Blog Archives

Interview with a CIA non-consensual human behavioral modification project

Transcript of Interview

Can you describe what mind control feels like?

JD: It takes on different characteristics over time. In the beginning, you simply don’t know that you are being influenced by it. Your brain doesn’t distinguish the external signal from your natural brain signals. Later, you feel that something is wrong and it feels like you are disassociated. Overtime as the intensity is turned up, you almost go into shock that such pain and trauma can be induced into the brain bypassing the normal sensory pathways. Just like turning a knob, full control of the human can be achieved or dissipated.

When full control is achieved it can best be described like a war in the mind. Your freewill is trying to overcome the mind control signal. Imagine a road with deep ruts in it. You are driving 55 miles an hour. Your tires get caught in the ruts and the car begins to steer itself to follow the deep ruts. When the car hops out of the ruts you get control but quickly the front tires get trapped into the ruts again. But unlike a car, you can’t just stop your mind. Even during sleep it continues and must follow the ruts. Later I learned that these ruts are called brain resonance entrainments and has commonalities to hypnosis.

What other kinds of psychological and neurological experiments were run on you?

JD: I counted over 75 different experiments from passing polygraphs and purposely failing polygraphs to memory recall experiments and trying to program me to kill various military leaders whom I didn’t know. They used sentence repetition, subliminal dream programming, a strange kind of brain imprinting using conditioning of emotional states that could be invoked with flashing images of the people I was to kill they told me.

What else can you tell people about your horrific experience and about neurological weapons?

JD: What was truly mind blowing for me is that I was forced to begin thinking in words. Every thought that I had after a while would be perceived as internal audio. They went through a mapping process where they refined and tuned the phonemes of perceived speech. It was as if they forced my brain to learn a way to control a voice synthesizer.

Can you imagine how maddening it is not to be able to think quickly and silently?

What do you think the purpose was of that experiment?

JD: At the time I was so confused as to why this was being done to me that I didn’t know. But in hindsight it was obvious that it served dual purposes at least. It is the perfect interrogation tool and by interjecting false sentences in the same “voice” as my new internal voice, the system would occasionally trick my mind into thinking that I thought it. They have been working on this technology and using it for over half a century. Again, in hindsight, I have seen this technology described in countless movies but didn’t believe that it really existed at the time.

How did they release you from the program?

JD: I don’t know if they fully did. They stopped the torture and violent imagery and repetitive sentence programming that were intensely painful, but not everything has stopped. Maybe I am to be triggered by a keyword to do their bidding. I just don’t know if I am a failed project because I was too aware of what they were trying to do or if I am now a programmed assassin. How could one know that technology to fully control a human as a remote control soldier has been perfected? I feel exactly how someone should feel who was tortured and now cope with post traumatic stress syndrome with flashbacks to the extreme torture methods.

It is difficult to know whether I should consider myself lucky that I survived or if the horror of being betrayed by my government and living with the knowledge on what a massive scale this is done isn’t a fate worse than death. There are no good guys to root for anymore.

What is Mind Control / Psychotronic Torture?



The term “Mind control” basically means covert attempts to influence the thoughts and behavior of human beings against their will (or without their knowledge), particularly when surveillance of an individual is used as an integral part of such influencing and the term “Psychotronic Torture” comes from psycho (of psychological) and electronic. This is actually a very sophisticated form of remote technological torture that slowly invalidates and incapacitates a person. These invisible and non-traceable technological assaults on human beings are done in order to destroy someone psychologically and physiologically.

Actually, as par scientific resources, the human body, much like a computer, contains myriad data processors. They include, but are not limited to, the chemical-electrical activity of the brain, heart, and peripheral nervous system, the signals sent from the cortex region of the brain to other parts of our body, the tiny hair cells in the inner ear that process auditory signals, and the light-sensitive retina and cornea of the eye that process visual activity. We are on the threshold of an era in which these data processors of the human body may be manipulated or debilitated. Examples of unplanned attacks on the body’s data-processing capability are well-documented.

An entirely new arsenal of weapons, based on devices designed to introduce subliminal messages or to alter the body’s psychological and data-processing capabilities, might be used to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the various sensory and data-processing systems of the human organism. In both cases, the goal is to confuse or destroy the signals that normally keep the body in equilibrium.

Definition of psychotronic (psycho-physical) weapons.

Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means (techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden, forced influences on the psyche of a person for the purpose of modifying his consciousness, behavior and health for what is desired in the way of influencing aspects of control…” This is not only dangerous, this is deadly!”

Actually, the goal of mind control is to access those areas of the brain that are outside of the conscious control of the individual by circumventing the normal inhibiting response of the cerebral cortex: “an individual’s voluntary conscious self-control must be bypassed or short-circuited.” This unconscious coercion is done through electromagnetic-wave bombardment of the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne waves can travel over distances and are known to change the behavior of animals and humans in their path. Such remote control makes possible potentially frightening uses for altering the brain’s functioning. These are invisible and deadly waves. This waves goes directly to the subconscious parts of the human brain for receiving or transcoding the messages and without the person exposed to such influence having a chance to control the information input consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting mind control requires the creation of “profound and deep emotional states.” Recommended are fear, shock and anxiety, which have “an intense disinhibitive effect on the human brain.” What this means, in essence, is that emotional trauma facilitates the accessing of dissociative states. In order to disable the brain’s “cortical block,” Verdier recommends alcohol, euphoric drugs, isolation, solitary confinement, and – “the most dramatic and unique item in the brainwashing arsenal” – hypnosis. All of these are methods that have been extensively tested by the CIA under the rubric of the MK-ULTRA program.

The technology is rooted in surveillance devices, such as audio and video bugs, through-the-wall and remote sensing devices, and biosensors both remote and implanted.  This provides the feedback for the influencing, as well as any “entertainment” value for voyeur/sadists and intellectual property theft for thieves.  Coupled with the surveillance is some sort of “effectors” or feedback path for influencing an individual.

Thus there are several categories of mind control operations, for example covert drugging, hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks, and ongoing feedback control setups for long-term torture and exploitation of victims, to mention a few.  What they have in common is the attack against the mind of the victim, as well as the deniable and denied nature of the attack.  The exact means being used in any particular case are beside the point here.  These techniques do not just violate one or two of what everyone knows are fundamental human rights:  In one fell swoop they violate almost every fundamental human right a person has.

The electromagnetic technology works on the theory that the mind and body are an electromagnetically mediated biophysics system and the electromagnetic signals form outside sources can mimic the mind and body’s electromagnetic signals and therefore a weapon can be developed based on these principles.

There is evidence that since the 1950’s the U.S. and other government have been developing electromagnetic weapons which can remotely target the electromagnetic system of the human body for military and intelligence purposes.

The First phase is the harassment/surveillance program

During the first phase of this Govt. program a person is broken physically and mentally. The methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon, Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs, homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family, friends. The isolation is needed to have access to the person to conduct many of the experiments on them. All privacy and constitutional rights are thus stripped away.

The second phase is the assaults of Directed Energy Weapons.

After a victim becomes isolated from everyone in the world. The victim now having feelings of regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During this time many have been implanted with microchips. Many begin experiencing extreme pain to their head. Some hear voices. Then pain is delivered to various other parts of their bodies. The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing the pain and no one is touching them. It is an invisible energy force. Along with drugs being administered by the scientist through either a drip system which!has been inserted into an individual, food tampering, or injection all without the victims permission. Then Mind Entrainment begins.

Directed Energy Weapons

Some of the weapons were known as non-lethal weapons. They use such weapons as extremely low frequency Elf electromagnetic weapons (which has been used in mind control), acoustics, harmonics (which have been used as a mind control technique), ultrasound, microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic energy beam can be used to induce “considerable agitation and muscular activity” or “induce muscular weakness and lethargy” this weapon is know as Ultra High Frequency EM.

Psychological warfare tactics are being used against unsuspecting citizens to destroy their jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to utterly destroy a person, very often resulting in a person taking his or her own life, or ending up in a mental hospital. This has been taking place for years and nothing is ever said about it. Nothing is ever written about it. For the sake of those who came before us, and those who come after us, the world needs to know what is happening.

For many people, this comes out of nowhere. They don’t know whose toes they stepped on in order to warrant such a brutal attack. For others who are whistleblowers, they know full well how they garnered such attention. For some, they don’t even realize that they are the targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that something unspeakable and devastating is happening.

What makes this crime so heinous is that the most sophisticated techniques of psychological warfare are employed against a person in order to make them look like they are crazy. Friends and family members don’t believe the things that are happening and often believe the targeted person is crazy.

This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking part of it, which targets experience to varying degrees. This involves stalking by a multitude of individuals both on foot and while you’re in the car. Known as “street theatre” by those who experience it, it involves vandalism to house, car and personal property. Gang stalking can also be referred to as cause stalking, vengeance stalking and multi-stalking.

Some people also experience electronic harassment. This is extremely distressing, painful and invasive, and feels like one’s mind and body is undergoing constant rape, 24 hours a day, 7 days a week. The technology used to do this is unknown, but hundreds of victims report the same physical sensations and experiences. Many take their lives in an attempt to escape the horror. It is so distressing that only fellow targets can really understand what another target is experiencing.

In either case, the attacks are so well orchestrated that only the victim is aware of them. This is intentional, and it appears that these groups have perfected these techniques over many years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do, since new targets are completely bewildered as to what is happening to them, having never heard a peep out of the media about such occurrences (except in relation to mental illness). Their actions are based on many of the same tactics as those employed in ritual abuse, and are designed to weaken the target’s mind and perpetrators are becoming increasingly addicted to this game of predator/prey, always needing more targets to satisfy their unending thirst for a thrill.

“Electronic harassment” or e-harassment is a catch-all term used to describe a group of circumstances which a large number of people are currently experiencing in common. In general, this term refers to the use of electronic technology to view, track and/or harass a person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by neighbors) is largely personal opinion. There is no definitive proof that would allow any of the present victims to launch a court case, but the numbers of victims and the commonality of experience speaks for itself.

The technology involves the use of electromagnetic waves of various frequencies to achieve different results. Some frequencies will make a person tired, while others may cause confusion or memory loss. With the rapid increase in cell phone usage, many experiments have been conducted on the detrimental effects of those particular frequencies on animals. The results indicate that the invisible e.m. signals from cell towers can cause a wide range of physical ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is even more likely the case with the frequencies which may be used to cause direct, intentional harm to a person.

Electronic harassment is sometimes referred to as “psychotronics”, but would more accurately be described as “criminal psychotronics”.

Types of Weapons:

Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons

Soft Kill Weapons
Less-Than-Lethal Weapons

No-Touch Torture (Remote torture) , Interrogations and False Confession

Interrogation Tactics

It is well settled that courts permit interrogators to lie to suspects on certain subjects and to deceive them — and interrogators routinely exercise these freedoms. They lie about both the existence and the strength of the evidence that supposedly links the suspect to a crime. They deceive suspects by feigning certainty in the suspect’s guilt even when they have no evidence pointing to the person. And, when they know their advice is not in the suspect’s interest, they deceive by feigning sincerity when they volunteer advice about how best to deal with the problem facing the suspect.10

Interrogators also lie when they do things that the courts prohibit, such as promising leniency. Not only are their promises of leniency impermissible, they are false. Persons who are naïve about interrogation are unlikely to realize they are being lied to by the detective they correctly understand is promising that leniency will follow from a confession that the crime happened in a certain way. The detective knows that he has no power to deliver on his promise. He has no intention of trying to honor the promise. He probably does not believe that the crime happened as he has suggested. He has also probably already made up his mind that he will lie if asked about the promise and deny that he ever made it, even if he is asked while under oath.11

Interrogation is also an exceptional experience because the stakes are so high. Being accused of having committed a murder is likely to foster the realization that what life will be like in the future depends on the resolution of the accusation. Interrogators capitalize on and intensify the feelings associated with this realization. They try to make it seem that the suspect’s future, if not his life, turns on the outcome of the interrogation itself, as if it is during the interrogation that the accusation will be resolved. Both being accused of a serious crime and the interrogator’s initial position that the suspect’s future will be spent in prison are likely to be disturbing and create great anxiety. Interrogators act to magnify a suspect’s distress for two reasons. They want the suspect to believe that he or she needs to reach a resolution during the interrogation. They also want to intensify the suspect’s distress since emotionality interferes with thinking strategically and diminishes the likelihood that the suspect will consider possible options different from those the interrogator proposes.

Despite the fact that interrogations are conducted under atypical circumstances and in settings that are unusually stressful, there is no reason to imagine that a suspect’s decision-making is anything but rational given the information on which he is relying. That said, one should not forget the adage “garbage in, garbage out” and bear in mind that in assessing options the suspect is enmeshed in a fantasy deliberately created by the interrogator. Even knowing he is innocent of the crime, in assessing risk a suspect relies on false information about the amount of evidence that mistakenly links him to the crime. In deciding what is best for him to do, the suspect does not know that the offer of a way out is a fraud. What makes psychological coercion so dangerous is that it can lead an innocent person to erroneously conclude that giving a false confession is the best choice under what he perceives to be his circumstances.

Approaching interrogation as a matter of rational decision-making and being able to study records of interrogations have led to certain realizations about how detectives convince suspects to admit responsibility for a crime. To prepare someone to shift from denial to admission, detectives need to accomplish specific intermediate goals and address these goals in a particular order. Influencing someone to shift requires three steps: (1) that the suspect’s perception of his situation be changed from confident and secure that the interrogation will not be a problem for him to dispirited and hopeless; (2) that the suspect’s expectations about the future change from confident he or she will return to normal life to certain that arrest and imprisonment will follow the interrogation; and (3) that a motivator be provided to induce the suspect to shift from denial to admission of responsibility.

Interrogation records reveal that detectives use a relatively small number of alternative tactics to accomplish each of their essential sub-goals. Although interrogations vary somewhat as a function of the habits of the detectives conducting them and the crimes under investigation, the similarities from one interrogation to the next are far more striking than their differences. The similarities are there because detectives learn to conduct interrogations by attending schools or through on-the-job training that passes on the culture of interrogation.

True and false confessions happen in response to interrogations that are built from almost identical collections of tactics. Understanding why false confessions happen starts with realizing that interrogations that overcome a suspect’s resistance and produce confessions will always include steps 1 and 2 because these steps set up the suspect to view his situation in a certain way — because his future is determined, confessing or not makes no real difference.

The majority of the tactics detectives actually use in interrogation are approved (or not disapproved) by the courts. What appears to distinguish interrogations that can produce a false confession from those that do not have this potential is the type and strength of the motivator that the interrogator relies on to accomplish step 3. Interrogations that stay within the bounds set by the courts, including which motivational tactics may be used, do not seem to have the potential to cause normal, innocent adults to falsely confess.

Based on the research that has been done and my experience studying interrogation and false confession in the United States, it appears that knowing false confessions from psychologically and intellectually normal adults come about if and only if a detective introduces into the interrogation a too strong motivator, that is, a motivator that is psychologically coercive.12 A psychologically coercive motivator is created when an interrogator establishes a linkage between confessing and absolute or relative leniency and/or a linkage between continuing to deny and absolute or relatively severe punishment. Interrogators inject psychological coercion into an interrogation either by making direct, blatant threats and promises or through a more complicated method that works to communicate a message via a series of suggestions and slightly veiled promises.

Unfortunately, despite knowing full well that what they are doing is prohibited, some detectives deliberately use psychological coercion to obtain confessions from suspects. Although undoubtedly many of the suspects exposed to coercive motivators are guilty of the crime, some are not and the interrogator cannot necessarily tell the difference. The reliance by American police on the use of coercive motivators is a serious problem. According to studies, false confessions are one of the major causes of miscarriages of justice in America. ( Read More)

What is a psychotronic weapon?

It is a weapon that emits certain electromagnetic frequencies  that can affect the central nervous system and the neural activity of the brain, disrupting its normal  activities.  This is part of a larger study under several names, electromagnetics, biomagnetics, and  others.  Apparently, if reports can be believed, the first uses of psychotronic warfare was by the  Soviets during the cold war.  Some synonyms for psychotronics are synthetic telepathy, subconscious  brainwashing.


ПСИХОТРОНИКА  – отрасль науки и техники, в основе которой лежит взаимодействие человеческой психики с физическими приборами и техническими устройствами; возможность работы этих устройств заключена не в самом приборе, а в специально подготовленном операторе, в его психической программе и глубине сознания, поэтому в результате психического воздействия человека-оператора физико-технические характеристики устройства существенно меняются.

Методы целенаправленного воздействия на человека

Воздействовать на ум и поведение человека можно различными путями, одни из которых требуют лишь специфичной подготовленности специалиста (убеждение, внушение, подкуп…), а другие – еще и специальной аппаратуры (технотронные приемы, секс-мероприятия, зомбирование…).
Методы прицельного влияния могут быть щадящими (внушение…) и агрессивными (шантаж), простенькими (запугивание…) и изощренными (зомбирование…), трудно уловимыми (нейролингвистическое программирование…) и дополняющими (фармакоуправление…).
*Выбор применяемой методики зависит от*:
– реальной уязвимости объекта (черт его характера, эпизодов биографии, наличной ситуации…);
– цели намечаемого воздействия (изменение мышления, привлечение к сотрудничеству, получение информации, одноразовое содействие, воспитующее наказание…);
– собственных возможностей (обладание временем, умением, знанием, техаппаратурой, должными химпрепаратами, компетентными помощниками…);
– персональных установок исполнителя (его уровня моральной допустимости…).
*В практике чаще всего используются*:
– убеждение;
– внушение;
– гипноз;
– нейролингвистическое программирование;
– нарковоздействия;
– секс-мероприятия;
– фармакоуправление;
– технотронные приемы (ультразвук, инфразвук, СВЧ-излучения, электрошок, подпороговая стимуляция, торсионные излучения…);
– зомбирование;
– подкуп;
– запугивание;
– пытки..

The Militarization of Neuroscience

When military scientists begin to combine “cognitive engineering” and neuroscience with genetic engineering, we could see a nightmarish new generation of biological weapons and nerve agents that radically alter the minds, emotions, memories and beliefs of everyone on earth.

That’s the opinion of Mark Wheelis and Malcolm Dando, authors of “Neurobiology: A Case Study of the Imminent Militarization of Biology” published September 30, 1995 in the International Review of the Red Cross. See this site for a PDF of the full article:

Abstract: The revolution in biology, including advances in genomics, will lead to rapid progress in the treatment of mental illness by advancing the discovery of highly specific ligands that affect specific neurological pathways. The status of brain science and its potential for military application to enhance soldier performance, to develop new weapons and to facilitate interrogation are discussed. If such applications are pursued, they will also expand the options available to torturers, dictators and terrorists. Several generic approaches to containing the malign applications of biology are shown, and it is concluded that success or failure in doing so will be significantly dependent on the active involvement of the scientific and medical communities.

Translation: The medical community has got to stop sitting on its duff and get some international legislation passed prohibiting the development of these bioweapons NOW.

I would add: An equally serious effort needs to be made to block military application of EM weapons to the human brain. The pretence that such weapons are “less than lethal” is a serious misunderstanding of the immense threat that they pose to the privacy and civil liberties of every man, woman and child on the face of the globe.

Synthetic telepathy also known as techlepathy or psychotronics

The following article is an entry that appeared on Wikipedia. Within the last 24 hours a major “edit war” broke out and it appeared, at least to me, that the information was being suppressed. The article goes into depth about a field of espionage that employs a technology known as “silent sound” or “Synthetic telepathy”. If you’re interested in high tech espionage, this makes for a very good read.
Synthetic telepathy

Synthetic telepathy also known as techlepathy or psychotronics – is a term used to describe the process in brain-computer interfaces by which human thought (as electromagnetic radiation) is intercepted, processed by computer and a return signal generated that is perceptible by the human brain. (ref 1,2,3,4)

In 1967, Edmond M. Dewan published a paper in Nature demonstrating the control of Alpha waves, turning them on and off, to produce Morse code. (ref 5) Using an EEG machine, Dewan and his fellow researchers were able to send words and phrases by thought alone.

In 1976, Robert G. Malech was awarded United States Patent 3951134 for remotely monitoring and altering brainwaves using radio.(ref 6) This patent makes reference to demodulating the waveform, displaying it to an operator for viewing and passing this to a computer for further analysis.

In 1988, Farwell, L.A. & Donchin, D. produced a paper describing a method of transmitting linguistic information using the P300 response system. (ref 7) This system combined matching observed information to what the subject was thinking of. In this case, being able to select a letter from the alphabet that the subject was thinking of. In theory, any input could be used and a lexicon constructed.

United States Patent 6,011,991, granted January 4, 2000, describes a method of monitoring an individual’s brain waves remotely, for the purposes of communication. Filed December 7, 1998, the patent outlines a system that monitors an individual’s brainwaves via a sensor, then transmits this, specifically by satellite, to a computer for analysis. This analysis would determine if the individual was attempting to communicate a “word, phrase, or thought corresponding to the matched stored normalized signal”.(ref 8)

Approaches to synthetic telepathy can be categorized into two major groups, passive and active. Like sonar, the receiver can take part or passively listen.

Passive reception is the ability to “read” a signal without first broadcasting a signal. This can be roughly equated to tuning into a radio station, the brain generates electromagnetic radiation which can be received at a distance. That distanced is determined by the sensitivity of the receiver, the filters used and the bandwidth required. Most universities would have limited budgets and receivers such as EEG (and similar devices) would be used. A related military technology is the surveillance system TEMPEST, the effective range of which is classified. (ref 9) Given that US Congress attempted to enact a bill in Oct 2001 banning these type of devices as “space weapons”, (ref 10) may indicate that fluctuations in the human magnetic field can be intercepted by satellite.

Robert G. Malech’s approach requires a modulated signal to be broadcast at the target. The method uses an active signal which is interfered with by the brain’s modulation. Thus, the return signal can be used to infer the original brainwave. This approach does expose the transmitter, but is ultimately required for generating return signals that can be processed by the brain.

The research of Farwell, L.A. & Donchin, D, is the first public revelation that could lead to a generic lexicon being developed, however, this is implied in the work of Robert G. Malech in 1976.

==Current research==

Current research, as of 2010, is being driven by military for “covert speech”, however, given that much of this is unclassified, it would suggest that the bulk of the research was performed much earlier and dedicated to the field of intelligence gathering during the cold war. Additional reports suggest that a version is deployed in combat zones to demoralize enemy troops and a smaller number of reports indicate a potential use to undermine governments and cause public unrest. (ref 11, 12)

Today, the driving force appears to be silent communication with battlefield troops. A mere $4 million was provided to DARPA for the fiscal year 2009/2010 to develop such a system called “Silent Talk”. (ref 13) Much of the research is being conducted at The Cognitive NeuroSystems Lab at UC Irvine. (ref 14)

A further $4 million was allocated by the Army to the University of California to investigate computer-mediated “synthetic telepathy”.(ref 15) The research aims to detect and analyze the word-specific neural signals, using EEG, which occur before speech is vocalized, and to see if the patterns are generalizable. (ref 16) The research is part of a wider $70 million project that began in 2000 which aims to develop hardware capable of adapting to the behavior of its user.(ref 17)

Quite apart from linguistic information, images have been extracted from the brain. Researchers at Japan’s ATR Computational Neuroscience Laboratories have been able to reconstruct images that a subject can currently see. The ultimate goal of the unclassified project is to view both retinal and imagined images in real-time, including dreams. (ref 18)

==Computer mediation==

Computer mediation falls into two basic categories, interpretative and interactive.

Interpretative mediation is the passive analysis of signals coming from the human brain. A computer “reads” the signal then compares that signal against a database of signals and their meanings. Using statistical analysis and repetition, false-positives are reduced over time.

Interactive mediation can be in a passive-active mode, or active-active mode. In this case, passive and active denote the method of reading and writing to the brain and whether or not they make use of a broadcast signal. Interactive mediation can also be performed manually or via artificial intelligence.

Manual interactive mediation involves a human operator producing return signals such as speech or images. A.I. mediation leverages the cognitive system of the subject to identify images, pre-speech, objects, sounds and other artifacts, rather than developing A.I. routines to perform such activities. A.I. based systems may incorporate natural language processing interfaces that produce sensations, mental impressions, humor and conversation to provide a mental picture of a computerized personality. Not only can this A.I hold a conversation via the internal monologue but it may also perform routing of information to and from specific groups or individuals. This provides a broad range of potential applications from acting as a communications system to conducting interrogations.

This latter form is currently being researched at UC Irvine for an unclassified US military project. (ref 19) Given the high value to espionage and counter-terrorism, it is likely that such a system is already deployed in a classified manner.

==Military uses==

In a military context, the first obvious uses is to both read and write information to the internal monologue. This provides two major areas of interest, the first being two-way communication for field agents and the second is the intelligence gathering and interrogation. A fundamental problem arises when using the system for communication purposes, in that, it is impossible to authenticate the source of the transmission. Synthetic telepathy has limited uses as a communication system unless direct-contact headset systems are used and supported by encrypted channels. As such, standard radios are more effective in combat situations. Synthetic telepathy also requires the thought stream to be processed which results in a minor lapse of attention, rather like a daydream, that could have deadly consequences on the battlefield.

With respect to intelligence gathering and interrogations, synthetic telepathy has a wide range of drawbacks and limitations. Contrary to popular belief, synthetic telepathy does not provide the ability to read a person’s mind or memories. What it does provide is the ability to read the internal monologue (or anything that causes electrical change/radiation) and the trick is to get the subject to “voice” their memories and cross-reference that with their emotional state. In other words, basic psychological manipulation is a key factor and makes the technology not much more reliable than a standard lie-detector test. In practice, passive monitoring of the internal monologue over a long time period (months-years) is probably the most effective method of intelligence gathering.

The capability to put a person into a state of hypnosis is often touted by conspiracy theorists. In actual fact, the suggestive capabilities of synthetic telepathy use a different mechanism, basic impulses and sensations. This is merely a different form of writing to the brain. To formulate thought, the brain has a pipeline through which information is processed. (ref 20) At its most basic, impulses guide human behavior and manipulation of these impulses provides a strategic advantage in both combat and political situations. By altering the motivational factors of a target subject or group, it makes it easier to guide their higher level decision making processes.

Crowd or riot control can be achieved by generating impulses that are essentially common to all humans, resulting in the dispersion of crowds or a willingness to co-operate with authorities. This type of synthetic telepathy is arguably a political tool as it suppresses dissent. (ref 21)

Amnesia (retrograde and anterograde) can be induced as any active signal is essentially interferring with normal operations of the brain. Thus, transfer from shortterm to longterm memory can be inhibited. (ref 22) Vision and auditory systems could also be compromised, as with any neural processing system, corruption of the inputs would result in halucinations, much like the effects of LSD. With a proper interface to such regions, events such as “alien abductions” or “seeing God” could be faked quite readily and “mental illness” used as a cover for the extraction of information. (ref 23, 24, 25)

==Silent Sound Spread Spectrum (SSSS/S-Quad)==

ITV News Service, in March 1991, produced a report of ultrasound piggybacked on a commercial radio broadcast (100Mhz) aimed at entraining the brains of Iraqi troops and creating feelings of despair. (ref 26) This has been related to United States Patent 5,159,703 awarded to Oliver M. Lowery which refers to a “silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain, typically through the use of loudspeakers, earphones or piezoelectric transducers.”(ref 27)

Human hearing is roughly in the range of 20Hz-20,000Hz (20 kHz), although a human adult will lose the ability to hear the higher ranges as they grow older. In addition, most cheap radios have a limited frequency response range (ref 28) that will be unable to reproduce silent sound as encoded originally making it ineffective.

As such, an alternative explanation for the effectiveness of S-Quad is provided in human biology:

1. Cells amplifying radio signals at certain frequencies.
2. Cells can demodulate voice on a basic carrier wave.

This is not as strange as it seems, it has been noted for a long time that fillings, or dental braces, can result in radio stations being heard in the mouth of an individual. (ref 29)

==Mind control==

Conspiracy theory and popular science fiction would have the world believe that the human mind can be remotely controlled. That individuals can be turned into mindless automatons and directly controlled by computers to produce sleepers or assassins. (ref 30) The reality is much less clear.

Interfacing remotely to write to the brain is performed using electrical interference rather like crosstalk (electronics). (ref 31) Much like a drill next to a television, the interference pattern is processed by the brain as information, a variant which induces sensations and feelings is known as Transcranial Magnetic Stimulation. (ref 32) As such, an externally generated monologue will be weaker than the internal monologue of the target subject due to a lesser signal strength. An over-powering signal would interrupt a wide range of neural functions that could impact critical autonomic systems resulting in death.

Two possible methods exist that could result in an individual killing another through the use of synthetic telepathy. The first is to leverage the natural behavior of the target subject, that is, use an individual who would kill another. The second is to induce psychotic symptoms and diminish their mental control (ref 33, 34) In both cases, the underlying mechanics are the same, to provide impulses and sensations that urge the individual to commit murder. This is not hypnosis, but merely physiological manipulation without the knowledge of the target.

Another area of interest and arguably more feasible, is the manipulation of political figures. (ref 35)Thoughts, sensations and impulses can be combined to influence political and personal decision making processes. A similar process can be used to effect the population at large to drive agendas or to maintain power for certain groups, undermining free will and self-expression. (ref 36) As the technology matures and expands to regimes throughout the globe, this will be a major source of concern for governments world-wide.

Finally, we come to the area of interrogations which can be conducted remotely whilst an individual or groups is conducting their normal daily business. The internet is saturated with such reports (ref 37) and as a possible side-effect is psychosis, it is quite likely that at least some of them are accurate.

==In law==
The term “psychotronic”, short for psycho-electronic ( ref 38) was used in the proposed Bill H.R. 2977 Space Preservation Act of 2001, which listed “psychotronic” as a list of possible spaceborne weapons which would be banned by the Act (ref 39)

In 2001, President Vladimir V. Putin signed into law a bill making it illegal to employ “electromagnetic, infrasound … radiators” and other weapons of “psychotronic influence” with intent to cause harm.

As a completely unnatural event, it is arguable that this type of technology when employed in interrogations would be classified as “cruel or unusual”. Further to this, A.I. mediated events such as mock executions or death threats would also violate the Geneva convention, International law and laws of most nations in the developed world. Counter-claims focusing on National Security would be invalid as criminal activity is, in itself, a gross violation of National Security

The European Parliament adopted a resolution on January 28, 1999[38], 28.1.99 Environment, security and foreign affairs A4-0005/99:

23. Calls on the European Union to seek to have the new ‘non-lethal’ weapons technology and the development of new arms
strategies also covered and regulated by international conventions …

27. Calls for an international convention introducing a global ban on all developments and deployments of weapons which might
enable any form of manipulation of human beings

==In the media==

60 Minutes correspondent Lesley Stahl interviewed Tom Mitchell of Carnegie Mellon University on his work in “Thought Identification” using fMRI. (ref 40) The segment, published Jan. 4, 2009 and available on the CBS website, shows associate producer Meghan Frank having his thoughts identified by computer. (ref 41) The segment shows that a generalizable pattern exists in the human brain that can be used to identify thoughts without training a computer for each individual with 100% accuracy.

==Further reading==
Dr Nick Begich – Controlling the Human Mind, Earth Pulse Press Anchorage – isbn=1-890693-54-5}}
Walter Bowart –
John Marks – In Search of the Manchurian Candidate, publisher WW Norton & Co, 1979, isbn=0-393-30794-8

1. – Army developing ‘synthetic telepathy’
2. articleshow/3596708.cms – US army developing synthetic telepathy
3.url= – Army Sinks Millions Into “Synthetic Telepathy” Research
4. – Tips and Tricks for Mind Control from the US Military
5. – MURI: Synthetic Telepathy
6. – Apparatus and method for remotely monitoring and altering brain waves
7. – MURI: Synthetic Telepathy
8. – Communication system and method including brain wave analysis and/or use of brain activity
9. – TEMPEST measurement standards
10. – Space Preservation Act of 2001
12. Wall, Judy, “Military Use of Mind Control Weapons”, NEXUS, 5/06, Oct-Nov 1998
13. Soldier-Telepathy” Drummond, Katie – Pentagon Preps Soldier Telepathy Push –
14. – MURI: Synthetic Telepathy
15. Soldier-Telepathy” Drummond, Katie – Pentagon Preps Soldier Telepathy Push –
16. Soldier-Telepathy” Drummond, Katie – Pentagon Preps Soldier Telepathy Push –
17. Noah, Shachtman – Pentagon’s PCs Bend to Your Brain –
18. – Scientists extract images directly from brain
19. – MURI: Synthetic Telepathy -Overview
20. – MURI: Synthetic Telepathy
21. -Bioeffects of selected non-lethal weapons
22. – Partial Amnesia for a Narrative Following Application of Theta Frequency Electromagnetic Fields
23. – This Is Your Brain on God
24. – The NSA & Synthetic Telepathy
25. – Journal of Psycho-Social Studies – Vol 2 (2) 2003 – On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology by Dr. Carole Smith
26. – Eleanor White – New Devices That ‘Talk’ To The Human Mind Need Debate, Controls
27.,159,703.PN.&OS=PN/5,159,703&RS=PN/5,159,703 – Silent subliminal presentation system
28. | – Understanding Loudspeaker Frequency Response
29. – Q: Radio signals picked up by tooth fillings
30.| – God’s Judgment Cometh Soon
31. – Apparatus for audibly communicating speech using the radio frequency hearing effect
32. – Transcranial Magnetic Stimulation
34. – Brain Zapping
35. – More on synthetic telepathy
36. – Brain Zapping
37. – DaProcess of A Federal Investigation PG 1 of 4
38. , -Journal of Psycho-Social Studies – Vol 2 (2) 2003 – On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology by Dr. Carole Smith
39. – Space Preservation Act of 2001
40. – 60 Minutes: Incredible Research Lets Scientists Get A Glimpse At Your Thoughts
41.;photovideo – 60 Minutes: Video – Mind Reading