Category Archives: Zersetzung

Space Mirror in Russia ( Father of HAARP in USA)

Space Mirror

by N.Shpakovsky,
TRIZ-Consultant, Ph.D.
nick_sh2000@mail.ru

Abstract. The article analyzes the failure of the Russian project �Znamya 2�, which is better known as �Space Mirror�. When unfolding, the space mirror membrane caught on the antenna that projected over the space station body.

Using TRIZ, the causes of the failure were analyzed and a number of solutions for improving the reliability of the flexible membrane unfolding under weightlessness were proposed.

Introduction. The space mirror that reflects the Sun�s rays onto the nightside of our planet is one of the impressive space projects. In 1993, the spaceship �Progress M-15� placed into orbit a 20-meter film mirror (the project �Znamya 2�). The mirror unfurled and produced a light spot that was equal in strength approximately to one full moon. A huge plash of sunlight glanced over beclouded Europe to be seen only by astronomers on the top of the Alps.

The project �Znamya 2.5� stood head and shoulders above its predecessor. The mirror was expected to be perceived on the Earth as 5 to 10 full moons and it formed a trace of about 7 km in diameter which could be controlled by fixing it on one spot for a long time. The space mirror was a slightly concave membrane of 25 m in diameter made of thin film with a mirror surface, which was attached around the periphery of the station. The membrane was expected to unfold and be held unfolded by centrifugal forces (Fig.1).


Fig.1

However, the project was a failure. Soon after the deployment started, the membrane caught on the antenna (Fig. 2). The spaceship �Progress M-40 was de-orbited and buried in the ocean.

Fig. 2

It would be interesting to consider this situation in terms of TRIZ. Why exactly hasn�t the membrane unfolded? Has everything been done for it to unfold? What can be done to make such membranes unfold under various conditions? There is a great many of similar constructions and it is not always possible to provide such unfolding conditions as for the solar mirror.

Was this failure natural? In principle, from the point of view of traditional design everything is OK. The membrane�s prototype is a parachute canopy. There is no oncoming air stream in space, so inertia forces that occur as a result of the space station rotation are used to unfold the membrane. The first membrane – that of �Znamya 2� – unfolded successfully. Besides, there is a good analogue – designs of spaceships with a solar sail in which the sail is unfolded and held by a centrifugal force occurring during the spaceship rotation. It also seems correct in the context of TRIZ. The basic requirement of ideality is satisfied – the membrane itself without any additional devices moves off the station, unfolds and is held unfolded.

This, however, has not worked. The station started rotating, the membrane began moving off it and caught on the antenna. We can certainly blame the antenna. Parachute-jumpers thoroughly remove all buckles, hooks and heelplates – everything on which the parachute may caught while deploying – from their clothing and especially from the helmets and footwear. But the space station is an expensive and serious thing and is designed to solve many different problems during one flight. It is difficult to remove all devices from the station�s surface, as they are needed for solving other problems. Under such conditions, one accidental jerk of the engine can cause inertia to throw the unfolding membrane back onto the antenna.

Rational membrane-unfolding technology. Let us try to solve this problem with the aid of TRIZ and find a method for unfolding the membrane without removing the antennas and other objects projecting over the station�s surface. Unfortunately, we�ll only have to be guided by the published information, so we�ll have to think ourselves of such important �trifles� as the design of membrane-holding devices, locks, etc. Or, for instance, what are the radial slits in the membrane for?

Thus, we have a packed membrane attached around the periphery of the station. It is held, for instance, by several flexible bands with locks (Fig. 3, a).

Fig. 3

Let us recall one of the basic TRIZ laws – the law of coordination of ES parts� interaction – and try to build a �desirable technology� of membrane deployment. The deployment process falls into two distinct stages. At the first stage, the station starts rotating, locks are released and the membrane moves off the station�s surface (Fig. 3,d). The second stage includes the unfolding of the membrane, its final stretching and holding in the unfolded state. (Fig.3,c).

The first stage is apparently most complex. Since the entire mass of the packed membrane is situated near the axis of rotation, centrifugal forces are comparatively small at that moment, while the work to be done by them is considerable. At the same time, certain requirements are also imposed on the sequence of membrane deployment. It would be better for the membrane not to unfold at once throughout the entire volume, but from the center toward the edges, quickly receding from the station to the area that is free from projecting antennas, in the form of a compact torus-like packing and not as an inordinate heap.

Further stretching of the unfolded membrane is not connected with any troubles because at that time the membrane is already far from the �human factor�. Here we can do with centrifugal forces.

Thus, we can formulate an important requirement for the deployment process: �the unfolded internal part of the membrane must be permanently stretched�.

How can we accomplish sequential unfolding of the membrane? The chances are that it is �concertinaed� before the flight and then it is unfolded throughout the entire volume after releasing the locks.

Proposal 1. Leave free some of the folds adjoining the station and fasten the rest of the folds together with destroyable filaments or bands. Then peripheral tensile stress will first spread the folds near the station surface and the part of the membrane adjoining the station will be stretched. And only then the ties of the peripheral part of the membrane will break and the final deployment will start (Fig.4).

Fig. 4.

How can we accelerate the membrane deployment at the first stage?

It is obvious that we can either increase the station spinning frequency or increase the membrane mass. But carrying an extra load is not an ideal solution. Suppose we first spin up the station and then release the locks� And suppose we place a ring charge BB under the packed membrane, then release the membrane from the locks and explode the charge! Or place small jet engines around the external periphery of the membrane�

Something will definitely fly to pieces, because the membrane is only 7 mm thick.

What are the requirements for the membrane mass in this case?

  • On the one hand, the membrane must be heavy to be able to unfold fast and to move off the station.

  • At the same time, the membrane must be lightweight to prevent the occurrence of excessive loads produced by centrifugal forces.

We can resolve this contradiction in the following way. Let the membrane be heavy at the first stage of deployment and lightweight during the rest of the time. Or rather, the unfolding force must be great at the first stage. Then it may be much smaller, but great enough to unfold and stretch the membrane.

What resources are available?

Substances: membrane, space station, vacuum, air that remained inside the membrane after packing (if it is not evacuated while packing).

Fields: electric, magnetic, Sun�s light field, heat field, space wind. The characteristics of most fields may vary within very wide ranges by turning the station relative to the Sun.

Time: unlimited before the conflict, including the time of space station preparation on the Earth.

Let us draw an abstract model of the problem (Fig. 5).

Fig. 5

B2 is a station. It is a tool. B1 is a packed membrane. It is an object. B2 acts on B1 by the mechanical field (Fineria), produced by the inertia forces. This action is insufficient.

What do the standards recommend (1)?

Introduce one more substance and a field to control this substance.

For instance, add ferromagnetic particles while manufacturing the membrane. Then, while unfolding, the membrane may be acted upon by an annular electromagnet placed around the station body�s periphery. However, it is necessary to additionally introduce an electromagnet, which reduces the system�s ideality.

Add one more substance to one of the interacting substances.

B1 is a station. A space station is a large vessel with air. Consequently, the second substance is already available. It only remains to use it.

Proposal 2. We can provide rapid withdrawal of the membrane from the station to the distance of the non-fastened folds by using the energy of compressed air supplied under the packed membrane. In this case, as distinct from the explosion of a ring charge, the action value can be easily controlled (Fig. 6).

Fig. 6

Transfer to a capillary-porous substance.

Make the membrane capillary-porous.

Proposal 3. For instance, paste thin pipes in the mirror membrane cloth and supply compressed air into them while unfolding. The membrane will change into a plane practically instantly and with a great force.

Eliminating possible catching. As for possible hooking of the membrane during the deployment, the following contradiction occurs.

  • The membrane must not catch on a hook.

  • Under the deployment conditions, the membrane can contact a hook.

Of course, it would be ideal to remove the conditions that cause the membrane catching. But if we cannot eliminate such a probability, it is necessary to make so that the caught membrane can be easily released. How can we resolve this contradiction?

Firstly, we can do this in time.

At the first stage of deployment, when the catching is most probable, the unfolding force should be large enough to secure tearing a piece out of the membrane cloth. The peace should be big enough only for normal unfurling and stretching of the unfurled membrane.

This is achieved by introducing additional forces at the first stage of deployment (Proposals 2 and 3) to help the peripheral centrifugal force.

Secondly, we can do this in space.

For this purpose we use a resource: the membrane material.

We can formulate the following requirement for this material. Let the membrane have rigid surface in close proximity to the station and let the surface become flexible and elastic as the membrane moves off the station.

Proposal 4. The peripheral part of the membrane moves off the station in the form of compact torus-like packing. The packed membrane may be placed inside a rigid thin-walled body with an open bottom (Fig. 7). Because during the deployment the circumference of the packed membrane constantly increases, the body must be corrugated and must extend like accordion. Or it must be composed of several sections that move relative to one another. The use of such a body provides a good protection of the packed membrane against hooking and allows for preserving its compact form without bonding or binding.

Fig. 7.

The membrane is likely to have equal strength in all directions. This is quite correct for that of its parts, which is situated comparatively far from the station. At the same time, the requirements for the central part of the membrane are contradictory:

  • On the one hand, the membrane must not be durable so that it can tear and unhook.

  • At the same time, the membrane must be durable so that is does not fail while unfolding and in a working position.

To satisfy these contradictory requirements, we can structure the material of the central part of the membrane.

Radial filaments must be comparatively durable to provide reliable attachment of the membrane to the station body. Tangential filaments that are perpendicular to those radial must not be durable so that they easily break in case of hooking. For peripheral forces not to break the membrane at the interface of its central and peripheral parts, a ring band can be used here for reinforcement.

In principle, since the area of the membrane�s central part is comparatively small, tangential filaments may be removed at all.

Proposal 5. Make the membrane in the form of a wide ring attached to the station body with bands or cables. In packing, such bands are easy to �concertina� like shroud lines. Each folded band can be put into a covering attached to the membrane. This will ensure well-ordered unfolding of the central part of the membrane and will eliminate hooking (Fig. 8).

Fig. 8.

Final solution concept. To build a final solution concept, let us take proposal 3 as a basis that provides energetic withdrawal of the membrane from the station as envisaged in our �desirable technology of membrane deployment�. This proposal is well supplemented by proposal 1 that ensures the membrane moving off the station in a compact packed state and by proposal 5 that excludes the catching of the middle part of the membrane on the projecting parts of the station�s surface. In this case proposal 3 and proposal 5 are just combined. As for proposal 1, we only use the function �to hold the membrane packed� which is performed with the aid of resources available in the system (pipes with compressed air).

To provide fast and energetic unfolding of the middle part of the membrane, it is necessary to use, instead of a one-piece film, thin radially positioned pipes that connect the packed peripheral part of the membrane with the station. By supplying compressed air into the pipes we�ll practically instantly obtain a rigid frame that will ensure energetic unfolding of the membrane at the first stage.

To hold the membrane in a compact packed state until the full unfolding of its middle part, it is proposed to make each of the membrane-holding clamps in the form of two pipes that encompass the membrane on its sides. The pipes� end faces should be closed and connected with the rest of the frame. The pipes� ends should be connected with each other with a break-off band or filament. After the full unfolding of the frame of the membrane�s middle part, compressed air starts going into the clamps� pipes. The pipes straighten with a great force, break the bands and release the membrane (Fig. 9).

Proposal 2 is partially realized by using compressed air.

Fig. 9

Intensified solution. If it is still impossible to avoid the contact of the membrane, which moves off the station, with hooks, it is expedient to additionally use proposal 4.

The packed membrane is placed in a rigid multi-section thin-walled body, which is discarded after complete deployment of the membrane.

Conclusion. No doubt that using only open sources of information we missed out many circumstances. But I hope that this attempt to analyze the problem will be to a certain extent useful to space mirror designers, and not only to them. We are sure that all the errors will be corrected and after the next attempt we�ll see a hand-made sun in the night sky.

Reference

  1. Altshuller, Genrikh. �The Innovative Algorithm. TRIZ, Systematic Innovation and Technical Creativity.� Technical Innovation Center, INC. Worcester, MA. 1999.

The pictures by Elena Novitskaja.

 

(back to top)

� Copyright 1997-2005 CTQ Media LLC
http://www.triz-journal.com
All Rights Reserved.

 

Mercury News: Man with defibrillator wants to know what his heart is saying

By Lisa M. Krieger

lkrieger@mercurynews.com

Posted: 01/29/2012 03:28:34 PM PST
Updated: 01/30/2012 03:07:20 AM PST

Hugo Campos has a small computer buried in his chest to help keep him alive. But he has no idea what it says about his faulty heart.

All the raw data it collects, especially any erratic rhythms it controls with shocks, goes directly to the manufacturer. And some of it later gets sent to his doctor.

But Campos had to step onto a national stage in his fight to see the data his body produces.

His David-and-Goliath campaign puts him on the leading edge of what’s called the “e-patient movement” — “engaged, equipped and enabled” — that seeks to harness data so patients can learn more about their bodies.

“It’s mine. I paid for it. It’s in my body,” asserts the tech-savvy 45-year-old, who since his sudden collapse at the Fruitvale BART station four years ago has devoted himself to studying cardiology textbooks, attending device symposiums and scheming how to access the electronics of his tiny defibrillator.

“I have a right to my own damn data,” he said.

The information could help him take control of his health, said the Brazilian-born graphic artist.

Already he discovered — using an online spreadsheet accessible from his iPhone — that caffeine and Scotch trigger irregular heartbeats.

But it would be far better to have raw, real-time data, he said.

Federal law entitles patients to easy access to their health records, including X-rays and pathology reports.

But implanted defibrillator data is
Advertisement
different. The information stays with manufacturers, who use it to monitor and improve their products. And it comes in a format that is not easily understood. Patients can get only interpreted data, not the raw data.

“It’s just wrong,” Campos asserts. “We get all our financial data — why is it different with health care? Patients should be empowered to take care of their lives.”

Deluge of interest

Each year, hundreds of thousands of Americans are implanted with small battery-powered electrical impulse generators, such as pacemakers, loop recorders and cardiac defibrillators.

The devices are critical for people like Campos, whose irregular heartbeat threatens sudden cardiac arrest. They also wirelessly transmit data to bedside monitors, and then over a telephone line to the manufacturers.

Much of the collected data — such as average heart rate, fluid accumulation, atrial arrhythmias — is diagnostic.

But these devices also collect huge amounts of proprietary information, such as wiring breakdowns, battery voltage and the time it takes to release a shock.

Calls and emails deluged him after an online video of last November’s TEDxCambridge speech went viral. He has also testified before the U.S. Food and Drug Administration and been featured on National Public Radio.

He’s started a blog, founded an online “Implantable Cardioverter Defibrillators (ICD) User Group” and embraced a new world of patient advocacy through social media. He’s even written a protest song inspired by Malvina Reynolds’ “It Isn’t Nice.” (“It isn’t nice to grab my data, from my implantable device. Then to hog it, keep it from me. That’s not right, I’ve told you twice. It isn’t nice.”)

To prepare himself to understand the device and its data, he earned a certificate from the Arrhythmia Technologies Institute. “Patients need to educate themselves,” he said. “It really is the only way to get a proper seat at the table.”

In an effort to better understand their construction, he’s bought 19 different used devices on eBay, storing them in velvet sacs in a gold-decorated box.

“He is a pioneer. He’s an articulate visionary who sees what is possible and expresses it as common sense,” said Dave deBronkart of Nashua, N.H.

DeBronkart is a kidney cancer survivor who launched a right-to-information campaign after discovering that his hospital had exported a Google personal health record riddled with inaccuracies and omissions.

Campos’ campaign has a professional supporter.

“It is embarrassing to leave our patients in the dark, by design or technological necessity,” wrote Dr. David Lee Scher in his blog. The former cardiac electrophysiologist founded DLS Healthcare Consulting, which advises digital health companies.

He cautions that the data is very technical, even for physicians, and often irrelevant. He urges patients and physicians to work together on a solution.

The concept of “open access” is gaining tradition in the medical device world. The Palo Alto startup Glooko, for instance, sells diabetics a $40 cable that connects glucose meters to iPhones. Meter readings are automatically downloaded, so patients can constantly monitor their blood-sugar levels.

But so far, the billion-dollar ICD industry has been cool to Campos’ campaign.

Interpreting data

The device is implanted for the therapy it delivers, not the information it gathers, manufacturers told Campos. They worry that patients unable to interpret the raw data might become alarmed.

One manufacturer is aware of the building controversy.

“Medtronic is looking into ways to provide patients with meaningful and actionable information with regard to their implantable devices,” said spokeswoman Kathleen Janasz. “We will take all of this feedback into consideration as we move forward in assessing the most appropriate solution.”

In resistance, Campos has decided on a risky political act, rejecting his remote monitor.

“I will not be monitored remotely unless I’m part of the loop,” he asserts.

But new allies have rallied to him: hackers.

More than a dozen engineers have volunteered to help him tap into the wireless system and unlock the data.

“I’ll get it,” he said, “one way or another.”

Contact Lisa M. Krieger at 408-920-5565.

For more information

http://icdusergroup.blogspot.com/

http://www.jopm.org/
http://www.onthemedia.org/2012/jan/20/who-owns-data-inside-your-body/

ONLINE EXTRA

Scan this code with a smartphone to see Campos’s speech at the TEDxCambridge conference.
Find a users’ group for people with implantable defibrillators like Campos’s. http://icdusergroup.
blogspot.com.
Hear an On the Media report about Campos: http://www.onthe
media.org/2012/jan/20/who-owns-data-inside-your-body/.

NSA & “Artificial Thought” Control ( IBM Blue Beam)

Diffuse Artificial Thought

“The advancement of techniques propel us toward the third step in the Blue Beam Project that goes along with the telepathic and electronically augmented two-way communication where ELF, VLF and LF waves will reach each person from within his or her own mind, convincing each of them that their own god is speaking to them from the very depths of their own soul. Such rays from satellites are fed from the memories of computers that have stored massive data about every human on earth, and their languages. The rays will then interlace with their natural thinking to form what we call diffuse artificial thought.”

So how could that be possible you ask? Easy. Enter Project Joshua Blue, currently under development by our favourite business machines company, IBM. Joshua Blue is a program with the stated goal of “Evolving an Emotional Mind in a Simulated Environment”, “to enhance artificial intelligence by evolving such capacities as common sense reasoning, natural language understanding, and emotional intelligence, acquired in the same manner as humans acquire them, through learning situated in a rich environment.”

This is software that is capable of learning and developing ‘emotions’ according to a related document “Feeling Fabricated: Artificial Emotion“. Parts of this project involve the development of Joshua so that emotion is part of it’s reasoning and these guidelines are being followed: Naturalness and believability, social effectiveness, and meaningfulness of displays to human observers. In fact, the main goal of Joshua Blue is to achieve cognitive flexibility that approaches human functioning. In other words – this is artificial intelligence that could be diffused with our own thought because it has been designed to ‘think like a human’.

A computer program which can read silently spoken words by analysing nerve signals in our mouths and throats, has been developed by NASA. In my previous post I outlined the technology that exists. In 1994, the brain wave patterns of 40 subjects were officially correlated with both spoken words and silent thought. This was achieved by a neurophysiologist, Dr Donald York, and a speech pathologist, Dr Thomas Jensen, from the University of Missouri. They clearly identified 27 words / syllables in specific brain wave patterns and produced a computer program with a brain wave vocabulary. It does not take much thinking to realise that the US agencies have access to a perfected version of this technology. In fact the relevant computers have a vocabulary in excess of 60,000 words and cover most languages. In fact, the NSA’s signals intelligence monitor the brainwaves of their targets by satellite and decode the evoked potentials (3.50Hz 5 milliwatts) that the brain emits. So, using lasers / satellites and high-powered computers the agencies have now gained the ability to decipher human thoughts – and from a considerable distance (instantaneously).

With these seemingly far fetched technologies in mind, althought evidently not so far fetched, also consider this final one. Silent subliminal presentation system: A communication system in which non aural carriers (in the very low or high audio frequency range or the ultrasonic frequency spectrum) are amplified or frequency modulated with the desired “intelligence”, and propagated acoustically or vibrationally for inducement directly into the brain. This can be done “live” or recorded/stored on magnetic, mechanical or optical media for delayed/repeated transmission to the target. Sound can also be induced by radiating the head with microwaves (in the range 100 to 10,000 mhz) that are modulated with a waveform consisting of frequency modulated bursts. HAARP of course is going to be handling all the microwaves.

Knowing all of this, Joshua Blue could in fact be being fed with your personal data (facebook, myspace, medical records, driving records, police records, shopping records etc.) and could be simultaniously extracting your actual, real time thought processes. It could then calculate alternate thought trains and depending on the ‘mission’, it could distract you, lead you to the wrong conclusions or drive you insane. It could even manage to make you convince yourself that yes, aliens truly are invading or Jesus really is talking to you from the clouds. With all the data we put out into the internet about ourselves through MSN, I’m 100% certain ‘they’ know how we talk and therefore how we think. This is way too feasible for me to be comfortable. If the thought that was generated artificially by the computer was so accurately precise how could you reasonably differentiate from AI and your own thought? This scares me.

Joshua Blue is specifically being designed to handle emotions, so thought patterns and logically chosen emotions to compliment them are going to be very hard to overcome.

THUGOCRACY: U.S. FED-POLICE VIGILANTES PERSECUTE CITIZEN TARGETS


• Multi-agency fusion center- directed, police-protected community “policing” thugs stalk, terrorize, home-invade their targets — including the journalist who has exposed the electromagnetic microwave radio frequency cellular “torture towers” being used to silently assault, torture, impair and harm extrajudicially “targeted individuals.”

• Rule of law breaks down in Bucks County, PA, home of mid-Atlantic states’ MAGLOCLEN-RISS Intelligence Center and no law enforcement agency — local, state or federal — will come to the aid of the unjustly targeted.

VIC LIVINGSTON
Over the past seven years, this veteran major market journalist has been poisoned, gassed, vandalized; relentlessly “gang stalked,” harassed, slandered; violated by home invaders and pervasive surveillance; and horrendously tortured and impaired by a stealth microwave radio frequency weapon system — and no law enforcement agency, local or federal, will pursue credible leads that could unmask the community goons and thugs — vigilantes and some uniformed officers — who continue to terrorize me, imprisoning me in what some are calling a ‘virtual Auschwitz.’
How could law enforcement allow this?
The answer is simple: Law enforcement, together with security and intelligence agencies of federal and local government, is the complicit overseer of a nationwide campaign of extrajudicial targeting, persecution and high-tech, electromagnetic silent torture — an American genocide.
The Gestapo-like mechanism that is committing serial crimes against humanity and the Constitution: the 72 regional “fusion centers” administered by the U.S. Department of Homeland Security. The fusion center “partners” include federal, state and local law enforcement, security, intelligence and revenue agencies, as well as security-related private companies, including telecommunications companies, defense contractors, and financial institutions.
The fusion center Gestapo comprises America’s shadow government, an iron-fisted, centralized apparatus of social and political control, a calculated bypass of elected officials and the courts that arrogantly acts as judge, jury and executioner — an authoritarian regime that makes a mockery of the Constitution and the rule of law.
This fusion center Gestapo is engaged in an inhumane criminal enterprise under the cover of national security and law enforcement. Its structure and tactics echo the efficient, centralized fascism of Nazi Germany. It is directed by a cultish security elite that has quietly usurped power from the nation’s elected lawmakers and judiciary — a federal bureaucrat- directed but grassroots- based American junta.
The fusion center Gestapo, by deliberate calculation, uses the wars on terror, crime and drugs as the pretext, the cover story, for what amounts to a slow-kill genocide — a hate- and ideology-driven silent holocaust directed at persons and entire families it unilaterally and extrajudicially condemns as unworthy of the rights supposedly guaranteed to all Americans under the U.S. Constitution.
The “targets” are untold thousands of citizens, and by extension, their families, who, without benefit of due process under the law, are regarded by faceless bureaucrats in federal and local agencies and commands as dissidents, undesirables, or “enemies of the state.”
As in Nazi Germany, journalists, intellectuals, ethnic minorities and homosexuals are among its prime targets. And it only takes someone in a position of authority within the vast fusion center ambit to set into motion the process that results in a citizen’s designation as a “T.I.” — a targeted individual unjustly condemned to an often foreshortened life of torment, personal and financial sabotage, and physical torture and impairment — slow-kill mass murder.
Politics, ethnic background, and prejudice factor heavily in the decision to extra-legally ruin lives and rip families apart by consigning “targets” to what security and military insiders have labeled “the torture matrix.”
The American Gestapo torture matrix is comprised of four main components:
CHARACTER ASSASSINATION AND FINANCIAL SABOTAGE
The extra-legally targeted person first realizes that he or she has been “thrown into the matrix” when their careers and personal lives take a sudden downturn, accompanied by whispered slanders and lies generated by the entity that first targeted them. A relentless campaign of character assassination, often conducted by persons unknown to the target, often results in sudden job loss, as employers are discreetly informed that their previously prized worker is now a “person of interest” to law enforcement. Strained family relations often follow as the slanders reach spouses and other relations. The character assassination is accompanied by financial sabotage — identity theft, stolen checks and important documents, often leading to financial loss, unfavorable credit terms and inflated balances on fabricated, counterfeited credit card and utility billing statements.

It soon becomes clear to the target that even the local bank or merchant, or at least some of their employees, are in on the expropriation scheme. Targets are treated rudely, with open contempt, by local businesspeople and even by previously friendly neighbors, who likely have been told lies about them by members of the “matrix” — also widely known as “the program.”
SURVEILLANCE AND ORGANIZED ‘GANG STALKING’ DOMESTIC TERRORISM
By this time, all of the targets’ communications — by telecommunications or in the supposed privacy of their own homes — are under constant surveillance, and often ideologically-driven censorship…
… by fusion center network “information systems” defense contractors, whose pervasive warrantless surveillance facilitates the community-based domestic terrorism that is soon to follow — “organized stalking,” commonly referred to as “gang stalking.” These terms are euphemisms for fusion center- coordinated persecution that often hides behind seemingly respectable, government-funded community policing, town watch, and citizen volunteer organizations such as Infragard, C.O.P.S., USA On Watch and Citizen Corps.
If the target does not already have a GPS-equipped vehicle, making it ready for warrantless tracking, a GPS beacon often is planted on the vehicle. The target’s cellphone also is used for tracking — and even targeting for silent microwave radio frequency attack (more on that later).
Squadrons of vehicle stalkers, often affiliated with town watch or community policing groups, relentlessly follow and often tailgate targets as they come into range of their own GPS units; the federally funded RISSNET network apparently supplies the stalker units with the targets’ GPS locations, often by way of local police departments who lord over the government-enabled vigilantes. Some of the stalkers may weave menacingly in the vicinity of the T.I.’s vehicle — or even try to cause an accident. Police may find the “target” at fault, or even may charge the stalking victim with a traffic violation, or a crime (including, ironically, a charge of “stalking”), should they complain.
Community stalkers often parade by the target’s home or conduct “noise campaigns” on nearby streets, or when T.I.’s venture out onto the road — often with the assistance of local firefighters and emergency medical technicians. Local police sometimes participate in this cruel harassment, which includes the phoning in of false alarms in the vicinity of the target — a drain on taxpayer-funded public safety resources.

DEATH BY A THOUSAND CUTS: HOME INTRUSIONS, STREET THEATER, LOSS OF PRIVACY, VANDALISM, COMMERCIAL SABOTAGE
Targets also find themselves the victims of serial incidents of surreptitious home entry; harassing phone calls; vandalism of appliances or major systems such as heating and cooling; even sadistic acts such as poisoning of food and water with foul tasting and hazardous chemicals, and the tearing and staining of clothing, rugs and furnishings. Such acts of criminal depravity often occur as the target and his family is sound asleep — and unlikely to awaken, due to silent radio frequency attack. (Again, more on that in a moment.).

The extra-legally targeted also find they no longer can expect good service, whether it’s in-home repair, at the local retailer, or at the auto service shop. They often find their vehicles mechanically or cosmetically vandalized, causing added expense, and a possible danger to vehicle occupants — or to other motorists driving nearby.
The stark fact is that this government-spawned torture matrix has created a subculture of sadism and cruel depravity. Those wondering why “bullying” has become endemic in our communities need look no further than the local fusion center- affiliated community “watch” Gestapo. Indeed, fusion center- affiliated agencies sponsor weekend retreats for “program” members, where, it has been reported, bullying and harassment methods and tactics are carefully taught.
Want to know who’s doing this locally, where you live? Ask a neighbor for the name of the local “block captain.” Then ask him or her whether “community watch” sometimes turns into community-based harassment and acts of malicious vandalism and psychological torment. See if the answer satisfies you after reading this article and the accompanying linked material.
This “death by a thousand cuts” — the stalking, the character assassination and community “shunning,” the financial sabotage, the home intrusions, the vandalism — is expressly designed to wreak psychological damage on targeted persons, to deconstruct their lives and their personalities, erode their self-confidence and their ability to earn a living, destroy their family and social relations — to neutralize them.
These are the same cruel tactics practiced by authoritarian regimes past and present, from the Nazis to the Communist Chinese.
In hopes of using law enforcement and the health care system as instruments of social neutralization, community vigilante stalkers engage their targets in elaborate set-ups and stunts directed and scripted by their “team leaders.” This “street theater” is intended to unnerve their prey and provoke a response. If the target reacts with often justifiable irritation or anger, other stalkers are there as “witnesses,” should the encounter attract the attention of law enforcement — whose officers already may have been tipped off to the attempted entrapment. It has happened to me repeatedly over the past seven years, as in a contrived confrontation that led to my assault, false arrest and false imprisonment by Falls Township, Bucks County, PA police:
But relatively few street theater scenarios involve law enforcement. Most times, the play-acting is done out of sadistic, petty spite, as I describe in a recent article about the night I visited a Lowe’s hardware superstore trying to find a sink disposer part that was deliberately sabotaged by home intruding community terrorists:
THE FUSION CENTER GESTAPO’S FINAL SOLUTION:  SILENT ELECTROMAGNETIC TORTURE AND IMPAIRMENT — A SLOW-KILL GENOCIDE
The “psychological operations” conducted against targeted persons pale in terms of sheer bestiality when compared to the “final solution” engineered into the fusion center Gestapo plan: silent high-tech torture, impairment, induction of fatigue, stroke, aneurysms, heart attack or other injury and disease — a slow-kill homicide — by means of covert electromagnetic attack.
The covert irradiation of unknowing citizens is facilitated by a U.S. government microwave radio frequency “directed energy” weapon system installed on cell tower masts nationwide — and capable of the precision-targeting of unique individuals — or entire populations.
The existence of these weapons of mass or personal destruction in every neighborhood and along every highway in America was first revealed a year ago by this journalist, who himself continues to be a victim of these heinous attacks:
Nearly eight years of electromagnetic attack have caused serious damage to my physical well-being, including chronic pain; weakened musculature and stamina; chronic fatigue; degraded eyesight and hearing; fibrous tumors; and other physical maladies too disturbing to mention here.
Hospitals and medical facilities in my region, and probably yours, are thoroughly infiltrated by the community stalker brigades; I’ve been subject to sadistic treatment, even to what I believe were harmful procedures such as unnecessary multiple X-rays and even a CAT scan that caused pain — and my outcry elicited a sadistic remark from the technician. This happened at a well-respected central New Jersey hospital center.
When I retrieved the X-ray, I found the name of another person on the actual film, under a sticky label upon which my name had been typed. So I was not surprised when a doctor informed me in 2004, the year I became aware of my targeting, that the X-ray revealed an “aging brain.” I didn’t dare tell her that I believed the X-ray belonged to someone else; if I had, she would have bought the line that I was delusional — just what certain entities may have wanted her to conclude.
I was only 54 years old at the time. I believe I was being set up by unknown authorities seeking to declare me incompetent — a felonious, fraudulent scheme if there ever was one. Perhaps that explains why another patient’s name was on the film. Since no authority will come to my aid, and because it is unlikely that I could have found an attorney to file a lawsuit on a contingency basis absent physical damage arising from the procedure, I just let it drop — and haven’t written about it until today.

 

HOW COULD THIS HAPPEN ‘UNDER THE RADAR?’ REMEMBER HISTORY. NEVER FORGET.
So how, readers may ask, can such a nationwide horror escape the attention of the public, and the news media? The answer is simple. It is the same answer to the question as to how the Jews and other oppressed people of pre-war Germany could not fathom the holocaust that was about to consume their livelihoods and their lives:

The belief that “it can’t happen here.”
Continue reading at NowPublic.com: THUGOCRACY: U.S. FED-POLICE VIGILANTES PERSECUTE CITIZEN TARGETS | NowPublic News Coverage http://www.nowpublic.com/world/thugocracy-u-s-fed-police-vigilantes-persecute-citizen-targets#ixzz1auXeUxlZ

 

Russian spy agency targeting western diplomats using Zersetzung

FSB using psychological techniques developed by KGB to intimidate and demoralise diplomatic staff, activists and journalists

Russia‘s spy agency is waging a massive undercover campaign of harassment against British and American diplomats, as well as other targets, using deniable “psychological” techniques developed by the KGB, a new book reveals.

The federal security service (FSB) operation involves breaking into the private homes of western diplomats – a method the US state department describes as “home intrusions”. Typically the agents move around personal items, open windows and set alarms in an attempt to demoralise and intimidate their targets.

The FSB operation includes the bugging of private apartments, widespread phone tapping, physical surveillance, and email interception. Its victims include local Russian staff working for western embassies, opposition activists, human rights workers and journalists.

The clandestine campaign is revealed in Mafia State, a book by the Guardian’s former Moscow correspondent Luke Harding, serialised in Saturday’s Weekend magazine.

The British and American governments are acutely aware of the FSB’s campaign of intimidation. But neither has publicly complained about these demonstrative “counter-intelligence” measures, for fear of further straining already difficult relations with Vladmir Putin’s resurgent regime. Putin, a former KGB lieutenant colonel, was head of the FSB.

British sources admit they have files “five or six inches thick” detailing FSB break-ins and other incidents of harassment against Moscow embassy staff. “Generally we don’t make a fuss about it,” one said. So pervasive is the FSB’s campaign that the British government is unable to staff fully its Moscow embassy. The intrusions are designed to “short-tour” diplomats so they leave their posts early, the source said.

Despite a recent improvement in US-Russian relations, the FSB has also targeted US diplomats and their families. In a 2009 confidential diplomatic cable leaked by WikiLeaks, the US ambassador in Moscow, John Beyrle, complains that the FSB’s aggressive measures have reached unprecedented levels.

Mafia State recounts how the KGB first became interested in “operational psychology” in the 1960s. But it was the Stasi, East Germany’s sinister secret police, that perfected these psychological techniques and used them extensively against dissidents in the 1970s and 1980s. These operations were given a name, Zersetzung – literally corrosion or undermining.

According to former Stasi officers the aim was to “switch off” regime opponents by disrupting their private or family lives. Tactics included removing pictures from walls, replacing one variety of tea with another, and even sending a vibrator to a target’s wife. Usually victims had no idea the Stasi were responsible. Many thought they were going mad; some suffered breakdowns; a few killed themselves.

It was Erich Honecker, East Germany’s communist leader, who patented these methods after concluding that “soft” methods of torture were preferable to open forms of persecution. The advantage of psychological operations was their deniability – important for a regime that wanted to maintain its international respectability. Putin spent the late 1980s as an undercover KGB officer based in the east German town of Dresden. Harding was himself the victim of repeated FSB break-ins, and last November was, in effect, expelled from Russia when the foreign ministry said it was not renewing his journalist’s accreditation.

Mafia State also reveals:

• FSB officers privately admit the agency was involved in the assassination of dissident spy Alexander Litvinenko. They regret, however, the bungled way it was carried out.

• The British embassy in Moscow has a “polonium” chair sat on by Andrei Lugovoi, the chief suspect in the Litvinenko murder. Uncertain what to do with it, officials have locked it in a room in the embassy.

• Russia’s footballing union knew a week before a vote in December that Fifa’s executive committee would give Russia, rather than England, the 2018 World Cup.

The FSB never explained why they targeted Harding with such zeal. Other western correspondents have also suffered from occasional “home intrusions”, but on a much lesser scale.

What is Mind Control / Psychotronic Torture?



BY DEB CHAKRABORTY

 

The term “Mind control” basically means covert attempts to influence the thoughts and behavior of human beings against their will (or without their knowledge), particularly when surveillance of an individual is used as an integral part of such influencing and the term “Psychotronic Torture” comes from psycho (of psychological) and electronic. This is actually a very sophisticated form of remote technological torture that slowly invalidates and incapacitates a person. These invisible and non-traceable technological assaults on human beings are done in order to destroy someone psychologically and physiologically.

Actually, as par scientific resources, the human body, much like a computer, contains myriad data processors. They include, but are not limited to, the chemical-electrical activity of the brain, heart, and peripheral nervous system, the signals sent from the cortex region of the brain to other parts of our body, the tiny hair cells in the inner ear that process auditory signals, and the light-sensitive retina and cornea of the eye that process visual activity. We are on the threshold of an era in which these data processors of the human body may be manipulated or debilitated. Examples of unplanned attacks on the body’s data-processing capability are well-documented.

An entirely new arsenal of weapons, based on devices designed to introduce subliminal messages or to alter the body’s psychological and data-processing capabilities, might be used to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the various sensory and data-processing systems of the human organism. In both cases, the goal is to confuse or destroy the signals that normally keep the body in equilibrium.

Definition of psychotronic (psycho-physical) weapons.


Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means (techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden, forced influences on the psyche of a person for the purpose of modifying his consciousness, behavior and health for what is desired in the way of influencing aspects of control…” This is not only dangerous, this is deadly!”

Actually, the goal of mind control is to access those areas of the brain that are outside of the conscious control of the individual by circumventing the normal inhibiting response of the cerebral cortex: “an individual’s voluntary conscious self-control must be bypassed or short-circuited.” This unconscious coercion is done through electromagnetic-wave bombardment of the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne waves can travel over distances and are known to change the behavior of animals and humans in their path. Such remote control makes possible potentially frightening uses for altering the brain’s functioning. These are invisible and deadly waves. This waves goes directly to the subconscious parts of the human brain for receiving or transcoding the messages and without the person exposed to such influence having a chance to control the information input consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting mind control requires the creation of “profound and deep emotional states.” Recommended are fear, shock and anxiety, which have “an intense disinhibitive effect on the human brain.” What this means, in essence, is that emotional trauma facilitates the accessing of dissociative states. In order to disable the brain’s “cortical block,” Verdier recommends alcohol, euphoric drugs, isolation, solitary confinement, and – “the most dramatic and unique item in the brainwashing arsenal” – hypnosis. All of these are methods that have been extensively tested by the CIA under the rubric of the MK-ULTRA program.

The technology is rooted in surveillance devices, such as audio and video bugs, through-the-wall and remote sensing devices, and biosensors both remote and implanted.  This provides the feedback for the influencing, as well as any “entertainment” value for voyeur/sadists and intellectual property theft for thieves.  Coupled with the surveillance is some sort of “effectors” or feedback path for influencing an individual.

Thus there are several categories of mind control operations, for example covert drugging, hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks, and ongoing feedback control setups for long-term torture and exploitation of victims, to mention a few.  What they have in common is the attack against the mind of the victim, as well as the deniable and denied nature of the attack.  The exact means being used in any particular case are beside the point here.  These techniques do not just violate one or two of what everyone knows are fundamental human rights:  In one fell swoop they violate almost every fundamental human right a person has.

The electromagnetic technology works on the theory that the mind and body are an electromagnetically mediated biophysics system and the electromagnetic signals form outside sources can mimic the mind and body’s electromagnetic signals and therefore a weapon can be developed based on these principles.

There is evidence that since the 1950’s the U.S. and other government have been developing electromagnetic weapons which can remotely target the electromagnetic system of the human body for military and intelligence purposes.

The First phase is the harassment/surveillance program


During the first phase of this Govt. program a person is broken physically and mentally. The methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon, Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs, homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family, friends. The isolation is needed to have access to the person to conduct many of the experiments on them. All privacy and constitutional rights are thus stripped away.

The second phase is the assaults of Directed Energy Weapons.


After a victim becomes isolated from everyone in the world. The victim now having feelings of regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During this time many have been implanted with microchips. Many begin experiencing extreme pain to their head. Some hear voices. Then pain is delivered to various other parts of their bodies. The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing the pain and no one is touching them. It is an invisible energy force. Along with drugs being administered by the scientist through either a drip system which!has been inserted into an individual, food tampering, or injection all without the victims permission. Then Mind Entrainment begins.

Directed Energy Weapons


Some of the weapons were known as non-lethal weapons. They use such weapons as extremely low frequency Elf electromagnetic weapons (which has been used in mind control), acoustics, harmonics (which have been used as a mind control technique), ultrasound, microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic energy beam can be used to induce “considerable agitation and muscular activity” or “induce muscular weakness and lethargy” this weapon is know as Ultra High Frequency EM.

Psychological warfare tactics are being used against unsuspecting citizens to destroy their jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to utterly destroy a person, very often resulting in a person taking his or her own life, or ending up in a mental hospital. This has been taking place for years and nothing is ever said about it. Nothing is ever written about it. For the sake of those who came before us, and those who come after us, the world needs to know what is happening.

For many people, this comes out of nowhere. They don’t know whose toes they stepped on in order to warrant such a brutal attack. For others who are whistleblowers, they know full well how they garnered such attention. For some, they don’t even realize that they are the targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that something unspeakable and devastating is happening.

What makes this crime so heinous is that the most sophisticated techniques of psychological warfare are employed against a person in order to make them look like they are crazy. Friends and family members don’t believe the things that are happening and often believe the targeted person is crazy.

This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking part of it, which targets experience to varying degrees. This involves stalking by a multitude of individuals both on foot and while you’re in the car. Known as “street theatre” by those who experience it, it involves vandalism to house, car and personal property. Gang stalking can also be referred to as cause stalking, vengeance stalking and multi-stalking.

Some people also experience electronic harassment. This is extremely distressing, painful and invasive, and feels like one’s mind and body is undergoing constant rape, 24 hours a day, 7 days a week. The technology used to do this is unknown, but hundreds of victims report the same physical sensations and experiences. Many take their lives in an attempt to escape the horror. It is so distressing that only fellow targets can really understand what another target is experiencing.

In either case, the attacks are so well orchestrated that only the victim is aware of them. This is intentional, and it appears that these groups have perfected these techniques over many years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do, since new targets are completely bewildered as to what is happening to them, having never heard a peep out of the media about such occurrences (except in relation to mental illness). Their actions are based on many of the same tactics as those employed in ritual abuse, and are designed to weaken the target’s mind and perpetrators are becoming increasingly addicted to this game of predator/prey, always needing more targets to satisfy their unending thirst for a thrill.

“Electronic harassment” or e-harassment is a catch-all term used to describe a group of circumstances which a large number of people are currently experiencing in common. In general, this term refers to the use of electronic technology to view, track and/or harass a person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by neighbors) is largely personal opinion. There is no definitive proof that would allow any of the present victims to launch a court case, but the numbers of victims and the commonality of experience speaks for itself.

The technology involves the use of electromagnetic waves of various frequencies to achieve different results. Some frequencies will make a person tired, while others may cause confusion or memory loss. With the rapid increase in cell phone usage, many experiments have been conducted on the detrimental effects of those particular frequencies on animals. The results indicate that the invisible e.m. signals from cell towers can cause a wide range of physical ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is even more likely the case with the frequencies which may be used to cause direct, intentional harm to a person.

Electronic harassment is sometimes referred to as “psychotronics”, but would more accurately be described as “criminal psychotronics”.

Types of Weapons:

Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons

Soft Kill Weapons
Less-Than-Lethal Weapons

Exposure To Low-Level ElectroMagnetic Fields Causes DNA Damage

Two brain cells from a rat exposed to a low-level electromagnetic field show significant amounts of damaged DNA, seen exiting from the cells. Findings by UW researchers suggest that such damage is cumulative. (Photo credit: University of Washington )

ScienceDaily (Feb. 19, 2004) — Prolonged exposure to low-level magnetic fields, similar to those emitted by such common household devices as blow dryers, electric blankets and razors, can damage brain cell DNA, according to researchers in the University of Washington’s Department of Bioengineering. The scientists further found that the damage from brief exposures appears to build up over time.

The new study is scheduled to be published in Environmental Health Perspectives, a journal of the National Institutes of Environmental Health Sciences, and is available now on the Internet.

In the study, the researchers discovered that rats exposed to a 60-hertz field for 24 hours showed significant DNA damage, and rats exposed for 48 hours showed even more breaks in brain cell DNA strands. Exposure also resulted in a marked increase in brain cell apoptosis, or “cell suicide,” a process in which a cell self-destructs because it can’t repair itself.

A previous study showed similar damage, but it was conducted at 10 times the intensity and rats were exposed for just two hours. That indicates that the effects of exposure are cumulative, and duration can be as damaging as intensity, said Henry Lai, a UW research professor who conducted the study with fellow UW bioengineer Narendra Singh. “In real life, people get this kind of exposure in brief doses – three minutes of exposure to a blow dryer, five minutes of exposure to an electric razor,” Lai said. “We found that this could add up over time and could eventually lead to some health effect.” Since Lai first reported findings of magnetic field-induced DNA damage in 1995, several laboratories in Europe and India have reported similar effects.

Traditionally, scientists have held that low-level electromagnetic fields couldn’t be harmful because they weren’t potent enough to break chemical bonds in a living organism. Lai doesn’t disagree – he simply suspects a more subtle mechanism is at work. He believes that the fields, rather than causing harm directly, initiate a process within the cells that leads to the damage.

Lai and Singh hypothesize that exposure to magnetic fields affects the balance of iron in certain cells, leading to an increase in free iron within the cell. That free iron undergoes a chemical reaction, which releases “free radicals,” or charged atoms that attack cell structures, including DNA, lipids and proteins.

To test the idea, the researchers gave some of the rats drugs that either neutralize free radicals or decrease free iron before exposing the animals to the magnetic field. The treatments supported the hypothesis, effectively blocking the effects of the fields and protecting the rats’ brain cell DNA from damage.

One significant implication of this is that certain types of cells with higher iron content – such as brain cells – may be more susceptible to damage from electromagnetic fields.

DNA damage in and of itself isn’t unusual – all cells experience some DNA damage through normal wear and tear and repair themselves. Problems can occur when that damage is significantly increased because that also increases the likelihood of a mistake being made in the repair process, resulting in a mutation that could lead to such diseases as cancer.

Some types of DNA damage are more worrisome than others. A break on one side of DNA’s ladder-like double helix is relatively easy to fix. Repairs are much harder if both sides of the helix are broken, and, as a result, the probability of a mutation is substantially higher. Lai and Singh found both single and double strand breaks in the exposed brain cells.

Lai said people shouldn’t be overly alarmed by his research results. But they do need to be aware of the possibility that low-level electromagnetic fields might be harmful, especially given the fact that electrical devices are such a central component of daily life. And most household appliances – blow dryers, razors, electric blankets, ovens, coffee makers, clocks – emit a 60-hertz field. More work needs to be done to fully understand the process at work and the risks involved, Lai added. In the meantime, he has some advice:

“People should do what they can to limit their exposure to as little as possible, especially in relation to electrical appliances that are used very close to the body.”

The study is available on the Web at http://ehp.niehs.nih.gov/docs/2004/6355/abstract.html

Story Source:

University Of Washington (2004, February 19). Exposure To Low-level Magnetic Fields Causes DNA Damage In Rat Brain Cells, Researchers Find. ScienceDaily. Retrieved September 1, 2011, from http://www.sciencedaily.com­ /releases/2004/02/040219075606.htm

Psychological Warfare ( Manipulation)

PSYCHOLOGICAL MANIPULATION

Psychological manipulation is a type of social influence that aims to change the perception or behavior of others through underhanded, deceptive, or even abusive tactics. By advancing the interests of the manipulator, often at the other’s expense, such methods could be considered exploitative, abusive, devious, and deceptive.

Social influence is not necessarily negative. For example, doctors can try to persuade patients to change unhealthy habits. Social influence is generally perceived to be harmless when it respects the right of the influenced to accept or reject it, and is not unduly coercive. Depending on the context and motivations, social influence may constitute underhanded manipulation.

REQUIREMENTS FOR SUCCESSFUL MANIPULATION

According to George K. Simon, successful psychological manipulation primarily involves the manipulator:

–          concealing aggressive intentions and behaviors.

–          knowing the psychological vulnerabilities of the victim to determine what tactics are likely to be the most effective.

–          having a sufficient level of ruthlessness to have no qualms about causing harm to the victim if necessary.

Consequently the manipulation is likely to be covert (relational aggressive or passive aggressive).

HOW MANIPULATORS CONTROL THEIR VICTIMS

According to Braiker

Braiker identified the following basic ways that manipulators control their victims:

–          positive reinforcement – includes praise, superficial charm, superficial sympathy (crocodile tears), excessive apologizing; money, approval, gifts; attention, facial expressions such as a forced laugh or smile; public recognition.

–          negative reinforcement – includes nagging, yelling, the silent treatment, intimidation, threats, swearing, emotional blackmail, the guilt trap, sulking, crying, and playing the victim.

–          intermittent or partial reinforcement – Partial or intermittent negative reinforcement can create an effective climate of fear and doubt. Partial or intermittent positive reinforcement can encourage the victim to persist – for example in most forms of gambling, the gambler is likely to win now and again but still lose money overall.

–          Punishment

–          traumatic one-trial learning – using verbal abuse, explosive anger, or other intimidating behavior to establish dominance or superiority; even one incident of such behavior can condition or train victims to avoid upsetting, confronting or contradicting the manipulator.

According to Simon

Simon identified the following manipulative techniques:

Lying: It is hard to tell if somebody is lying at the time they do it although often the truth may be apparent later when it is too late. One way to minimize the chances of being lied to is to understand that some personality types (particularly psychopaths) are experts at the art of lying and cheating, doing it frequently, and often in subtle ways.

Lying by omission: This is a very subtle form of lying by withholding a significant amount of the truth. This technique is also used in propaganda.

Denial: Manipulator refuses to admit that he or she has done something wrong.

Rationalization: An excuse made by the manipulator for inappropriate behavior. Rationalization is closely related to spin.

Minimization: This is a type of denial coupled with rationalization. The manipulator asserts that his or her behavior is not as harmful or irresponsible as someone else was suggesting, for example saying that a taunt or insult was only a joke.

Selective inattention or selective attention: Manipulator refuses to pay attention to anything that may distract from his or her agenda, saying things like “I don’t want to hear it”.

Diversion: Manipulator not giving a straight answer to a straight question and instead being diversionary, steering the conversation onto another topic.

Evasion: Similar to diversion but giving irrelevant, rambling, vague responses, weasel words.

Covert intimidation: Manipulator throwing the victim onto the defensive by using veiled (subtle, indirect or implied) threats.

Guilt tripping: A special kind of intimidation tactic. A manipulator suggests to the conscientious victim that he or she does not care enough, is too selfish or has it easy. This usually results in the victim feeling bad, keeping them in a self-doubting, anxious and submissive position.

Shaming: Manipulator uses sarcasm and put-downs to increase fear and self-doubt in the victim. Manipulators use this tactic to make others feel unworthy and therefore defer to them. Shaming tactics can be very subtle such as a fierce look or glance, unpleasant tone of voice, rhetorical comments, subtle sarcasm. Manipulators can make one feel ashamed for even daring to challenge them. It is an effective way to foster a sense of inadequacy in the victim.

Playing the victim role (“poor me”): Manipulator portrays him- or herself as a victim of circumstance or of someone else’s behavior in order to gain pity, sympathy or evoke compassion and thereby get something from another. Caring and conscientious people cannot stand to see anyone suffering and the manipulator often finds it easy to play on sympathy to get cooperation.

Vilifying the victim: More than any other, this tactic is a powerful means of putting the victim on the defensive while simultaneously masking the aggressive intent of the manipulator.

Playing the servant role: Cloaking a self-serving agenda in guise of a service to a more noble cause, for example saying he is acting in a certain way for “obedience” and “service” to God or a similar authority figure.

Seduction: Manipulator uses charm, praise, flattery or overtly supporting others in order to get them to lower their defenses and give their trust and loyalty to him or her.

Projecting the blame (blaming others): Manipulator scapegoats in often subtle, hard to detect ways.

Feigning innocence: Manipulator tries to suggest that any harm done was unintentional or did not do something that they were accused of. Manipulator may put on a look of surprise or indignation. This tactic makes the victim question his or her own judgment and possibly his own sanity.

Feigning confusion: Manipulator tries to play dumb by pretending he or she does not know what you are talking about or is confused about an important issue brought to his attention.

Brandishing anger: Manipulator uses anger to brandish sufficient emotional intensity and rage to shock the victim into submission. The manipulator is not actually angry, he or she just puts on an act. He just wants what he wants and gets “angry” when denied.

VULNERABILITIES EXPLOITED BY MANIPULATORS

According to Braiker manipulators exploit the following vulnerabilities (buttons) that may exist in victims:

  • the “disease to please”
  • addiction to earning the approval and acceptance of others
  • Emotophobia (fear of negative emotion)
  • lack of assertiveness and ability to say no
  • blurry sense of identity (with soft personal boundaries)
  • low self-reliance
  • external locus of control

 

According to Simon manipulators exploit the following vulnerabilities that may exist in victims:

 

  • naïveté – victim finds it too hard to accept the idea that some people are cunning, devious and ruthless or is “in denial” if he or she is being victimized
  • over-conscientiousness – victim is too willing to give manipulator the benefit of the doubt and see their side of things in which they blame the victim
  • low self-confidence – victim is self-doubting, lacking in confidence and assertiveness, likely to go on the defensive too easily.
  • over-intellectualization – victim tries too hard to understand and believes the manipulator has some understandable reason to be hurtful.
  • emotional dependency – victim has a submissive or dependent personality. The more emotionally dependent the victim is, the more vulnerable he or she is to being exploited and manipulated.

Manipulators generally take the time to scope out the characteristics and vulnerabilities of their victim.

According to Kantor the following are vulnerable to psychopathic manipulators:

  • too trusting – people who are honest often assume that everyone else is honest. They commit themselves to people they hardly know without checking credentials, etc. They rarely question so-called experts.
  • too altruistic – the opposite of psychopathic; too honest, too fair, too empathetic
  • too impressionable – overly seduced by charmers. For example, they might vote for the phony politician who kisses babies.
  • too naïve – cannot believe there are dishonest people in the world or if there were they would not be allowed to operate.
  • too masochistic – lack of self-respect and unconsciously let psychopaths take advantage of them. They think they deserve it out of a sense of guilt.
  • too narcissistic – narcissists are prone to falling for unmerited flattery.
  • too greedy – the greedy and dishonest may fall prey to a psychopath who can easily entice them to act in an immoral way.
  • too immature – has impaired judgment and believes the exaggerated advertising claims.
  • too materialistic – easy prey for loan sharks or get-rich-quick schemes
  • too dependent – dependent people need to be loved and are therefore gullible and liable to say yes to something to which they should say no.
  • too lonely – lonely people may accept any offer of human contact. A psychopathic stranger may offer human companionship for a price.
  • too impulsive – make snap decisions about, for example, what to buy or whom to marry without consulting others.
  • too frugal – cannot say no to a bargain even if they know the reason why it is so cheap
  • the elderly – the elderly can become fatigued and less capable of multi-tasking. When hearing a sales pitch they are less likely to consider that it could be a con. They are prone to giving money to someone with a hard-luck story. See elder abuse.

MOTIVATIONS OF MANIPULATORS

Manipulators have possible motivations, including:

–          the need to advance their own purposes and personal gain at virtually any cost to others,

–          a strong need to attain feelings of power and superiority in relationships with others,

–          a want and need to feel in control (aka. control freakery),

–          and gaining a feeling of power over others in order to raise self-esteem.

On the need for neurotechnology in the national intelligence and defense agenda: Scope and trajectory

Chris Forsythe, PhD1, James Giordano, PhD2, 3,4*

1. Sandia National Laboratories, PO Box 5800, Albuquerque, NM, 87185-(mail stop), USA. 2. Center for Neurotechnology Studies, Potomac Institute for Policy Studies, 901 N. Stuart St., Suite 900, Arlington, VA, 22203, USA, 3. Oxford Centre for Neuroethics, Oxford University, UK, 4. Uehiro Centre for Practical Philosophy, Oxford University, UK,

Email: jgiordano@potomacinstitute.org.

In light of the recent advances in neuroscience and neurotechnology, we posit that intellectual and empirical commitment to brain science is critical to national security. Moreover, we believe it is equally important to have a commitment to translational research, or at very least, devoted attention to the steps essential to progressing science from theory to application. Our position is that while there is no shortage of science and intellectual consideration, there is a substantive gap in our understanding of how to engage this knowledge toward useful — and ethically sound — ends.

Whether the basis for improved human performance or more intelligent machines, the impacts of neuroscience and neurotechnology will be far-reaching, change the landscape of human capabilities, and will necessitate readdress of guidelines, policies and practices (1, 2). The ratio of applications to discoveries in brain science is high, and international advances in neuroscience and neurotechnology highlight the importance of maintaining US competitiveness in these areas. For example, researchers at the Max Planck Institute in Germany have demonstrated capability to predict test subjects’ decisions for simple choices based on neuroimaging-based assessment of brain activity arising prior to the subjects’ conscious awareness of their decision (3).

Employing such findings beyond the laboratory, it might thus be possible to develop human-machine systems that could enable an operator’s intentions to be anticipated and controlled well before conscious initiation of action(s) (4). As well, research institutes in different nations have engineered nanomaterials to sense and manipulate activity to induce specific effects on targeted regions and functions of the brain and/or spinal cord. Researchers at the RIKEN Center in Japan have manipulated the genetics of embryonic stem cells to cultivate neural precursor cellsthat when transplanted into a living mouse, self-organize to form neural circuits that integrate with existing neural tissue to enable normal brain activity (5). This creates the potential to alter the neural genome, phenome and connectome in ways that induce short- and long-term structural and functional changes to affect brain activity relevant to cognition, emotion, and/or behavior. It is not diffi cult to imagine how an increasingly embellished, or widespread use (or misuse) of these technologic applications could impact not only human thought, and action, but also more fundamental constructs of beliefs, intention, and the nature, meaning and contexts of various socio-cultural interactions. These possibilities illustrate the ways that sustained investments in basic and applied neuroscience and neurotechnology can be directed at the structure of the brain and its function(s) — viz. – the “mind” — to incur profound impacts upon aspects of human cognition and behavior that are relevant and important to security and defense.

As with other scientific and technical innovations (e.g., flight, nuclear physics), the dual-use (i.e., civilian and military) capability of neuroscience is apparent. Since the early 20th century, technologies that affect the nervous system, and brain~mind have been employed in national defense (e.g., nerve gas, attempts at “brain-washing” techniques of interrogation, etc.). The speed and sophistication of new developments in neuroscience and neurotechnology (as well as the linking of existing devices and technology to innovative approaches; e.g., nanoscale delivery systems; genetic tools, etc. within a directed program of integrative scientific convergence) are such that the breadth and depth of this progress demands continuous re-address, re-appraisal, and reflective governance (1). While ethical caveats have restricted neuroscientifi c research in US national security and defense (at least to some extent), it cannot (nor should not) be overlooked that other nations are making tremendous investments in brain science, and much of this research could provide a basis for offensive capabilities. In response to these potential threats, we posit that it is important that the United States conduct research to examine and evaluate how and what neuroscientific neurotechnologic advancements may be employed in these ways, so as to anticipate, be prepared for, and perhaps counter such intelligence and military application(s) of brain science by our (current and future) adversaries. But while an emphasis has primarily been upon anticipating threats posed by other nations, we believe that it is equally important to emphasize United States’ capabilities so as to remain ahead of — or at least in step with — any international competition in these areas, and in this way, not render our national security vulnerable. But, surveillance, identification, analysis and a forward-looking program of research development testing and evaluation (RDTE) does not imply our developing and stockpiling potential neuroweapons. If the nuclear age has provided any lesson at all, it is that any programs of mutual, mass accumulation of weaponry is both self-perpetuating, and generally problematic. Rather, we posit that a viable goal is to develop and utilize neurotechnologies to maximize national intelligence efforts, and apply such intelligence methods to deep analysis of the fi eld and the assessment and mitigation of any/all international efforts that might be considered as potential threats. Indubitably, new threats will emerge that could be diffi cult to mitigate without sufficient information and knowledge of the strengths and limitations in other nations’ existing and potential neuroscientifi c and neurotechnological capabilities. Thus, attention to augmented cognition technologies, and its employment in education and training, as well as operational field use, are of vital importance, both at present and in the future. In this light, we have identifi ed four interactive areas of neuroscience that could affect and be important for national security; these are:

1. Nano-neuroscience: Nano-substances and devices may be engineered to alter neural networks, induce changes in properties of the nervous system from periphery to brain, and affect sensitivity to internal and/or external stimuli. Nano-neurotechnologies could therefore be used to modify cognitive, emotional and/or behavioral functions, and in this way affect mental and motor capacity, alter mood or cause near- and long-term disability. Such capability might be used to modify the function of national intelligence and security personnel, and/or could be employed in a) combat (both to enhance performance of troops, as well as impair function of enemy warfi ghters) and/or b) by our enemies as a form of biological-technological terrorism and a means of mass subjugation.

2. Advanced neuropharmacologicals: Augmented cognition and neural performance improvement (and/or degradation) can be achieved through the use of psycho-neuropharmaceuticals. As mentioned above, these agents could be administered via nanodelivery systems that allow enhanced access to the central nervous system (CNS) in ways that maximize biological (and ultimately psycho-social) effect(s), yet could easily elude detection. Similarly, pharmaceuticals can be linked to brain stimulation technologies (vide infra) to synergize effects in modifying specifi c cognitive, motoric, emotional and/or behavioral processes.

3. Neuro-imaging and neuro-manipulative devices: Current and prospective developments in neuroimaging offer the potential to visualize relatively site- and network-specifi c brain processes that are putatively involved in (or may explicitly subserve) various cognitive-emotional and behavioral functions. Identifying these neurological axes could provide means to investigate — if not “detect” and/or “reveal” — mental states. But imaging alone, at least in its current iteration(s), while useful in the scientifi c and medical investigation of cerebral function, may be of limited utility for practical applications of rain~mind science for intelligence and defense purposes. Efforts are underway that focus more upon measuring (i.e., quantifying and qualitatively defining) brain activity, in attempt to provide indications of “what”, if not “why” cognitive and/or emotional processes (such as deceit, intent, aggression, etc.) occur. Obviously, this has given rise to hypothetical “mind reading” scenarios, and, like other aspects of neurotechnological research and applications, has prompted considerable debate about the validity, value and ethical implications of such devices and techniques. Moreover, imaging/ measurement can be yoked to neuro-interventional technologies (e.g., transcranial magnetic stimulation, pharmacologicals) to guide or enable manipulation of  neurological activity. Simply put, near-future iterations of these technologies (either as stand-alone modalities, or if used in convergence) makes the notion of biotechnologically “altering brains” to “changing minds” evermore viable.

4. Neuroinformatics and cyber-neurosystems: The linking of rapidly advancing computational capability to neurotechnology has established three major domains of progress. The fi rst is the use of computational systems and models to augment human cognitive processes (i.e., human-computer interfaces), the second is in reverse-engineering cognitive mechanisms to create computational techniques and systems to achieve efficient and robust machine intelligence(s), and the third is the data banking of information (about neural structure — including genotypes — and function) to facilitate real-time access, analyses and use.

References

1. Giordano J, Gordijn B. Scientifi c and philosophical perspectives in neuroethics. Cambridge:  Cambridge University Press; 2010.

2. Giordano J, Olds J. On the interfl uence of neuroscience, neuroethics, and ethical, legal and social issues: the need for (N)ELSI. Am J Bioethics- Neuroscience.2011. 12-14.

3. Soon C, Brass M, Heinze H, Haynes J. Unconscious determinants of free decisions in the human brain.

Nature Neuroscience. 2008; 11:543-545.

4. Libet B, Gleason C, Wright E, Pearl K. Time of conscious intention to act in relation to onset of cerebral activity (readiness-potential). Brain. 1983; 106(3): 623-642.

5. Kim T, Nakagawa T, Kita T, Higashi T, Takebayashi S, Matsumoto M, et al. Neural connections between

Hearing Voices: Audio Implants by Intelligence Agencies

AUDIO IMPLANTS

BACKGROUND INFORMATION

The concepts used in audio implants had been discovered in the first half of the 20th century, but the refinement of technology to take advantage of what had been discovered waited until the second half of the century. The development of audio implants ran on two tracks, one was the public medical research and the other was the secret Illuminati/Intelligence Agencies’ research. Audio implants began to be publicly placed into people in the 1960s. The Illuminati was experimenting on some victims at this stage, and the military in the Vietnam war used auditory implant devices to aid communicating to their men who were sent into tunnels and who were placed into forest situations where audible noise would compromise their locations to the enemy. The Illuminati/Intelligence/& Military consortium was keeping the experimentation secret. It appears from looking at the worldwide research on audio implants that the Illuminati realized that the field was so ambiguous, and open to so many different approaches, that rather than straightjacket the research community by a specific strategy, they encouraged a wide variety of approaches in the research. Consequently, research by one group would overlap or duplicate research by another. Much to their credit, a few researchers rejected offers to get involved because they saw the sinister ramifications. By the 1970s, the intelligence agencies were willing to start using hundreds of people to experiment operationally with the implants. People in every state of the U.S. were selected as victims. Many of these implant victims had programmed multiple personalities already. The controllers were very heavy handed with the people they implanted, and they used the full force of the Illuminati/Intelligence agencies power to keep these people under their control at all times. These innocent victims have had their lives totally destroyed. Some tried to fight back, spending thousands of dollars to get out from underneath the incessant audio messages that the implants sent, but the system was too big and too powerful to fight. Police, congressmen, psychologists and many other people turned their backs on these victims. Some victims who initially fought back gave up resisting, some committed suicide, and some continued to fight. Meanwhile, on the public track during the 1970s & 1980s, medical researchers kept putting more and more audio implants into deaf and hard-to-hear persons. Hundreds of people in the U.S. and many hundreds in other nations such as the U.K., Germany, Austria, Israel, Australia, France and other countries began to receive the cochlear implants. Australia was so proud of their audio implant research/development they issued a postage stamp showing an implant device (“bionic ear”) developed in Australia. The question begs asking, if thousands of people have publicly received audio implants, isn’t obvious that the secret societies and secret intelligence agencies have done at least as much if not far more?

BRIEF CHRONOLOGY OF AUDIO IMPLANTS

1790–first known attempt by Volta to electrically stimulate the ears. He shot approximately 50 volts of electricity into his auditory system, and experienced the sensation of a blow to the head followed by a sound like the boiling of viscous liquid.

1850–Electro-otiatrics was begun by otologists who hoped electricity could help ear diseases in various ways.

1925–Sounds were created in people by radio engineers by placing electrodes near the ear with a modulated alternating current.

1930–Weaver & Bray discovered the principles used later in the cochlear microphonic implants.

1937–By passing an alternating electrical current in the audible frequency range from an electrode to the skin, Steven, Jones, Lurie and Flottorp found they could have people hear sounds. For a number of years these men studied this phenomena.

1957–Djourno and Eyries in France woke the world up concerning the ability to electrical stimulate the auditory nerves and produce sound with their reports. A patient from France reportedly gets William F. House, MD interested in developing an implant device.

1961–William House implants two patients with short-term audio implants. One patient receives a multiple electrode implant.

1960s–intense research for audio implants is conducted in California in places like Sanford, the Univ. of Calif., in L.A. etc. The military uses audio implants operationally to be able to talk to soldiers in situations where external noise would compromise the location of the American soldiers, such as exploring tunnel system.

1970s–Various researchers around the world begin publicly implanting audio implants into people. The Illuminati and intelligence agencies begin to secretly implant people, this is known because many of the early victims can pin point at time in the 1970s when they got their audio implants.

1980–The FDA establishes Federal regulations regarding cochlear audio implants.

1984–By this year, 369 people have publicly received the House Cochlear Audio Implants, which have been implanted by 36 different clinics. The 3M Cochlear Implant System! House Design for use in adults, which is already in hundreds of adults, receives FDA approval in Nov.

1990s–Audio implants along with other implants begin to be used more aggressively by the mind-control programmers. Successful intelligence operations are carried out with the aid of audio implants.

BASICS OF HOW THE IMPLANTS CAN FUNCTION

Thousands have publicly received audio implants, and thousands have received audio implants without their permission by the New World Order. The implants (whether secret or public) basically have to contain A. a receiver(s), B. a processor, C. a transmitter, D. electrodes or electrical stimulating device. When sound waves arrive to the human ear, the sound causes biological reactions all along the auditory pathway–from the cochlea, the auditory nerve, the brain stem nuclei and the primary cortical projection areas. Each of these areas are fair game for machinations of the mind-control researchers. There are brain stem potentials which originate in the auditory brain stem nuclei–primarily in the inferior colliculi. The public auditory implants produce a small electrical stimulus that bypasses damaged hair cells and directly stimulates the remaining auditory neural elements. This means that for the secret implants, the electrical impulse that is generated to stimulate the person to hear a sound or sentence is totally unnoticed by everyone but the victim. As mentioned before, psychologists are being used to shut victims up, by declaring that they are crazy for claiming to hear voices. How do these psychologists know that the person isn’t hearing voices from an implant? Some psychologists are declaring the implant victims are “crazy”, “delusional”, & “insane”, because audio implants supposedly don’t exist–therefore it is useless to give any credence to the complaints of victims. In other words, psychologists are being used as the establishment’s witch doctors to cover up the mind-control activities of the New World Order. What’s new? Establishment shrinks helped cover up the programmed multiplicity for decades by labelling the programmed-multiple slaves “paranoid schizophrenics”. During experiments, it was discovered that the skin of a person can pick up auditory vibrations, so tests were run to see if implants in other parts of the human body could be used for auditory implants. The vibrotacticle system of the skin has an upper limit of sensitivity to 400 to 500 Hz. In contrast the auditory system had a frequency range between 20 to 20,000 Hz and an optimum range of 300 to 3,000 Hz. The auditory system had a dynamic range of 130 dB (decibels) which the vibrotactile had only a 30-35 dB range. In other words, using the skin like on the chest to send auditory vibrations to the brain was a very limited way to create sound. For most purposes it isn’t a viable approach, even though some experimental auditory implants were placed in places like the chest. The ones that were tested only reconfirmed the suspicions that the best results are by using the inner cochlea and the auditory canal area. Dr. Begich’s and later others showed that a nonlinear function will translate one frequency to another frequency, but although it does jump, this method is inadequate for the current mind control signals, and a linear function is used which operates simply on the energy that the implants have.

Originally single channel devises were used, but then multichannel devices were soon found superior. The processing units of a device, had to have an extraction method to determine the pitch of the signal and then would present a square wave at the rate of that frequency. Soon the miniature computers that made up part of the audio implant were made so that they were programmable. Some of the publicly implanted people (for instance some who got a 4 mm. cochlear auditory implant), who thought they were getting medical help, were later followed up a decade later by the intelligence agencies for their own agenda, and instead of just hearing the world, they got to hear mind-control drivel from some handler communicating via the implant. As sound waves come into the public implants, they are fast Fourier transformed into many channels lying between say 100 and 4000 Hz. Each channel may be assigned to a specific electrode located on an array of electrodes. The electrodes are stimulated for instance at 300 pulses per minute. The transmissions go to receiver/stimulators that then stimulate the subject to hear something. (Fourier transforms have also been identified being used by human brains to encode memory.)

In order to keep their signals to their implanted victims secret, the Network employs a tactic called piggybacking where they piggyback their own audio transmission onto standard FM frequencies.

CANAL is the acronym for an system that is used simultaneously for transmission and reception via the use of a double-frequency shift keying (DFS). Radio transmitters that send quick signals are variously called BURST, SQUIRT, SQUASH, or high-speed transmitters.

USES OF THE IMPLANTS

a. by themselves

b. with other implants

c. in conjunction with other mind-control devices

TYPES OF AUDIO IMPLANTS–

Part A. Publicly admitted audio implants
Part. B. Secretly implanted audio implants.

Part A. Publicly admitted audio implants.

The entire world has gotten involved in audio implant research. The British Cochlear Implant Group has been setting up “implanting centres” for the UK. Not all the publicly known implants will be listed here, for instance, some of those I chose not to list include some developed in Spain by Bosch & Colomina, the ones created in Thailand by upgrading american made implants, and several made in East and West Germany before the wall went down, and the Swiss implant which was simply the Austrian audio implant used with their own processor.

3M COCHLEAR IMPLANT SYSTEM/HOUSE DESIGN–MODEL 7700 (AKA ALPHA)

BANFAI, EMG –Several models developed by Banfai in Cologne-Dueren, West Germany. It is digital, with a pulsatile signal and a programmable memory. The implant can be communicated with using an interface device hooked to a computer. The patient has a keyboard. It was first implanted in 1977 and has 8/14 and 16 channels. It has been implanted into hundreds of people.

BRITISH, for instance UCH– Developed by Douek, Fourcin and Moore in London and implanted with a single electrode in 1978 and multiple electrodes in 1990. The implant has bioglass, and promontory grooves for the electrode, and neural network programming in its computer memory.

CHEN AUDIO IMPLANT–developed in Guangzhoi, mainland China and first implanted in 1984. It was said by the chinese that 20 people received this implant.

CZECHOSLOVAKIAN–Implants were created by Volvoda and Tichy in Prague and implanted in the 1980s into a few people.

FRASER–Developed in London, and first implanted in 1983. It was notable because it had a round window in the implant. In the first few years it was implanted into 56 people. The encapsulated the implant in a high-grade Silastic rather than an epoxy, as some other European researchers had done

FRAYASE–Developed in Toulouse, France, this audio implant was implanted with its receiver in the chest. It was first implanted in 1981, and 22 people were said to have received it.

GOA–developed in Shanghai, China by Lee and Lin.

INERAID- (fka Symbion) produced by the Richards Company, USA. In the Journal of the Acoustical Society of America, Mar. 1994, vol. 95, pp. 1677-1678, they have an article about a woman who had an implant in one ear and not the other. She was asked to compare the pitch signals from natural sources versus the right ear audio implant. The most apical implanted electrode was not as accurate as the more basal located electrodes using an Ineraid implant.

IMPLEX COM 12–Comes with an interfacing computer and a Syncom patient self-tester

LAURA–Developed at Antwerp, Belgium. These were first implanted in 1986, and had an internal canal antenna, a microphone entirely internal in the auditory canal, a pre-amp, an antenna, and a data control circuit. Only a few subjects got this implant. It comes with a computer, and an interface unit. It does have a programmable memory.

MED-EL –Developed in Austria at Vienna and Innsbruck by Hochmair, and first implanted in 1977. Hundreds of people were implanted with this audio implant. Some were implanted externally with it and some internally inside the ear canal. It has one channel and a multitude of electrodes stimulating the audio channel. It is analogue, and sends an analogue signal. It does not have a programmable memory.

MXM- -Developed by Chouard in Paris and first implanted in 1974. It had been implanted by 1990 into 179 people.

NUCLEUS 22, NUCLEUS MINISYSTEM 22, and other NUCLEUS AUDIO IMPLANTS (aka CLARK’s Implants)–At least two models developed in Australia at Melbourne. This audio implant was first implanted in 1978. The implant is programmable from the outside. It has been implanted into many hundreds of people. It has a multitude of electrodes that stimulate the audio system. It is digital, sends a pulsatile signal, and has a programmable memory. The implant comes with a diagnostic and programming interface computer. The Australian government heavily subsidized with millions of dollars research into audio implants and got the Cochlear Corporation (Nucleus) going. Nucleus uses what is called MULTIPEAK which provides high-frequency information from 2000 to 7000 Hz. With this 4 electrodes are stimulated in rapid succession, and special algorithms are used which change the relationship between the pulse amplitude and the pulse duration in order to allow 4 pulses to occur within a single frame. The Nucleus Minisystem 22 was approved by the FDA for implantation in both adults and children.

Storz Instrument Co.’s Implant–developed at Univ. of Calif, San Francisco.

Part. B. Secretly implanted audio implants.

There were several profiles of people that were used in the World Order’s selection of secret victims to implant. The following were criteria that they liked in the selection process, a. vulnerable, such as single women, b. people who were already programmed with trauma-based mind-control, c. psychics, who had already told people they heard or saw things ordinary people don’t, d. people, not highly regarded by society such as minorities, criminals, street people, mentally insane, who would not be able to find a support system to help them fight the experimentation. They also did the audio implants into some of their own intelligence agents, apparently to some who were getting somewhat difficult to their superiors. Because of this type of profile, and some other things this author learned, it appears that the initial two decades were used more for experimentation and development than they were for actual operations. However, with more than 2 decades of experience, they are now fully operational. From watching their interaction (messages) with victims of audio implants, it is clear that they are not in the testing stage, but are fully operational, and have a full cadre of trained operatives (men & women) to staff the secret bases from which the monitor and broadcast signals to their slaves. The staff their bases with 3 shifts and the graveyard shift leaves approx. 6 a.m. In other words, from what we can tell they are using standard shift times for the audio implant control staffs.

COCHLEAR IMPLANTS–There are Cochlear implants for auditory control secretly implanted without permission. A rubber molding skin color covers the outer lining of the ear canal. There are tiny slits in this lining, which when pushed to the side would show the presence of coils and a plastic rod/wire embedded in the area. Sometimes burn marks occur on sides of face due to intense heat generated by implants, which is painful.

DENTAL AUDITORY IMPLANTS–At least a dozen victims have complained that after their teeth were capped they began hearing voices. Other sources indicate that during the filing process implants are being put into people. This is the type of implant placed into J. Z. Knight and left dormant for many years until they decided to activate her as New Age guru.

RIDGE IMPLANTS– These implants can produce Theta waves and even voices. They are designed to suppress a particular type of thinking. The body may be sent into paralysis or given various stimulus-response stimuli in order to suppress certain thought patterns. If the slave begins to have certain thought patterns that threaten the programming and programming structures, these implants kick in to divert the person’s mental activity to something else.