Category Archives: Brainwashing

Space Mirror in Russia ( Father of HAARP in USA)

Space Mirror

by N.Shpakovsky,
TRIZ-Consultant, Ph.D.
nick_sh2000@mail.ru

Abstract. The article analyzes the failure of the Russian project �Znamya 2�, which is better known as �Space Mirror�. When unfolding, the space mirror membrane caught on the antenna that projected over the space station body.

Using TRIZ, the causes of the failure were analyzed and a number of solutions for improving the reliability of the flexible membrane unfolding under weightlessness were proposed.

Introduction. The space mirror that reflects the Sun�s rays onto the nightside of our planet is one of the impressive space projects. In 1993, the spaceship �Progress M-15� placed into orbit a 20-meter film mirror (the project �Znamya 2�). The mirror unfurled and produced a light spot that was equal in strength approximately to one full moon. A huge plash of sunlight glanced over beclouded Europe to be seen only by astronomers on the top of the Alps.

The project �Znamya 2.5� stood head and shoulders above its predecessor. The mirror was expected to be perceived on the Earth as 5 to 10 full moons and it formed a trace of about 7 km in diameter which could be controlled by fixing it on one spot for a long time. The space mirror was a slightly concave membrane of 25 m in diameter made of thin film with a mirror surface, which was attached around the periphery of the station. The membrane was expected to unfold and be held unfolded by centrifugal forces (Fig.1).


Fig.1

However, the project was a failure. Soon after the deployment started, the membrane caught on the antenna (Fig. 2). The spaceship �Progress M-40 was de-orbited and buried in the ocean.

Fig. 2

It would be interesting to consider this situation in terms of TRIZ. Why exactly hasn�t the membrane unfolded? Has everything been done for it to unfold? What can be done to make such membranes unfold under various conditions? There is a great many of similar constructions and it is not always possible to provide such unfolding conditions as for the solar mirror.

Was this failure natural? In principle, from the point of view of traditional design everything is OK. The membrane�s prototype is a parachute canopy. There is no oncoming air stream in space, so inertia forces that occur as a result of the space station rotation are used to unfold the membrane. The first membrane – that of �Znamya 2� – unfolded successfully. Besides, there is a good analogue – designs of spaceships with a solar sail in which the sail is unfolded and held by a centrifugal force occurring during the spaceship rotation. It also seems correct in the context of TRIZ. The basic requirement of ideality is satisfied – the membrane itself without any additional devices moves off the station, unfolds and is held unfolded.

This, however, has not worked. The station started rotating, the membrane began moving off it and caught on the antenna. We can certainly blame the antenna. Parachute-jumpers thoroughly remove all buckles, hooks and heelplates – everything on which the parachute may caught while deploying – from their clothing and especially from the helmets and footwear. But the space station is an expensive and serious thing and is designed to solve many different problems during one flight. It is difficult to remove all devices from the station�s surface, as they are needed for solving other problems. Under such conditions, one accidental jerk of the engine can cause inertia to throw the unfolding membrane back onto the antenna.

Rational membrane-unfolding technology. Let us try to solve this problem with the aid of TRIZ and find a method for unfolding the membrane without removing the antennas and other objects projecting over the station�s surface. Unfortunately, we�ll only have to be guided by the published information, so we�ll have to think ourselves of such important �trifles� as the design of membrane-holding devices, locks, etc. Or, for instance, what are the radial slits in the membrane for?

Thus, we have a packed membrane attached around the periphery of the station. It is held, for instance, by several flexible bands with locks (Fig. 3, a).

Fig. 3

Let us recall one of the basic TRIZ laws – the law of coordination of ES parts� interaction – and try to build a �desirable technology� of membrane deployment. The deployment process falls into two distinct stages. At the first stage, the station starts rotating, locks are released and the membrane moves off the station�s surface (Fig. 3,d). The second stage includes the unfolding of the membrane, its final stretching and holding in the unfolded state. (Fig.3,c).

The first stage is apparently most complex. Since the entire mass of the packed membrane is situated near the axis of rotation, centrifugal forces are comparatively small at that moment, while the work to be done by them is considerable. At the same time, certain requirements are also imposed on the sequence of membrane deployment. It would be better for the membrane not to unfold at once throughout the entire volume, but from the center toward the edges, quickly receding from the station to the area that is free from projecting antennas, in the form of a compact torus-like packing and not as an inordinate heap.

Further stretching of the unfolded membrane is not connected with any troubles because at that time the membrane is already far from the �human factor�. Here we can do with centrifugal forces.

Thus, we can formulate an important requirement for the deployment process: �the unfolded internal part of the membrane must be permanently stretched�.

How can we accomplish sequential unfolding of the membrane? The chances are that it is �concertinaed� before the flight and then it is unfolded throughout the entire volume after releasing the locks.

Proposal 1. Leave free some of the folds adjoining the station and fasten the rest of the folds together with destroyable filaments or bands. Then peripheral tensile stress will first spread the folds near the station surface and the part of the membrane adjoining the station will be stretched. And only then the ties of the peripheral part of the membrane will break and the final deployment will start (Fig.4).

Fig. 4.

How can we accelerate the membrane deployment at the first stage?

It is obvious that we can either increase the station spinning frequency or increase the membrane mass. But carrying an extra load is not an ideal solution. Suppose we first spin up the station and then release the locks� And suppose we place a ring charge BB under the packed membrane, then release the membrane from the locks and explode the charge! Or place small jet engines around the external periphery of the membrane�

Something will definitely fly to pieces, because the membrane is only 7 mm thick.

What are the requirements for the membrane mass in this case?

  • On the one hand, the membrane must be heavy to be able to unfold fast and to move off the station.

  • At the same time, the membrane must be lightweight to prevent the occurrence of excessive loads produced by centrifugal forces.

We can resolve this contradiction in the following way. Let the membrane be heavy at the first stage of deployment and lightweight during the rest of the time. Or rather, the unfolding force must be great at the first stage. Then it may be much smaller, but great enough to unfold and stretch the membrane.

What resources are available?

Substances: membrane, space station, vacuum, air that remained inside the membrane after packing (if it is not evacuated while packing).

Fields: electric, magnetic, Sun�s light field, heat field, space wind. The characteristics of most fields may vary within very wide ranges by turning the station relative to the Sun.

Time: unlimited before the conflict, including the time of space station preparation on the Earth.

Let us draw an abstract model of the problem (Fig. 5).

Fig. 5

B2 is a station. It is a tool. B1 is a packed membrane. It is an object. B2 acts on B1 by the mechanical field (Fineria), produced by the inertia forces. This action is insufficient.

What do the standards recommend (1)?

Introduce one more substance and a field to control this substance.

For instance, add ferromagnetic particles while manufacturing the membrane. Then, while unfolding, the membrane may be acted upon by an annular electromagnet placed around the station body�s periphery. However, it is necessary to additionally introduce an electromagnet, which reduces the system�s ideality.

Add one more substance to one of the interacting substances.

B1 is a station. A space station is a large vessel with air. Consequently, the second substance is already available. It only remains to use it.

Proposal 2. We can provide rapid withdrawal of the membrane from the station to the distance of the non-fastened folds by using the energy of compressed air supplied under the packed membrane. In this case, as distinct from the explosion of a ring charge, the action value can be easily controlled (Fig. 6).

Fig. 6

Transfer to a capillary-porous substance.

Make the membrane capillary-porous.

Proposal 3. For instance, paste thin pipes in the mirror membrane cloth and supply compressed air into them while unfolding. The membrane will change into a plane practically instantly and with a great force.

Eliminating possible catching. As for possible hooking of the membrane during the deployment, the following contradiction occurs.

  • The membrane must not catch on a hook.

  • Under the deployment conditions, the membrane can contact a hook.

Of course, it would be ideal to remove the conditions that cause the membrane catching. But if we cannot eliminate such a probability, it is necessary to make so that the caught membrane can be easily released. How can we resolve this contradiction?

Firstly, we can do this in time.

At the first stage of deployment, when the catching is most probable, the unfolding force should be large enough to secure tearing a piece out of the membrane cloth. The peace should be big enough only for normal unfurling and stretching of the unfurled membrane.

This is achieved by introducing additional forces at the first stage of deployment (Proposals 2 and 3) to help the peripheral centrifugal force.

Secondly, we can do this in space.

For this purpose we use a resource: the membrane material.

We can formulate the following requirement for this material. Let the membrane have rigid surface in close proximity to the station and let the surface become flexible and elastic as the membrane moves off the station.

Proposal 4. The peripheral part of the membrane moves off the station in the form of compact torus-like packing. The packed membrane may be placed inside a rigid thin-walled body with an open bottom (Fig. 7). Because during the deployment the circumference of the packed membrane constantly increases, the body must be corrugated and must extend like accordion. Or it must be composed of several sections that move relative to one another. The use of such a body provides a good protection of the packed membrane against hooking and allows for preserving its compact form without bonding or binding.

Fig. 7.

The membrane is likely to have equal strength in all directions. This is quite correct for that of its parts, which is situated comparatively far from the station. At the same time, the requirements for the central part of the membrane are contradictory:

  • On the one hand, the membrane must not be durable so that it can tear and unhook.

  • At the same time, the membrane must be durable so that is does not fail while unfolding and in a working position.

To satisfy these contradictory requirements, we can structure the material of the central part of the membrane.

Radial filaments must be comparatively durable to provide reliable attachment of the membrane to the station body. Tangential filaments that are perpendicular to those radial must not be durable so that they easily break in case of hooking. For peripheral forces not to break the membrane at the interface of its central and peripheral parts, a ring band can be used here for reinforcement.

In principle, since the area of the membrane�s central part is comparatively small, tangential filaments may be removed at all.

Proposal 5. Make the membrane in the form of a wide ring attached to the station body with bands or cables. In packing, such bands are easy to �concertina� like shroud lines. Each folded band can be put into a covering attached to the membrane. This will ensure well-ordered unfolding of the central part of the membrane and will eliminate hooking (Fig. 8).

Fig. 8.

Final solution concept. To build a final solution concept, let us take proposal 3 as a basis that provides energetic withdrawal of the membrane from the station as envisaged in our �desirable technology of membrane deployment�. This proposal is well supplemented by proposal 1 that ensures the membrane moving off the station in a compact packed state and by proposal 5 that excludes the catching of the middle part of the membrane on the projecting parts of the station�s surface. In this case proposal 3 and proposal 5 are just combined. As for proposal 1, we only use the function �to hold the membrane packed� which is performed with the aid of resources available in the system (pipes with compressed air).

To provide fast and energetic unfolding of the middle part of the membrane, it is necessary to use, instead of a one-piece film, thin radially positioned pipes that connect the packed peripheral part of the membrane with the station. By supplying compressed air into the pipes we�ll practically instantly obtain a rigid frame that will ensure energetic unfolding of the membrane at the first stage.

To hold the membrane in a compact packed state until the full unfolding of its middle part, it is proposed to make each of the membrane-holding clamps in the form of two pipes that encompass the membrane on its sides. The pipes� end faces should be closed and connected with the rest of the frame. The pipes� ends should be connected with each other with a break-off band or filament. After the full unfolding of the frame of the membrane�s middle part, compressed air starts going into the clamps� pipes. The pipes straighten with a great force, break the bands and release the membrane (Fig. 9).

Proposal 2 is partially realized by using compressed air.

Fig. 9

Intensified solution. If it is still impossible to avoid the contact of the membrane, which moves off the station, with hooks, it is expedient to additionally use proposal 4.

The packed membrane is placed in a rigid multi-section thin-walled body, which is discarded after complete deployment of the membrane.

Conclusion. No doubt that using only open sources of information we missed out many circumstances. But I hope that this attempt to analyze the problem will be to a certain extent useful to space mirror designers, and not only to them. We are sure that all the errors will be corrected and after the next attempt we�ll see a hand-made sun in the night sky.

Reference

  1. Altshuller, Genrikh. �The Innovative Algorithm. TRIZ, Systematic Innovation and Technical Creativity.� Technical Innovation Center, INC. Worcester, MA. 1999.

The pictures by Elena Novitskaja.

 

(back to top)

� Copyright 1997-2005 CTQ Media LLC
http://www.triz-journal.com
All Rights Reserved.

 

Advertisements

NSA & “Artificial Thought” Control ( IBM Blue Beam)

Diffuse Artificial Thought

“The advancement of techniques propel us toward the third step in the Blue Beam Project that goes along with the telepathic and electronically augmented two-way communication where ELF, VLF and LF waves will reach each person from within his or her own mind, convincing each of them that their own god is speaking to them from the very depths of their own soul. Such rays from satellites are fed from the memories of computers that have stored massive data about every human on earth, and their languages. The rays will then interlace with their natural thinking to form what we call diffuse artificial thought.”

So how could that be possible you ask? Easy. Enter Project Joshua Blue, currently under development by our favourite business machines company, IBM. Joshua Blue is a program with the stated goal of “Evolving an Emotional Mind in a Simulated Environment”, “to enhance artificial intelligence by evolving such capacities as common sense reasoning, natural language understanding, and emotional intelligence, acquired in the same manner as humans acquire them, through learning situated in a rich environment.”

This is software that is capable of learning and developing ‘emotions’ according to a related document “Feeling Fabricated: Artificial Emotion“. Parts of this project involve the development of Joshua so that emotion is part of it’s reasoning and these guidelines are being followed: Naturalness and believability, social effectiveness, and meaningfulness of displays to human observers. In fact, the main goal of Joshua Blue is to achieve cognitive flexibility that approaches human functioning. In other words – this is artificial intelligence that could be diffused with our own thought because it has been designed to ‘think like a human’.

A computer program which can read silently spoken words by analysing nerve signals in our mouths and throats, has been developed by NASA. In my previous post I outlined the technology that exists. In 1994, the brain wave patterns of 40 subjects were officially correlated with both spoken words and silent thought. This was achieved by a neurophysiologist, Dr Donald York, and a speech pathologist, Dr Thomas Jensen, from the University of Missouri. They clearly identified 27 words / syllables in specific brain wave patterns and produced a computer program with a brain wave vocabulary. It does not take much thinking to realise that the US agencies have access to a perfected version of this technology. In fact the relevant computers have a vocabulary in excess of 60,000 words and cover most languages. In fact, the NSA’s signals intelligence monitor the brainwaves of their targets by satellite and decode the evoked potentials (3.50Hz 5 milliwatts) that the brain emits. So, using lasers / satellites and high-powered computers the agencies have now gained the ability to decipher human thoughts – and from a considerable distance (instantaneously).

With these seemingly far fetched technologies in mind, althought evidently not so far fetched, also consider this final one. Silent subliminal presentation system: A communication system in which non aural carriers (in the very low or high audio frequency range or the ultrasonic frequency spectrum) are amplified or frequency modulated with the desired “intelligence”, and propagated acoustically or vibrationally for inducement directly into the brain. This can be done “live” or recorded/stored on magnetic, mechanical or optical media for delayed/repeated transmission to the target. Sound can also be induced by radiating the head with microwaves (in the range 100 to 10,000 mhz) that are modulated with a waveform consisting of frequency modulated bursts. HAARP of course is going to be handling all the microwaves.

Knowing all of this, Joshua Blue could in fact be being fed with your personal data (facebook, myspace, medical records, driving records, police records, shopping records etc.) and could be simultaniously extracting your actual, real time thought processes. It could then calculate alternate thought trains and depending on the ‘mission’, it could distract you, lead you to the wrong conclusions or drive you insane. It could even manage to make you convince yourself that yes, aliens truly are invading or Jesus really is talking to you from the clouds. With all the data we put out into the internet about ourselves through MSN, I’m 100% certain ‘they’ know how we talk and therefore how we think. This is way too feasible for me to be comfortable. If the thought that was generated artificially by the computer was so accurately precise how could you reasonably differentiate from AI and your own thought? This scares me.

Joshua Blue is specifically being designed to handle emotions, so thought patterns and logically chosen emotions to compliment them are going to be very hard to overcome.

Conditioning: Aversion therapy & Desensitization

Mind Control
By Harry V. Martin and David Caul
Copyright, Napa Sentinel, 1991
Part Nine in a Series

Tuesday, October 22, 1991

In mans quest to control the behavior of humans, there was a great breakthrough established by Pavlov, who devised a way to make dogs salivate on cue. He perfected his conditioning response technique by cutting holes in the cheeks of dogs and measured the amount they salivated in response to different stimuli. Pavlov verified that “quality, rate and frequency of the salivation changed depending upon the quality, rate and frequency of the stimuli.”

Though Pavlov’s work falls far short of human mind control, it did lay the groundwork for future studies in mind and behavior control of humans. John B. Watson conducted experiments in the United States on an 11-month-old infant. After allowing the infant to establish a rapport with a white rat, Watson began to beat on the floor with an iron bar every time the infant came in contact with the rat. After a time, the infant made the association between the appearance of the rat and the frightening sound, and began to cry every time the rat came into view. Eventually, the infant developed a fear of any type of small animal. Watson was the founder of the behaviorist school of psychology.

“Give me the baby, and I’ll make it climb and use its hands in constructing buildings or stone or wood. I’ll make it a thief, a gunman or a dope fiend. The possibilities of shaping in any direction are almost endless. Even gross differences in anatomical structure limits are far less than you may think. Make him a deaf mute, and I will build you a Helen Keller. Men are built, not born,” Watson proclaimed. His psychology did not recognize inner feelings and thoughts as legitimate objects of scientific study, he was only interested in overt behavior.

Though Watson’s work was the beginning of mans attempts to control human actions, the real work was done by B.F. Skinner, the high priest of the behaviorists movement. The key to Skinner’s work was the concept of operant conditioning, which relied on the notion of reinforcement, all behavior which is learned is rooted in either a positive or negative response to that action. There are two corollaries of operant conditioning” Aversion therapy and desensitization.

Aversion therapy uses unpleasant reinforcement to a response which is undesirable. This can take the form of electric shock, exposing the subject to fear producing situations, and the infliction of pain in general. It has been used as a way of “curing” homosexuality, alcoholism and stuttering. Desensitization involves forcing the subject to view disturbing images over and over again until they no longer produce any anxiety, then moving on to more extreme images, and repeating the process over again until no anxiety is produced. Eventually, the subject becomes immune to even the most extreme images. This technique is typically used to treat people’s phobias. Thus, the violence shown on T.V. could be said to have the unsystematic and unintended effect of desensitization.

Skinnerian behaviorism has been accused of attempting to deprive man of his free will, his dignity and his autonomy. It is said to be intolerant of uncertainty in human behavior, and refuses to recognize the private, the ineffable, and the unpredictable. It sees the individual merely as a medical, chemical and mechanistic entity which has no comprehension of its real interests.

Skinner believed that people are going to be manipulated. “I just want them to be manipulated effectively,” he said. He measured his success by the absence of resistance and counter control on the part of the person he was manipulating. He thought that his techniques could be perfected to the point that the subject would not even suspect that he was being manipulated.

Dr. James V. McConnel, head of the Department of Mental Health Research at the University of Michigan, said, “The day has come when we can combine sensory deprivation with the use of drugs, hypnosis, and the astute manipulation of reward and punishment to gain almost absolute control over an individual’s behavior. We want to reshape our society drastically.”

A U.S. Navy psychologist, who claims that the Office of Naval Intelligence had taken convicted murderers from military prisons, used behavior modification techniques on them, and then relocated them in American embassies throughout the world. Just prior to that time, the U.S. Senate Intelligence Committee had censured the CIA for its global political assassination plots, including plots against Fidel Castro. The Navy psychologist was Lt. Commander Thomas Narut of the U.S. Regional Medical Center in Naples, Italy. The information was divulged at an Oslo NATO conference of 120 psychologists from the eleven nation alliance. According to Dr. Narut, the U.S. Navy was an excellent place for a researcher to find “captive personnel” whom they could could use as guinea pigs in experiments. The Navy provided all the funding necessary, according to Narut.

Dr. Narut, in a question and answer session with reporters from many nations, revealed how the Navy was secretly programming large numbers of assassins. He said that the men he had worked with for the Navy were being prepared for commando-type operations, as well as covert operations in U.S. embassies worldwide. He described the men who went through his program as “hit men and assassins” who could kill on command.

Careful screening of the subjects was accomplished by Navy psychologists through the military records, and those who actually received assignments where their training could be utilized, were drawn mainly from submarine crews, the paratroops, and many were convicted murderers serving military prison sentences. Several men who had been awarded medals for bravery were drafted into the program.

The assassins were conditioned through “audio-visual desensitization”. The process involved the showing of films of people being injured or killed in a variety of ways, starting with very mild depictions, leading up to the more extreme forms of mayhem. Eventually, the subjects would be able to detach their feelings even when viewing the most horrible of films. The conditioning was most successful when applied to “passive-aggressive” types, and most of these ended up being able to kill without any regrets. The prime indicator of violent tendencies was the Minnesota Multiphasic Personality Inventory. Dr. Narut knew of two Navy programming centers, the neuropsychiatric laboratory in San Diego and the U.S. Regional Medical Center in Italy, where he worked.

During the audio-visual desensitization programming, restraints were used to force the subject to view the films. A device was used on the subjects eyelids to prevent him from blinking. Typically, the preliminary film was on an African youth being ritualistically circumcised with a dull knife and without any anesthetic. The second film showed a sawmill scene in which a man accidentally cut off his fingers.

In addition to the desensitization films, the potential assassins underwent programming to create prejudicial attitude in the men, to think of their future enemies, especially the leaders of these countries, as sub-human. Films and lectures were presented demeaning the culture and habits of the people of the countries where it had been decided they would be sent.

After his NATO lecture, Dr. Narut disappeared. He could not be located. Within a week of so after the lecture, the Pentagon issued an emphatic denial that the U.S. Navy had “engaged in psychological training or other types of training of personnel as assassins.” They disavowed the programming centers in San Diego and Naples and stated they were unable to locate Narut, but did provide confirmation that he was a staff member of the U.S. Regional Medical Center in Naples.

Dr. Alfred Zitani, an American delegate to the Oslo conference, did verify Narut’s remarks and they were published in the Sunday Times.

Sometime later, Dr. Narut surfaced again in London and recanted his remarks, stating that he was “talking in theoretical and not practical terms.” Shortly thereafter, the U.S. Naval headquarters in London issued a statement indicating that Dr. Narut’s remarks at the NATO conference should be discounted because he had “personal problems”. Dr. Narut never made any further public statements about the program.

During the NATO conference in Oslo, Dr. Narut had remarked that the reason he was divulging the information was because he believed that the information was coming out anyway. The doctor was referring to the disclosure by a Congressional subcommittee which were then appearing in the press concerning various CIA assassination plots. However, what Dr. Narut had failed to realize at the time, was that the Navy’s assassination plots were not destined to be revealed to the public at that time.

The scientific foundation of no touch torture

The scientific foundation of no touch torture by Martin Bott

Electromagnetic fields such as radio frequency and laser radiations always cause an electric current if they are acting on conducting materials such as metals and the human body. To have an effect on the nerves or the muscles this current needs to imitate the currents used by the body, as is the case with the commercially available muscle trainers or other bioelectric apparatus.

The currents used by the nerves have a low frequency in the order between several hertz to several kilohertz. To produce such low frequency currents through high frequency microwave or laser radiation several methods are used.

One technique is to use beats between two high frequency electromagnetic radiations with slightly different frequencies. These beats are actually a low frequency electromagnetic field which then causes a low frequency current. The frequency of the beats is actually the frequency difference between the two high frequency fields.

If an electromagnetic field of 1 Ghz and another of 1 Ghz plus 100 hertz are interacting, the resulting beats have a frequency of 100 hertz. These electromagnetic beats cause a current with a frequency of 100 hertz which then contracts muscles.

If the frequency of the beats is in the audible range, one would hear a sound or voice depending on the signal being used for modulation. Technically spoken one would overlay two high frequency electromagnetic radiations of equal frequency. To one of these microwave or laser radiations the desired low frequency signal, for example recorded nerve pulses or voice is added in a way that leads to an addition of the high frequency and the low frequency signal. The resulting beats between the two high frequency signals consist of a low frequency electromagnetic field which has the characteristics of the added nerve pulses or voice. This electromagnetic Field then causes an electrical current similar to the nerve pulses or voice added to the high frequency signal. And such an artificial nerve current has the same effect as the nerve currents used by the body.

Another possibility is to use an asymmetric electromagnetic field where the positive component has a different frequency from the negative component. Electric currents in the body are not caused by moving electrons as in metals but are mainly ionic currents. That is, they consist of moving electrically charged Atoms. These Atoms have a certain mass and size. Their relative size causes them to have, additional to their electrical resistance, a mechanical resistance in the body fluid. If the ion is moved faster, its mechanical resistance rises even faster.

The mechanical resistance rises as the square of the speed. This means that if the speed is doubled, the resistance is 2×2 which gives a value of 4. And if the speed rises by a factor of 3 the mechanical resistance rises by 3×3 which is 9. This effect can be felt if one moves the hand slow and fast through water.

As a consequence the ions conducting the current in the body experience a higher mechanical resistance if moved at higher frequencies as compared to lower frequencies. If the high frequency signal is asymmetric, meaning that the positive component of the sine wave has a different frequency as the negative component, the ion experiences two different mechanical resistances as well.

Since the energies of both components of the signal are equal, the ions are moved back and forth by the asymmetric field. But because of the lower mechanical resistance during slow movement they move a bit further in the direction enforced by of the lower frequency component.

This is illustrated with a DVD being moved through water in the Film 4 Strahlenwaffen. Such an asymmetric electromagnetic field can be generated with frequencies up to many Ghz by fast synthesizers. These asymmetric high frequency fields are causing ionic electric currents which can simulate nerve pulses in the body.

This techniques are used for brainwashing as well. If the parts of the brain which are passing the nerve signal from the ear to the brain are irradiated with such a speech modulated signal, the resulting voice is not being heard, as it is not coming from the ear. But it is not being thought either as it is not coming from inside the brain. That can make it difficult to decide whether specific thoughts or opinions are the result of brainwashing. Especially if one is not aware of this possibility. Brainwashing can be suspected if opinions or thoughts are openly false or even lead to dangerous behavior like taking drugs, drinking and smoking.

Suitably speech modulated electromagnetic fields are perceived as being heard or thought by certain brain regions involved in hearing. In a similar way the regions of the brain responsible for seeing can be stimulated by electromagnetic fields. The question arises to what extend this can be used. It is known that every point on the surface of the body corresponds to another point on the surface of the brain with regard to feeling, hearing and seeing. The surface of the brain is, so to speak, an image of the surface of the body with regard to data processing. Points being close together on the surface of the body or the retina are as well close together in the respective region of the brain. The region responsible for seeing is situated in the backof the skull, right over the neck and named visual cortex.

This opens the possibility to stimulate this region of the brain with laser using the techniques described in detail elsewhere in this text. A high resolution low frequency or asymmetric electromagnetic field being produced by heterodyning of two laser beams is used to scan the surface of the visual cortex. On its way over the brain surface it stimulates the nerves to cause the impression of seeing. And thus “write” a picture or a film onto the visual cortex.

There are two major obstacles to simply “write” a picture onto the brain. The first is that the structure and organization of every brain is a little different. The second is that the surface of the visual cortex is quite large and as a consequence is bent to fit into the scull resulting in a three dimensional structure.

The laser has to write the picture without the computer exactly knowing which part of the brain surface is matching a given point on the retina. This problem certainly would result in a distorted picture being “seen”. With modern computer techniques, matching a picture or a film to the bent surface of the brain, it is possible to write an exact picture onto the brain. The difficulty is to know which point on the brain corresponds to which point on the retina. This demands a possibility to calibrate the laser weapons.

But how can the brain, the retina and nerves in general be tapped with a sufficient high resolution at some distance? If a microwave signal is interacting with a low frequency signal such as is occurring in a nerve, both are heterodyning. This heterodyning causes signals with the frequencies microwave+nerve signal and another one microwave-nerve signal. As these resulting signals are microwave signals as well, they are radiating from the nerve and can be received at some distance, allowing direct measurement of the electric activity of the nerves.

The voltage of a nerve pulse measures about 50 to 100 millivolts. There are electronic circuits for transmitters operating with 600 millivolt and even less. These of course only have a short range of maybe 10 or 20 meters. However, the alternating voltage in the antenna of such a transmitter may not be much higher than 100 millivolt. Similar oscillating voltages result in similar radiated power. The nerves may not radiate as good as a metallic antenna but with the use of low noise amplifiers this may be compensated to some extend. A range of 5 to 10 meters for such a nerve tapping system seems to be reasonable and is more than what is necessary to map the electric activity of the retina and the brain.

The system needs two high resolution laser beams with slightly different frequencies to produce one beam of beats in the microwave range. These high resolution beats scan the group of nerves to be mapped. The local heterodyning between the electromagnetic beats in the microwave range and the nerve pulses cause microwave signals of different frequencies which are radiated. This allows to measure the nerve activity at some distance with a resolution depending on the resolution of the laser.

The technique is employed in the following way: One system is scanning the retina to exactly measure the local nerve activity with a high resolution. This allows at least to get a precise image of the patterns seen by the nerves of the retina at this moment. Maybe even a coloured picture similar to that seen with the eyes at this moment can be generated. A second system is simultaneously scanning the visual cortex.

During seeing a nerve signal from a spot on the retina is passed through the nerve system to the corresponding spot in the visual cortex. This spot then shows a nerve activity corresponding to the activity on the retina. Patterns seen by the eye show up on the surface of the brain as well.

Due to the irregular structure of the brain these patterns certainly will appear spatially distorted, but always in the same way. The technique described allows to map the retina and the visual cortex within seconds to gain sufficient data concerning the spatial distortion. This data then can be used to match a picture or a film to the spacial distortion in the visual cortex. This corrected picture will then be “seen” undistorted if written onto the brain with laser techniques.

Once this calibration is done any picture or film can be written at great distance onto the visual cortex. Certainly the picture seen by the eyes can be reproduced at great distances as well, using radar and lidar techniques to measure the direction the eyes are looking into. The picture of the area the eyes are looking into can be obtained by radar and lidar as well. This allows the possibility to write a modified or morphing picture or film of the reality into the visual cortex of the brain. This modified picture then interferes with the picture seen through the eyes. This technique seems to be used to simulate hallucinations by introduction of additional pictures or colours. The quality of the pictures and films being transmitted with this technique is unknown but may be very high. Certainly this technique used by the CIA/ NSA/ FBI is very costly and an enormous waste of tax money.

Making visible the picture seen by the eyes through tapping of the nerves seems to be done under favorable conditions for other reasons as well. In this case the tapped nerve signals are used to generate an exact picture of what is seen with the retina, to reveal what a person is looking at. And high resolution laser weapons allow to exactly steer the muscles of the eyes of a victim.

Both techniques combined allow the exact picture seen by a victim to be written on the retina of a CIA/ NSA/ FBI official. Then the movements of the muscles in the eye of the CIA/ NSA/ FBI official can be measured with radar and the data be used to steer the muscles of the victim likewise. This allows the agency preceding the CIA/ NSA/ FBI to cause a victim to see what they want him to see and to prevent the victim from seeing something else. This technique is being used in many ways to force a victim to make decisions, like choosing a certain company from the yellow pages or looking at specific points of a map omitting others.

Obviously crude techniques using electromagnetic radiation to write a picture onto the brain are known for quite some time. Around 1975 when I was about 10 years of age I had been told by classmates that one would have a third eye, situated on the brain right in the middle of the forehead, which I, of course, did not believe. However these children at the age of 10 or 12 years certainly knew a little more despite giving a false location for the visual cortex.

State of the art

According to the techniques published, one would expect a high resolution laser beam being split into two. One of these laser beams would run through a pockels cell where a synthesizer generated microwave signal would be added. This microwave signal would be asymmetric. Additionally it would be a spread spectrum signal, meaning that its frequency would change very fast over several Ghz. The interaction of these two laser beams produces beats in the microwave range.

As a result we have a high resolution and highly directional beam of an asymmetric electromagnetic field in the microwave range which then produces a low frequency current which can imitate the natural currents of the nerves. The target area is then scanned with this high resolution beam. Such beats in the microwave range penetrate an obstacle just like any radio frequency signal of the same frequency.

With this technique it is quite difficult to directly measure the beam due to the spread spectrum signal. Even with the proper measuring equipment it should be possible to shoot right around the sensors due to the very high resolution achievable with a laser. Other possibilities are jamming the sensors or using additional laser radiation which causes destructive interference of the electromagnetic waves within the sensor, nulling theeffect of the laser signal on this sensor.

Promising could be direct measurement of the currents on the surface, or better by electrodes within the body and comparing them with the natural body currents. Another possibility could be to use additional radiation of one or several suitable wavelengths which then interact with the radiation of the laser weapon to produce either beats or harmonics in a spectrum visible to the eye or cameras. A little bit of smoke would then reveal the path and origin of such a radiation used as weapon.

The generation of beats or harmonics can be used in shielding techniques as well. If additional radiation of a suitable wave length is overlaying or heterodyning the relatively low frequency beats of a laser weapon, harmonics can be generated in a frequency range which can not penetrate a certain barrier. An electromagnetic field causes atoms and molecules to move in time with the field. If the frequency of the electromagnetic field is low this movement of the atoms is slow as well, consuming relatively little of the energy being transmitted by the electromagnetic field. This allows microwave signals as well as electromagnetic beats in the microwave range to
penetrate walls.

If high frequency, for example infrared radiation, is overlaying the low frequency microwave signal, this heterodyning causes harmonics in the infrared region. These high frequency electromagnetic harmonics, like infrared radiation, are moving the atoms and molecules in time with their high frequency. These fast movements of atoms and molecules enforced by the harmonics or electromagnetic radiation are consuming the energy very fast, resulting in the radiation being shielded by converting it into heat.

The same physical principles are used for surveillance as well. The resolution achievable with laser radar techniques using infrared and visible light can be evaluated with regard to data storage on CD-ROM and DVD. Using heterodyning it is possible to penetrate one or several barriers. The use of UV-lasers allows a much higher resolution, making it possible to read CD-ROMs and DVDs at quite some distance, especially if they are positioned in a way exposing the optical layer to the laser. Stacks of many DVDґs may be read without any problem.

This makes possible to let organizations being interested in certain information, say voice or film recordings showing victims being tortured, to have a look at it and still being able to plausibly deny any knowledge. However, the material is archived somewhere. And the CIA/NSA/FBI certainly does not want this. And consequently may back off from torturing a person. Otherwise…film it, burn it and expose it.

The application to steering, brainwashing techniques and torture.

During steering the contraction of the muscles of the torturer is being measured with radar techniques. The contraction of the muscles of the torture victim is measured with radar techniques as well. Then electrical pulses are transmitted by laser or microwave techniques into the muscles of the torture victim till the muscles of both persons are contracted likewise, resulting in synchronous movements including speech. Being steered results in exactly following the movements of the person steering and saying what this person says.

Beating as it is frequently shown in the films requires purposeful movements of the body. These movements can be steered as described by a CIA/ NSA/ FBI official or by a person’s own brain. Brainwashing of course does not steer the muscles. Accordingly target is not beating during brainwashing and mood management as this requires deliberate and purposeful aimed movements of the body, not only enforced “thoughts” of any kind.

Brainwashing is done by converting voice into suitable electrical pulses. With theses pulses laser or microwave radiation is modulated in one of the already described ways. This modulated radiation is aimed at the regions of the head transmitting speech from the ears to the brain. This radiation then produces an electric current which is equivalent to the voice used for modulation.

Depending on the part of the head or brain being targeted this voice is perceived in a different way. If the ear is targeted the voice is heard like a normal voice as is the case with cochlear implants in deaf persons. If the areas of the brain are targeted which are transmitting the nerve signals from the ear to the brain, the voice does not come from the ear and is accordingly perceived more or less as thought. This makes it difficult, especially for the unaware, to distinguish between own thoughts and simulated “thoughts” enforced through brainwashing.

Because thoughts are more likely to be accepted as truth than an information given by another person, such enforced “thoughts” are used by the agency like the CIA/ NSA/ FBI to lie more effectively. An effective countermeasure could be to use an exotic language or dialect while thinking. This makes brainwashing more difficult as the CIA/ NSA/ FBI then has to use this language or dialect for brainwashing as well. The more exotic the better. America targeting native speakers of an exotic language for immigration may point to a possible operating field of the CIA/ NSA/ FBI, searching personnel to enable brainwashing in this region.

Additionally, enforced “thoughts” of any kind effectively prohibit a person to think on her own as long as the brainwashing continues. Such a prohibition to think, may result in a reduction of the intellectual capacity if continued over years due to lack of training. And it effectively prevents the targeted person to gain information from independent sources such as the media as a database to make correct decisions or to correct possible false beliefs.

This incident exposes the quality achievable in steering of the voice. Emotional changes in the torturers voice are being perfectly imitated by exactly copying the movements of the muscles to make the steered voice sound as natural as possible.

Obviously the computer processing the data being used for steering of the victims voice recognizes the emotionality of the steering CIA/ NSA/ FBI official to a certain extend. Techniques like stress analysis of the voice and measurement of the electrical resistance of the skin are being used in the polygraph for lie detection. The lower the resistance of the skin the stronger the current induced by radar and the stronger the returning radar signal.

With this data it is possible to a certain extend to automatically steer additional rudimentary mood management in phase with the mood and voice of the steering CIA/ NSA/ FBI official. Additional mood management used against the victim while being steered makes it harder to recognize this steering. Experiencing the own body insulting or even beating someone without being angry would be quite a strange experience, making it obvious that the own body is being steered. As it is sometimes been stated by persons being accused of aggressive behavior. The shouting and insulting carried out by the CIA/ NSA/ FBI official steering the target before beginning to beat could be part of this mood management system as well. To make it more difficult for target to recognize the mood management and the steering by diverting him through additional agitation.

A certain amount of blackout in some regions of the brain seems to be used by the CIA/ NSA/ FBI as well to render more difficult the detection of being steered. This suppression of intellectual capacity and power of recollection can be achieved through slowing down of the brainwaves or by jamming of the communication between the nerve cells using additional electric pulses being transmitted through radio frequency or laser weapons. Such a blackout sometimes as well is reported by persons being involved in violent incidents.

Even the short term memory can be erased to a certain extend as it stores the information electrically before this information finally is being stored chemically through connections of the nerves which can only be erased by destruction of the cells. But such a destruction would be easily detectable using modern medical equipment.

Electrical erasure of the short term memory by purpose can be assumed if one goes a short distance, say into another room for a certain reason and on arrival can not remember this reason.

The experience of a word being on the tip of someoneґs tongue which then slips away without the possibility to get a grip on it, also seems to be caused through erasure of the short term memory.

Committing someone to suicide can be achieved by brainwashing as well. However, directly steering a person into death will be much easier and thus be preferred. The recorded films show target completely being steered. This techniques can be used to assassinate a person by steering, using any of the conceivable methods to commit suicide. While being steered target had been made to shoot himself into the hand with an
air gun.

Causing someone to drive straight ahead into a tree or walk into a passing car can easily be done by producing low frequency beta waves in the brain, prohibiting all conscious action. Simple devices using this mechanism by employing laser or microwave radiation.

Interview with a CIA non-consensual human behavioral modification project

Transcript of Interview

Can you describe what mind control feels like?

JD: It takes on different characteristics over time. In the beginning, you simply don’t know that you are being influenced by it. Your brain doesn’t distinguish the external signal from your natural brain signals. Later, you feel that something is wrong and it feels like you are disassociated. Overtime as the intensity is turned up, you almost go into shock that such pain and trauma can be induced into the brain bypassing the normal sensory pathways. Just like turning a knob, full control of the human can be achieved or dissipated.

When full control is achieved it can best be described like a war in the mind. Your freewill is trying to overcome the mind control signal. Imagine a road with deep ruts in it. You are driving 55 miles an hour. Your tires get caught in the ruts and the car begins to steer itself to follow the deep ruts. When the car hops out of the ruts you get control but quickly the front tires get trapped into the ruts again. But unlike a car, you can’t just stop your mind. Even during sleep it continues and must follow the ruts. Later I learned that these ruts are called brain resonance entrainments and has commonalities to hypnosis.

What other kinds of psychological and neurological experiments were run on you?

JD: I counted over 75 different experiments from passing polygraphs and purposely failing polygraphs to memory recall experiments and trying to program me to kill various military leaders whom I didn’t know. They used sentence repetition, subliminal dream programming, a strange kind of brain imprinting using conditioning of emotional states that could be invoked with flashing images of the people I was to kill they told me.

What else can you tell people about your horrific experience and about neurological weapons?

JD: What was truly mind blowing for me is that I was forced to begin thinking in words. Every thought that I had after a while would be perceived as internal audio. They went through a mapping process where they refined and tuned the phonemes of perceived speech. It was as if they forced my brain to learn a way to control a voice synthesizer.

Can you imagine how maddening it is not to be able to think quickly and silently?

What do you think the purpose was of that experiment?

JD: At the time I was so confused as to why this was being done to me that I didn’t know. But in hindsight it was obvious that it served dual purposes at least. It is the perfect interrogation tool and by interjecting false sentences in the same “voice” as my new internal voice, the system would occasionally trick my mind into thinking that I thought it. They have been working on this technology and using it for over half a century. Again, in hindsight, I have seen this technology described in countless movies but didn’t believe that it really existed at the time.

How did they release you from the program?

JD: I don’t know if they fully did. They stopped the torture and violent imagery and repetitive sentence programming that were intensely painful, but not everything has stopped. Maybe I am to be triggered by a keyword to do their bidding. I just don’t know if I am a failed project because I was too aware of what they were trying to do or if I am now a programmed assassin. How could one know that technology to fully control a human as a remote control soldier has been perfected? I feel exactly how someone should feel who was tortured and now cope with post traumatic stress syndrome with flashbacks to the extreme torture methods.

It is difficult to know whether I should consider myself lucky that I survived or if the horror of being betrayed by my government and living with the knowledge on what a massive scale this is done isn’t a fate worse than death. There are no good guys to root for anymore.

Brainwashing and Mind Control Methods

There are many methods of gaining control over the human mind. Commonly disguised as relaxation or meditation, hypnosis induces a high state of suggestibility and is mainly achieved in three ways: repetitive music (close to the human heart beat), voice rolling (talking to a beat of 45 to 60 beats per minute in a patterned, paced style), and to make the subject comfortable and drowsy with the feel of the room. Other methods of mind control are: imposing fear or guilt, allowing no questions, playing “games” with obscure rules, forcing controlled approval, isolation, finger pointing, financial commitment, confession, sleep deprivation, imposing fatigue, peer or group pressure, love bombing, confusing doctrine, communication, removal of privacy, disinhibitation, uncompromising rules and verbal abuse.

You Are Being Brain Washed

written by Ken Poirier – November 2008

YOU ARE BEING BRAINWASHED. You don’t have to like it, but most people do. There has always been an “opiate for the masses”. It is a necessary part of the civilized world. Imagine if everyone was running around with a free thinking mind of their own. People would work less and less, demanding more and more pay. Parents would trust their children to make decisions on their own. Teachers would teach information based on research, instead of curriculum. Students would learn, instead of achieving grades.

Fortunately, You don’t have to worry about that. You are being brainwashed.

Although brainwashing has existed for thousands of years, the term “brainwashing” was coined by the CIA in 1950. It is also known as re-education, thought control, propaganda, and conversion.

The human mind is not predisposed to accept external control. Look at children. If you tell them to do something, they automatically rebel. It is only through repetition of instructions and a punishment/reward system that they “learn” to “behave properly”. If it wasn’t for this early brainwashing, we would all be running around naked, making funny noises for no reason, leaving doors open, and farting in public.

This is how brainwashing works. Mental programming requires three basic elements. First, the programmer needs to limit the information available to the subject. Then they control the subject’s behavior. The final piece of the puzzle is to apply subtle amounts of stress to the subject to distract them from the thought control process.

Mind ControlLimiting the information can be done by isolating the subject from alternate opinions. We say to the child, “You can’t play with Jimmy. He’s a bad influence.”, “You need to go to church every Sunday.” The programmer can physically separate you from those opinions or make you dismiss them before those ideas are heard. They may say, “Those people are uncivilized”, “They are just crackpots and alarmist.”, “Let us never tolerate outrageous conspiracy theories.” (GW Bush) or on the other side, “You can never trust the white devil.” If someone is trying keep you from learning, you are being brainwashed.

It can also come in the form of repetition. It could be something someone is saying to you, “You’re an idiot.”, “You don’t know what your doing.”, “You can’t hold a job.”, “you’re a drunk.” If someone says something to you enough, you will eventually believe that it’s true. Repetition might also be something you say over and over again, like a prayer, pledge, or saying. It most often comes in the form of TV news or slogans, “Stay the course” , “In God We Trust”, “We can’t let the terrorist win.”, “I’m thinking Arby’s!”

If you are hearing or seeing, or (even worse) saying, the same phrase over and over again, you are being brainwashed.

The second phase is controlled behavior. It can be as simple as being woken from a state of sleep to go to work or school, or telling someone when they can or can’t go to the bathroom. It could be someone telling you, not asking you, to chew with your mouth closed. It can also be repetitive movements such as when we are at church, being told to kneel, stand, or sit on command. It can be even broader, Pay your taxes, Drive the speed limit, green light = go, red light = stop.

Our behavior can also be controlled by observing the behavior in others. If a child sees her father beating her mother, she will grow up and be beaten by her husband. If, in a movie, a teacher takes a note from a student and reads it out loud before the class, and a teacher or student watches that movie, they will imitate that behavior in real life. If an evangelist sees their family in church rolling on the floor, “possessed by the holy spirit”, they too will one day roll on the floor. If someone plays Call of Duty 4 enough, they will think it is ok to go to foreign countries and kill brown people.

Usually though, you will just get brainwashed into buying a new car or exercise equipment you can’t afford.

The last aspect is the application of stress. Most often, this takes the form of a conditional threat; hence it is often called conditioning. “If you don’t stop drinking, I’m taking the kids and leaving”, “If you sleep with anyone else I’ll kill you”, “If you leave me, I’ll kill myself”, “If you don’t pray, you’ll go to hell”, “If you don’t behave, we will beat you again”, “If you don’t pass a $700 billion dollar bail-out, I’ll instate marshal law.”

If someone is trying to control your behavior or putting stress on your life, you are being brainwashed. Get away from them!

The worse thing about being brainwashed is that once you are brainwashed, it is very difficult to be aware of it. Your brainwashed state of mind and actions is completely normal to you. You are just an average Joe (maybe you’re a plumber, zing!). Everything you do seems completely normal. Since, you are normal, anyone who doesn’t share your beliefs and values must be either insane or uncivilized. So what do you do? You brainwash them!

That is the beauty of the system. Since humans feel a need to be socially justified, without even thinking about it, we go out and “teach” others about “proper behavior”. The brainwashed become the brainwashers, at no extra charge. The programmed behavior spreads like a virus from host to host, to friends, lovers, and family.

There is hope. You can change your ways. The main defense against brainwashing is to not let the stress distract you and to remain aware that you are being brainwashed. Next time someone is telling you what to do, if you are doing something that seems against your will, if the words coming out of your mouth are not yours, say to your self, “I’m being brainwashed!” Then get yourself out of that situation and away from those people! Remember, it’s not their fault, they are brainwashed. Just get away from them.

Remain aware! When you put this paper down, you will be aware that you are being brainwashed.

What is Mind Control / Psychotronic Torture?



BY DEB CHAKRABORTY

 

The term “Mind control” basically means covert attempts to influence the thoughts and behavior of human beings against their will (or without their knowledge), particularly when surveillance of an individual is used as an integral part of such influencing and the term “Psychotronic Torture” comes from psycho (of psychological) and electronic. This is actually a very sophisticated form of remote technological torture that slowly invalidates and incapacitates a person. These invisible and non-traceable technological assaults on human beings are done in order to destroy someone psychologically and physiologically.

Actually, as par scientific resources, the human body, much like a computer, contains myriad data processors. They include, but are not limited to, the chemical-electrical activity of the brain, heart, and peripheral nervous system, the signals sent from the cortex region of the brain to other parts of our body, the tiny hair cells in the inner ear that process auditory signals, and the light-sensitive retina and cornea of the eye that process visual activity. We are on the threshold of an era in which these data processors of the human body may be manipulated or debilitated. Examples of unplanned attacks on the body’s data-processing capability are well-documented.

An entirely new arsenal of weapons, based on devices designed to introduce subliminal messages or to alter the body’s psychological and data-processing capabilities, might be used to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the various sensory and data-processing systems of the human organism. In both cases, the goal is to confuse or destroy the signals that normally keep the body in equilibrium.

Definition of psychotronic (psycho-physical) weapons.


Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means (techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden, forced influences on the psyche of a person for the purpose of modifying his consciousness, behavior and health for what is desired in the way of influencing aspects of control…” This is not only dangerous, this is deadly!”

Actually, the goal of mind control is to access those areas of the brain that are outside of the conscious control of the individual by circumventing the normal inhibiting response of the cerebral cortex: “an individual’s voluntary conscious self-control must be bypassed or short-circuited.” This unconscious coercion is done through electromagnetic-wave bombardment of the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne waves can travel over distances and are known to change the behavior of animals and humans in their path. Such remote control makes possible potentially frightening uses for altering the brain’s functioning. These are invisible and deadly waves. This waves goes directly to the subconscious parts of the human brain for receiving or transcoding the messages and without the person exposed to such influence having a chance to control the information input consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting mind control requires the creation of “profound and deep emotional states.” Recommended are fear, shock and anxiety, which have “an intense disinhibitive effect on the human brain.” What this means, in essence, is that emotional trauma facilitates the accessing of dissociative states. In order to disable the brain’s “cortical block,” Verdier recommends alcohol, euphoric drugs, isolation, solitary confinement, and – “the most dramatic and unique item in the brainwashing arsenal” – hypnosis. All of these are methods that have been extensively tested by the CIA under the rubric of the MK-ULTRA program.

The technology is rooted in surveillance devices, such as audio and video bugs, through-the-wall and remote sensing devices, and biosensors both remote and implanted.  This provides the feedback for the influencing, as well as any “entertainment” value for voyeur/sadists and intellectual property theft for thieves.  Coupled with the surveillance is some sort of “effectors” or feedback path for influencing an individual.

Thus there are several categories of mind control operations, for example covert drugging, hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks, and ongoing feedback control setups for long-term torture and exploitation of victims, to mention a few.  What they have in common is the attack against the mind of the victim, as well as the deniable and denied nature of the attack.  The exact means being used in any particular case are beside the point here.  These techniques do not just violate one or two of what everyone knows are fundamental human rights:  In one fell swoop they violate almost every fundamental human right a person has.

The electromagnetic technology works on the theory that the mind and body are an electromagnetically mediated biophysics system and the electromagnetic signals form outside sources can mimic the mind and body’s electromagnetic signals and therefore a weapon can be developed based on these principles.

There is evidence that since the 1950’s the U.S. and other government have been developing electromagnetic weapons which can remotely target the electromagnetic system of the human body for military and intelligence purposes.

The First phase is the harassment/surveillance program


During the first phase of this Govt. program a person is broken physically and mentally. The methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon, Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs, homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family, friends. The isolation is needed to have access to the person to conduct many of the experiments on them. All privacy and constitutional rights are thus stripped away.

The second phase is the assaults of Directed Energy Weapons.


After a victim becomes isolated from everyone in the world. The victim now having feelings of regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During this time many have been implanted with microchips. Many begin experiencing extreme pain to their head. Some hear voices. Then pain is delivered to various other parts of their bodies. The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing the pain and no one is touching them. It is an invisible energy force. Along with drugs being administered by the scientist through either a drip system which!has been inserted into an individual, food tampering, or injection all without the victims permission. Then Mind Entrainment begins.

Directed Energy Weapons


Some of the weapons were known as non-lethal weapons. They use such weapons as extremely low frequency Elf electromagnetic weapons (which has been used in mind control), acoustics, harmonics (which have been used as a mind control technique), ultrasound, microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic energy beam can be used to induce “considerable agitation and muscular activity” or “induce muscular weakness and lethargy” this weapon is know as Ultra High Frequency EM.

Psychological warfare tactics are being used against unsuspecting citizens to destroy their jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to utterly destroy a person, very often resulting in a person taking his or her own life, or ending up in a mental hospital. This has been taking place for years and nothing is ever said about it. Nothing is ever written about it. For the sake of those who came before us, and those who come after us, the world needs to know what is happening.

For many people, this comes out of nowhere. They don’t know whose toes they stepped on in order to warrant such a brutal attack. For others who are whistleblowers, they know full well how they garnered such attention. For some, they don’t even realize that they are the targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that something unspeakable and devastating is happening.

What makes this crime so heinous is that the most sophisticated techniques of psychological warfare are employed against a person in order to make them look like they are crazy. Friends and family members don’t believe the things that are happening and often believe the targeted person is crazy.

This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking part of it, which targets experience to varying degrees. This involves stalking by a multitude of individuals both on foot and while you’re in the car. Known as “street theatre” by those who experience it, it involves vandalism to house, car and personal property. Gang stalking can also be referred to as cause stalking, vengeance stalking and multi-stalking.

Some people also experience electronic harassment. This is extremely distressing, painful and invasive, and feels like one’s mind and body is undergoing constant rape, 24 hours a day, 7 days a week. The technology used to do this is unknown, but hundreds of victims report the same physical sensations and experiences. Many take their lives in an attempt to escape the horror. It is so distressing that only fellow targets can really understand what another target is experiencing.

In either case, the attacks are so well orchestrated that only the victim is aware of them. This is intentional, and it appears that these groups have perfected these techniques over many years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do, since new targets are completely bewildered as to what is happening to them, having never heard a peep out of the media about such occurrences (except in relation to mental illness). Their actions are based on many of the same tactics as those employed in ritual abuse, and are designed to weaken the target’s mind and perpetrators are becoming increasingly addicted to this game of predator/prey, always needing more targets to satisfy their unending thirst for a thrill.

“Electronic harassment” or e-harassment is a catch-all term used to describe a group of circumstances which a large number of people are currently experiencing in common. In general, this term refers to the use of electronic technology to view, track and/or harass a person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by neighbors) is largely personal opinion. There is no definitive proof that would allow any of the present victims to launch a court case, but the numbers of victims and the commonality of experience speaks for itself.

The technology involves the use of electromagnetic waves of various frequencies to achieve different results. Some frequencies will make a person tired, while others may cause confusion or memory loss. With the rapid increase in cell phone usage, many experiments have been conducted on the detrimental effects of those particular frequencies on animals. The results indicate that the invisible e.m. signals from cell towers can cause a wide range of physical ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is even more likely the case with the frequencies which may be used to cause direct, intentional harm to a person.

Electronic harassment is sometimes referred to as “psychotronics”, but would more accurately be described as “criminal psychotronics”.

Types of Weapons:

Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons

Soft Kill Weapons
Less-Than-Lethal Weapons

Psychological Warfare ( Manipulation)

PSYCHOLOGICAL MANIPULATION

Psychological manipulation is a type of social influence that aims to change the perception or behavior of others through underhanded, deceptive, or even abusive tactics. By advancing the interests of the manipulator, often at the other’s expense, such methods could be considered exploitative, abusive, devious, and deceptive.

Social influence is not necessarily negative. For example, doctors can try to persuade patients to change unhealthy habits. Social influence is generally perceived to be harmless when it respects the right of the influenced to accept or reject it, and is not unduly coercive. Depending on the context and motivations, social influence may constitute underhanded manipulation.

REQUIREMENTS FOR SUCCESSFUL MANIPULATION

According to George K. Simon, successful psychological manipulation primarily involves the manipulator:

–          concealing aggressive intentions and behaviors.

–          knowing the psychological vulnerabilities of the victim to determine what tactics are likely to be the most effective.

–          having a sufficient level of ruthlessness to have no qualms about causing harm to the victim if necessary.

Consequently the manipulation is likely to be covert (relational aggressive or passive aggressive).

HOW MANIPULATORS CONTROL THEIR VICTIMS

According to Braiker

Braiker identified the following basic ways that manipulators control their victims:

–          positive reinforcement – includes praise, superficial charm, superficial sympathy (crocodile tears), excessive apologizing; money, approval, gifts; attention, facial expressions such as a forced laugh or smile; public recognition.

–          negative reinforcement – includes nagging, yelling, the silent treatment, intimidation, threats, swearing, emotional blackmail, the guilt trap, sulking, crying, and playing the victim.

–          intermittent or partial reinforcement – Partial or intermittent negative reinforcement can create an effective climate of fear and doubt. Partial or intermittent positive reinforcement can encourage the victim to persist – for example in most forms of gambling, the gambler is likely to win now and again but still lose money overall.

–          Punishment

–          traumatic one-trial learning – using verbal abuse, explosive anger, or other intimidating behavior to establish dominance or superiority; even one incident of such behavior can condition or train victims to avoid upsetting, confronting or contradicting the manipulator.

According to Simon

Simon identified the following manipulative techniques:

Lying: It is hard to tell if somebody is lying at the time they do it although often the truth may be apparent later when it is too late. One way to minimize the chances of being lied to is to understand that some personality types (particularly psychopaths) are experts at the art of lying and cheating, doing it frequently, and often in subtle ways.

Lying by omission: This is a very subtle form of lying by withholding a significant amount of the truth. This technique is also used in propaganda.

Denial: Manipulator refuses to admit that he or she has done something wrong.

Rationalization: An excuse made by the manipulator for inappropriate behavior. Rationalization is closely related to spin.

Minimization: This is a type of denial coupled with rationalization. The manipulator asserts that his or her behavior is not as harmful or irresponsible as someone else was suggesting, for example saying that a taunt or insult was only a joke.

Selective inattention or selective attention: Manipulator refuses to pay attention to anything that may distract from his or her agenda, saying things like “I don’t want to hear it”.

Diversion: Manipulator not giving a straight answer to a straight question and instead being diversionary, steering the conversation onto another topic.

Evasion: Similar to diversion but giving irrelevant, rambling, vague responses, weasel words.

Covert intimidation: Manipulator throwing the victim onto the defensive by using veiled (subtle, indirect or implied) threats.

Guilt tripping: A special kind of intimidation tactic. A manipulator suggests to the conscientious victim that he or she does not care enough, is too selfish or has it easy. This usually results in the victim feeling bad, keeping them in a self-doubting, anxious and submissive position.

Shaming: Manipulator uses sarcasm and put-downs to increase fear and self-doubt in the victim. Manipulators use this tactic to make others feel unworthy and therefore defer to them. Shaming tactics can be very subtle such as a fierce look or glance, unpleasant tone of voice, rhetorical comments, subtle sarcasm. Manipulators can make one feel ashamed for even daring to challenge them. It is an effective way to foster a sense of inadequacy in the victim.

Playing the victim role (“poor me”): Manipulator portrays him- or herself as a victim of circumstance or of someone else’s behavior in order to gain pity, sympathy or evoke compassion and thereby get something from another. Caring and conscientious people cannot stand to see anyone suffering and the manipulator often finds it easy to play on sympathy to get cooperation.

Vilifying the victim: More than any other, this tactic is a powerful means of putting the victim on the defensive while simultaneously masking the aggressive intent of the manipulator.

Playing the servant role: Cloaking a self-serving agenda in guise of a service to a more noble cause, for example saying he is acting in a certain way for “obedience” and “service” to God or a similar authority figure.

Seduction: Manipulator uses charm, praise, flattery or overtly supporting others in order to get them to lower their defenses and give their trust and loyalty to him or her.

Projecting the blame (blaming others): Manipulator scapegoats in often subtle, hard to detect ways.

Feigning innocence: Manipulator tries to suggest that any harm done was unintentional or did not do something that they were accused of. Manipulator may put on a look of surprise or indignation. This tactic makes the victim question his or her own judgment and possibly his own sanity.

Feigning confusion: Manipulator tries to play dumb by pretending he or she does not know what you are talking about or is confused about an important issue brought to his attention.

Brandishing anger: Manipulator uses anger to brandish sufficient emotional intensity and rage to shock the victim into submission. The manipulator is not actually angry, he or she just puts on an act. He just wants what he wants and gets “angry” when denied.

VULNERABILITIES EXPLOITED BY MANIPULATORS

According to Braiker manipulators exploit the following vulnerabilities (buttons) that may exist in victims:

  • the “disease to please”
  • addiction to earning the approval and acceptance of others
  • Emotophobia (fear of negative emotion)
  • lack of assertiveness and ability to say no
  • blurry sense of identity (with soft personal boundaries)
  • low self-reliance
  • external locus of control

 

According to Simon manipulators exploit the following vulnerabilities that may exist in victims:

 

  • naïveté – victim finds it too hard to accept the idea that some people are cunning, devious and ruthless or is “in denial” if he or she is being victimized
  • over-conscientiousness – victim is too willing to give manipulator the benefit of the doubt and see their side of things in which they blame the victim
  • low self-confidence – victim is self-doubting, lacking in confidence and assertiveness, likely to go on the defensive too easily.
  • over-intellectualization – victim tries too hard to understand and believes the manipulator has some understandable reason to be hurtful.
  • emotional dependency – victim has a submissive or dependent personality. The more emotionally dependent the victim is, the more vulnerable he or she is to being exploited and manipulated.

Manipulators generally take the time to scope out the characteristics and vulnerabilities of their victim.

According to Kantor the following are vulnerable to psychopathic manipulators:

  • too trusting – people who are honest often assume that everyone else is honest. They commit themselves to people they hardly know without checking credentials, etc. They rarely question so-called experts.
  • too altruistic – the opposite of psychopathic; too honest, too fair, too empathetic
  • too impressionable – overly seduced by charmers. For example, they might vote for the phony politician who kisses babies.
  • too naïve – cannot believe there are dishonest people in the world or if there were they would not be allowed to operate.
  • too masochistic – lack of self-respect and unconsciously let psychopaths take advantage of them. They think they deserve it out of a sense of guilt.
  • too narcissistic – narcissists are prone to falling for unmerited flattery.
  • too greedy – the greedy and dishonest may fall prey to a psychopath who can easily entice them to act in an immoral way.
  • too immature – has impaired judgment and believes the exaggerated advertising claims.
  • too materialistic – easy prey for loan sharks or get-rich-quick schemes
  • too dependent – dependent people need to be loved and are therefore gullible and liable to say yes to something to which they should say no.
  • too lonely – lonely people may accept any offer of human contact. A psychopathic stranger may offer human companionship for a price.
  • too impulsive – make snap decisions about, for example, what to buy or whom to marry without consulting others.
  • too frugal – cannot say no to a bargain even if they know the reason why it is so cheap
  • the elderly – the elderly can become fatigued and less capable of multi-tasking. When hearing a sales pitch they are less likely to consider that it could be a con. They are prone to giving money to someone with a hard-luck story. See elder abuse.

MOTIVATIONS OF MANIPULATORS

Manipulators have possible motivations, including:

–          the need to advance their own purposes and personal gain at virtually any cost to others,

–          a strong need to attain feelings of power and superiority in relationships with others,

–          a want and need to feel in control (aka. control freakery),

–          and gaining a feeling of power over others in order to raise self-esteem.

No-Touch Torture (Remote torture) , Interrogations and False Confession


Interrogation Tactics

It is well settled that courts permit interrogators to lie to suspects on certain subjects and to deceive them — and interrogators routinely exercise these freedoms. They lie about both the existence and the strength of the evidence that supposedly links the suspect to a crime. They deceive suspects by feigning certainty in the suspect’s guilt even when they have no evidence pointing to the person. And, when they know their advice is not in the suspect’s interest, they deceive by feigning sincerity when they volunteer advice about how best to deal with the problem facing the suspect.10

Interrogators also lie when they do things that the courts prohibit, such as promising leniency. Not only are their promises of leniency impermissible, they are false. Persons who are naïve about interrogation are unlikely to realize they are being lied to by the detective they correctly understand is promising that leniency will follow from a confession that the crime happened in a certain way. The detective knows that he has no power to deliver on his promise. He has no intention of trying to honor the promise. He probably does not believe that the crime happened as he has suggested. He has also probably already made up his mind that he will lie if asked about the promise and deny that he ever made it, even if he is asked while under oath.11

Interrogation is also an exceptional experience because the stakes are so high. Being accused of having committed a murder is likely to foster the realization that what life will be like in the future depends on the resolution of the accusation. Interrogators capitalize on and intensify the feelings associated with this realization. They try to make it seem that the suspect’s future, if not his life, turns on the outcome of the interrogation itself, as if it is during the interrogation that the accusation will be resolved. Both being accused of a serious crime and the interrogator’s initial position that the suspect’s future will be spent in prison are likely to be disturbing and create great anxiety. Interrogators act to magnify a suspect’s distress for two reasons. They want the suspect to believe that he or she needs to reach a resolution during the interrogation. They also want to intensify the suspect’s distress since emotionality interferes with thinking strategically and diminishes the likelihood that the suspect will consider possible options different from those the interrogator proposes.

Despite the fact that interrogations are conducted under atypical circumstances and in settings that are unusually stressful, there is no reason to imagine that a suspect’s decision-making is anything but rational given the information on which he is relying. That said, one should not forget the adage “garbage in, garbage out” and bear in mind that in assessing options the suspect is enmeshed in a fantasy deliberately created by the interrogator. Even knowing he is innocent of the crime, in assessing risk a suspect relies on false information about the amount of evidence that mistakenly links him to the crime. In deciding what is best for him to do, the suspect does not know that the offer of a way out is a fraud. What makes psychological coercion so dangerous is that it can lead an innocent person to erroneously conclude that giving a false confession is the best choice under what he perceives to be his circumstances.

Approaching interrogation as a matter of rational decision-making and being able to study records of interrogations have led to certain realizations about how detectives convince suspects to admit responsibility for a crime. To prepare someone to shift from denial to admission, detectives need to accomplish specific intermediate goals and address these goals in a particular order. Influencing someone to shift requires three steps: (1) that the suspect’s perception of his situation be changed from confident and secure that the interrogation will not be a problem for him to dispirited and hopeless; (2) that the suspect’s expectations about the future change from confident he or she will return to normal life to certain that arrest and imprisonment will follow the interrogation; and (3) that a motivator be provided to induce the suspect to shift from denial to admission of responsibility.

Interrogation records reveal that detectives use a relatively small number of alternative tactics to accomplish each of their essential sub-goals. Although interrogations vary somewhat as a function of the habits of the detectives conducting them and the crimes under investigation, the similarities from one interrogation to the next are far more striking than their differences. The similarities are there because detectives learn to conduct interrogations by attending schools or through on-the-job training that passes on the culture of interrogation.

True and false confessions happen in response to interrogations that are built from almost identical collections of tactics. Understanding why false confessions happen starts with realizing that interrogations that overcome a suspect’s resistance and produce confessions will always include steps 1 and 2 because these steps set up the suspect to view his situation in a certain way — because his future is determined, confessing or not makes no real difference.

The majority of the tactics detectives actually use in interrogation are approved (or not disapproved) by the courts. What appears to distinguish interrogations that can produce a false confession from those that do not have this potential is the type and strength of the motivator that the interrogator relies on to accomplish step 3. Interrogations that stay within the bounds set by the courts, including which motivational tactics may be used, do not seem to have the potential to cause normal, innocent adults to falsely confess.

Based on the research that has been done and my experience studying interrogation and false confession in the United States, it appears that knowing false confessions from psychologically and intellectually normal adults come about if and only if a detective introduces into the interrogation a too strong motivator, that is, a motivator that is psychologically coercive.12 A psychologically coercive motivator is created when an interrogator establishes a linkage between confessing and absolute or relative leniency and/or a linkage between continuing to deny and absolute or relatively severe punishment. Interrogators inject psychological coercion into an interrogation either by making direct, blatant threats and promises or through a more complicated method that works to communicate a message via a series of suggestions and slightly veiled promises.

Unfortunately, despite knowing full well that what they are doing is prohibited, some detectives deliberately use psychological coercion to obtain confessions from suspects. Although undoubtedly many of the suspects exposed to coercive motivators are guilty of the crime, some are not and the interrogator cannot necessarily tell the difference. The reliance by American police on the use of coercive motivators is a serious problem. According to studies, false confessions are one of the major causes of miscarriages of justice in America. ( Read More)

What is a psychotronic weapon?

It is a weapon that emits certain electromagnetic frequencies  that can affect the central nervous system and the neural activity of the brain, disrupting its normal  activities.  This is part of a larger study under several names, electromagnetics, biomagnetics, and  others.  Apparently, if reports can be believed, the first uses of psychotronic warfare was by the  Soviets during the cold war.  Some synonyms for psychotronics are synthetic telepathy, subconscious  brainwashing.

 

ПСИХОТРОНИКА  – отрасль науки и техники, в основе которой лежит взаимодействие человеческой психики с физическими приборами и техническими устройствами; возможность работы этих устройств заключена не в самом приборе, а в специально подготовленном операторе, в его психической программе и глубине сознания, поэтому в результате психического воздействия человека-оператора физико-технические характеристики устройства существенно меняются.

Методы целенаправленного воздействия на человека


Воздействовать на ум и поведение человека можно различными путями, одни из которых требуют лишь специфичной подготовленности специалиста (убеждение, внушение, подкуп…), а другие – еще и специальной аппаратуры (технотронные приемы, секс-мероприятия, зомбирование…).
Методы прицельного влияния могут быть щадящими (внушение…) и агрессивными (шантаж), простенькими (запугивание…) и изощренными (зомбирование…), трудно уловимыми (нейролингвистическое программирование…) и дополняющими (фармакоуправление…).
*Выбор применяемой методики зависит от*:
– реальной уязвимости объекта (черт его характера, эпизодов биографии, наличной ситуации…);
– цели намечаемого воздействия (изменение мышления, привлечение к сотрудничеству, получение информации, одноразовое содействие, воспитующее наказание…);
– собственных возможностей (обладание временем, умением, знанием, техаппаратурой, должными химпрепаратами, компетентными помощниками…);
– персональных установок исполнителя (его уровня моральной допустимости…).
*В практике чаще всего используются*:
– убеждение;
– внушение;
– гипноз;
– нейролингвистическое программирование;
– нарковоздействия;
– секс-мероприятия;
– фармакоуправление;
– технотронные приемы (ультразвук, инфразвук, СВЧ-излучения, электрошок, подпороговая стимуляция, торсионные излучения…);
– зомбирование;
– подкуп;
– запугивание;
– пытки..