radiation experiments on the US population, just prior to Delgado starting his research on electro-magnetic radiation and its capacity for influencing people’s consciousness.

After the 1974 congressional hearings the Doctor continued his animal research managing to link his brain implants with computers. This was documented in “Two-Way Transdermal Communication with the Brain” published in 1975 where he stated:

“The most interesting aspect of the transdermal stimoceivers is the ability to perform simultaneous recording and stimulation of brain functions, thereby permitting the establishment of feedbacks and ‘on-demand’ programs of excitation with the aid of the computer. With the increasing sophistication and miniaturization of electronics, it may be possible to compress the necessary circuitry for a small computer into a chip that is implantable subcutaneously. In this way, a new self-contained instrument could be devised, capable of receiving, analyzing, and sending back information to the brain, establishing artificial links between unrelated cerebral areas, functional feedbacks, and programs of stimulation contingent on the appearance of pre-determined patterns” [22]

In true “mad professor” fashion, Delgado continued his experimentation  on an island in Bermuda, where a group of gibbons were placed at his disposal. Naturally, the doctor had them all fixed with electronic brain implants which led him to discover how to build and destroy social orders using electrical brain boosts. [23] This would have been right up the technocratic street that was emerging in the warfare-ridden 1970s. So, this begs the question: after over thirty years of electronic implant tinkering what has the Pentagon, DARPA, NSA and unknown agencies come up with besides the RFID tagging systems? Our old friend the Nazi-tainted IBM needs to be brought in here.

Reflect on this confidential memo covertly obtained all the way back from October, 1995 from INTELLI-CONNECTION, a Security Division of IBM. In the form of an office memo, it reveals some interesting information. An edited extract follows:


 THE I.B.M. 2020 NEURAL IMPLANT

CONFIDENTIAL, LIMITED DISTRIBUTION ONLY, LEVEL 9 COMMUNICATION, 2020 NEURAL CHIP IMPLANT

   “Federal regulations do not yet permit testing of implants on prisoners, but we have entered into contractual testing of our product. We have also had major successes in privately owned sanitariums with implant technology… In California, several prisoners were identified as members of a security threat group, EME, or Mexican Mafia.

   They were brought to the health services unit at Pelican Bay and tranquilized with advanced sedatives developed by our Cambridge, Massachusetts laboratories.

   The implant procedure takes about 60-90 minutes depending on the experience of the technician. We are working on a device that will reduce that time by as much as 60 per cent. The results of implants on 8 prisoners yielded the following:

   Implants served as surveillance monitoring devices for threat group activity. Implants disabled two subjects during an assault on correctional staff. Universal side effects in all 8 test subjects revealed that when the implant was set to 116 Mhz all subjects became lethargic and slept an average of 18-22 hours per day. All subjects refused recreation periods for 14 days during the 116 Mhz test evaluation…”

   Each subject was monitored for aggressive activity during the test period and the findings are conclusive that 7 out of 8 test subjects exhibited no aggression, even when provoked. Each subject experienced only minor bleeding from the nose and ears 48 hours after the implant due to initial adjustment.

   Each subject had no knowledge of the implant for the test period and each implant was retrieved under the guise of medical treatment. The security windfall from the brief test period was tremendous. Security officials now know several strategies employed by the EME that facilitate the transmission of illegal drugs and weapons into their correctional facilities … In Massachusetts, the Department of Corrections had already entered into high level discussions about releasing certain offenders to the community with the 2020 neural chip implants.” [24]


What is the probability that such technology has been way in advance of anything we see from outsourced DOD departments which are overt and relatively open to public discourse? What of deep black projects far away from any oversight? Might we assume that method may be in development that could be used on the potential activist, dissident or “terrorist” when the SMART-Surveillance society (SSS) is fully integrated into a comfortable, consumerist paradise?

If we take the infestation of Satanic Ritual Abuse networks which appear to be seated in most centres of power and seeping into the waiting SSS managed by mind control technology both overt and covert, this is surely worse than any science-fiction novel we can imagine. If we are to give credence to Zbigniew Brzezinski’s visions, which in any case, may simply be explanatory notes to his fellow comrades signalling what will happen, the technology may already be in place and operational.

In his 1970 book Between Two Ages Brzezinski writes:

“… of a future at most only decades away,” upon which he related the opinion of an experimenter in intelligence control who asserted: ‘I foresee a time when we shall have the means and therefore, inevitably, the temptation to manipulate the behavior and intellectual functioning of all the people through environmental and biochemical manipulation of the brain.” [25]

This is the darker side of the transhumanism crowd and which permeates social network corporations, military-intelligence and the DARPA inspired National Surveillance state. The music emanating from SMART grid technology is that of the Pied Piper lulling his followers into a false dawn. Saturating ourselves in W-Fi and locking ourselves into a EMF grid; making our gadgets indispensable for our most basic daily needs is exactly what this mainframe seduction is all about. Part of being psycho-civilised is that we become seduced by the promise of more and more access, increasing efficiency and the ever smaller distance between “want” and “have.” The problem is, it appears to be an illusion, engineered with great precision, doffing it’s hat to ecological principles and economic alternatives whilst retaining a core-machine centralisation.

If we do not see the Magician behind these pretty lights and virtual enticements; these amenities offering a New Order of efficiency and ease, we will end up exactly as Henry David Thoreau wrote about his fellow man whom he believed had become : “… as tools of their tools.” When that happens and in combination with our illustrious pathocratic leaders, there may be very few choices to think freely, let alone act. We will be quite literally lost in the “simulation and simulacra”.

That is the antithesis of SMART.

 

See also: Satan’s Little Helpers VI: Sleepers and Electro-Shocks

 


Notes

[1] ‘Met police using surveillance system to monitor mobile phones’ The Guardian October 3, 2011.
[2] ‘Urban Wireless to Serve Intel and PSYOP forces’ by Mark Baard parallelnormal.com, July 19, 2007.
[3] http://www.patft.uspto.gov/
[4] ‘Method and an associated apparatus for remotely determining information as to person’s emotional state’ Inventors: Stirbl; Robert C. (New York, NY), Wilk; Peter J. (New York, NY) Appl. No.: 08/222,835 Filed: April 5, 1994 / 5,507,291 Stirbl et al. April 16, 1996. www. patft.uspto.gov/
[5] ‘Silent subliminal presentation system’ Inventors: Lowery; Oliver M. (Norcross, GA) Appl. No.: 07/458,339 Filed: December 28, 1989, issued as United States Patent 5,159,703, October 27, 1992. www. patft.uspto.gov/
[6] Utility Services in India’ | http://www.indiaonline.in/About/utilities/index.html
[7] The Military Use of Electromagnetic Microwave and Mind Control Technology’ by Dr Armen Victorian Lobster Magazine 1998. [8] ‘Horrifying US Secret Weapon Unleashed In Baghdad’ By Bill Dash, rense.com August 25, 2003.
[9] .‘Ariel Mind Control’ by Judy Wall, Editor/Publisher Resonance Newsletter of the MENSA Bioelectromagnetics Special Interest Group http://www.raven1.net/commsolo.htm
[10] ‘Magnetite Biomineralization in the Human Brain’ by Joseph L. Kirschvink, Atsuko Kobayashi-Kirschvink and Barbara J. Woodford, National Academy of Sciences. | Vol. 89. Biophysics, 1992.
[11]’US Electromagnetic Weapons and Human Rights’ By Peter Phillips, Lew Brown and Bridget Thornton, As Study of the History of US In telligence Community Human Rights Violations and Continuing Research in Electromagnetic Weapons, Completed December 2006, Sonoma State University, Project Censored Media Freedom Foundation.http://www.projectcensored.org/wp-content/uploads/2010/05/ElectromegnaticWeapons.pdf
[12] Ibid.
[13] ‘Non-Lethal Weapons (NLW): Industry, Technologies & Global Market’ 2014-2020 Aug 19, 2014 |http://www.marketwatch.com/story/non-lethal-weapons-nlw-industry-technologies-global-market-2014-2020-2014-08-19
[14] Ibid.
[15] http://jnlwp.defense.gov/Portals/50/Documents/Press_Room/Annual_Reviews_Reports/2013/DoD_Non-Lethal_Weapons_Program_Annual_Review_11.19.2012_HTML_format_v1.pdf
[16] Many accounts on psychotronic abuse are available to read in books and online. Some links: http://mindjustice.org/ | http://freedomfightersforamerica.com/victims_statements_pg1 [16] op.cit Philips, Brown, Thornton.
[17]The People Shapers by Vance Packard, published by Little, Brown & Co., 1977, (p.4).
[18] Joseph Delgado February 24, 1974 edition of the CONGRESSIONAL RECORD (MKULTRA hearings) No. 26, Vol.118.
[19] ‘Psychocivilization and Its Discontents: An Interview with José Delgado’ by Magnus Bärtås and Fredrik Ekman, Cabinet magazine, Issue 2 Mapping Conversations Spring 2001.
[20] Ibid.
[21] Ibid.
[22] ‘Two-Way Transdermal Communication with the Brain,’ Delgado, Lipponen, Weiss, del Pozo, Monteagudo, and McMahon, a co-operative publication of the Medical University of Madrid, Spain, and Yale University Medical School, 1975.
[23] Mass Control: Engineering Human Consciousness Jim Keith, IllumiNet Press, 1999. (p.99)
[24] ‘The IBM 2020 Neural Implant’ The Phoenix Project, Dr. Al Overholt, quoting from The California Sun, by Herb Dorsey, Feb. 1997. See also: (http://www.trufax.org/reports/2020.html)
[25] op. cit. Brzezinski (p.15) (Between Two Ages)

Technocracy XI: Social (SMART) Grid and “Cognitive Infiltration”

“A really efficient totalitarian state would be one in which the all-powerful executive of political bosses and their army of managers control a population of slaves who do not have to be coerced, because they love their servitude.”

Aldous Huxley, Brave New World


thSocial networking websites like Facebook, Twitter, Tumblr, Yahoo! and others have offered new ways to chat, make friends, speed-date and keep in touch with family wherever you are. It has revolutionized information in ways which we are only just beginning to understand. The networks have become such a normal part of our daily lives in such a short time that it is only recently that serious questions about privacy and surveillance have filtered through to the MSM. But ethical questions are being left behind as the Information Age surges ahead. Indeed, if you don’t have a Facebook account then you have already consigned yourself to the hinterlands of suspicion and abnormality. According to some, this may even be a red-flag for suspected terrorist or paedophile. Such is the power of social networking websites on society and the ridiculous assumptions now circulating. [1] $billion companies like Twitter and Facebook have become the largest database on the global population, representing a free and easy resource for intelligence agencies to data-mine. With over 900 million active users it is not difficult to see how useful data catchment could be.

Growing awareness that social networks are being used by intelligence agencies to monitor citizens’ activities prompted cyber-consumer advocate Electronic Frontier foundation (EFF) to file requests in October 2009 to provide records about federal guidelines on the use of social networking sites for investigative or data-gathering purposes. Among other issues related to surveillance as discussed previously, they sued the CIA, the US Department of Defence, Department of Justice and three other government agencies for allegedly refusing to release information on their involvement in social networks. The cases are on-going.

There are so many dubious aspects to Facebook aside from its intelligence connections and origins it is hard to know where to start. We will pinpoint a few however.

The company makes no secret of is its drive to know everything about its members. It wants to extract and mine as much the data from them as is humanely possible and then make it available to all kinds of interested parties. The implications of their drive to happily make your social life – including information you might not ordinarily reveal – fully integrated into the net experience is of course, never discussed. Facebook has been busily creating “Shadow Profiles” in a bid to extract even more information. Using various functions on the software interface which encourages users to share personal data of other users and non-users of Facebook such as mobile phone synchronization, search queries, friend invitations, email-provider imports and instant messaging means that even if you don’t use Facebook you may have a profile nonetheless. [2]

Since Facebook is such a fan of being “social by default” then it shouldn’t be concerned when the tables are turned. Since Facebook revealed in 2012 that more than 83 million Facebook accounts (8.7% of total users) were fake accounts, ongoing controversies with privacy issues, class action lawsuits and litigation as well as the virtual ownership of members’ profiles, it is hardly surprising this was reflected in the stock value which dropped below $20 in the same year. [3]


th“You may remove your User Content from the Site at any time. If you choose to remove your User Content, the license granted above will automatically expire, however you acknowledge that the Company may retain archived copies of your User Content.”

– Facebook Terms of Service. (It has since been updated yet protests groups claim little has changed).


When independent software developer Pete Warden crawled all the data that Facebook’s privacy settings changes had made public, the company sued him. This occurred before the Open Graph API system which means they were planning to make the data publicly available anyway. As Vice President of Engineering at Border Stylo Dan Yoder comments: “Their real agenda is pretty clear: they don’t want their membership to know how much data is really available,” stating further: “It’s one thing to talk to developers about how great all this sharing is going to be; quite another to actually see what that means in the form of files anyone can download and load into MatLab.” [4]

In 2010, a Canadian security researcher Ron Bowes created a specific crawler script which he then used to take information from Facebook’s open access directory. He managed to download 2.8Gb of personal details including credit card numbers, account names, profile URLs and contact details; names of those users’ friends, (even with hidden profiles) and more intimate photos of over 100 million Facebook users. This cache of private information gold was then dumped on P2P file-sharing service BitTorrent, which was subsequently downloaded by scores of major corporations many hundreds of times. The point was not the relative ease by which such data was “stolen,” though this is an important issue, it was the fact that the data is already publicly available, provided Facebook members have not chosen to hide their profile from search results. [5]

As of 2012, there are now a raft of members, celebrities, underwriters and advertisers all taking a cut of Facebook profits. On the management board is co-founder and CEO Mark Zuckerberg with the largest ownership percentage of an individual at 28% (he is worth $33.1Billion) with co-founders Eduardo Saverin, Dustin Moskovitz, Sean Parker taking between 6-4%.  Venture capital company Accel Partners, Russian internet firm Mail du Ru take 10% repsectively and former PayPal CEO and venture capitalist Peter Thiel 3%. Thiel sums up Facebook’s history of double-dealing and entrepreneurship very well.

mark-zuckerbergCEO Mark Zuckerberg

The first lump sum from his venture capital funding amounted to $500,000 – a tidy sum no doubt drawn from his £3bn hedge fund Clarium Capital Management and a venture capital fund called Founders Fund. Thiel is the Author of an anti-multicultural missive The Diversity Myth and on the board of VanguardPAC a radical internet-based Neo-Conservative pressure group that was apparently set up to attack MoveOn.org, a left-liberal pressure group website. VanguardPAC’s mission is to “reshape America and the globe” according to Neo-Conservative values – the type of values which are still carving up the Middle East. Thiel is certainly not the shy and retiring type and promotes a New World Technocracy laced with transhumanist and right-wing conservatism. The Guardian’s Tom Hodgkinson summarises Thiel’s curious mélange of fascist views: “… since the 17th century, certain enlightened thinkers have been taking the world away from the old-fashioned nature-bound life, and here he quotes Thomas Hobbes’ famous characterisation of life as ‘nasty, brutish and short’, and towards a new virtual world where we have conquered nature. Value now exists in imaginary things.” [6]

pthiel1

Peter Thiel: Technocratic Neo-Conservative

From where did Theil obtain his inspiration? Stanford’s University’s René Girard and his mimetic theory that states all cultures and ancient societies were built on the victimisation and an eventual sacrifice of the innocent, even though they believed they were guilty. Mythology was used to legitimise and rationalise the fact that society was founded on violence. If Girard believes that people are sheep and will follow the one strongest in the herd then according to Hodgkinson:

“The theory would also seem to be proved correct in the case of Thiel’s virtual worlds: the desired object is irrelevant; all you need to know is that human beings will tend to move in flocks. Hence financial bubbles. Hence the enormous popularity of Facebook. Girard is a regular at Thiel’s intellectual soirees. What you don’t hear about in Thiel’s philosophy, by the way, are old-fashioned real-world concepts such as art, beauty, love, pleasure and truth.” [7]

Perhaps this is something that may be said for much of the neo-feudalist collectives currently infiltrating our social systems?

Consider the other board member of Facebook, Jim Breyer a partner in the venture capital firm Accel Partners who put $12.7m into Facebook in April 2005:

“…. On the board of such US giants as Wal-Mart and Marvel Entertainment, he is also a former chairman of the National Venture Capital Association (NVCA). Now these are the people who are really making things happen in America, because they invest in the new young talent, the Zuckerbergs and the like. Facebook’s most recent round of funding was led by a company called Greylock Venture Capital, who put in the sum of $27.5m. One of Greylock’s senior partners is called Howard Cox, another former chairman of the NVCA, who is also on the board of In-Q-Tel. What’s In-Q-Tel? Well, believe it or not (and check out their website), this is the venture-capital wing of the CIA. After 9/11, the US intelligence community became so excited by the possibilities of new technology and the innovations being made in the private sector, that in 1999 they set up their own venture capital fund, In-Q-Tel, which “identifies and partners with companies developing cutting-edge technologies to help deliver these solutions to the Central Intelligence Agency and the broader US Intelligence Community (IC) to further their missions”. [8] [Emphasis mine]

With significant lobbying costs totalling over $41,000 in just one quarter of 2010 the focus of their expenditure was primarily intelligence agencies such as the Office of the Director of National Intelligence (DNI) and the Defence Intelligence Agency (DIA). It was the only internet company to do so out of Google, Amazon, eBay, Microsoft, Yahoo and Apple. The DNI is an umbrella office founded in the wake of 9/11 synthesizing intelligence from 17 agencies (including the CIA) and advises the President on privacy and federal cyber-security policy.

Which begs the question: Is Facebook lobbying merely to keep their operations free from interference for their Intel handlers?

Meanwhile, Facebook, Blogs, newspapers, radio TV channels, and internet chat rooms are poured over and monitored by the Open Source Centre or “vengeful librarians” – even the constant “tweets” from the Twitter network reaching over 5 million per day. Information is gathered by an army of analysts to find the low-down on the emotional level of a certain city demographic or whether a country is ready to be invaded or …”Democratised.”

facebooklogin1


 “Facebook is not your friend, it is a surveillance engine.”

– Richard Stallman, software freedom activist


It is now common knowledge that The U.S. Department of Homeland Security’s command centre monitors blogs, forums newsgroups and message boards on a daily basis. Scores of popular websites, including Twitter, Facebook, WikiLeaks, Hulu, and many alternative and left-leaning news sites also come under the umbrella of US surveillance.

Among the many examples that the Obama Administration has provided and which go above and the beyond the Neo-Conservative crimes of the Bush-Cheney cabal is President Obama’s regulatory Czar and legal scholar Cass Sunstein. Just before his appointment as Administrator of the White House Office of Information and Regulatory Affairs, this gentleman managed to add to the grand façade that is American democracy by writing a 30-page academic paper co-authored with Adrian Vermule entitled: “Conspiracy Theories.” In the paper he suggested the government should “infiltrate” social network websites, chat rooms and message boards. This “cognitive infiltration,” according to Sunstein, should be used to enforce a U.S. government ban on “conspiracy theorizing.” This ban would be imposed on such heresies as anti-anthropocentric global warming; the World Trade Centre attacks on 911 were an inside job; Al-Qaeda is a US government-created mercenary unit for hire and a range of other proven conspiracy facts, most of which feature on this blog. By “conspiracy theory” Sunstein defines it as “an effort to explain some event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”

Heaven forbid we should try to expose that …

And of course, Sunstein implies that that there are no conspiracies operating in government, banking and corporate activities and if you are one of the mentally deranged few that believe so, then medical help and a good psychologist is the only path open to you. It seems everyone is a potential extremist if you are aren’t giving the government a virtual back-rub. He further suggests: ““… a distinctive tactic for breaking up the hard core of extremists who supply conspiracy theories: cognitive infiltration of extremist groups, whereby government agents or their allies (acting either virtually or in real space, and either openly or anonymously) will undermine the crippled epistemology of believers by planting doubts about the theories and stylized facts that circulate within such groups, thereby introducing beneficial cognitive diversity.” [9]

Cass SunsteinCass Sunstein 2011, (AP Photo)

Sunstein’s objective is to raise: “… doubts about their factual premises, causal logic or implications for political action,” which places a whole new angle on some of many trolls and trouble-makers who periodically appear on website forums to sow seeds of discontent in ways which follow distinct patterns of emotional programming indicative of paid disinformation agents. Indeed, PSYOPS targeting the web have been in operation for several years, possibly since the internet’s inception in some form or another.  Sunstein’s suggestions are merely an updating of the US Dept. Defence’s Information Operations Road Map of the future. [10]

To make sure such a future – and the mass mind – is firmly where it should be DARPA means to keep biometrics and the internet connected to the same port (which, one day soon, may be located at the back of our skulls). Pentagon scientists are helpfully creating a program to use biometrics as a platform for creating a “cognitive fingerprint” which would dispense with all those passwords building up in our little black books. Which means, according to their website: “… validating any potential new biometrics with empirical tests to ensure they would be effective in large scale deployments.” Named the Active Authorisation Program (AAP) it offers deep analysis of the user’s cognitive processes and thus their online behaviour in the hope of inventing new forms of biometrics so that your identity can be ascertained.

Parallel to this grateful assistance in making our lives so much more efficient and safe, online tech journal Security Ledger reported in April 2013 on one time hacker and DARPA’s cyber chief Peiter “Mudge” Zatko heading to Google Inc. Joining Google’s Motorola Mobility’s Advanced Technology & Projects (ATAP) group, it has a mission to deliver “breakthrough innovations to the company’s product line on seemingly impossible short time-frames.” While Microsoft continues to track users of the Windows phones which have a unique ID that interacts with Wi-Fi locations and GPS to know anyone’s longitude and latitude. Customer privacy isn’t a big issue for Microsoft and really any of the big internet companies. Google knows the password of every Android device (phone or tablet) which has ever logged on to a particular Wi-Fi network. (Android accounts for 79 per cent of phones shipped worldwide).

Business Insider’s article of August 14th, 2013 alerted us to the fact that if you are one of 400 million persons who chose Gmail then you can also expect no privacy at all. In a class action complaint of 2013 Google responded by claiming “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” So, be warned, even though it is unlikely you’ll be able to avoid Google even if you wanted to.

It seems Google and DARPA are courting each other for good reason.

 


Notes

[1] Is not joining Facebook a sign you’re a psychopath? Some employers and psychologists say staying away from social media is ‘suspicious’ Daily Mail, 6 August 2012.
[2] ‘Facebook Is Building Shadow Profiles of Non-Users’ October 18 2011, http://www.slashdot.org
[3] “Facebook: About 83 million accounts are fake”. USA Today. August 3, 2012.
[4] ‘Top Ten Reasons You Should Quit Facebook’ by Dan Yoder http://www.gizmodo.com May 3 2010.
[5] ‘How 100 million Facebook users ended up in a list on BitTorrent’ Jemima Kiss, The Guardian, 29 July 2010.
[6] ‘With friends like these …’ by Tom Hodgkinson, The Guardian May 2010.
[7] Ibid.
[8] Ibid.
[9] ‘Conspiracy Theories’ by Cass R. Sunstein (Harvard Law School) and Adrian Vermeule (Harvard Law School) January 15, 2008, Harvard Public Law Working Paper No. 08-03, U of Chicago, Public Law Working Paper No. 199 U of Chicago Law & Economics, Olin Working Paper No. 387. [ During my own experience in working for several alternative news websites there was no question that persistent problems from site “trolls” on the relevant forums fell into this category. Some exhibited high knowledge on certain specialist subjects and exhibited a standard formula for contouring ideas and concepts which included the very same “cognitive infiltration” tactics cited by Sunstein and often in a highly elaborate form. Once “outed” they were gone but often the damage was already done].
[10] As part of the “Information Dominance” strategy of the Pentagon, ‘The Information Operation Road Map’ was a paper commissioned in 2003 and declassified in 2006. It was personally approved by the then Secretary of Defence Donald Rumsfeld. It included details of major PSYOPS disinformation campaigns to place false stories in newspapers and the internet as well as the kind of beginings of “cognitive infiltration” that Sunstein was so keen to see materialise.

Save

Technocracy V: The Technocrats Tap in (2)

“What is the society we wish to protect? Is it the society of complete surveillance for the commonwealth? Is this the wealth we seek to have in common – optimal security at the cost of maximal surveillance?”
 .
– Tom Stoppard, author, playwright
.

sbirs-geo-1-missile-warning-satellite

                                      Image credit: gizmag.com | infrakshun

In 2003, under the Bush Administration, the Total Information Awareness program was introduced in order to provide “large, distributed repositories” including “biometric signatures of humans” and “human network analysis and behavior modeling” provided by DARPA. It was a reiteration of what ECHELON and MAIN CORE had been doing for years. Congress defunded the program in the same year, prohibiting any such activities to target Americans.

The Total Information Awareness Office run by convicted Iran-Contra felon John Poindexter and featured a logo on its website resembling the popular occult mythology of the Illuminati. It was so blatant that some visitors thought it was a bad attempt at political satire. It wasn’t. It did however, beg the question as to why such a revealing caricature and its objectives was allowed the go ahead? Moreover, why was it derailed so quickly when other draconian legislation – including the highly controversial PATRIOT act – sailed through without any problems?

The reason for this was to provide a distraction so that yet another surveillance hub could be built away from the spotlight.

A 2012 article by online tech magazine Wired reports on Intel journalist James Bamford’s sources who claim that once again, NSA has been continuing its surveillance operations with a new spy data centre based in Utah: “… capable of breaking almost any encryption, reading any email and recording any phone call anywhere in the world, even if it’s not made over the Internet.” Where have we heard that before? This hub is just one of a number of networked sites based around a similar network 0f “ultra-sensitive satellites … with the unique ability to sniff electronic communications from a massive distance.” [1]Bamford’s sources say that the NSA is routinely violating the US constitution by dumping all of America’s communications data into the system for analysis. Perhaps most importantly, and which goes to the heart of the premise of this book is the opinion of another covert source to which Bamford made contact who claimed that: “… the NSA is on the verge of a massive coup, putting the U.S. inches away from ‘a turnkey totalitarian state.’” [2]

tia-greatseal

The Total Information Awareness logo as compared to the Great Seal found on the US dollar bill, a freemasonic emblem. A purposeful distraction?

Another heavy-weight whistleblower, William Binney, decided to grab the gauntlet and go against his superiors to warn of an Orwellian Superstate which is “ready” and “set up” so that one has to just “turn the key” and this would be an immediate reality. [3] A specialist in traffic analysis, Binney worked for the NSA for 37 years and knows its capabilities and technical now-how inside out. He joined Electronic Frontier Foundation’s case against the National Security Agency (Jewel v. NSA) filed in July 2, 2012, and their illegal domestic surveillance programs which, according to Binney, “are consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications” inside the U.S. He has stated that over 20 trillion files have been created since the September 11th attacks.[4]Amid significant civil liberty concerns, NSA head and commander of US Cyber Command department General Keith Alexander is still seeking to redesign the internet’s infrastructure so that the NSA may: “… know instantly when overseas hackers might be attacking public or private infrastructure and computer networks.” A trial of 17 US defence companies is already underway.

Tom Simonite from Technology Review tells us:

“Under the Defense Industrial Base (DIB) Cyber Pilot, Lockheed Martin and other companies set up their computer security systems to automatically alert the agency when the alarm is tripped. They automatically pass a summary of what was detected and the IP address associated with the event to the NSA over the Internet. ‘All you need to pass is the fact of a signature and IP address in real time, and we can take it from there,’ said Alexander.” [5]

Yet, there is more to MAIN CORE than high-level data collection and future detention. First, we need to keep in mind that targeting the thinking population is not just an Orwellian fantasy but an objective reality. The NSA and Homeland Security is collecting massive amounts of data on the US and European populations for another purpose which may well have something to do with “Synthetic Environments for Analysis and Simulation” or (SEAS). From their celebratory website we read: “What happens when you take gaming technology, inject it with the latest discoveries in management, economics, and psychology, and apply it to business, political, and social situations? The answer is Simulex’s Synthetic Environments for Analysis and Simulation (SEAS), the result of ten years of research conducted at Purdue University’s Krannert School of Management, in association with the United States Department of Defence and several Fortune 500 companies.” [6]

Looking at Simulex Inc. client base it is fairly easy to guess. As the bold heading that greets us on the client page attests, SEAS has a top heavy bias for the telecommunications industry. It assists the United States Joint Forces Command (USJFCOM) to “model the volatile regions of the world” while also providing their services to United States Department of Homeland Security in preparing “… for bio-terrorist attacks, and by Fortune 500 companies for strategic planning.”[7]Other clients include: United States Department of Defence, United States Department of Justice, United States Army Recruiting Command and Crane Naval Surface Warfare Centre. Their private sector clients are global pharmaceutical corporation Eli Lilly and our old weapons friend Lockheed Martin who got rid of whistleblower Margaret Newsham for blabbing to the press about unwarranted surveillance.

Is it coincidence Lockheed turns up here?

Other Fortune 500 companies are apparently clients but we are not given a list. However, it would be right up the social engineering alley of the Rockefeller Foundation and Monsanto Corp.

(Photo: Mönch / STN)

Which brings us to another 2005 whistleblower Russell D. Tice, a former intelligence analyst for the U.S. Air Force, Office of Naval Intelligence, Defence Intelligence Agency (DIA) and NSA Signals Intelligence (SIGINT) officer. His statements in an interview to online journal Think Progress Security.org claimed that the surveillance discovered so far was “… only the tip of the iceberg,” and there was “… an angle that you haven’t heard about yet…” [8]In another interview with the online culture journal Reason just prior to a congressional hearing on the NSA wiretapping scandal (which went nowhere) Tice infers that the wire-tapping was not the main issue and that he needed: “… to tell Congress that no one knows yet, which is only tertiarily connected to what you know about now … In my case, there’s no way the programs I want to talk to Congress about should be public ever, unless maybe in 200 years they want to declassify them. You should never learn about it; no one at the Times should ever learn about these things.”[9]

So, surveillance was only scratching the surface. What then, are we to make of this military-corporate complex outsourcing in conjunction with MAIN CORE? What would you do if you wanted to predict how each of us may act in the future, most especially if your main objective was to control population in the face of a real or imagined threat against the Establishment power-base?

What is it that we “should never learn about?”

Could that be that each and every one of us who has expressed a level of awareness that thinks out of the box has an electronic kindle file packed full of interesting data? Moreover, this data is part of complex synergy of multi-layered simulations that uses a form of mass “pre-crime” software with a supercomputing power undreamt of.

>Blogger and commentator Kevin Flaherty from cryptogon.com makes it clear in the following analysis:

We must assume that They are using the full spectrum of surveillance information to try to PREDICT HOW EACH OF US IS LIKELY TO BEHAVE ON A DAY TO DAY BASIS. Where we go. Which routes we take. What we buy. Etc. All of these things can be broken down into a kind of moving average that wiggles around between an upper band and a lower band, kind of like a standard deviation from a mean. Stay within the bands, and the Magic 8 Ball probably won’t bother to flag your profile for closer analysis by some genius at the Terrorist Screening Center.

Obviously, most of us aren’t worth the attention of a human analyst, and They know it. Most of the sheep just go with the herd. They do what they’re told, shop at Wal-Mart, pay their taxes, go to church, the end. More educated sheep read Business Week or the New York Times, etc. Within a fairly wide range of activities, it’s no more complicated, for the vast majority of the people out there, than the way pool balls behave as they bounce around the table and each other.

This is a key point, so I’m going to emphasize it: These systems would excel at finding the artifacts, the outliers, the people who haven’t internalized the programming, but continue to act ‘normal.’ [10] [Emphasis mine]

Journalist and author Walter Bowart who wrote the seminal classic Operation Mind Control (1978) the NSA of the 1960s had computer systems decades in advance of public and governmental agencies of the time. And let’s not forget the capabilities of “Quantum Light Harvesting” which offers a revolutionary way to advance computational power to undreamt of levels and in a short space of time. That being so, what systems do we imagine the NSA playing with now in 2015?

Having explored the notions of depopulation or “managed genocide” and psychological operations in this series, Flaherty makes an interesting observation on the nature of this total surveillance and so called resource-grabbing. He draws our attention to a recent and on-going SEAS project in partnership with the US Department of Defence (DOD) called the Sentient World Simulation (SWS). According to the concept paper for the project, a parallel Planet Earth is being developed: “… with billions of individual ‘nodes’ to reflect every man, woman, and child this side of the dividing line between reality and AR… It will be a “synthetic mirror of the real world with automated continuous calibration with respect to current real-world information.” Apparently, the simulation: “… provides an environment for testing Psychological Operations (PSYOP),” so that military leaders can “develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners”.

SWS also:

“… replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers believe they can predict how individuals and mobs will respond to various stressors.

SEAS can display regional results for public opinion polls, distribution of retail outlets in urban areas, and the level of unorganization of local economies, which may point to potential areas of civil unrest. Yank a country’s water supply. Stage a military coup. SWS will tell you what happens next.

“The idea is to generate alternative futures with outcomes based on interactions between multiple sides,” said Purdue University professor Alok Chaturvedi, co-author of the SWS concept paper. [11]

However, the Pentagon still isn’t content. Hundreds of additional spies are being sent overseas as part of a new espionage network that is set to rival the CIA in size according to the Washington Post. The report informs us that the a transformation of the Defence Intelligence Agency (DIA) is underway having been “dominated for the past decade by the demands of two wars” and which will now be a “spy service focused on emerging threats and more closely aligned with the CIA and elite military commando units.” With “collectors” numbering as many as 1,600 all over the world this is no small project. In fact, as we have explored, it seems to be part of an expansive operation to merge military and intelligence agencies into a more centralised system of espionage and domestic surveillance. As the Post mentions: “… the Pentagon’s plan to create what it calls the Defense Clandestine Service (DCS) reflects the military’s latest and largest foray into secret intelligence work. The DIA overhaul — combined with the growth of the CIA since the Sept. 11, 2001, terrorist attacks — will create a spy network of unprecedented size.” [12]

illustrationPhoto from Simulex, Inc. advert

On top of all this, in 2012, former CIA intelligence analyst turned Whistleblower Edward J. Snowden leaked more than 50,00 classified documents to the Wikileaks organisation and journalist Glenn Greenwald revealing in black and white just how pervasive and all-encompassing the surveillance capabilities of America’s NSA and Britain’s GCHQ truly is. For some, the jury is still out on Snowden’s motives, primarily due to the fact that much of this information had been known for many years by independent journalists and alternative media who had been trying to get the attention of the mainstream media, but to no avail. So, it was a little fishy that Snowden was all over every possible media outlet in a very short space of time as though he had single-handedly dismantled the apparatus himself. Yet, he is the first CIA agent to do so. Is he a patsy, a conscious agent or a hero?

Whether the NSA is using him to test the demographic water of mass perception is unclear. For one thing, it allows the public to ease their way into deeper issues surrounding the whole arena of US policy from drone attacks to terrorism. The latter reason has been trotted out to justify all kinds of unconstitutional measures and many are waking up to this fact. After all, so-called “terrorists” are acutely aware that they are always monitored. What Snowden has done is to show how surveillance is targeting innocent people, not the terrorists. The NSA, in all probability, may be extremely peeved that their methods have been revealed. Whether this is a CIA-NSA turf war suggested by some commentators remains to be seen. As the CIA grapples with increasing revelations about its torture and rendition programs and the NSA continues to try and stem the flow of leaked cables on its surveillance capabilities, the leviathan of soft totalitarianism still lumbers forward.

NSACIA Emblem

© infrakshun

By 2013, while the magnitude of surveillance of all and everyone was being digested it is true to say that there may be much more to be drawn out of the NSA shadows. On November 28th,the BBC’s Hardtalk programme, Glenn Greenwald stated that there are still thousands of leaked cables to go through and make public. As it stands, the leaks have not made the slightest difference to its illegality as some commentators have been saying for quite some time. Far from being chastened, the NSA has romped ahead by creating a secret body of law which gives the agency carte blanche in accessing data on Americans justified by the war on terror and the threat of cyber-terrorism and underground nuclear proliferation.

The Foreign Intelligence Surveillance Court (FISA) has eleven members whose job it was to approve illegal wire-tapping orders and which have  now been expanded to allow the NSA to do as it pleases while doffing its hat to feeble attempts to regulate intelligence surveillance. In a Guardian piece by Spencer Ackerman on August 16, 2013, it was reported that thousands of annual violations of its own restrictions continue to mount as reported by two US senators who sit on the US intelligence committee. As Rice, they stated that these were, also: “the tip of the iceberg.”

The bottom line is that everyone is presumed guilty rather than innocent simply due to the vast amount of data building on every citizen. The NSA can effectively trap you into suspected wrongdoing. As we have seen, the ubiquitous rise of entrapment operations may reflect something much deeper. Just because you have led a law-abiding life, it is no protection against mass spying programs seeping into every corner of our lives care of SMART technology. Indeed, the very definition of “law abiding” is changing; contoured towards government policy rather than what is ethically and morally sound. Whistleblower William Binney has warned for several years that the government is storing literally everything and creating a highly sophisticated, searchable database to be used for anything it wants. Snowden says much the same thing in an interview on June 12, 2013:

Because even if you’re not doing anything wrong you’re being watched and recorded. And the storage capability of these systems increases every year consistently by orders of magnitude … to where it’s getting to the point where you don’t have to have done anything wrong. You simply have to eventually fall under suspicion from somebody – even by a wrong call. And then they can use this system to go back in time and scrutinize every decision you’ve ever made, every friend you’ve ever discussed something with. And attack you on that basis to sort to derive suspicion from an innocent life and paint anyone in the context of a wrongdoer. [13]

On July 6, 2013, Eric Lichtblau writng for the New York Times commented on officials’ statements that: “… the court’s still-secret decisions go far beyond any single surveillance order.” Indeed, though European countries such as France and Spain have been found spying on their own citizens, even handing over data to the NSA it is the United States that has led the charge against the global population’s privacy. This in turn, has led the Surveillance State seeping into every avenue of American life. Even the Internal Revenue Service (IRS) has routinely been snooping in order to extract largely unconstitutional taxation claims. It believes that it can continue to operate quite happily without using a warrant to read people’s emails and text messages. Just like the search engine Google Inc. (whom we will turn to presently) the Fourth Amendment and every person’s right to basic privacy is deemed irrelevant to the IRS and it’s highly dubious definitions of taxations laws. In summary, they have their ears and eyes tapped into every conceivable communication source while making up their own laws to maintain this illegal surveillance  well into the future. If you listened to the BBC you would think that it is Glenn Greenwald who should be on trial for daring to suggest that intelligence chiefs “routinely lie.”

But the shadow government and the NSA isn’t content – it needs more and more. Research into weaponisation, military capabilities and surveillance has now encompassed much of society. Corporations, multinational security firms and private contractors who act as “digital blackwaters” are all in the NSA bag. Outsourcing is key in terms of diluting accountability whilst encouraging innovation. In just a few examples from many, military-intel company Raytheon has “… secretly developed software capable of tracking people’s movements and predicting future behaviour by mining data from social networking websites.” The company admitted that it was a joint research & development project shared with the US government sincce 2010 in order “… to help build a national security system capable of analysing ‘trillions of entities’ from cyberspace.

WilliamBinney-EdwardSnowdenWhistleblowers William Binney (left) and Edward J. Snowden (right)

The security of biometric data is a bad joke since the sale of private data is open to lucrative profits. In 2013, Richard Kerbaj and Jon Ungoed-Thomas reported in the May 13th, edition of The Sunday Times that data of 27m mobile phone users had been: “… offered for sale to the Metropolitan police, private companies and other bodies, enabling them to track users’ movements.” The company involved in the potential sale is: “Ipsos Mori, one of Britain’s biggest research firms, … claimed in meetings that every movement by users can be tracked to within 100 metres.” According to the newspaper, the company: “shelved any deal after being contacted by The Sunday Times.” The report continued: “Documents to promote the data reveal that it includes ‘gender, age, postcode, websites visited, time of day text is sent [and] location of customer when call is made’. They state that people’s mobile phone use and location can be tracked in real time with records of movements, calls, texts, also available for the previous six months.” [14]

To carry out these  games in order to “protect us” the NSA has resorted to impersonating Google in order to obtain its information and swell its billions of files.  Named in the business as a “man in the middle attack” it involves a hacker technique of “… using a fake security certificate to pose as a legitimate Web service, bypass browser security settings, and then intercept data that an unsuspecting person is sending to that service.” Once passwords have been collected users can then log in to genuine banking websites thereby acting as intermediary or “middle man” and re-routing requests to their bank and returning the information to the customer while gathering highly personal data from both participants without either having the slightest clue what has happened. (It also applies to email servers). This time it is not a lone hacker but the NSA and GCHQ, where massive amounts of information is being channelled back to their central hubs. [15]

The idea that informational roadmap of cyberspace has been compromised by Intel PSYOPS and NSA surveillance has become more of a probability that a possibility. It is foolish to believe that anything we do online is secure or private. Not only is the NSA breaking most forms of encryption on the internet but is likely replacing intercepting downloads of open-source encryption software and silently replacing these with their own versions. The NSA is re-calibrating the internet towards its own perception of reality.

Illegality is justified with the favourite canard that it is all to protect us from terrorism. It was confirmed just how manufactured the threat truly is when online journal allgov.net reported in October 2013 that NSA Director Keith Alexander admitted before a congressional committee that he lied when he claimed the agency’s wire-tapping program had thwarted 54 terrorist “plots or events.”  In June of 2013, while the Obama administration was busy denouncing the whistleblowing of Edward Snowden and locking away Bradley Manning for 35 years, the NSA was lying through its teeth once again. Only 13 of the 54 cases were connected to the United States and just one or two suspected plots were: “… identified as a result of bulk phone record collection.” This was nothing new. The head was merely following the “terrorist-under-your-bed” justification for all manner of constitutional abuses practiced by the government and military-intelligence apparatus.

Lying is an inherent part of the deal. Apart from using data and surveillance as a means to implement propaganda, cyber-warfare and the harassment of those deemed “enemies,” mass surveillance is key to Obama’s assassination programs still carried out without oversight. In combination with the Joint Special Operations Command (JSOC) the NSA and CIA effectively make a private army outside any democratic accountability. Special operations units utilising drones and US soldiers are deployed all around the globe, from Somalia to Yemen, Afghanistan to Iraq. The coordination and logistical support is given by the National Counterterrorism Center (NCTC) who essentially decides who might be a suitable target and the means by which he or she will be murdered.

According to Guardian journalist Glenn Greenwald and the American Civil Liberties Union (ACLU) the true purpose of the NCTC is the:

“massive, secretive data collection and mining of trillions of points of data about most people in the United States” …. In particular, the NCTC operates a gigantic data-mining operation, in which all sorts of information about innocent Americans is systematically monitored, stored, and analyzed. This includes “records from law enforcement investigations, health information, employment history, travel and student records” – “literally anything the government collects would be fair game”. In other words, the NCTC – now vested with the power to determine the proper “disposition” of terrorist suspects – is the same agency that is at the center of the ubiquitous, unaccountable surveillance state aimed at American citizens.

Worse still, as the ACLU’s legislative counsel Chris Calabrese documented back in July in a must-read analysis, Obama officials very recently abolished safeguards on how this information can be used. Whereas the agency, during the Bush years, was barred from storing non-terrorist-related information about innocent Americans for more than 180 days – a limit which “meant that NCTC was dissuaded from collecting large databases filled with information on innocent Americans” – it is now free to do so. Obama officials eliminated this constraint by authorizing the NCTC “to collect and ‘continually assess’ information on innocent Americans for up to five years”. [16]

As the NSA and Homeland Security can now, on a whim, label any American a potential terrorist, the most obvious question to ask is how long will it be before American citizens are assassinated on their own soil? (Assuming it hasn’t happened already).

drones

Obama’s Drones ready to assassinate from a distance without trial or jury. Based on the woeful intelligence of the last decade chances are you are likely to be an innocent civilian.

Perhaps no better example illustrates how the NSA should be the last people we trust is from the recent confirmation that the agency wishes to defend none other than Wall Street. Rather than wire-tapping genuine criminals infesting the world of cartel economics, this bastion of financial terrorism is deemed worthy of protection.

Salon, journalist Natasha Lennard details how the Director of National Intelligence James Clapper released a statement in early 2013 noting: “It is not a secret that the Intelligence Community collects information about economic and financial matters, and terrorist financing. We collect this information for many important reasons: for one, it could provide the United States and our allies early warning of international financial crises which could negatively impact the global economy. It also could provide insight into other countries’ economic policy or behavior which could affect global markets.” [17]

The NSA could no doubt collect vast amounts of information on the continuing “irregularities” and corporate crimes still devouring any chance of a healthy economy. As journalist Michael Degerald mentioned regarding the admission: “If any part of American society or business had shown itself to be corrupt to the core, and thus in need of surveillance, it’s Wall Street.” [18]

 


Notes

[1] ‘The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)’ By James Bamford, Wired, March 15, 2012.
[2] Ibid.
[3] RT report July 2012.
[4] ‘Sworn Declaration of Whistleblower William Binney on NSA Domestic Surveillance Capabilities’ July 16 2012. Public Intelligence.net, http://www.publicintelligence.net.
[5] ‘NSA Boss Wants More Control Over the ‘Net’by Tom Simonite, technologyreview.com, July 27, 2012.
[6] Ibid.
[7] Ibid.
[8] ‘NSA Whistleblower To Expose More Unlawful Activity: ‘People…Are Going To Be Shocked’’ By Faiz Shakir, Thnik Progress Security, wwwthinkprorgess.org May 12, 2006.
[9]‘Inside the Puzzle Palace’ – A Reason interview with NSA whistleblower Russell Tice, by Julian Sanchez, http://www.reason.org, January 13, 2006.
[10] ‘Synthetic Environments for Analysis and Simulation’ By Kevin Flaherty, http://www.cryptogon.com, June 30th, 2007.
[11] ‘Sentient world: war games on the grandest scale – Sim Strife’ By Mark Baard, The Register, 23rd June 2007.
[12] ‘DIA sending hundreds more spies overseas’ By Greg Millar, The Washington Post, December 2.
[13] See: ‘Full Interview with Edward Snowden’at: https://www.youtube.com/watch?v=bdPbvKeRgpk
[14] ‘Secrets of 27m mobile phones offered to police’ by Richard Kerbaj and Jon Ungoed-Thomas Sunday Times, 12 May 2013.
[15] ‘NSA Disguised itself as Google’ by Edward Moyer CNET.com, September 2013.
[16] “The President’s Private Army”: NSA-CIA Spying is Central to Carrying Out the Obama Administration’s Assassination Program. By Washington’s Blog / Global Research, September 29, 2013.
[17] ‘Statement by Director of National Intelligence James R. Clapper on Allegations of Economic Espionage’
Sunday, September 08, 2013.
[18] ‘Why doesn’t NSA spy on Wall Street?’by Michael Degerald Salon.com Sep 11, 2013.

Technocracy IV: The Technocrats Tap in (1)

By M.K. Styllinski

“…As far as intelligence goes the NSA’s far, far superior to [the CIA]—far in advance in the ‘black arts.’…The CIA gets blamed for what NSA does. NSA is far more vicious and far more accomplished in their operations.”

Operation Mind Control (1978) By Walter Bowart, Interview conducted with a confirmed government assassin.


cctv1The average British person has the dubious honour of being part of a population that is the most intensely monitored on the planet. In just one week, a British individual will have over 3,254 pieces of personal information stored about him or her, which is then held for years on a variety of databases, or in some instances indefinitely. Where you shop, how frequently, what you buy, how often you use your credit card and where; you’re most common website searches and favourite sites as well as the details of your emails and keyword analysis therein. An average of 50 websites is visited and 32 emails sent per person in Britain every day. That’s a lot of data. And the internet service providers (ISPs) log everything which is then happily handed over to advertisers representing perhaps the most “benign” use of your private data. (Stay tuned).

The dividing line between the corporate sector and government has never been more blurred when it comes to sharing data about customer’s habits. Phone companies already retain enormous amounts of data about British people and presently give it to over 650 public bodies on request. A recent finding by the UK’s Telegraph newspaper revealed that plans to grant local authorities and other public bodies access to the email and internet records of millions has already gone ahead, despite the well-publicised loss of data by government departments, including an incident where HM Revenue and Customs mislaid computer disks containing the personal details of 25 million people. [1]

Microsoft continues to track users of the new Windows phones which has a unique ID that interacts with Wi-Fi locations and GPS to know anyone’s longitude and latitude. Customer privacy isn’t a big issue for Microsoft and any of the big internet companies. Mobile phones are now effectively little tracking devices courtesy of a network of phone masts which allow name, time, location and direction of travel to be catalogued via a unique identifying signal that is pulsed out at regular intervals, even when you are not using the phone. Police and public authorities can access this information at any time, ostensibly for investigating crimes. [2]

intellistreetsIt seems that one company “Illuminating Concepts” is quite open about the spread of surveillance and even seems to celebrate it. Closely associated with Homeland Security, the firm is already rolling out its SMART street lighting under brand name “intellistreets” in various cities throughout the USA. However, on the intellistreets website it reveals the lighting system has: “Homeland Security features … embedded in the system.” What does that mean exactly? Well, they have provided sensors for: “Mass notification, emergency evacuation routing, emergency call stations, CBRNE attack notification, visual analysis and digital signage. And further, team have helpfully created: “… systems processors [that] provide background music, public announcements, and digital messaging.” Although in an earlier report  the description included “voice stress analyzers,” this seems to have been scrubbed from their updated version, although you can be sure it remains in the package, all made possible via an ocean of wi-fi waves…And since they also act as surveillance cameras then there is no reason to fear …

intellistreets2

Intelligent Street Lighting in Las Vegas. They are fitted with a range of sensors designed to assist Homeland Security…(screen-shot from intellistreets demo)

Back in the United Kingdom, aside from intelligent transport and street lighting, there is still the matter of a central nexus of surveillance care of CCTV or closed-circuit television where well over 4.2 million cameras are crammed into this tiny island. Network Rail, London Underground, government and corporate buildings are all littered with the critters, recording an average of over 300+ appearances on camera for the ordinary Brit. The tapes can be kept however long it is deemed necessary. The fact that CCTV surveillance has proven by the police’s own crime statistics to have made virtually no reduction or prevention of crime, the SMART city future continues to attract the technocratic faithful, nonetheless.[3]And if you are thinking of high-tailing your way out of the UK in search of real privacy, automatic number plate recognition systems can always track your speeding car…

That is, if airborne drones don’t do it first.

Produced by yet another delighted arms manufacturer, BAE Systems, unmanned aerial vehicles (UAVs) better known as “drones,” and controversially deployed in Afghanistan are now being used for the routine and covert monitoring of the UK and US public. In the United States police, universities, state transportation departments and federal agencies already have some form of drone device monitoring the public. Some of these are anything from small, remote-controlled model “aeroplanes” to large predator drones seen in the military. A consortium of government agencies and law enforcement authorities are falling over themselves to deploy the drones in an attempt to “greatly extend the government’s surveillance capacity and ‘revolutionise policing.’” According to a 2010 Guardian report: “The CAA is currently reluctant to license UAVs in normal airspace because of the risk of collisions with other aircraft.” Despite this, the government and their weapons manufacturers are confident that the widespread deployment of drones will take off… in just a few years. [4] 

The Federal Administration Authority (FAA) has estimated 10,000 drones could be flitting about our skies by 2020. With a September 2015 deadline from Congress to open the nation’s airspace to drone traffic, the investment alone will ensure such a deadline remains on course. [5] Indeed, early 2015 has already seen drones operating on behalf of amazon, pizza delivery, as waiters in Japan and even drones whizzing around at the Superbowl (until the FAA became jittery and banned them).

Overall surveillance is marching to the tempo of intel agencies and the creation of so-called “threat assessments.” CCTV photography is entered into a facial recognition database which can then be used to create a 3D model of your face which is distributed across a vast database surveillance network. The United States Defence Advanced Research Projects Agency (DARPA) has been busy developing the AWARE-2 gigapixel camera which is capable of creating images with 50,000 megapixels. The machine will be used for military surveillance, which means if not being used against suspecting civilians or “insurgents” in foreign lands it will probably mean protesters and law abiding citizens like you and me. The AWARE camera is part of a whole industry rolling out new hardware to meet the demands of a global populace that is becoming more aware.

Governments have been spying on their own people since the end of the Second World War as a consequence of gathering enemy intelligence and code cracking. Codes and encryption technology led to coordinated signal intelligence (SIGINT) which obtained a fresh burst of state support from the pressure of the Cold War. The computer innovations that would follow led to the creation of the ECHELON global spying system, a vast network of digital spy stations carefully maintained by the US, England, Canada, Australia, and New Zealand.

Originally named “Project P415” with the involvement of a broad network of international intelligence agencies on board, it has continued to grow in size and scope thanks to successive Prime Ministers and Presidents signing off billions of pounds and dollars without congressional approval. By the 1980s, the Anglo-American plan for an expansion of ECHELON was set in motion. It was to be fully operational by the 21st century and its ambitions included the monitoring, collection and analysis of the civilian population overseen by the United States’ National Security Agency (NSA) and Britain’s Government Communications Headquarters (GCHQ) at Cheltenham, England. This is the coordinating centre for Europe, Africa and Russia, West of the Ural Mountains, while the NSA is responsible for the rest of Russia and the Americas. The NSA’s monitoring of the South Pacific, and South East Asia is sourced from a base in Australia. The still secret UKUSA (UK-USA) monitoring agreement splits the work into several sections assigned to the relevant agency where the global population’s private lives are intercepted from mobiles, land line telephones, fax transmissions and emails and fed through NSA departments where personnel pore over keywords in the hope of isolating phantom suspects’ intent on blowing up the White House.[6]

A 1998 European Parliament sponsored research study entitled: ‘An Appraisal of Technologies of Political Control,’ gave credence to journalists’ insistence that a UK-US spy surveillance network was in operation. The Scientific and Technological Options Assessment (STOA) committee of the European Parliament compiled the report and gave cast iron evidence that not only did it exist but showed the NSA was routinely carrying out illegal and sophisticated surveillance experiments on Europeans with UK support.

In the 1980s, Margaret Newsham worked for arms manufacturer Lockheed Martin and had been stationed at the NSA’s Menwith Hill listening post in Yorkshire, England. This is the central clearing house for information that is vacuumed up and dissected by the NSA at fort Meade and other locations. Newsham became a whistleblower and testified to a Congressional committee after realising that the NSA was illegally spying on Americans and Europeans. Their report was never published but investigative journalist Duncan Campbell took an interest and verified her story in a 1988 report of his own, blowing the lid off ECHELON secrecy in the process.

gchq-nsaAmerica’s NSA Headquarters (top) and UK’s ECHELON surveillance system and GCHQ

Patrick S. Poole, a lecturer in government and economics at Bannockburn College in Franklin, Tennessee compiled a data base on the nature and history of ECHELON. In an extensive series from 1999 and 2000 he outlined some of the surveillance operation code names unveiled over the years mostly by determined investigative journalists which include the following sourced from the Menwith Hill data hub:

STEEPLEBUSH – Completed in 1984, this $160 million system expanded the satellite surveillance capability

RUNWAY –receives signals from the second-generation geosynchronous Vortex satellites, and gathers miscellaneous communications traffic from Europe, Asia and the former Soviet Union. The information is then forwarded to the Menwith Hill computer systems for processing.

PUSHER – An HFDF system that covers the HF frequency range between 3 MHz and 30 MHz (radio transmissions from CB radios, walkie-talkies, and other radio devices). Military, embassy, maritime and air flight communications are the main targets.

MOONPENNYthis system is targeted at the communication relay satellites belonging to other countries, as well as the Atlantic and Indian Ocean Intelsat satellites.

KNOBSTICKS I and II – The purpose of these antennae arrays are unknown, but they probably target military and diplomatic traffic throughout Europe.

GT-6 – A new system installed at the end of 1996, GT-6 is believed to be the receiver for the third generation of geosynchronous satellites termed Advanced Orion or Advanced Vortex. A new polar orbit satellite called Advanced Jumpseat may be monitored from here as well.

STEEPLEBUSH II – An expansion of the 1984 STEEPLEBUSH system, this computer system processes information collected from the RUNWAY receivers gathering traffic from the Vortex satellites.

SILKWORTH – Constructed by Lockheed Corporation, the main computer system for Menwith Hill processes most of the information received by the various reception systems.

Additional systems (TROUTMAN, ULTRAPURE, TOTALISER, SILVERWEED, RUCKUS, et. al.) complete the monumental SIGINT collection efforts at Menwith Hill. [7]

Unfortunately, while disputing the strength of such a system and the danger it poses for ordinary citizens Mr. Poole also buys into the propaganda of “us and them” terrorism and hails the “successes” that such a framework has yielded, citing a selection of terrorist atrocities that unbeknownst to him, had the sticky hand of state-sponsorship all over of them. Like many journalists and academics he has yet to grasp that the building of extremism is part of the Terror Industry in turn, connected to the “justifications” rallied by the mainstream press to support the World State-surveillance apparatus. In conjunction with long-time utilisation of PROMIS software – and now thanks to Edward Snowden’s whistleblowing on Internet surveillance programs such as PRISM, XKeyscore, Tempora, and the interception of US and European telephone metadata, remote viewing of any computer in real time is possible, as well as the creation of “back door snooping” in most public systems such as Microsoft.

Unsurprisingly, the Middle East, that bastion of US-NATO interference, has come under extensive surveillance activities at the turn of the millennium.  The online tech journalThe Register revealed in June 2014 that British intelligence had created a secret spy base responsible for tapping undersea cables at Seeb on the coast of Oman. This is only one of a three sites as part of the GCHQ network in Oman codenamed “TIMPANI”, “GUITAR” and “CLARINET”. Iraq and Yemen are the targets of this spying. According to leaked cables by Edward Snowden, it seems telecommunication companies are making a mint by allowing intel operatives to plug in to their networks and stay silent. (This symbiotic relationship reflects the dominance of Israeli spy networks within telecommunications in the United States).

…the intelligence agency annually pays selected companies tens of millions of pounds to run secret teams which install hidden connections which copy customers’ data and messages to the spooks’ processing centres. The GCHQ-contracted companies also install optical fibre taps or “probes” into equipment belonging to other companies without their knowledge or consent. Within GCHQ, each company has a special section called a “Sensitive Relationship Team” or SRT.

BT and Vodafone/C&W also operate extensive long distance optical fibre communications networks throughout the UK, installed and paid for by GCHQ, NSA, or by a third and little known UK intelligence support organization called the National Technical Assistance Centre (NTAC).

Snowden’s leaks reveal that every time GCHQ wanted to tap a new international optical fibre cable, engineers from “REMEDY” (BT) would usually be called in to plan where the taps or “probe” would physically be connected to incoming optical fibre cables, and to agree how much BT should be paid. The spooks’ secret UK access network feeds Internet data from more than 18 submarine cables coming into different parts of Britain either direct to GCHQ in Cheltenham or to its remote processing station at Bude in Cornwall. [8]

oman-1From The Register: “GCHQ’s submarine cable tapping centre for the TEMPORA project at Seeb in Oman, codename “CIRCUIT”.   It was built alongside a commercial satellite interception station, codename “SNICK”, according to documents revealed by Edward Snowden.”

As the tawdry tale of US-NATO led destabilisation policy continues in the Middle East, directly connected to the crisis in the Ukraine and Baltic states you can be sure more spy centres will be cropping up as surveillance sophistication grows.

The NSA’s warrantless surveillance or “wire-tapping” authorised by George W. Bush’s executive order expanded the monitoring of phone calls, emails, Internet history, text messaging, and any form of communication in or outside US jurisdiction. The search warrant became a thing of the past. Violations of the First, Fourth and Fifth Amendments of the US Constitution continue to be ignored because what’s left of the Bill of rights and the Constitution itself has been so diluted that intelligence agencies and their law-makers take advantage of the myriad loopholes and executive order mandates. The Obama Administration has continued where Bush left off and extended the financing and capability of the surveillance methods. [9]

As a result of its illegal spying programs the NSA still hasn’t foiled a single terrorist plot, including all the copious amounts of suspicious activity prior to 9/11. Once we realise that the War on Terror is at root a hoax, designed to facilitate geo-strategic control, suppress domestic dissent and create leverage for political blackmail, we may see that surveillance becomes much more than a protective measure, as former workers and whistleblowers have cautioned. As Duncan Campbell observed: “The targeting of US political figures would not occur by accident, but was designed into the system from the start.” [10]

Since the recent furore of Rupert Murdoch’s News of the World scandal in which journalists were found to have listened in to calls and monitored computer files, one can imagine the capability available to the NSA and GCHQ in the context “deep black” intelligence operations. Satellite systems have become integral to this global project with a network of monitoring stations in Britain and Europe tapping into domestic communications circuits, and analysing every email, text, mobile phone call and just about any data signal that is readable – which is everything. Telecommunications companies in the UK such as BT and Vodafone have made this easier by collaborating with the spy agency and passing on details of their customers’ phone calls, email messages and Facebook entries. As reported in several June 2013 reports at various news outlets, fibre optic cables have been tapped by the NSA – with the blessing of the government.

Leaked documents from whistle-blower Edward Snowden has shown that illegal surveillance in the UK is pretty much a carbon-copy of what goes on in the United States, though with even more ubiquitous surveillance devices positioned in everyone’s direction. From overhead satellite systems extremely precise location can be secured along with a raft of data about a company or individual. International communications was said to be its original concern at the US satellite and communications base at Menwith Hill but US national security in the wake of the War on Terror has given “justification” for monitoring all and everything, ostensibly to sift for Al-Qaeda/ ISIL gold.

Keep in mind that this isn’t just a rough scan of large quantities data. According to former NSA analysts and whistle-blowers Judy Woodruff, William Binney, Russell and now Snowden, they have all confirmed that the NSA is scanning every email, recording every word of every phone call made within the United States – digitised and archived. This includes files on relevant persons deemed a domestic threat. If we take a look at the extraordinary advances in telecommunications and applications in the public domain then we must also consider the likelihood that the advances in the military-intelligence sector is decades ahead. In the context of ECHELON surveillance, Homeland Security, the SMART Grid, and the delights of technocratic automation of every conceivable suburban amenity, you can gain an understanding of what this may mean if you are one of those that don’t take to this kind of regimentation.

In the 2008 May/June issue of Radar Magazine an article written by investigative journalist Christopher Ketcham entitled: “The Last Roundup” reveals the high probability that the U.S. Government had established a database and tracking system called MAIN CORE used primarily for over eight million Americans who have been designated as threats to national security. Taking its cue from the from the global equivalent that is ECHELON, it uses the same sources of data such as internet activity, mobile, telephone, health records, marketing and financial information but extends that capability to a cross-network with undisclosed black programs. Need to check out a suspicious individual because he looked funny on a subway camera? The keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards are all archived on government supercomputers and according to Ketcham and others’ sources, also fed into the MAIN CORE database.

It also has another more immediate purpose.

With the program’s inception going back to at least the 1980s and with help from the Defence Intelligence Agency, MAIN CORE is run under the highly classified and controversial Continuity of Government (COG) operations. The COG is the principle of establishing defined procedures that allow a government to continue its essential operations in case of nuclear war or other catastrophic event. President George W. Bush, tasked with eviscerating the constitution, included in his raft of executive legislation the National Security Presidential Directive/NSPD 51 and Homeland Security Presidential Directive/HSPD-20 which served to outline the federal government’s plan for maintaining continuity in the face of such a “catastrophic emergency.” The latter is defined as “any incident, regardless of location, that results in extraordinary levels of mass casualties, damage, or disruption severely affecting the U.S. population, infrastructure, environment, economy, or government function.” Constitutional government is effectively bypassed granting Police State powers to the White House, the Federal Emergency Management Authority (FEMA) and Homeland Security (DHS).

gty_nsa_surveillance_kb_131029_16x9_992Source: abcnews.go.com

If you think that gives a government the licence to impose Martial Law based on virtually any scenario it chooses, then you’d be correct. Such a state of affairs would be lamentable for the public but a bundle of laughs for those in power, many whom would be gagging for such an opportunity. According to Ketcham’s article, it alleges that Americans listed in the MAIN CORE database, “Could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.” [11] A senior government official who had high level clearance gives a chilling observation:

“There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” [12]

This didn’t extend to the assigned terrorists such as Osama Bin Laden it seems.

What about this hypothetical attack – Another 911? We saw how the US and the world changed radically after that event. This time, the scenario may not be Al-Qaeda/ISIL bogeyman but the American citizens themselves who would be targeted. Indeed, this is exactly what’s happening.

Ketcham describes how events might play out:

“With the population gripped by fear and anger, authorities undertake unprecedented actions in the name of public safety. Officials at the Department of Homeland Security begin actively scrutinizing people who—for a tremendously broad set of reasons—have been flagged in Main Core as potential domestic threats. Some of these individuals might receive a letter or a phone call, others a request to register with local authorities. Still others might hear a knock on the door and find police or armed soldiers outside. In some instances, the authorities might just ask a few questions. Other suspects might be arrested and escorted to federal holding facilities, where they could be detained without counsel until the state of emergency is no longer in effect.” [13]

If we factor in Pre-Crime software, it is obvious that this will play an integral part in the coming SMART revolution, as a former military operative explains: >

“… the program utilizes software that makes predictive judgments of targets’ behavior and tracks their circle of associations with ‘social network analysis’ and artificial intelligence modeling tools…. “The more data you have on a particular target, the better [the software] can predict what the target will do, where the target will go, who it will turn to for help,” he says. “Main Core is the table of contents for all the illegal information that the U.S. government has [compiled] on specific targets.” An intelligence expert who has been briefed by high-level contacts in the Department of Homeland Security confirms that a database of this sort exists, but adds that “it is less a mega-database than a way to search numerous other agency databases at the same time.” [14]

Homeland Security’s homage to Phillip K. Dick’s Minority Report is already up and running with their version of an airport based Pre-Crime. Using an algorithmic “prototype screening facility” designed “to detect cues indicative of mal-intent” based on ground-breaking factors of ethnicity, gender, breathing, and heart rate” we can expect great things from those fearless protectors. Combine that still further with the FBI’s nationwide new facial recognition service and we have reason to feel that we are not so much “protected” as invasively monitored. [15]

The Terrorist Watch List garners over 200,000 new unaware individuals every year from housewives to school boys, businessmen to political commentators and ordinary citizens. As of writing, the list is well over the 1 million mark and rising exponentially. A former NSA officer discloses: “… that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to MAIN CORE, as does a Pentagon program that was created in 2002 to monitor anti-war protestors and environmental activists such as Greenpeace.” [16] In the MAIN CORE data base even these definitions are too restrictive.

We can easily arrive at the logical conclusion that if we have voiced an opinion that is contrary to the prevailing “wisdom” of government authorities then you can be rest assured there is a pretty little file just for you.

If supermarkets have a marketing profile of your purchasing patterns then imagine what your own governments have?

In 2007, online revelations concerning the NSA’s IP intercept operations and there ubiquitous presence on the internet gave us a level of surveillance that surpassed most people’s wildest imaginations. AT&T telecommunications engineer Mark Klein who participated in building the secret NSA infrastructure blew the whistle on the real designs behind his boss’s wishes. The NSA and AT&T tried their best to prevent disclosure. After a class-action lawsuit against AT&T allowing secret government surveillance of Internet traffic, a refreshingly rare instance of democracy was at work when the Electronic Frontier Foundation (EFF) released unredacted court documents related to the AT&T/NSA intercept case. This provided – in astonishing detail – the capability of surveillance software run by intelligence agencies on service providers’ networks. [17] A company called Narus developed a custom-built network surveillance system named “NarusInsight Intercept Suite” with the capable of real-time analysis of all the data passing through the most advanced and largest network nodes currently in existence.

According to the Narus website:

These capabilities include playback of streaming media (i.e. VoIP), rendering of web pages, examination of e-mail and the ability to analyze the payload/attachments of e-mail or file transfer protocols. Narus partner products offer the ability to quickly analyze information collected by the Directed Analysis or Lawful Intercept modules. When Narus partners’ powerful analytic tools are combined with the surgical targeting and real-time collection capabilities of Directed Analysis and Lawful Intercept modules, analysts or law enforcement agents are provided capabilities that have been unavailable thus far. 

This is what you might call the tip of a particularly large and hidden iceberg…

 


Notes

[1] How Big Brother watches your every move’ by Richard Gray, The Telegraph, August 2008.
[2] Ibid.
[3] ‘CCTV cameras: If they do not stop crime or catch criminals, what are they for?’ The Telegraph, 24 Aug 2009. | ‘CCTV boom has failed to slash crime, say police’ by Owen Bowcott, The Guardian, 6 May 2008.
[4] ‘CCTV in the sky: police plan to use military-style spy drones’ by Paul Lewis, The Guardian, 23 January 2010.
[5] ‘Drones Are Taking to the Skies in the U.S.’ Los Angeles Times February 18th, 2013.
[6]‘The National Security Agency and Global Electronic Surveillance’ by Duncan Campbell, New Statesman August 12, 1988.
[7] ‘ECHELON: America’s Global Surveillance Network’ by Patrick S. Poole 1999/2000.
[8] ‘Federal Judge Finds N.S.A. Wiretaps Were Illegal’. By Charlie Savage, James Risen, The New York Times, March 31, 2010.
[9] ‘GCHQ’s Middle East cable tap centre revealed’,The Register 3rd June, 2014.
[10] op. cit. Campbell.
[11] ‘The Last Roundup’ By Christopher Ketcham, Radar Magazine, April 29, 2008.
[12] Ibid.
[13] Ibid.
[14] Ibid.
[15] ‘Homeland Security Moves Forward with ‘Pre-Crime’ Detection’CNET, October 8th, 2011. | ‘FBI to Launch Nationwide Facial Recognition Service’ Nextgov. October 8th, 2011.
[16] Ibid.
[17] https://www.eff.org/nsa/faq/

Satan’s Little Helpers VII: Mind War

“An academic paper written for the Air Force in the mid-1990s mentions the idea of a weapon that would use sound waves to send words into a person’s head. “The signal can be a ‘message from God’ that can warn the enemy of impending doom, or encourage the enemy to surrender.” In 2002, the Air Force Research Laboratory patented precisely such a technology: using microwaves to send words into someone’s head. The patent was based on human experimentation in October 1994 at the Air Force lab, where scientists were able to transmit phrases into the heads of human subjects.

   — Washington Post article on electronic harassment and voices in the head, January 14, 2007.


In 1991, Paul Vallely, a one-time senior military analyst for FOX News, retired from the US Army as Deputy Commanding General, US Army, and Pacific. He served 32 years, more than 15 of them in Special Operations, Psychological and Civil-Military Operations. After co-authoring Endgame – Blueprint for Victory for Winning the War on Terror, he wrote a military paper with the late Lt. Col. Michael Aquino in 1980 entitled: From PSYOPS to Mindwar: The Psychology of Victory.

In the introduction we read:

“Like the sword Excalibur, we have but to reach out and seize this tool; and it can transform the world for us if we have the courage and the integrity to change civilization with it. If we do not accept Excalibur, then we relinquish our ability to inspire foreign cultures with our morality. If they then desire moralities unsatisfactory to us, we have no choice but to fight them on a more brutish level.” [1] [Emphasis mine]

The above text is breath-taking in its assumed superiority and delusional romanticism in keeping with present authoritarianism. Mind War has a lot to do with deception and perception management. It is also about tactical and strategic war for the mass mind. Most importantly, it concerns the imposition of a neo-feudalist mentality that naturally sees others as inferior and in desperate need of management. You might say this is military PSYOPS from a Neo-Conservative perspective. It does not exclude the use of a chilling warning that they must descend to a level that is “brutish” in order to fulfil their aims.

This seems to be what is taking place within the military-intelligence apparatus at this time – the philosophy of the brute who masks his core deviance in “civilised” forms that must be must be let loose in response to the “unsatisfactory” moralities of normal people which make no sense at all to the psychopath. It is the management and eventual eradication of those that harbour conscience as the only option open to them.  Not only is this a typical regurgitation of an American fascist doctrine so popular with the Straussian Zio-Cons, it could also said to fit in rather nicely with the principles of a Satanic path where the perceived “whole truth” is “forced into existence” arrogantly attempting to displace the will of Creation.

satan-shown-as-the-fallen-angel-after-having-been-smittenThose following a form of existential Satanism view themselves as the subjective centre of the universe, and strive to elevate the individual Self as a form of exclusive “self-love.” A Satanist views him/herself as his or her own god of matter in waiting. The La Veyian Satanist maintains that those who find themselves naturally aligned with Satanism should strive to separate themselves from the herd mentality adopting an “enlightened individualism”; to maintain it as much as possible in order to learn to exploit the naïveté and misguided altruism of the masses. This was exactly the same belief which came out of the Age of Enlightenment and the Illuminism responsible for its development. As Anton LaVey states: “Are we not all predatory animals by instinct? If humans ceased wholly from preying upon each other, could they continue to exist?”

A fairly succinct description from the ceremonial psychopath.

According to the Temple of Set website there is an impression of romantic science and freedom fighting for the soul which has its roots in the original LaVey Church of Satan where this God of the Material plane was understood to be “an authentic metaphysical presence: a being not evil, but rather independent, assertive, and creative – a true Prince of Darkness after the imagery of Milton, Blake, Baudelaire, and Twain.”

Quite true. However, if it were just a question of “personal Godhood” and the observation of ethics and responsibility then there would be no distinction to make save the semantics of individual and collective freedom. Knowledge as a means for self-sucking power and knowledge as an energy disbursement based around sharing seems to be the obvious and key distinction. In other words: service to self or service to others? The Satanist as deceiver has been left out of the seemingly pious and humble explanations of practicing Satanists, most of who are pandering to the dilettante. Embroider the concepts with suitable romance and chemistry of the cool and the pied piper wins every time.

Regardless, on the lower tiers of such occult theology, Aquino and his ilk will no doubt attract their naïve followers charmed by flowery words and earnest intentions. They are nevertheless, the “Chosen Ones” and part of the pyramid of diminishing returns; a monolithic culture of predation that requires more and more amounts of energy in order to sustain itself. Deception is the primary mode of acquiring such energy.

In summary, “the world inside the devil” is concerned with the occult maxim of “Will to Power,” tied as it is to one’s own individualistic intent and will – which is effectively a God in Diapers spellbound by phenomena and manipulation of the material and para-physical worlds. Therefore, for those who are by nature, self-seeking adherents to an exclusive Self-Godhood, the results will be strictly material in every sense of the word, which is why “The Absolute” of the material plane is worshipped in Satanism with an inherent and chosen blindness to its obvious limitations. The tangible effects of individual power as the arbiter of one’s own “truth” is entirely subjective thus insubstantial and transistory. One’s psychic power will be impressive as long as one relishes the Kundalini-chemicals and the biology to sense it. Once these feats of daring-do expire as a flame that rapidly burns up a limited provision of “fuel,” one can imagine that such a Faustian bargain will require recompense. The worshipping of personal power will then give you the same – a primal and ultimate absorption into Dark matter.

In reality, whether on the periphery in the early stages, it is conceivable that such Satanic outposts are openings to the honeycomb networks of further recruits to be controlled in a variety of ways once they have reached a suitable “degree.” This “brutish level” of which Aquino and Vallely speak incorporates all manner of propaganda operations spawned from a shadow government’s obsession with mass mind control experiments so valued by the CIA and NSA. Propaganda is never enough. Controlling the mind, body and soul of the populace is the goal.

If that sounds as if it’s veering into conspiratorial paranoia, let’s not forget the history of deep black operations in America. Richard M. Dolan’s research reminds us: “By early 1969, teams within the CIA were running a number of bizarre experiments in mind control under the name Operation Often. In addition to the normal assortment of chemists, biologists, and conventional scientists, the operation employed psychics and experts in demonology.” [2] Indeed, Operation Often had its roots in the 1950 and 60s mind control experiments of Dr. Ewan Cameron and the LSD experiments of Sidney Gottlieb, mentioned previously. The evolution of extremes meant that the CIA behaviourists studied the arcana of the occult underground in the hope of utilising its principles. [3]

Returning to Mind War the following extract is equally pertinent:

For the mind to believe in its own decisions, it must feel that it made those decisions without coercion. Coercive measures used by the operative, consequently, must not be detectable by ordinary means. There is no need to resort to mind-weakening drugs such as those explored by the CIA; in fact the exposure of a single such method would do unacceptable damage to Mind War’s reputation for truth. Existing PSYOP identifies purely-sociological factors which suggest appropriate idioms for messages. Doctrine in this area is highly developed, and the task is basically one of assembling and maintaining individuals and teams with enough expertise and experience to apply the doctrine effectively. This, however, is only the sociological dimension of target receptiveness measures. There are some purely natural conditions under which minds may become more or less receptive to ideas, and Mind War should take full advantage of such phenomena as atmospheric electromagnetic activity, air ionization, and extremely low frequency waves.  [Emphasis mine] [4]

As we have seen, behaviour modification, ultrasonics and brain stimulation obsessively researched in pre and post-war Britain and America was followed by the study of the effects of very-low-frequency sound (VLF)—the opposite of ultrasonics—as a new tool for war and social control. Declassified Pentagon reports show the application of Lowe Frequency Sound (LFS) for interrupting and eliminating the productive capacity of civilian populations during war time. It has been known since at least the experimental days of Nikola Tesla, that natural wave formation exists between the earth and the ionosphere which could be used to propagate very-low-frequency radiation and direct it to pre-selected coordinates on the earth. Further studies have shown that this had massive implications for mind control in that such low frequencies have a profound capacity to affect the electrical behaviour of the brain. As the alpha waves of the human brain oscillate at 8-12 hertz per second and ionospheric waves at 8 hertz this indicates that the latter is an excellent harmonic carrier of LFS waves which are near on impossible to detect due to their size. Manipulating the minds of a large number of people is therefore not so fantastic.

Earth-Wallpaper

© infrakshun

The Establishment and its military-intelligence apparatus has assiduously fought public and media attention on foreign or domestic capabilities of microwave and radiation technology since the early 1960s. This is true even for government departments, partly in fear of provoking restrictions on the use of radar but more importantly, drawing attention to its own experimentation in these fields, including the rise in so-called “non-lethal” weaponry. Though occasional fears were voiced in the US Senate and European governments about the effects of radiation from televisions and partial concerns about microwave ovens, very little action was taken to investigate the sources and possible dark-side applications of this technology at the military level.

Most scientists dismiss the idea that electromagnetic radiation beamed at the brain can alter the brain and produce changes in behaviour. Environmental degradation and economic disparity prove much more of an impediment to innovation let alone the advancement of technology developing along sinister lines. It is a favourite blind-spot of the liberal left as it is the moderate Conservative. Once again, this is testament to human wishful thinking. The parasite, if it reaches significant numbers and continues to feed on its host will pay no heed to its demise. It will willingly go down with the ship if need be. Similarly, expenditure and innovation in the wrong hands follows the path of least resistance and in this case it is ignorance which furnishes the needed circumnavigation of checks and balances which the general public assumes to be in place.

From an array of source publications at the back of Mind War it is obvious that Aquino was drawing from information illustrated in the following extract which shaped his vision of the future and the basis from which one branch of current mind technology is developing.

We are told that:

“ELF (extremely low frequency) waves (up to 100 Hz) … are naturally occurring, but they can also be produced artificially … ELF waves are not normally noticed by the unaided senses, yet their resonant effect upon the human body has been connected to both physiological disorders and emotional distortion. Infrasound vibration (up to 20 Hz) can subliminally influence brain activity to align itself to delta, theta, alpha, or beta wave patterns, inclining an audience toward everything from alertness to passivity. Infrasound could be used tactically, as ELF waves endure for great distances; and it could be used in conjunction with media broadcasts as well.” [5]

If the human brain can be aligned to infrasound through media broadcasts, what does that say about our ability to think critically and access thoughts which are truly our own? What is the stage and level of application after more than thirty years since the publication of MindWar ? Moreover, would we even know if we were on the receiving end of this “doctrine”?

fundamentals_effects

c/o http://www.narda-sts.us/ High Frequency and Low Frequency effects on the human body

Advocates of a world-wide conspiracy of Satanic Ritual Abuse believed that the reason that cases have not resulted in prosecution is due to the accused having the protection of the courts and the government. This is undoubtedly true in some, perhaps even the majority of cases. However, as we have discovered, the divide and rule formula of the Pathocracy keeps all parties blind.

As Aquino was busy clearing “his good name” however unconvincingly, he rightly mentioned a book called Michelle Remembers which started the whole hysteria of “satanic panic.” Countless accusations and allegations led to the imprisonment of the innocent, while giving cover to the guilty. It was in fact, a work of fiction that was presented as fact and later shown to be a hoax. [6]

Author and historian Laura Knight-Jadczyk offers up a controversial hypothesis in relation to the so-called grey alien abduction theory *and SRA,[7] both of which arrived on the scene at exactly the same time. Allegations of SRA were whipped up into a frenzy of religious persecution and “‘moral entrepreneurs’ both fed the fires of prosecution and earned a good living from it.” She asks: “If there are thousands of baseless accusations of SRA and thousands upon thousands of cases of unverifiable alien abductions, from where do they originate?” [8]

Knight-Jadczyk reiterates the puzzle that children would not make up stories of such bizarre acts of abuse which are often so explicit and beyond the knowledge of children of preschool age. Stories are also taken at face value by prosecutors, therapists, police officers and parents. Sometimes they are correct but frequently they are wrong. While establishing that many ufology and New Age operatives are often part of counter-intelligence programs (CoIntelpro) designed to hoodwink the populace into dead-end alley ways of awareness, she mentions certain figures coming together at the same juncture, suggestive of intelligence manoeuvres designed to manipulate the public mind.

In keeping with Mind War and the above hypothesis, Richard M. Dolan offers us more to chew on:

By the early 1970s, there were already means available to alter the moods of unsuspecting persons. A pocket-sized transmitter generating electromagnetic energy at less than 100 milliwatts could do the job. This is no pie-in-the-sky theory. In 1972, Dr. J.F. McDonald testified before the House Subcommittee on Oceans and International Environment on the issue of electromagnetic weapons used for mind control and mental disruption. He stated:
[T]he basic notion was to create, between the electrically charged ionosphere in the higher part of the atmosphere and conducting layers of the surface of the Earth, this neutral cavity, to create waves, electrical waves that would be tuned to the brain waves. …About ten cycles per second. …You can produce changes in behavioral patterns or in responses.

The following year, Dr. Joseph C. Sharp, at Walter Reed Hospital, while in a soundproof room, was able to hear spoken words broadcast by ‘pulsed microwave audiogram.’ These words were broadcast to him without any implanted electronic translation device. Rather, they reached him by direct transmission to the brain. [9] [Emphasis mine]

Aquino’s prescient statement that psychological operations: “… should take full advantage of such phenomena as atmospheric electromagnetic activity, air ionization, and extremely low frequency waves,” then takes on a much richer meaning. This posits the idea that a mass mind control program may be in operation where some Satanic Ritual Abuse and alien abduction scenarios are beamed into our very heads. [10]

gwen-satellite

Gwen Towers and satellite networks

Unlikely as that may seem, the technology to manipulate our collective minds is already in operation in the military-corporate sector. Moreover, commercial patents finding their way to the public arena are many years, possibly several decades behind military applications. New innovations away from the media and public scrutiny will be far in advance of anything available in the market place and will not be designed for wholly benevolent applications – of that we can be certain. For instance, the NSA’s electronic surveillance system is already monitoring and handling millions of data on the global population every hour of every day. Despite the revelations from Edward Snowden and other whistleblowers before him we may have a way to go before we hit the bottom of this particular deep, dark barrel.

Consider this:

“Each of us has a unique bioelectrical resonance frequency in the brain, just like we have unique fingerprints. With electro-magnetic frequency (EMF) brain stimulation fully coded, pulsating electromagnetic signals can be sent to the brain, causing the desired voice and visual effects to be experienced by the target. This is a form of electronic warfare. U.S. astronauts were implanted before they were sent into space so their thoughts could be followed and all their emotions could be registered 24hrs a day.” [11]

Michael Persinger is a Canadian clinical neurophysicist and professor of neuroscience with over 200 peer-reviewed publications based around his work on the effects of electromagnetic fields upon biological organisms and human behaviour. Persinger also has voluminous work in the field of parapsychology and altered states of consciousness and has worked closely with the US Navy after attracting their attention with his paper entitled ‘Possible cardiac driving by an external rotating magnetic field’ in 1973. It is said that Persinger’s experiments were able to replicate alien abduction, and offer evidence of telepathy and remote viewing through the use of what he calls a “Magic Helmet” which is equipped with magnets allowing a low-level magnetic field to be generated and beamed at the temporal lobe.

Persinger’s work with the military comprised of using varying fields of low intensity in the ultra-low frequency (ELF) range and where he was able to make numerous rats sick and with consistent results. As a result, he is alleged to have been one of those who took part in Project Sleeping Beauty which was created by the NSA to develop electromagnetic weapons for behaviour modification. [12]  A participant in one of Persinger’s experiments in the 1990s, Dr. Susan Blackmore of Plymouth University was in no doubt that by applying a “silent and invisible force” into her brain he was able to create a specific experience for her.

Blackmore states:

“He claimed that he was imitating the basic sequences of the processes of memory and perception and that, by varying those sequences, he could control my experience. Could he have done it from a distance? Could it be done on a wider scale? Suddenly prospects of magnetic mind control seem an awful lot worse than the idea of being abducted by imaginary aliens…” [13]

That is not to say that all “alien” abductions are imaginary. However, what we can imagine is how such “progress” could be manifesting in our present era of rapid technological advancement and it doesn’t look pretty. We are in the technotronic era of mass mind control with the possibility that applications have advanced to such a degree that instead of targeting just individuals, whole populations can be affected.

Up until 2013, HAARP (High Frequency Active Auroral Research Program) was a vital piece of experimental armoury in U.S. military defence officially designated as an advanced weather research project focused on the ionosphere. Based in Garkona, Alaska, it is jointly funded by the U.S. Navy, the U.S. Air Force, the University of Alaska, and the Defense Advanced Research Projects Agency (DARPA).

Its true nature has always been cloaked in mystery due in part, to an official stance of “national security.” It seems part of the experimentation involves the use of electromagnetic frequencies and directed energy beams pulsed into the delicate upper layer of the atmosphere called the ionosphere around 1000 km above the Earth’s surface. The aim is to heat up specific areas which can create lenses of magnified effects. On the official website at http://www.haarp.alaska.edu/we can read: “HAARP is a scientific endeavor aimed at studying the properties and behavior of the ionosphere, with particular emphasis on being able to understand and use it to enhance communications and surveillance systems for both civilian and defense purposes.”

Though the creation and development of HAARP is shrouded in secrecy, Physicist Dr. Bernard Eastlund has given us a lot of food for thought from his US patent entitled: “Method and apparatus for altering a region in the earth’s atmosphere, ionosphere, and/or magnetosphere” filed in 1985. If such a patent can be made available publicly you can be sure classified research is well in advance of similar prototypical research.

From the patent, he states:

[The] temperature of the ionosphere has been raised by hundreds of degrees in these experiments.

A means and method is provided to cause interference with or even total disruption of communications over a very large portion of the earth. This invention could be employed to disrupt not only land based communications, both civilian and military, but also airborne communications and sea communications. This would have significant military implications.

It is possible … to take advantage of one or more such beams to carry out a communications network even though the rest of the world’s communications are disrupted.

[This invention] can be used to an advantage for positive communication and eavesdropping purposes.

Exceedingly large amounts of power can be very efficiently produced and transmitted.

This invention has a phenomenal variety of … potential future developments. Large regions of the atmosphere could be lifted to an unexpectedly high altitude so that missiles encounter unexpected and unplanned drag forces with resultant destruction or deflection. Weather modification is possible by, for example, altering upper atmosphere wind patterns or altering solar absorption patterns by constructing one or more plumes of atmospheric particles which will act as a lens or focusing device. Ozone, nitrogen, etc. concentrations in the atmosphere could be artificially increased.

Electromagnetic pulse defenses are also possible. The earth’s magnetic field could be decreased or disrupted at appropriate altitudes to modify or eliminate the magnetic field.

Though differing in scope and logistical capabilities, this is exactly the type of experimentation which HAARP is exploring,  building on Nicola Tesla’s extraordinary research into electromagnetism, earth energies and its relationship to the bio-chemical nature of the human body. Though many researchers posit HAARP was in reality a vast geo-engineering project linked to reducing climate change by saturating the atmosphere with specific chemicals – the infamous chemtrails controversy – it seems this was a sub-division of experimental research and a likely cover for something far sinister. The real action was in long rumoured experimental mass mind control and in line with the US military’s goal of “full-spectrum dominance” by 2020.

HAARPThe High Frequency Active Auroral Research Program (HAARP)

Author and researcher Nick Begich Jr. and his influential book: Angels Don’t Play This HAARP suggested that experiments in vibrating the ionosphere have greatly advanced  to the extent that earthquakes, tsunamis and hurricanes can be triggered (Hurricane Katrina, 2005, Haitian earthquake of 2009) and localised as part of an on-going geostrategy. More importantly, he theorises that it is the product of decades of research which has resulted in a mind control device of considerable power. The HAARP system is capable of transmitting on an array of frequencies – including that of the human brain.

But is that true? Conclusive evidence is obviously hard to come by. However, reading between the lines of decades of proven experiments in mind programming, huge advances in military technology such as Silent Sound Spectrum is very far from fantasy. Begich’s claims and that of other researchers are supported by public patents relating to HAARP, which include:

  • C. W. Hansell (1945) “Communication system by pulses through the Earth”, U.S. Patent 2,389,432.
  • R. L. Tanner (1965) “Extremely low-frequency antenna”, U.S. Patent 3,215,937.
  • G. F. Leydorf (1966) “Antenna near field coupling system”, U.S. Patent 3,278,937.
  • B. J. Eastlund (1987). “Method and apparatus for altering a region in the Earth’s atmosphere, ionosphere, and/or magnetosphere”, U.S. Patent 4,686,605.
  • B. J. Eastlund (1991). “Method for producing a shell of relativistic particles at an altitude above the earths surface”, U.S. Patent 5,038,664.

The history of DARPA’s main avenue of research has always been neuroscience, nanoscience and cybernetics adapted to military applications. Though often designated as a classic conspiracy theory and therefore with a “nothing- to-see-here” implications, it appears even the European Parliament expressed unease at the HAARP project in January 28 1999 stating in the minutes of the document “Resolution on the environment, security and foreign policy A4-0005/1999” that it: “… considers HAARP by virtue of its far-reaching impact on the environment to be a global concern and calls for its legal, ecological and ethical implications to be examined by an international independent body before any further research and testing.” It highlights the United States’ refusal to give more information on the nature of HAARP as “regrettable.”

The late Rauni Kilde MD, former Chief Medical Officer of Finland, lectured and wrote about an NSA Mind Control system using radio implants and microchips connected to satellites that are similar to what can be find in past “NSA PSYOPS” documents. Kilde writes: “With electro-magnetic frequency (EMF) brain stimulation fully coded, pulsating electromagnetic signals can be sent to the brain, causing the desired voice and visual effects to be experienced by the target. This is a form of electronic warfare.” Most certainly. And this form of extreme harassment is increasing, though by its very nature, it is notoriously difficult to obtain the evidence, assuming of course that prosecution is a viable option.

Citizens Against Human Rights Abuse (CAHRA) supports many of the claims of systematic surveillance stalking and virtual torture via electromagnetic waves and electronic interference not just within the U.S. The disturbing nature of the NSA and its famously secret activities no doubt produces its fair share of internet bunkum. Equally, there is far too much correlative and corroborative evidence from a variety of sources to suggest that it is merely conspiracy “cranking” at work. It may well be all in the mind, but not in the way some may prefer to think. The capabilities of the U.S. military’s on going EMF strategies to harass, intimidate and even murder selected individuals was highlighted in a Project Censored paper from a human rights perspective and also explores the testing and deployment of these weapons.

3183322190_eb492da7f9

Author of The Mind Controllers Dr. Armen Victorian wrote about the military use of electromagnetic microwave and mind control technology in a 1998 article for Lobster Magazine called: ‘Microwave and Mind Control Technology.’ He explores the capability of cloning human EEGs for targeted mind control purposes where a variety of emotional responses and instinctive reactions: “… have been identified and isolated from the EEG, as ‘emotion signature clusters’.” He goes on to state: “Their relevant frequencies and amplitudes have been measured, then the very frequency/amplitude cluster is synthesised and stored on another computer, each one of these negative emotions properly and separately tagged. “They are then placed on the Silent Sound carrier frequencies and will silently trigger the occurrence of the same basic emotion in another human being.” [14]

It appears that The Tri-Service Electromagnetic Advisory Panel (TERP) represents the interests of all three military services in the U.S. It is still conducting some of the most advanced research in the world which in turn stems from the investigations made by the Russian pioneers in mind control technology during the early 1960s and 1970s. The U.S. Air Force has been research into ocular injury by exposure to millimetre wave system, bio-effects of High Power Microwave in low microwave regions (S band) and Radio Frequency Radiation (RFR). The use of High Power Microwave (HMP), by each of the military services seems to be commonplace. Judging by the wealth of research on the subject the US Navy is also getting extremely excited at the prospect of utilizing electro-magnetic waves as a psychotronic weapon.

We may then understand how invasions like Iraq represented an opportunity to test out new developments in scalar and microwave weaponry and other aberrations. As Guardian columnist John Sutherland put it: “The battlefield will be the testing ground for the U.S. samurai. No more rhesus monkeys or pigs but real, live Iraqis.” According to Dr. Oliver Lowry who has had the dubious honour of working for the U.S. military on several classified projects, Iraqi soldiers may have been unwitting guinea pigs to further such advances.

These include:

… Silent Sound Spread Spectrum (SSSS), sometimes called SQUAD…’According to statements made by captured and deserting Iraqi soldiers, however, the most devastating and demoralizing programming was the first known military use of the new, high-tech, type of subliminal messages referred to as ultra-high-frequency “Silent Sounds” or “Silent Subliminals”. Although completely silent to the human ear, the negative voice messages placed on the tapes alongside the audible programming by PSYOPS psychologists were clearly perceived by subconscious minds of the Iraqi soldiers and the silent messages completely demoralized them and instilled a perpetual feeling of fear and hopelessness in their minds.” [15]

We live our lives inside the earth’s magnetic field, with its waves descending into the North Pole and emerging from the South Pole. The electromagnetic-wave conduction of the ionosphere is made up of electrically charged particles which protect us from solar winds. The Schumann Waves and their resonance consist of various natural waves produced by electrical discharge in this part of the atmosphere, the strongest of which is about 7.8 Hz. The electromagnetic space between the earth and he ionosphere contain these naturally occurring waves which occur at extremely low frequency (ELF).

What is interesting for those seeking new ways to control is the fact that the waves of the earth correspond exactly to human brain waves. As decades of hypno-programming and mind control research has shown governments are fascinated by biorhythms, magnetism, blood and geomagnetic resonance. Combine this with high-end advances in military applications gift-wrapped in a transhumanist belief system – we have a recipe for a technocratic control system that is historically unparalleled.

One theory for HAARP is based around the long held view that if these technophiles can create an artificial grid of geomagnetic waves by contouring and the earth’s natural geomagnetic field, then manipulating humanity’s brain waves would be the ultimate prize. This would take care of a lot of messy problems such as independent thinking and the common man’s quest for freedom. Obedience to the World State in formation would  be child’s play.  Such a scenario would mean that an artificial grid would be created by employing very low frequency (VLF) ground waves on the ground by a network of Ground Wave Emergency Network transmitters (GWEN). Constructed in 1980 around 58 have been officially erected across the United States, though 300 has been the aim. The GWEN towers were officially built in order to maintain defence communications in case of nuclear war, yet they have been plagued by the same problems from which they were designed to protect telecommunication systems. Yet, VLF is known to alter human brain waves with transmissions between 150 and 175 KHz.

According author and expert in electrical engineering and human biorhythms Dr. Robert O. Becker the purpose of GWEN is unequivocal, describing them as: “… a superb system, in combination with cyclotron resonance, for producing behavioural alterations in the civilian population.”  In his book Crosscurrents: The Perils of Electro-pollution  he wrote:

“The average strength of the steady geomagnetic field varies from place to place across the United States. Therefore, if one wished to resonate a specific ion in living things in a specific locality, one would require a specific frequency for that location. The spacing of GWEN transmitters 200 miles apart across the United States would allow such specific frequencies to be ‘tailored’ to the geomagnetic-field strength in each GWEN area.” [16]

More interesting still is the fact that the electromagnetic VLF signal travels via waves that stay close to the ground rather radiating out into our atmosphere; hanging heavy at the height of cities and homes. An artificially induced magnetic cavity straddles the whole of the United States saturating land and people in radio, Wi-Fi and low frequency waves.

Researcher and author C.B. Baker from his article ‘New World Order & ELF Psychotronic Tyranny’ observes:

“The alpha-wave frequency of the human brain is eight to twelve hertz (cycles per second). The ionospheric wave guide oscillates at eight hertz, making it a good harmonic carrier of low-frequency sound (LFS) waves (infrasound). These are such long waves that they are virtually impossible to detect. Pentagon reports apply LFS to demobilising the productive capacity of a civilian population in time of war.”

Working in partnership with HAARP, the GWEN towers may be acting as transducers for specifically modified electromagnetic waves which are then programmed to change the mood of people in specific states to an entire nation. In the realm of speculation but a very real possibility nonetheless. In combination with a new technocracy our technology in the military and defence sector desperately needs further exploration and oversight from independent monitors, backed up by law.

rat

© infrakshun

And so here we are in 2013. Could HAARP be doing exactly the same by targeting vast numbers of people at specific coordinates? Geoengineering the weather seems to be the dominant theme in relation to HAARP objectives, but is it the primary purpose? We must bear in mind that most of the patents in the public domain are unlikely to reflect the true picture. Rather, they may be largely disinformation, damage control or tangential research deemed nonthreatening and which camouflage deep black operations far from oversight. If the capture and modulation of electromagnetic fields is taking place to control brainwave patterns on a massive scale then it logically follows that it is part of the same recurring desire for complete control of the global population.

Generating enormous amounts of fear from an epidemic of Satanic abuse, alien abductions, paedophile predators; climate change; religious Jihad and Judgement Day, all filtered through a compliant and solipsistic media is the order of the day. It doesn’t mean that there is no truth to the accusations and that they do not take place – perhaps all the above examples have some aspect of a core truth. But what if these memes are reinforced by beaming them straight into our heads? Perhaps it is more about the way in which these facts and hypotheses are presented, riding as they do atop the runaway trains of personal beliefs and assumptions; that the frequency, context and root cause for such horrors may be very different than we think. Qui bono? Who benefits? This is the question that needs to be asked over and over.

For persons such as Aquino and so many other occultists deep in the pit of military-intelligence, they are waiting to make their move to exert total control which is rationalised through philosophy, religion or corporatism. As occult expert Peter Levenda stated there is: “… a peculiar breed of dark magician …who are little more than frustrated SS officers yearning for the day when a magically oriented totalitarianism regime takes the field once more and settles the world’s problems by the oldest and simplest expedient available, the two step formula of exclusion and annihilation.” [17]

 


* Alien Abduction: “subjectively real memories of being taken secretly against one have will by apparently nonhuman entities and subjected to complex physical and psychological procedures.” (The Abduction Experience: A Critical Evaluation of Theory and Evidence by Stuart Appelle, Journal of UFO Studies, n.s. 6, 1995/96, pp. 29–78).

Notes

[1] p.7; From PSYOPS to Mindwar: The Psychology of Victory by Colonel Paul E. Valley and Major Michael A. Aquino, 1980. | http://www.xeper.org/maquino/nm/MindWar.pdf
[2] op. cit. Dolan (p. 361)
[3] Even as early as 1964 the use of Occult rituals and themes was an accepted part of Psychological warfare and planning. Africa was a continent that was not only exploited for its resources and people but for “Witchcraft, Sorcery, Magic and Other Psychological Phenomena” which was one study underwritten by the same CIA front, the (MKULTRA) Human Ecology Fund. This gathered valuable data for the Bureau of Social Science Research (BSSR) the source of countless studies of Psychological Warfare on Eastern European countries. The Belgian administration in the Congo was one beneficiary of such studies allowing the power struggle within the Republic to side with a pro-US government.
[4]
op. cit. Valley, Aquino (pp.9-10)
[5]
op. cit. Marshall
[6]
‘Michelle Remembers: the Debunking of a Myth’ by Denna Allen and Janet Midwinter, The Mail on Sunday, Spetember 30, 1990; and from the Pagan Protection Centre an article by Kerr Cuhulain ‘Michelle Remembers’excerpt from reader comments, on the online bookstore Amazon.com: “I am speaking as a former ‘ritual abuse survivor’ who has now disavowed all of my ‘repressed memories’. This book is dangerous. And, I completely disagree with everyone who says ‘doesn’t matter if it’s fact or fiction’? Are you nuts?? People have had their lives ruined over allegations like this. This book played a major part in my ‘memories’. My advice is that ‘ritual abuse survivors’ need to find decent therapists.’”
[7]
“The Greys (or Grays, also known as Roswell Blue-Greys, Zetas or Reticulians after the ζ Reticuli star system) are a type of alleged intelligent extraterrestrial life that appears most commonly in modern UFO conspiracy theories and other UFO-related paranormal phenomena, especially the alien abduction phenomenon. Greys have largely replaced “little green men” as the stereotypical extraterrestrial of popular culture.” – (Wikipedia online encyclopaedia at wikipedia.org).
[8]
‘CoIntelpro is at work in the New Age’ By Laura Knight-Jadczyk , June 12, 2003. http://www.cassiopaea.org.
[9] op. cit. Dolan (p. 382)
[10]
While the use of HAARP and “chemtrails,” ionsphere applications are not within the remit of this book to explore further, readers are encouraged to do their own research into these subjects as the implications are far from pie in the sky.
[11] “When a 5-micromillimeter microchip (the diameter of a strand of hair is 50 micromillometers) is placed into optical nerve of the eye, it draws neuroimpulses from the brain that embody the experiences, smells, sights and voice of the implanted person. Once transferred and stored in a computer, these neuroimpulses can be projected back to the person’s brain via the microchip to be re-experienced. Using a RMS, a land-based computer operator can send electromagnetic messages (encoded as signals) to the nervous system, affecting the target’s performance. With RMS, healthy persons can be induced to see hallucinations and to hear voices in their heads. || Every thought, reaction, hearing and visual observation causes a certain neurological potential, spikes, and patterns in the brain and its electromagnetic fields, which can now be decoded into thoughts, pictures and voices. Electromagnetic stimulation can therefore change a person’s brainwaves and affect muscular activity, causing painful muscular cramps experienced as torture.” – from ‘Microchip Implants, Mindcontrol, and Cybernetics’ by Rauni-Leena Luukanen-Kilde, MD Former Chief Medical Officer of Finland, SPEKULA, 3rd Quarter, October 23, 1999.
[12]‘Mind control’ by Glenn Krawczyk, New Scientist, 17 December 1994, Magazine issue 1956.
[13] ‘Alien abduction’ By Susan Blckmore New Scientist, 19 November 1994, 29-31.
[14] The Mind Controllers By Dr. Armen Victorian, Lobster Magazine,1998.
[15] Ibid.
[16] p.303; Becker, Robert Crosscurrents: The Perils of Electro-pollution (1990).
[17] p.343; Unholy Alliance: A History of Nazi Involvement with the Occult by Peter Levenda, published by Continuum books, 2002 | ISBN-10: 0826414095