Kategori arşivi: Teknoloji
A brain-computer interface is a nice thing to dream about, but it’s not exactly around the corner. We are always getting closer, however. Newly developed carbon microthreads could serve as the long-lasting kind of brain implants you’d need to be able to mind-control computers.
The new microthread electrodes, designed at the University of Michigan, are tiny, just seven micrometers thick.That’s about 100 times thinner than traditional electrodes used to study animal brains. With this small form factor, the electrodes can be covered in proteins that make the brain not reject them immediately, and then be wired into the brain itself, where each electrode can monitor the firing of one specific neuron.
We already have electrodes that operate on the same basic principle, but they tend to be too large for extended use. Over time as the brain begins to build scar tissue around them and they become ineffective. So far, it looks like these tiny microthreads might be able to avoid that problem, meaning they could be used by quadriplegics to mind-control bionic limbs for a lifetime or serve as some other sort of brain-computer interface indefinitely. We may not be wiring computers to brains left and right quite yet, but when we are, tiny electrodes like this will probably come in handy. [Technology Review]
If a human thinks a command, a flying drone will obey. A Chinese team has shown how to control a quadrotor robot using brain signals alone as a futuristic twist on the saying, "Look ma, no hands!"
The researchers from Zhejiang University used a commercial electroencephalography (EEG) headset to interpret brain signals as commands for the hovering drone, according to New Scientist. They released a video showing how a man in a wheelchair can tell the drone where to go — a taste of what they will present at the Ubiquitous Computing Conference in September.
Sample commands include moving the drone forward by thinking "right," or turning it clockwise by thinking "left." The human user can even blink both eyes to tell the drone to snap a picture.
Such quadrotors have already shown impressive swarm tactics and coordination in aerial ballets ranging from playing the "007" theme from James Bond films to putting on dazzling laser light shows. A futuristic quadrotor has even featured in a video game ad that later inspired the U.S. military to begin thinking about building such robots.
The Chinese researchers first envision using the mind-controlled drones to empower disabled people or hold friendly aerial battles between drones. But it’s not hard to imagine a more refined version of the technology that could possibly allow soldiers to order around a swarm of much smarter drones on future battlefields.
This site contains materials from other clearly stated media sources for the purpose of discussion stimulation and content enrichment among our members only. whatsonningbo.com does not necessarily endorse their views or the accuracy of their content. For copyright infringement issues please contacteditor
That the stars of America’s national security establishment are being devoured by out-of-control surveillance is a form of sweet justice
General John Allen, the US’s leading military commander in Afghanistan, is being investigated over his ‘communications’ with Jill Kelley. Photograph: Jalil Rezayee/EPA
The Petraeus scandal is receiving intense media scrutiny obviously due to its salacious aspects, leaving one, as always, to fantasize about what a stellar press corps we would have if they devoted a tiny fraction of this energy to dissecting non-sex political scandals (this unintentionally amusing New York Times headline from this morning – "Concern Grows Over Top Military Officers’ Ethics" – illustrates that point: with all the crimes committed by the US military over the last decade and long before, it’s only adultery that causes "concern" over their "ethics"). Nonetheless, several of the emerging revelations are genuinely valuable, particularly those involving the conduct of the FBI and the reach of the US surveillance state.
As is now widely reported, the FBI investigation began when Jill Kelley – a Tampa socialite friendly with Petraeus (and apparently very friendly with Gen. John Allen, the four-star U.S. commander of the war in Afghanistan) – received a half-dozen or so anonymous emails that she found vaguely threatening. She then informed a friend of hers who was an FBI agent, and a major FBI investigation was then launched that set out to determine the identity of the anonymous emailer.
That is the first disturbing fact: it appears that the FBI not only devoted substantial resources, but also engaged in highly invasive surveillance, for no reason other than to do a personal favor for a friend of one of its agents, to find out who was very mildly harassing her by email. The emails Kelley received were, as the Daily Beast reports, quite banal and clearly not an event that warranted an FBI investigation:
"The emails that Jill Kelley showed an FBI friend near the start of last summer were not jealous lover warnings like ‘stay away from my man’, a knowledgeable source tells The Daily Beast. . . .
"’More like, ‘Who do you think you are? . . .You parade around the base . . . You need to take it down a notch,’" according to the source, who was until recently at the highest levels of the intelligence community and prefers not to be identified by name.
"The source reports that the emails did make one reference to Gen. David Petraeus, but it was oblique and offered no manifest suggestion of a personal relationship or even that he was central to the sender’s spite. . . .
"When the FBI friend showed the emails to the cyber squad in the Tampa field office, her fellow agents noted the absence of any overt threats.
"No, ‘I’ll kill you’ or ‘I’ll burn your house down,” the source says. ‘It doesn’t seem really that bad.’
"The squad was not even sure the case was worth pursuing, the source says.
"’What does this mean? There’s no threat there. This is against the law?’ the agents asked themselves by the source’s account.
"At most the messages were harassing. The cyber squad had to consult the statute books in its effort to determine whether there was adequate legal cause to open a case.
"’It was a close call,’ the source says.
"What tipped it may have been Kelley’s friendship with the agent."
That this deeply personal motive was what spawned the FBI investigation is bolstered by the fact that the initial investigating agent "was barred from taking part in the case over the summer due to superiors’ concerns that he was personally involved in the case" – indeed, "supervisors soon became concerned that the initial agent might have grown obsessed with the matter" – and was found to have "allegedly sent shirtless photos" to Kelley, and "is now under investigation by the Office of Professional Responsibility, the internal-affairs arm of the FBI".
[The New York Times this morning reports that the FBI claims the emails contained references to parts of Petraeus’ schedule that were not publicly disclosed, though as Marcy Wheeler documents, the way the investigation proceeded strongly suggests that at least the initial impetus behind it was a desire to settle personal scores.]
What is most striking is how sweeping, probing and invasive the FBI’s investigation then became, all without any evidence of any actual crime – or the need for any search warrant:
"Because the sender’s account had been registered anonymously, investigators had to use forensic techniques – including a check of what other e-mail accounts had been accessed from the same computer address – to identify who was writing the e-mails.
"Eventually they identified Ms. Broadwell as a prime suspect and obtained access to her regular e-mail account. In its in-box, they discovered intimate and sexually explicit e-mails from another account that also was not immediately identifiable. Investigators eventually ascertained that it belonged to Mr. Petraeus and studied the possibility that someone had hacked into Mr. Petraeus’s account or was posing as him to send the explicit messages."
So all based on a handful of rather unremarkable emails sent to a woman fortunate enough to have a friend at the FBI, the FBI traced all of Broadwell’s physical locations, learned of all the accounts she uses, ended up reading all of her emails, investigated the identity of her anonymous lover (who turned out to be Petraeus), and then possibly read his emails as well. They dug around in all of this without any evidence of any real crime – at most, they had a case of "cyber-harassment" more benign than what regularly appears in my email inbox and that of countless of other people – and, in large part, without the need for any warrant from a court.
But that isn’t all the FBI learned. It was revealed this morning that they also discovered "alleged inappropriate communication" to Kelley from Gen. Allen, who is not only the top commander in Afghanistan but was also just nominated by President Obama to be the Commander of US European Command and Supreme Allied Commander Europe (a nomination now "on hold"). Here, according to Reuters, is what the snooping FBI agents obtained about that [emphasis added]:
"The U.S. official said the FBI uncovered between 20,000 and 30,000 pages of communications – mostly emails spanning from 2010 to 2012 – between Allen and Jill Kelley . . . .
"Asked whether there was concern about the disclosure of classified information, the official said, on condition of anonymity: ‘We are concerned about inappropriate communications. We are not going to speculate as to what is contained in these documents.’"
So not only did the FBI – again, all without any real evidence of a crime – trace the locations and identity of Broadwell and Petreaus, and read through Broadwell’s emails (and possibly Petraeus’), but they also got their hands on and read through 20,000-30,000 pages of emails between Gen. Allen and Kelley.
This is a surveillance state run amok. It also highlights how any remnants of internet anonymity have been all but obliterated by the union between the state and technology companies.
But, as unwarranted and invasive as this all is, there is some sweet justice in having the stars of America’s national security state destroyed by the very surveillance system which they implemented and over which they preside. As Trevor Timm of the Electronic Frontier Foundation put it this morning: "Who knew the key to stopping the Surveillance State was to just wait until it got so big that it ate itself?"
It is usually the case that abuses of state power become a source for concern and opposition only when they begin to subsume the elites who are responsible for those abuses. Recall how former Democratic Rep. Jane Harman – one of the most outspoken defenders of the illegal Bush National Security Agency (NSA) warrantless eavesdropping program – suddenly began sounding like an irate, life-long ACLU privacy activist when it was revealed that the NSA had eavesdropped on her private communications with a suspected Israeli agent over alleged attempts to intervene on behalf of AIPAC officials accused of espionage. Overnight, one of the Surveillance State’s chief assets, the former ranking member of the House Intelligence Committee, transformed into a vocal privacy proponent because now it was her activities, rather than those of powerless citizens, which were invaded.
With the private, intimate activities of America’s most revered military and intelligence officials being smeared all over newspapers and televisions for no good reason, perhaps similar conversions are possible. Put another way, having the career of the beloved CIA Director and the commanding general in Afghanistan instantly destroyed due to highly invasive and unwarranted electronic surveillance is almost enough to make one believe not only that there is a god, but that he is an ardent civil libertarian.
The US operates a sprawling, unaccountable Surveillance State that – in violent breach of the core guarantees of the Fourth Amendment – monitors and records virtually everything even the most law-abiding citizens do. Just to get a flavor for how pervasive it is, recall that the Washington Post, in its 2010 three-part "Top Secret America" series, reported: "Every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications."
Equally vivid is this 2007 chart from Privacy International, a group that monitors the surveillance policies of nations around the world. Each color represents the level of the nation’s privacy and surveillance policies, with black being the most invasive and abusive ("Endemic Surveillance Societies") and blue being the least ("Consistently upholds human rights standards"):
And the Obama administration has spent the last four years aggressively seeking to expand that Surveillance State, including by agitating for Congressional action to amend the Patriot Act to include Internet and browsing data among the records obtainable by the FBI without court approval and demanding legislation requiring that all Internet communications contain a government "backdoor" of surveillance.
Based on what is known, what is most disturbing about the whole Petraeus scandal is not the sexual activities that it revealed, but the wildly out-of-control government surveillance powers which enabled these revelations. What requires investigation here is not Petraeus and Allen and their various sexual partners but the FBI and the whole sprawling, unaccountable surveillance system that has been built.
(1) One of the claims made over the last week was that Broadwell, in public comments about the Benghazi attack, referenced non-public information – including that the CIA was holding prisoners in Benghazi and that this motivated the attack – suggesting that someone gave her classified information. About those claims, a national security reporter for Fox reported:
"that a well-placed Washington source confirms that Libyan militiamen were being held at the CIA annex and may have been a possible reason for the attack. Multiple intelligence sources, she also reported, said ‘there were more than just Libyan militia members who were held and interrogated by CIA contractors at the CIA annex in the days prior to the attack. Other prisoners from additional countries in Africa and the Middle East were brought to this location.’"
Though the CIA denies that "the agency is still in the detention business", it certainly should be investigated to determine whether the CIA is maintaining off-the-books detention facilities in Libya.
(2) I’ve long noted that Michael Hastings is one of the nation’s best and most valuable journalists; to see why that is so, please watch the amazing 8-minute clip from last night’s Piers Morgan Show on CNN embedded below, when he appeared with two Petraeus-defending military officials (via the Atlantic’s Adam Clark Estes). When you’re done watching that, contrast that with the remarkably candid confession this week from Wired’s national security reporter Spencer Ackerman on how he, along with so many other journalists, hypnotically joined what he aptly calls the "Cult of David Petraeus".
(3) I gave a 40-minute speech this summer on the Surveillance State and the reasons it is so destructive, which can be viewed on the video below; Alternet transcribed the speech here:
Project Acronym:GUARDIAN ANGELS
|Organization name:ECOLE POLYTECHNIQUE FEDERALE DE LAUSANNE|
|Name:Mihai Adrian IONESCU (Professor)||-STATION 11
SCHWEIZ/SUISSE/SVIZZERARegion:RÉGION LÉMANIQUE Vaud
Objective: Guardian Angels (GA) are future zero-power, intelligent, autonomous systems-of-systems featuring sensing, computation, and communication beyond human aptitudes. GA will assist humans from their infancy to old age in complex life situations and environments. Zero-power reflects system-of-systems ability to scavenge energy in dynamic environments by disruptive harvesting techniques. The project prepares zero-power technologies based on future energy-efficient technologies, heterogeneous design, and disruptive energy scavengers.
Three zero-power generations of GAs are foreseen:
– Physical Guardian Angels are zero-power, on-body networks or implantable devices that monitor vital health signals and take appropriate actions to preserve human health.
– Environmental Guardian Angels extend monitoring to dynamic environments, using disruptive scavengers, personalized data communication, and first “thinking” algorithms. They are personal assistants that protect their wearers from environment dangers.
– Emotional Guardian Angels are intelligent personal companions with disruptive zero-power, manmachine interfaces deployed at large scale. They sense and communicate using non-verbal languages playing an important role in health, education, and security worldwide.
This project addresses the following scientific challenges for energy-efficient visionary Guardian Angel autonomous systems: (i) energy-efficient computing (down to E=10-100kT), (ii) and communication (approaching the limit of 1pJ/bit), (iii) low-power sensing, (iv) disruptive scavenging (bio-inspired, thermoelectric, etc, targeting energy densities of tens of mW/cm2), and (v) zero-power man-machine interfaces. A selection of emerging technologies based on energy efficiency is proposed. We will also develop design tools that integrate electrical, mechanical, optical, thermal, and chemical simulation tools over length and time scales currently achievable.
Writing by Melvin Hillard
A personal area network jamming/masking device. A portable device about the size of a pocket radio that produces signals similar to that of a human but at a higher power output and with noise riding on the signals. The human brain produces signals about 30HZ while awake. They currently have sophisticated software that removes unwanted events like heartbeats and voice vibrations from EEG readings so any noise produced should be random unpredictable events that are difficult to filter out. This device could also jam incoming microwave frequencies to stop the microwave hearing effect while outside. Bluetooth technology allows communication between enabled devices over the microwave spectrum at about 100 to 200 ft. The whole technology is on a single chip. It can be programed to do anything you want.
EMI shielding material can be used to make Faraday cages. A faraday cage is an enclosure, like a room or entire building, encased in this material and is then connected to earth ground. The NSA building on the grounds of Ft Meade MD is fully encased in copper. Copper is too expensive for most people but there are lower cost alternatives. The earth is a naturally conducting body that is always at electrical neutral. Any attempt to develop a voltage on a conductor that is connected to it will simply discharge to earth ground. It is not necessary to redo the roof. You could put a layer of material on the attic floor then cover it with another layer of plywood. Quarter inch plywood would not add too much weight. It is also possible to paint the underside of the roof with a metallic paint or attach metal screen. Metallic paint could be applied to all walls.
The power level of a neural implant must be quite small given the size of the implant and the available voltage. Maybe a fraction of a watt. The brain produces very small voltages. Making a mask of EMI material that covers the entire head (eyes, nose, mouth etc) and even the upper part of the body would probably be enough to block all incoming and outgoing signals. The person could then be taken to a Faraday cage facility to have it removed.
A lot of electronic equipment is very expensive. Personal computers etc. It is always a good idea to have it plugged into a surge suppressor. Surge suppressors prevent large spikes from destroying the equipment. A lightning strike for example can destroy everything in a home. Ham radio equipment is also vunerable through the antenna. Ham radio manufacturers make surge suppressors that connect between the antenna and the reciever. It might be possible to blow out an implant by standing near where someone produces a large spike. This could disconnect a lot of people very quickly and make it hard for them to chase everyone around. Another possibility is to just surgically snip off the end instead of trying to remove the whole thing to disconnect a lot of people.
It is possible to use the wiring inside your house as an an tenna for a radio thus picking up your signals and carrying them to the outside world. Broadband Over Powerlines is an example of using these wires to carry a lot of data. You should get off the grid completely. If wiring a new house all wires should go through a chase that connects all floors. This makes them accessible and more easily managed. Keep the amount of wiring to a minimum. Solar panels can separate the oxygen and hydrogen in water by electrolysis then recombine it in a fuel cell to produce electricity. Solar panels can also help to heat a house.
Having a stand alone noise generator in the house could also help. Along with Bluetooth technology SDR (Software Defined Radio) is becoming quite sophisticated. A company in California called Ettus Research has a radio that can cover from 0HZ to GHZ for about $600. It operates on a opensource program called the GNU Radio project. It might be possible to program it to produce all the noise you need. Older technology include spark transmitters and white noise generators.
There are two types of noise that get into electrical devices. Common mode and differential noise. A simple explanation is common mode comes from an outside source and differential comes from wire to wire. Crosstalk inside a data communication cable is differential. Noise that got on the cable from an outside source would be common mode. Ferrite cores can help eliminate noise by just clipping it onto the wire. Most houses have all thier power lines located at the panel. It could be possible to put a noise generator at the point and introduce noise into the lines.
Centrally locate all communication wiring in a panel inside the house. This makes it easier to manage. They make filters for telephone lines that will eliminate all frequencies above the audio level which is around 30KHZ. While it is still possible to send data at that speed it slows it down considerably. A shut off switch could be placed on the coax cable to shut it off if necessary. Make a list of all devices with antennas and decide if they are really needed. Make a Faraday cage for each one and put it inside when you don’t need it.
The Pentagon and the U.S. Intelligence agencies called the N.S.A. [ National Security Agency ], C.S.S. [ Central Security Service ], D.I.A. [ Defense Intelligence Agency ], D.A.R.P.A. [ Defense Advanced Research Projects Agency ], C.I.A. [ Central Intelligence Agency ], the D.H.S. [ Department of Homeland Security ], and the F.B.I. [ Federal Bureau of Investigation ] Cointelpro or Counter intelligence program unit has extremely top secret technology that can pick up the private thoughts given by individuals in the vibrations produced by the brains electrical impulses, and that these thoughts can be broadcast by means of microwave transceivers, infrasound and ultrasound transceivers, satellites, and any other form of technology which uses electromagnetic transfer, i.e. Television, radio, the internet, and the telephone. The Pentagon calls this mind reading technology SYNTHETIC TELEPATHY, although there is nothing paranormal about it at all. The N.S.A. Or National Security Agency is a part of the U.S. Department of Defense, and a very secretive part of that. The N.S.A. Has a black budget, and is always headed by a flag officer from one of the branches of the U.S. Military.
The top secret technologies available to the U.S. Military is usually thirty years or maybe even more ahead of the technology which is available to the U.S. Civilian economy. Who is to know among the general U.S. Public what the level of technological development is within the secret laboratories of the N.S.A. And D.A.R.P.A. [ Defense Advanced Research Projects Agency ]. The headquarters of the National Security Agency is located at Fort George Meade in the U.S. State of Maryland.
Today, there are microscopic computer chips based on nanotechnology which can be inserted into a person by means of an injection, capsule, or tooth filling, with or without the knowledge of a doctor or a pharmacist, and these computer chips can track the implanted person by radio or microwaves. These microscopic computer chips can also be made invisible to detection by means of C.A.T. [ Computerized Axial Tomography ], M.R.I. [ Magnetic Resonance Imaging ], and P.E.T. [ Positron Emission Tomography ] scans, by some means of electromagnetic degaussing.
With the latest top secret, and rapid technological advancements available to the U.S. Military intelligence agencies, the need for microscopic computer implants in conducting synthetic telepathy against targeted persons is obsolete by now. Rather, a system of subliminal, subconscious, wireless microwave remote control is used today against targeted individuals suffering from synthetic telepathy harassment.
Synthetic Telepathy is used for conducting torture training and/or experimentation against people as red herrings "good cop/bad cop" or tough love acting, diversions, feints, decoys, and smokescreens, as smear campaigns by association, as openly secret intimidation campaigns against targeted dissidents, and as a means of espionage. Once it was believed that claims about C.I.A. Agents secretly dumping the radioactive material in the slums of U.S. Cities during the 1950’s as part of a research program were simply mass conspiracy theories, until the U.S. The federal government in the 1990’s publicly admitted that the allegation was true.
FBI and NSA agents who are part of a secret US society are genetically inclined sociopaths and psychopaths who work as hit men, torturers, sexual abusers, stalkers, slanderers, and agent provocateurs involved in murders and torture of hundreds of thousands of innocent US citizens for years and years. At the last count there are 50,000 NSA spies who are businessmen, priests, community leaders and in all walks of life who are SPYING and keeping tabs on pretty much all Americans.
The synthetic telepathy espionage trainees, sociopaths, sadomasochistic torturers, slanderers, experimenters, and spies, in order to avoid developing any sympathy for their targeted victims, deliberately avoid actually feeling the emotions of their victims by following the squiggly EEG or Electroencephalograph lines on computer monitor screens, as well as the silent words thought of their victims which also appear on the computer monitor screens. Then again, who can feel all of the emotions and thoughts which any given person has undergone every second of their entire lifetime.
The emotions and silent words of the victims of synthetic telepathy operators can be broadcast against their will to anyone the synthetic telepathy torturers choose to broadcast to, and they also have the power to block or censor any emotions and words of their victims which they do not want to be broadcast. The synthetic telepathy spies can also place their own criminal or antisocial, negative emotions and words into their victims by means of subliminal, subconscious, remote control microwave brainwashing technology, and they can change the voice behind their words so as to make it appear that it is the targeted victim and not themselves who are communicating by means of synthetic telepathy.
They can also store emotions and silently thought words onto a supercomputer memory bank which they can rebroadcast at a later time. I believe that the synthetic telepathy operators, although having high I.Q.’s, are predisposed towards sociopathic behavior because of a genetic defect or a combination of genetic defects, and that the only way they can sustain the enthusiasm in their lives is by engaging in an addictive pattern of sadomasochistic activities and fantasies.
If you do not believe that synthetic telepathy exists, then you should look at these following web sites which reveal that part of electromagnetic psychological warfare and mind control which today is declassified:
I urge the readers to print/save this column as well as the following link where the NSA and their PSYCHO-ELECTRONIC WEAPON ATTACKS and SADISTIC TORTURE of hundreds of thousands of innocent American citizens (guinea pigs and victims) is explained in detail with diagrams and technology.
"Covert Operations of the U.S. National Security Agency" at http://www.mindcintrolforums.com/pro-freedom.co.uk/cov_us.html
Mind control means influencing the behavior of an individual. And to create or remolding victim’s personality towards a desired state. The desired model human for the elite of the world, or, "the Illuminati" is: Easily steerable mass-human without personal characteristics. A stupefied, dumbed down person. This secures the interests of the elite of the world. So they can lead our lives through changing times the way they want.
Apparently growing out of earlier government mind control research programs such as MKULTRA, and government suppression-of-dissent programs such as COINTELPRO, today’s mind control is covert, finely crafted, around the clock harassment perpetrated against citizens living in their homes and communities.
It is to be noted, that MK-ULTRA and other government programs worked as a front for the "alien" mind control techniques, which are superior.
The intradimensional way of mind control using the "alien" technologies ensures, that the result is always the desired one. And undesired for all free-loving people.
Destruction of family and other relationships by way of lies, bribes, and threats is a goal of the phase of today’s mind control. The current day mind control program has been carefully engineered so that if the target complains, their own words will instantly cause them to be labeled as mentally ill.
The mind/body symptoms of current day mind control include: Excruciating PAIN(!) Exceptionally frequent blanking of recent memories, and truncation of new ideas
• Very unnatural inability to sleep, as if large amounts of caffeine have been consumed.
• Sudden forced awakening at precisely the same time in the middle of the night, continuing for at least months, and right at a clock time such as 4 am, zero minutes, zero seconds
• Sudden clumsiness, which can result in spills, spoilage of precise work, or injury
• Attacks of extreme fatigue, sometimes almost to the point of paralysis, when there is no reason for such attacks
• Frequent powerful itching without rash, and which may start as a small electric shock
• Artificial "bee stings", especially while trying to get to sleep
• Wildly racing heart without any cause
• Sudden overheating, without any cause
• Frequent flailing of arms and legs as you try to sleep
• Fake sounds such as alarm clock going off when it shouldn’t, telephone ringing when there is no incoming call, knocking on the door but no one is there
• Voices, either very insulting, or telling you things that indicate you are under surveillance
• Vibration of body parts when trying to sleep
• High pitched tone in the ears, which may change when switching electronic equipment on or off In some cases, statements by strangers indicating they know what you had for supper In some cases, statements by strangers indicating they can read your thoughts
• Artificial and powerful sexual stimulation
• Artificial and powerful PREVENTION of sexual stimulation .
This is THE EXTERIOR of mind control. The non-noticeable mind control is the more dangerous one. That is the manipulation of our thoughts and emotions WITHOUT our notice of things.
We think we lead our lives. But we do not. We have to wake up to take notice of the situation. And try to change the course of history.
FBI and NSA SECRET SOCIETY imposes us the New world order using mind control. And we can`t shield ourselves from it. Which makes us as puppets on strings.
"Electromagnetic Weapons and Mind Control": from CNN’s Special Assignment, about 1985, at http://www.mindcontrolforums.com/cnn-mc.htm, by Chuck De Caro, CNN Special Assignments, and "List of mind control symptoms, in "2005 update: The convergence of the cold war history of mind control and electromagnetic weapons with new post cold war government Neuroscience research programs," by Cheryl Welsh, Director, Mind Justice, 2005, at http://www.mindjustice.org/2005update.htm and http://www.mindjustice.org/symptoms.htm
Also, there is an interesting article called "Brain wave technology could change lives: Imagine controlling a computer using only your thoughts." This technology already exists in the civilian economy as a means of playing video games, for example. See this link: http://www.msnbc.msn.com/id/6661974/.
The article was written by Robert Bazell, correspondent for NBC News, and was updated at 7:31p.m., December 6, 2004. Another web site concerned with gaining information on the electrical activity of brainwaves, and by means of wireless technology, can be found in the Sunday, 17 November, 2002, 00:41 GMT BBC NEWS World Edition article called "Remote control brain sensor", a thttp://news.bbc.co.uk/2/hi/health/2361987.stm
"4 Elite Airborne commandos Return from a Special Operation in Afghanistan and suddenly tortures and murder their wives" Friday, July 26, 2002 1:33 p.m. EDT FORT BRAGG, N.C. (Reuters) – Four U.S. Soldiers stationed at Fort Bragg, including three special operations servicemen who returned home this year after tours of duty in Afghanistan, allegedly killed their wives recently, military officials said on Friday. In two of the cases, the soldiers killed themselves after shooting their spouses, officials said. In the other two, the servicemen have been arrested and are facing charges. "There has been a recent series of instances where soldiers have either committed murder or murder-suicide against their wives," said Maj. Gary Kolb, a spokesman for the Army Special Operations Command.
STARGATE is one of the many names given to the Army’s classified clan of remote viewers. This project was hidden deeply within the government for close to two decades. The work of Harold Puthoff Ph.D., at SRI international http://www.sri.com/index/html joined with the work of others at the Cognitive Science Laboratory (http://www.lfr.org/csl) helped to supply the CIA with the framework of what was then known as Project GRILLFRAME. By 1978 America’s first remote viewers were at work. It is rumored the cold war was responsible for the government’s interest in remote viewing because Russia had spies not dissimilar to our remote viewers.
Psychic Dictatorship in the U.S.A.
(1995) Another bombshell from the fecund furnace of Feral House Press. Constantine, a political researcher in the mold of Mae Brussell, has gathered together a well-documented survey. "Bombing minds rather than bodies is the warfare of the new millennium… Funded under the euphemism of Nonlethal Technology, the Pentagon has developed the ability to transmit voices, and inflict pain, madness, even death, with the push of a button. Hard to believe? Believe it! Official sources have publicly admitted to the existence of such technology." Topics covered: Telemetric mind control, hearing voices, false memory hoax, E. Howard Hunt’s Death Squads, The GOP’s Pink Triangle & the CIA, Johnny Carson and the S&L crisis, and let’s not forget the chapter on NutraSweet as crowd control. 221 pages, PB PDU $12.95
The term "mind control" comes from former CIA director Allen Dulles. In 1953, Dulles, speaking before a national meeting of Princeton alumni, distinguished two fronts in the then-current "battle for men’s minds": a "first front" of mass indoctrination through censorship and propaganda, and a "second front" of individual "brainwashing" and "brain changing." Before an audience of fellow Ivy Leaguers, Dulles skipped the usual pieties about democracy. The same year, Dulles approved the CIA’s notorious MKULTRA project, and exempted it from normal CIA financial controls.
A partial list of aggressive promoters of this new technology includes Oak Ridge National Lab, Sandia National Laboratories, Science Applications International Corporation, MITRE Corporation, Lawrence Livermore National Lab, and Los Alamos National Laboratory.
In 1996, the US Air Force Scientific Advisory Board published a 14-volume study of future developments in weapons called New World Vistas. Tucked away on page 89 of an ancillary 15th volume are some hair-raising insights into the future ‘coupling’ of man and machine in a section dealing with ‘Biological Process Control’. The author refers to an ‘explosion’ of knowledge in the field of Neuroscience, adding, ominously:
One can envision the development of electromagnetic energy sources, the output of which can be pulsed, shaped, and focused, that can couple with the human body in a fashion that will allow one to prevent voluntary muscular movements, control emotions (and thus actions), produce sleep, transmit suggestions, interfere with both short-term and long-term memory, produce an experience set, and delete an experience set.
Translating the word ‘experience sets’ from military jargon into plain English, this means, simply, that they envisage the ability to erase your life’s memories and substitute a new, fictitious set.
By projecting such developments into the future, the authors of New Vistas are camouflaging present day capabilities. A similar futuristic scenario with many references to mind manipulation is described in The Revolution in Military Affairs and Conflict Short of War (US Army War College, 1994). Authors Steven Metz and James Kievit declare: "Behaviour modification is a key component of peace enforcement" and "The advantage of [using] directed energy systems is deniability." The authors ask: "Against whom is such deniability aimed?" The direct answer is "the American people".
Edward Tilton, President of Silent Sounds Inc., says this about S-quad in a letter dated 13 December, 1996:
All schematics, however, have been classified by the US Government and we are not allowed to reveal the exact details. We make tapes and CDs for the German Government, even the former Soviet Union countries! All with the permission of the US State Department, of course. The system was used throughout Operation Desert Storm (Iraq) quite successfully.
By using these computer-enhanced EEGs, scientists can identify and isolate the brain’s low-amplitude "emotion signature clusters", synthesise them and store them on another computer. In other words, by studying the subtle characteristic brainwave patterns that occur when a subject experiences a particular emotion, scientists have been able to identify the concomitant brainwave pattern and can now duplicate it. "These clusters are then placed on the Silent Sound carrier frequencies and will silently trigger the occurrence of the same basic emotion in another human being!"
Microwaves can also alter the permeability of the body’s blood-brain barrier,14 which can synergistically increase the effects of drugs, as the military is well aware. "Using relatively low-level RFR, it may be possible to sensitize large military groups to extremely dispersed amounts of biological or chemical agents to which the unirradiated population would be immune."15
Sound can be transmitted even easier through the use of implants – cochlear implants, implants that send electrical signals into the fluid of the inner ear, or implants that transmit sound vibrations via bone conduction, such as the cases of dental fillings picking up audible radio signals.
The stimoceiver, invented by Dr. Jose Delgado, consists of wires running from strategic points in the brain to a radio receiver/transmitter located entirely under the skin. Through this device, Delgado was able to stimulate raw emotions such as arousal, anxiety, and aggression with the turn of a knob. Of course, secret research by the US Government into microwaves and synthetic telepathy has moved on considerably since the end of the Cold War …
Secret microwave radiation can be used to induce in unsuspecting victims: "Headache, fatigue, perspiring, dizziness, menstrual disorders, irritability, agitation, tension, drowsiness, sleeplessness, depression, anxiety, forgetfulness, and the lack of concentration."
Naval Research Lab Attempts To Meld Neurons And Chips: Studies May Produce Army of ‘Zombies.’
Future battles could be waged with genetically engineered organisms, such as rodents, whose minds are controlled by computer chips engineered with living brain cells…. The research, called Hippo-campal Neuron Patterning, grows live neurons on computer chips. "This technology that alters neurons could potentially be used on people to create zombie armies," Lawrence Korb, a senior fellow at the Brookings Institution, said.
"National Security Agency" in
"Central Security Service" in
"Defense Intelligence Agency" in
"Defense Advanced Research Projects Agency" in
The following links explain secret MKULTRA and COINTELPRO programs of FBI, CIA and NSA agencies.