Blog Archives

Interview with a CIA non-consensual human behavioral modification project

Transcript of Interview

Can you describe what mind control feels like?

JD: It takes on different characteristics over time. In the beginning, you simply don’t know that you are being influenced by it. Your brain doesn’t distinguish the external signal from your natural brain signals. Later, you feel that something is wrong and it feels like you are disassociated. Overtime as the intensity is turned up, you almost go into shock that such pain and trauma can be induced into the brain bypassing the normal sensory pathways. Just like turning a knob, full control of the human can be achieved or dissipated.

When full control is achieved it can best be described like a war in the mind. Your freewill is trying to overcome the mind control signal. Imagine a road with deep ruts in it. You are driving 55 miles an hour. Your tires get caught in the ruts and the car begins to steer itself to follow the deep ruts. When the car hops out of the ruts you get control but quickly the front tires get trapped into the ruts again. But unlike a car, you can’t just stop your mind. Even during sleep it continues and must follow the ruts. Later I learned that these ruts are called brain resonance entrainments and has commonalities to hypnosis.

What other kinds of psychological and neurological experiments were run on you?

JD: I counted over 75 different experiments from passing polygraphs and purposely failing polygraphs to memory recall experiments and trying to program me to kill various military leaders whom I didn’t know. They used sentence repetition, subliminal dream programming, a strange kind of brain imprinting using conditioning of emotional states that could be invoked with flashing images of the people I was to kill they told me.

What else can you tell people about your horrific experience and about neurological weapons?

JD: What was truly mind blowing for me is that I was forced to begin thinking in words. Every thought that I had after a while would be perceived as internal audio. They went through a mapping process where they refined and tuned the phonemes of perceived speech. It was as if they forced my brain to learn a way to control a voice synthesizer.

Can you imagine how maddening it is not to be able to think quickly and silently?

What do you think the purpose was of that experiment?

JD: At the time I was so confused as to why this was being done to me that I didn’t know. But in hindsight it was obvious that it served dual purposes at least. It is the perfect interrogation tool and by interjecting false sentences in the same “voice” as my new internal voice, the system would occasionally trick my mind into thinking that I thought it. They have been working on this technology and using it for over half a century. Again, in hindsight, I have seen this technology described in countless movies but didn’t believe that it really existed at the time.

How did they release you from the program?

JD: I don’t know if they fully did. They stopped the torture and violent imagery and repetitive sentence programming that were intensely painful, but not everything has stopped. Maybe I am to be triggered by a keyword to do their bidding. I just don’t know if I am a failed project because I was too aware of what they were trying to do or if I am now a programmed assassin. How could one know that technology to fully control a human as a remote control soldier has been perfected? I feel exactly how someone should feel who was tortured and now cope with post traumatic stress syndrome with flashbacks to the extreme torture methods.

It is difficult to know whether I should consider myself lucky that I survived or if the horror of being betrayed by my government and living with the knowledge on what a massive scale this is done isn’t a fate worse than death. There are no good guys to root for anymore.

What is Mind Control / Psychotronic Torture?



BY DEB CHAKRABORTY

 

The term “Mind control” basically means covert attempts to influence the thoughts and behavior of human beings against their will (or without their knowledge), particularly when surveillance of an individual is used as an integral part of such influencing and the term “Psychotronic Torture” comes from psycho (of psychological) and electronic. This is actually a very sophisticated form of remote technological torture that slowly invalidates and incapacitates a person. These invisible and non-traceable technological assaults on human beings are done in order to destroy someone psychologically and physiologically.

Actually, as par scientific resources, the human body, much like a computer, contains myriad data processors. They include, but are not limited to, the chemical-electrical activity of the brain, heart, and peripheral nervous system, the signals sent from the cortex region of the brain to other parts of our body, the tiny hair cells in the inner ear that process auditory signals, and the light-sensitive retina and cornea of the eye that process visual activity. We are on the threshold of an era in which these data processors of the human body may be manipulated or debilitated. Examples of unplanned attacks on the body’s data-processing capability are well-documented.

An entirely new arsenal of weapons, based on devices designed to introduce subliminal messages or to alter the body’s psychological and data-processing capabilities, might be used to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the various sensory and data-processing systems of the human organism. In both cases, the goal is to confuse or destroy the signals that normally keep the body in equilibrium.

Definition of psychotronic (psycho-physical) weapons.


Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means (techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden, forced influences on the psyche of a person for the purpose of modifying his consciousness, behavior and health for what is desired in the way of influencing aspects of control…” This is not only dangerous, this is deadly!”

Actually, the goal of mind control is to access those areas of the brain that are outside of the conscious control of the individual by circumventing the normal inhibiting response of the cerebral cortex: “an individual’s voluntary conscious self-control must be bypassed or short-circuited.” This unconscious coercion is done through electromagnetic-wave bombardment of the brain, .i.e. bombarding of the brain with low-frequency radio waves. These airborne waves can travel over distances and are known to change the behavior of animals and humans in their path. Such remote control makes possible potentially frightening uses for altering the brain’s functioning. These are invisible and deadly waves. This waves goes directly to the subconscious parts of the human brain for receiving or transcoding the messages and without the person exposed to such influence having a chance to control the information input consciously. This can alter a person thoughts, emotions, and behavior. To achieve truly lasting mind control requires the creation of “profound and deep emotional states.” Recommended are fear, shock and anxiety, which have “an intense disinhibitive effect on the human brain.” What this means, in essence, is that emotional trauma facilitates the accessing of dissociative states. In order to disable the brain’s “cortical block,” Verdier recommends alcohol, euphoric drugs, isolation, solitary confinement, and – “the most dramatic and unique item in the brainwashing arsenal” – hypnosis. All of these are methods that have been extensively tested by the CIA under the rubric of the MK-ULTRA program.

The technology is rooted in surveillance devices, such as audio and video bugs, through-the-wall and remote sensing devices, and biosensors both remote and implanted.  This provides the feedback for the influencing, as well as any “entertainment” value for voyeur/sadists and intellectual property theft for thieves.  Coupled with the surveillance is some sort of “effectors” or feedback path for influencing an individual.

Thus there are several categories of mind control operations, for example covert drugging, hypnosis and trauma conditioning, one-shot EM-type brain blasting, short-term mind fucks, and ongoing feedback control setups for long-term torture and exploitation of victims, to mention a few.  What they have in common is the attack against the mind of the victim, as well as the deniable and denied nature of the attack.  The exact means being used in any particular case are beside the point here.  These techniques do not just violate one or two of what everyone knows are fundamental human rights:  In one fell swoop they violate almost every fundamental human right a person has.

The electromagnetic technology works on the theory that the mind and body are an electromagnetically mediated biophysics system and the electromagnetic signals form outside sources can mimic the mind and body’s electromagnetic signals and therefore a weapon can be developed based on these principles.

There is evidence that since the 1950’s the U.S. and other government have been developing electromagnetic weapons which can remotely target the electromagnetic system of the human body for military and intelligence purposes.

The First phase is the harassment/surveillance program


During the first phase of this Govt. program a person is broken physically and mentally. The methods used are typical CIA and FBI tactics like Cointelpro tactics. They use Echelon, Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs, homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family, friends. The isolation is needed to have access to the person to conduct many of the experiments on them. All privacy and constitutional rights are thus stripped away.

The second phase is the assaults of Directed Energy Weapons.


After a victim becomes isolated from everyone in the world. The victim now having feelings of regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During this time many have been implanted with microchips. Many begin experiencing extreme pain to their head. Some hear voices. Then pain is delivered to various other parts of their bodies. The pain is delivered by Directed Energy Weapons. No one sees anyone around them causing the pain and no one is touching them. It is an invisible energy force. Along with drugs being administered by the scientist through either a drip system which!has been inserted into an individual, food tampering, or injection all without the victims permission. Then Mind Entrainment begins.

Directed Energy Weapons


Some of the weapons were known as non-lethal weapons. They use such weapons as extremely low frequency Elf electromagnetic weapons (which has been used in mind control), acoustics, harmonics (which have been used as a mind control technique), ultrasound, microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic energy beam can be used to induce “considerable agitation and muscular activity” or “induce muscular weakness and lethargy” this weapon is know as Ultra High Frequency EM.

Psychological warfare tactics are being used against unsuspecting citizens to destroy their jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to utterly destroy a person, very often resulting in a person taking his or her own life, or ending up in a mental hospital. This has been taking place for years and nothing is ever said about it. Nothing is ever written about it. For the sake of those who came before us, and those who come after us, the world needs to know what is happening.

For many people, this comes out of nowhere. They don’t know whose toes they stepped on in order to warrant such a brutal attack. For others who are whistleblowers, they know full well how they garnered such attention. For some, they don’t even realize that they are the targets of an orchestrated attack to destroy their lives. Some of it can be so subtle that it is difficult to tell. But for others, the attacks can be blatant and obvious, leaving no doubt that something unspeakable and devastating is happening.

What makes this crime so heinous is that the most sophisticated techniques of psychological warfare are employed against a person in order to make them look like they are crazy. Friends and family members don’t believe the things that are happening and often believe the targeted person is crazy.

This whole exercise is a criminal & terrorist activity. One aspect deals with the gang stalking part of it, which targets experience to varying degrees. This involves stalking by a multitude of individuals both on foot and while you’re in the car. Known as “street theatre” by those who experience it, it involves vandalism to house, car and personal property. Gang stalking can also be referred to as cause stalking, vengeance stalking and multi-stalking.

Some people also experience electronic harassment. This is extremely distressing, painful and invasive, and feels like one’s mind and body is undergoing constant rape, 24 hours a day, 7 days a week. The technology used to do this is unknown, but hundreds of victims report the same physical sensations and experiences. Many take their lives in an attempt to escape the horror. It is so distressing that only fellow targets can really understand what another target is experiencing.

In either case, the attacks are so well orchestrated that only the victim is aware of them. This is intentional, and it appears that these groups have perfected these techniques over many years. Mistakes are rarely made, and clearly the perpetrators are successful at what they do, since new targets are completely bewildered as to what is happening to them, having never heard a peep out of the media about such occurrences (except in relation to mental illness). Their actions are based on many of the same tactics as those employed in ritual abuse, and are designed to weaken the target’s mind and perpetrators are becoming increasingly addicted to this game of predator/prey, always needing more targets to satisfy their unending thirst for a thrill.

“Electronic harassment” or e-harassment is a catch-all term used to describe a group of circumstances which a large number of people are currently experiencing in common. In general, this term refers to the use of electronic technology to view, track and/or harass a person from a distance. Whether this is done by satellite, land based systems or locally (i.e. by neighbors) is largely personal opinion. There is no definitive proof that would allow any of the present victims to launch a court case, but the numbers of victims and the commonality of experience speaks for itself.

The technology involves the use of electromagnetic waves of various frequencies to achieve different results. Some frequencies will make a person tired, while others may cause confusion or memory loss. With the rapid increase in cell phone usage, many experiments have been conducted on the detrimental effects of those particular frequencies on animals. The results indicate that the invisible e.m. signals from cell towers can cause a wide range of physical ailments. If that is the case with the relatively narrow range of cell phone frequencies, it is even more likely the case with the frequencies which may be used to cause direct, intentional harm to a person.

Electronic harassment is sometimes referred to as “psychotronics”, but would more accurately be described as “criminal psychotronics”.

Types of Weapons:

Electromagnetic Weapons
Microwave Weapons
Non-Lethal Weapons
ELF (Extremely Low Frequency) Weapons
Directed Energy Weapons
Acoustic Weapons
Psychotronic Weapons
RF (Radio Frequency) Weapons

Soft Kill Weapons
Less-Than-Lethal Weapons

No-Touch Torture (Remote torture) , Interrogations and False Confession


Interrogation Tactics

It is well settled that courts permit interrogators to lie to suspects on certain subjects and to deceive them — and interrogators routinely exercise these freedoms. They lie about both the existence and the strength of the evidence that supposedly links the suspect to a crime. They deceive suspects by feigning certainty in the suspect’s guilt even when they have no evidence pointing to the person. And, when they know their advice is not in the suspect’s interest, they deceive by feigning sincerity when they volunteer advice about how best to deal with the problem facing the suspect.10

Interrogators also lie when they do things that the courts prohibit, such as promising leniency. Not only are their promises of leniency impermissible, they are false. Persons who are naïve about interrogation are unlikely to realize they are being lied to by the detective they correctly understand is promising that leniency will follow from a confession that the crime happened in a certain way. The detective knows that he has no power to deliver on his promise. He has no intention of trying to honor the promise. He probably does not believe that the crime happened as he has suggested. He has also probably already made up his mind that he will lie if asked about the promise and deny that he ever made it, even if he is asked while under oath.11

Interrogation is also an exceptional experience because the stakes are so high. Being accused of having committed a murder is likely to foster the realization that what life will be like in the future depends on the resolution of the accusation. Interrogators capitalize on and intensify the feelings associated with this realization. They try to make it seem that the suspect’s future, if not his life, turns on the outcome of the interrogation itself, as if it is during the interrogation that the accusation will be resolved. Both being accused of a serious crime and the interrogator’s initial position that the suspect’s future will be spent in prison are likely to be disturbing and create great anxiety. Interrogators act to magnify a suspect’s distress for two reasons. They want the suspect to believe that he or she needs to reach a resolution during the interrogation. They also want to intensify the suspect’s distress since emotionality interferes with thinking strategically and diminishes the likelihood that the suspect will consider possible options different from those the interrogator proposes.

Despite the fact that interrogations are conducted under atypical circumstances and in settings that are unusually stressful, there is no reason to imagine that a suspect’s decision-making is anything but rational given the information on which he is relying. That said, one should not forget the adage “garbage in, garbage out” and bear in mind that in assessing options the suspect is enmeshed in a fantasy deliberately created by the interrogator. Even knowing he is innocent of the crime, in assessing risk a suspect relies on false information about the amount of evidence that mistakenly links him to the crime. In deciding what is best for him to do, the suspect does not know that the offer of a way out is a fraud. What makes psychological coercion so dangerous is that it can lead an innocent person to erroneously conclude that giving a false confession is the best choice under what he perceives to be his circumstances.

Approaching interrogation as a matter of rational decision-making and being able to study records of interrogations have led to certain realizations about how detectives convince suspects to admit responsibility for a crime. To prepare someone to shift from denial to admission, detectives need to accomplish specific intermediate goals and address these goals in a particular order. Influencing someone to shift requires three steps: (1) that the suspect’s perception of his situation be changed from confident and secure that the interrogation will not be a problem for him to dispirited and hopeless; (2) that the suspect’s expectations about the future change from confident he or she will return to normal life to certain that arrest and imprisonment will follow the interrogation; and (3) that a motivator be provided to induce the suspect to shift from denial to admission of responsibility.

Interrogation records reveal that detectives use a relatively small number of alternative tactics to accomplish each of their essential sub-goals. Although interrogations vary somewhat as a function of the habits of the detectives conducting them and the crimes under investigation, the similarities from one interrogation to the next are far more striking than their differences. The similarities are there because detectives learn to conduct interrogations by attending schools or through on-the-job training that passes on the culture of interrogation.

True and false confessions happen in response to interrogations that are built from almost identical collections of tactics. Understanding why false confessions happen starts with realizing that interrogations that overcome a suspect’s resistance and produce confessions will always include steps 1 and 2 because these steps set up the suspect to view his situation in a certain way — because his future is determined, confessing or not makes no real difference.

The majority of the tactics detectives actually use in interrogation are approved (or not disapproved) by the courts. What appears to distinguish interrogations that can produce a false confession from those that do not have this potential is the type and strength of the motivator that the interrogator relies on to accomplish step 3. Interrogations that stay within the bounds set by the courts, including which motivational tactics may be used, do not seem to have the potential to cause normal, innocent adults to falsely confess.

Based on the research that has been done and my experience studying interrogation and false confession in the United States, it appears that knowing false confessions from psychologically and intellectually normal adults come about if and only if a detective introduces into the interrogation a too strong motivator, that is, a motivator that is psychologically coercive.12 A psychologically coercive motivator is created when an interrogator establishes a linkage between confessing and absolute or relative leniency and/or a linkage between continuing to deny and absolute or relatively severe punishment. Interrogators inject psychological coercion into an interrogation either by making direct, blatant threats and promises or through a more complicated method that works to communicate a message via a series of suggestions and slightly veiled promises.

Unfortunately, despite knowing full well that what they are doing is prohibited, some detectives deliberately use psychological coercion to obtain confessions from suspects. Although undoubtedly many of the suspects exposed to coercive motivators are guilty of the crime, some are not and the interrogator cannot necessarily tell the difference. The reliance by American police on the use of coercive motivators is a serious problem. According to studies, false confessions are one of the major causes of miscarriages of justice in America. ( Read More)

What is a psychotronic weapon?

It is a weapon that emits certain electromagnetic frequencies  that can affect the central nervous system and the neural activity of the brain, disrupting its normal  activities.  This is part of a larger study under several names, electromagnetics, biomagnetics, and  others.  Apparently, if reports can be believed, the first uses of psychotronic warfare was by the  Soviets during the cold war.  Some synonyms for psychotronics are synthetic telepathy, subconscious  brainwashing.

 

ПСИХОТРОНИКА  – отрасль науки и техники, в основе которой лежит взаимодействие человеческой психики с физическими приборами и техническими устройствами; возможность работы этих устройств заключена не в самом приборе, а в специально подготовленном операторе, в его психической программе и глубине сознания, поэтому в результате психического воздействия человека-оператора физико-технические характеристики устройства существенно меняются.

Методы целенаправленного воздействия на человека


Воздействовать на ум и поведение человека можно различными путями, одни из которых требуют лишь специфичной подготовленности специалиста (убеждение, внушение, подкуп…), а другие – еще и специальной аппаратуры (технотронные приемы, секс-мероприятия, зомбирование…).
Методы прицельного влияния могут быть щадящими (внушение…) и агрессивными (шантаж), простенькими (запугивание…) и изощренными (зомбирование…), трудно уловимыми (нейролингвистическое программирование…) и дополняющими (фармакоуправление…).
*Выбор применяемой методики зависит от*:
– реальной уязвимости объекта (черт его характера, эпизодов биографии, наличной ситуации…);
– цели намечаемого воздействия (изменение мышления, привлечение к сотрудничеству, получение информации, одноразовое содействие, воспитующее наказание…);
– собственных возможностей (обладание временем, умением, знанием, техаппаратурой, должными химпрепаратами, компетентными помощниками…);
– персональных установок исполнителя (его уровня моральной допустимости…).
*В практике чаще всего используются*:
– убеждение;
– внушение;
– гипноз;
– нейролингвистическое программирование;
– нарковоздействия;
– секс-мероприятия;
– фармакоуправление;
– технотронные приемы (ультразвук, инфразвук, СВЧ-излучения, электрошок, подпороговая стимуляция, торсионные излучения…);
– зомбирование;
– подкуп;
– запугивание;
– пытки..

Synthetic Telepathy Spies and Near Death Experiences

Synthetic Telepathy  Spies and Near Death Experiences

The U.S. intelligence agencies have extremely top secret technology that can pick up the private thoughts given by individuals in the vibrations produced by the brains electrical impulses, and that these thoughts can be broadcast by means of microwave transceivers, infrasound and ultrasound transceivers, satellites, and any other form of technology which uses electromagnetic transfer, i.e. television, radio, the internet, and the telephone. The pentagon calls this mind reading technology SYNTHETIC TELEPATHY, although there is nothing paranormal about it at all. The N.S.A. or National Security Agency is a part of the U.S. Department of Defense, and a very secretive part at that. The N.S.A. has a black budget, and is always headed by a flag officer from one of the branches of the U.S. military. The top secret technologies available to the U.S. military is usually thirty years or maybe even more ahead of the technology which is available to the U.S. civilian economy. Who is to know among the general U.S. public what the level of technological development is within the secret laboratories of the N.S.A. and D.A.R.P.A. [ Defense  Advanced Reserch Projects Agency ].
A system of subliminal, subconscious, wireless microwave remote control is used today against targeted individuals suffering from synthetic telepathy harassment. Synthetic Telepathy is used for conducting torture training and/or experimentation against people suffering from various types and degrees of mental illnesses, as red herring “good cop/bad cop” or tough love acting, diversions, feints, decoys, and smokescreens, as smear campaigns by association, as openly secret intimidation campaigns against targeted dissidents, and as a means of espionage. Sometimes American synthetic telepathy spies can imitate Russian spies.
No doubt, secret agents have microscopic computer chips which are invisible to brain scan detection implanted surgically or injected in them in order to scramble or block the ability of enemy spies to read their silent, private thoughts or mentations, and to place erroneous, misleading thoughts in their minds in order to deceive enemy spies.

Artificial (Synthetic) Telepathy: Hearing Voices

Hearing Voices

The experience of “Artificial Telepathy” is really not that extraordinary. It’s as simple as receiving a cell-phone call in one’s head.

Indeed, most of the technology involved is exactly identical to that of cell-phone technology. Satellites link the sender and the receiver. A computer “multiplexer” routes the voice signal of the sender through microwave towers to a very specifically defined location or cell. The “receiver” is located and tracked with pinpoint accuracy, to within a few feet of actual location. But the receiver is not a cell phone. It’s a human brain.

Out of nowhere, a voice suddenly blooms in the mind of the target. The human skull has no “firewall” and therefore cannot shut the voice out. The receiver can hear the sender’s verbal thoughts. The sender, in turn, can hear all of the target’s thoughts, exactly as if the target’s verbal thoughts had been spoken or broadcast. For this reason, the experience could be called “hearing voices” but is more properly described as “artificial telepathy”.

Now, if artificial telepathy were entirely voluntary, like a conversation between friends sitting across the room from one other, it might be kind of cool. One could talk back and forth with one’s friend, exchanging verbal thoughts exactly as if speaking on the phone, but without ever using one’s voice or mouth. It’s a completely silent, subvocal form of speech. Between lovers, this would be beautiful.

The problem is that artificial telepathy provides the perfect weapon for mental torture and information theft. It provides an extremely powerful means for exploiting, harassing, controlling, and raping the mind of any person on earth. It opens the window to quasi-demonic possession of another person’s soul.

When used as a “nonlethal” weapons system it becomes an ideal means for neutralizing or discrediting a political opponent. Peace protestors, inconvenient journalists and the leaders of vocal opposition groups can be stunned into silence with this weapon.

Artificial telepathy also offers an ideal means for complete invasion of privacy. If all thoughts can be read, then Passwords, PIN numbers, and personal secrets simply cannot be protected. One cannot be alone in the bathroom or shower. Embarrassing private moments cannot be hidden: they are subject to all manner of hurtful comments and remarks. Evidence can be collected for blackmail with tremendous ease: all the wrongs or moral lapses of one’s past are up for review.

Like a perverted phone caller, a hostile person with this technology in hand can call at any time of day, all day long. Sleep can be disrupted. Prayers can be desecrated, religious beliefs mocked. Business meetings can be interrupted, thoughts derailed. Love can be polluted, perverted, twisted, abused. Dreams can be invaded, fond memories trashed.

The attacker cannot be seen or identified, the attack cannot be stopped, and the psychological damage is enormous. But there is no physical damage, not one single mark is left on the body and there is absolutely no proof that any crime or any violation ever took place! Everything that “happens” to the victim happens inside the victim’s head. What physical evidence is there to give the police? Without physical evidence, how can one photograph the “crime scene” or fingerprint the stalker? There are no footprints leading to or from the scene. Indeed, there is no physical scene at all, and no evidence that an attack ever took place.

Most people who experience this abusive form of “artificial telepathy” feel as if their mind has been raped. They find themselves hunted, stalked, harassed and abused by a person or persons who refuse to give their names, who defile one’s mind with the most foul and perverse language imaginable, and who refuse to hang up or go away. The caller or callers delight in the perverse and sadistic torture of their targets. Furthermore, they delight in violating the privacy of their targets, reading the target’s mind and commenting on everything the target thinks, in an effort to demonstrate as brutally as possible that the target has no privacy at all.

The callers act, in short, exactly like rapists or perverted stalkers. Imagine what a man might do if he found a “magic cell phone” that allowed him to dial into the heads and the private thoughts of anyone on earth. The temptation to choose a target at random and start spying on or abusing that person would be enormous, almost irresistable. It could become a sick and twisted hobby, a guilty pleasure very quickly. Put into the hands of a secret police unit, the potential for abusing such technology is even more chilling.

Now, the natural reaction of a normal and intelligent person who undergoes the horrible experience of mind rape for the first time is to panic and reach for a real phone. They call family, contact their doctor or call police with a bizarre complaint that “someone is beaming voices into my head.”

But if the police are the ones behind the abuse, the victims aren’t going to get much help, are they? And if the police are not the perpetrators, then how are they to make an arrest? It’s much more convenient and easy to believe that the caller is a nutcase.

In short order, the victim of mind rape finds herself or himself undergoing the additional humiliation of being carted off to the psych ward, often being committed involuntarily by a loved one “for one’s own good.”

The more vehement the efforts to prove that the voice or voices in one’s head are “real”, the more smug become the smiles of the medical doctors, who gently insist that such technology does not exist, that the voices cannot possibly be real, and that one must take a powerful psych med and lie down for a good long rest.

The experience of “hearing voices” — especially voices that give a running stream of negative abuse — will gain one automatic admission to the rubber room. Indeed, hearing voices is a classic example of schizophrenia. If you hear voices, you are, by definition, crazy.

Yet when released from the psych ward with an expensive supply of meds, “voice hearers” often find that the meds are ineffective — exactly as one would expect if their problem had nothing to do with brain chemistry and everything to do with a bio-electronic attack by unseen stalkers.

Voice hearers often puzzle psychiatrists, because many of them don’t fit the classic model of schizophrenia, which usually begins onset in the early twenties. The victims of “artificial telepathy” are often well into their thirties or fourties and many have no prior history of serious mental illness or drug abuse. Many seem to be alert, healthy, and rational even while insisting that they can hear voices. They agree with the psychiatrists that, yes, they are depressed, but who wouldn’t be a bit depressed under such trying circumstances? To be stalked and verbally bullied every waking hour of the day is a form of mental torture.

Victims of mind rape quickly learn not to discuss their “psychological problems” with family and coworkers. It’s embarrassing, it’s bizarre, it gets very little sympathy and only serves to alarm most people. The only way that another person can “help” is to suggest that the mind rape victim see a psychiatrist, who will promptly double one’s dose of psych meds and antidepressants. The result is a very stiff medical bill, which only adds financial pain to the mix. And the verbal harassment continues.

As they learn to endure their daily torture, voice hearers can usually return to mainstream life, where they are able to carry on intelligent, coherent conversations, hold down jobs, and function quite normally. In fact, if they don’t discuss their “problem” they usually can’t be told apart from normal people on the street. Because they are normal people.

The growing number of voice hearers in our society is therefore well masked. Those who continue to insist that there is a “secret society of people beaming voices into our heads” are simply laughed into silence or labelled paranoid schizophrenics. They are completely discredited. In fact, many voice hearers have internalized the idea that they are mentally ill, and they struggle to understand how their “auditory hallucinations” could continue to seem so very, very real.

Naturally, many of these voice hearers are deeply confused. They turn to support groups, including such on-line communities as the Voice Hearers’ support group at Yahoo.com.

Anyone who doubts that “artificial telepathy” exists need only contact such a Voice Hearers community, where they will encounter people who continue to insist that they are being harassed by real people using an unknown or unexplained technology.

Surprisingly, there is a tremendous amount of scientific literature and circumstantial evidence to back up that claim.

In the following posts, we will explore the history of synthetic telepathy and learn the names of the scientists who developed this sinister technology. We will also identify and examine some of the government agencies that are fielding and using this weapon of torture against innocent civilians.

As the background material develops, it will become increasingly clear that we are discussing a modern day Manhattan Project — a super-secret research program more sinister — and potentially more devastating — than the development of the atomic bomb.

MASER BEAMS READING SUBVOCALISED THOUGHTS


The latest advance in electronic mind control is equipment that uses special types of microwave beams called MASERs (Gyrotron Resonance Masers). These are the laser equivalent of microwave beams.

MASER stands for Microwave Amplification by Stimulation Emission of Radiation. A LASER is a MASER that works with higher frequency photons in the ultraviolet or visible light spectrum (photons are bundles of electromagnetic energy commonly thought of as “rays of light” which travel in oscillating waves of various wavelengths) .

These MASER beams have been used to develop something called synthetic telepathy. This is the ability to read people’s minds from a distance. Electronic scanning of victims’ brains by monitoring the electromagnetic (EM) emissions from peoples brains and using amongst other things, the brain waves (as measured on an EEG), to read the victim’s subvocalised thoughts.

In synthetic telepathy, the weak electromagnetic signals in the brain associated with subvocalised thought, are connected to a computer by use of electrodes, or in more advanced mechanisms by MASER beams. Sophisticated computer systems have learnt to read the subvocalised thoughts in the brain, by associating a specific brain exciting potential, with a particular word. In this case, only one specific language can be decoded, as each word in a language has a specific set of frequencies that must be discovered. Once the donkey work of finding the specific frequencies for all the words in a language has been programmed into a super computer, which can carry out massive parallel processing, fuzzy logic software is used to match this with real world excitation potential associated with subvocalised thought obtained from thousands of abductees, who are used to calibrate the synthetic telepathy devices.

Synthetic telepathy detects the I5Hz, 5 milliwatt auditory cortex brain emissions, that are linked with the excitation potentials in the brain associated with subvocalised thought. New technology, involving low frequency microwaves and RF, has enabled devices to be built which can scan through walls and look inside peoples’ bodies like X-rays. This enables security personnel to see a target in his own home and to track him throughout the house. Further to this, being able to see inside the victim’s head, would allow computer controlled targeting of specific brain centres in the victim’s brain, even when he was walking around the house. A scan of the specific brain emissions given off when the victim subvocalises using an array AF pulsed frequency MASERs fired at the specific brain centres of the subversive, while he resides in his own home, enables the victim to be scanned. By finding an array of ELF pulse modulated MASERs, which scan up and down the window of frequency emissions given off by subvocalised thought, interference effects can be measured in the MASER beam. The victim’s ELF brain emissions will interact constructively or destructively with the pulse frequency MASER carrying ELF in the ELF window associated with subvocalised thoughts.

If we fire an array of pulsed MASERs, which are out of phase with each other, extraneous noise can be filtered out in the digital domain. Since the converging ELF modulated MASERs are being effected by the low level emissions in the victim’s brain, the shifts in the ELF pulsed signal going into the subversive’s brain can be detected.

A simplistic version of this would be the LASER beam shone at the window of the person that is being bugged. The vibrations in the window cause modulations in the LASER that can be converted into electrical signals and hence into sound. In this way the subvocalised thoughts in the victim’s brain can be read. Having already built up a library of excitation potential signatures for differing words and groupings of words, a sophisticated computer can begin to decode the emission signatures into word streams. In this way the subvocalised thoughts of the victim can be stored in the memory of a supercomputer and analysed to give a read out of what the target is thinking.

Using ELF audiograms carried by a single pulse-modulated Maser, subvocalised thoughts can be placed in the victim’s brain. This enables synthetic telepathy operators the ability to enter into conversations with the subversive to drive him mad or to bring up key words which will get the victim thinking about the information they wish to find. Visual cortex excitation potentials can also be broadcast into the victim’s brain so that illusory images can be projected into their brain to drive them mad, or to program them to commit suicide.

 

US Citizen Corps Harassing Other Citizens/Immigrants

Before I begin, two paragraphs to put this in context:  This has to do with a secretive group receiving money to use emerging technologies (see footnote 1. and others ) to experiment, and able to sanction crimes. They have sought and succeeded in making most all people I associate with,  controlled in regards to me, for negative and illegitimate purposes. This includes strangers, who have on average, fill destinations or places visited, present offensive jestures or harassment in my presence, and have been involved in stealing from anything that may be carried by me, ie: printed material, contents of backpack, important personal items or documents.

One has to question what sort of recruitment is involved in this locally, and elsewhere this has happened.

US Citizens Corp data base of citizens:

From the Operation TIPS (Terrorist Information and Prevention)

quote: “Each file or entry contains an interested individual’s name, mailing address, e-mail address, and Volunteer Program area of interest. The database contains and tracks names of each individual and the date of expression of interest, type of interest expressed (e.g., Community Emergency Response Team, Neighborhood Watch, Citizen Corps
Councils), and similar information.”-[Federal Register: May 7, 2002 (Volume 67, Number 88)] http://www.citizencorps.gov/downloads/txt/news/02-11253.txt

The experience I have daily, with evidence in names of businesses, from the Mid West to the current location, is the use of an enormous pool of people, to arrive before, the same time, or after, I do, at almost all destination, daily, for purposes stated below. In one area, over a hundred people on call, so that differing people are used each time.

There should be investigation as to whether this system is being used to create pools of people in all the country, for the purpose of assigning them to harassment for emeriging technologies experiments. There has been many people daily for 4 years, that in all locations, daily, fill to one extent or another, all spaces occupied by myself. This takes many people in that there are different people used, to harass, distract for theft, taunt, play on associations for criminal ends. Police in all locations are aware of this, and used. Offices, like FBI or Attorney General, when approached for concerns regarding incidences or crimes that fall within their respective juristiction, are sometimes informed before I call on their offices, and have been ordered to confront me in particular ways, never claiming the seriousness of what I attempt to report.

It takes a vast database to come up with people for specific tasks, from stalking or harassment to serious crimes, over long distances.  I have been met with in airports en route cross country by groups who evidently have been coached for specifics in harassment.

Here are some quotes from the Citizen Corp website, regarding Operation TIPS:

”This new system of records contains information gathered by the Citizen Corps, which is part of the USA

Freedom Corps established by President George W. Bush under Executive Order 13254, January 29, 2002.”

‎2002: Pursuant to the Privacy Act of 1974 (5 U.S.C. 552a),

The Federal Emergency Management Agency (FEMA) proposes to establish a new system of records entitled “Citizen Corps Database Tracking System..http://www.citizencorps.gov/downloads/txt/news/02-11253.txt.

Operation TIPS found in Report by Lawyers Committee for Human Rights 2002.

I have placed below as a footnote quotes and link from Lawyers Committee for Human Rights Report mentioning Operations TIPS, from A Year Lost, Reexamining Civil Liberties Since September 11. (footnote 1.). A data pool to outsource actions of crime and harassment, trained and coached, is indeed a real thing.

Harassment using many citizens Sometimes more than 100 citizens per day are used to fill cafes, restaurants, mob at every outing to a mini mart. People have been placed on airlines for this purpose, with seating arranged beforehand. I have evidence of this in records, though all boarding passes for 2006 have been stolen from me.

How these citizens are instructed to do:

Cruel attention includes cutting hair from behind, tampering with backpack, stealing anything I carry, instructing stores to short change when others distract, and malicious tricks using seeming friendly people, etc.. They even use children to steal from me, mob and stalk, etc.

There is mobilization daily, filling destinations, day to day places, vehicles used as well.

There is never any short supply, and no one seems to have a conscience. This is right out of Nazi play books.

If one checks the internet Google: gang stalking; covert harassment, you will find misinformation, a flood of it. Nothing regarding gang stalking, or the internet people claiming to be victims can be confirmed.

Thus stated, a structure similar to Operation TIPS (http://www.citizencorps.gov/) is used as a pool of people, all ages and classes, so that sadistic exercises using emerging technologies, can pervasively fill the subjects every moment with intrusions, some playing on themes, psychological conditioning.

And if you ever wonder why police stations look like a sealed ticket booth at a theater, well, it has some advantages in denying a subject of what is referred to here, access to police for reporting crimes from felony to malicious acts.

“Federal Emergency Management Agency (FEMA) proposes to establish a new system of records entitled “Citizen Corps Database Tracking System..

http://www.citizencorps.gov/downloads/txt/news/02-11253.txt

The Militarization of Neuroscience

When military scientists begin to combine “cognitive engineering” and neuroscience with genetic engineering, we could see a nightmarish new generation of biological weapons and nerve agents that radically alter the minds, emotions, memories and beliefs of everyone on earth.

That’s the opinion of Mark Wheelis and Malcolm Dando, authors of “Neurobiology: A Case Study of the Imminent Militarization of Biology” published September 30, 1995 in the International Review of the Red Cross. See this site for a PDF of the full article:

http://www.icrc.org/Web/Eng/siteeng0.nsf/html/review-859-p553

Abstract: The revolution in biology, including advances in genomics, will lead to rapid progress in the treatment of mental illness by advancing the discovery of highly specific ligands that affect specific neurological pathways. The status of brain science and its potential for military application to enhance soldier performance, to develop new weapons and to facilitate interrogation are discussed. If such applications are pursued, they will also expand the options available to torturers, dictators and terrorists. Several generic approaches to containing the malign applications of biology are shown, and it is concluded that success or failure in doing so will be significantly dependent on the active involvement of the scientific and medical communities.

Translation: The medical community has got to stop sitting on its duff and get some international legislation passed prohibiting the development of these bioweapons NOW.

I would add: An equally serious effort needs to be made to block military application of EM weapons to the human brain. The pretence that such weapons are “less than lethal” is a serious misunderstanding of the immense threat that they pose to the privacy and civil liberties of every man, woman and child on the face of the globe.

Thought Police: The Next Logical Step in a Total Surveillance Society

George Orwell introduced the concept of the “Thought Police” in his dystopian novel 1984. See the Wikipedia article on Thought Police here:

http://en.wikipedia.org/wiki/Thought_Police


According to Kathleen Taylor in her own book, Brainwashing: The Science of Thought Control (Oxford University Press, 2006) “It is the job of the Thought Police to uncover and punish thoughtcrime and thought-criminals, using psychology and omnipresent surveillance from telescreens to find and eliminate members of society who were capable of the mere thought of challenging ruling authority.”

Does such a system exist in the United States today? Signs point to yes.

Granted, the United States remains a republic, and it has just completed a new cycle of elections. Its liberal constitution and principles of democratic representation seem to be standing firmly in place. Its flag waves proudly.

But there is a growing body of evidence that this country, once “conceived in liberty and dedicated to the proposition that all men are created equal,” has devolved into a paranoid police state, much like the authoritarian state described by George Orwell in 1984.

One may find, simply by searching the internet, plenty of evidence that the United States government is actively involved in all the basic activities of the “Thought Police” exactly as listed above:

1. The uncovering and punishment of thought crime and thought criminals
2. The use of psychology to profile and identify “potential” criminals, terrorists and subversives within society; and
3. the use of “omni present surveillance from telescreens” to create what Harlan Girard calls “an Electronic Concentration Camp System” — a grid or matrix from which no person can escape.

In each of these activities, the new mind-invasive technologies known collectively as artificial telepathy play a key role.

Uncovering and Punishing Thought Crime

As documented in many other posts on this blog, mind-invasive technologies have begun to play a key role in the uncovering and punishment of “thoughtcrime.”

The prime example is the Department of Homeland Security’s new Malintent program mentioned in the previous post (q.v.) By scanning the faces of people at airports and reading other vital signs like heart rate, temperature and blood pressure, new sensors and computer algorithms can be used to read the intentions of airplane passengers — and presumably to prevent “potential terrorists” from boarding planes by means of “pre-emptive arrest.”

One must emphasize here that reading a person’s intentions with a camera and a computer is probably not much more reliable than a classic lie detector test, and very little scientific evidence exists to support the claims that these machines are accurate. The important thing to note is that the Department of Homeland Security seriously intends to use these machines as a pretext for pre-emptive arrest — that is, they intend to arrest people for crimes not yet committed.

Arresting a person for a crime not yet committed, on the basis of perceived intent, amounts to arresting people for thought crimes.

Use of Psychological Profiling to Detect and Detain “Potential” Criminals

As Jim Marrs points out in his new book The Rise of The Fourth Reich: The Secret Societies That Threaten to Take Over America (William Morrow, 2008), these “mind reading” computer systems are “reminiscent of prewar Nazi plans to preempt crime and dissent.” (p. 333)

For example, Nazi psychologists used pseudo-scientific examinations and the doctrine of preemption to remove “uneducable” children from grade schools. If a number of symptoms indicated that a child was “bad student material,” their name would be registered on a list. It was stated that “genetic and national health considerations recommend their preventative registration.”

“Of course,” says Marrs, “such registration led to the euthanasia centers.”

Marrs rightly calls “disturbing” the new trend to identify and detain potential troublemakers before they have actually committed a crime.

Terrorist Watch List — or Black List?

In its efforts to intercept “suspected terrorists,” the Department of Homeland Security has added more than one million names to its terrorist watch list. The American Civil Liberties Union suggests this number is way too high.

“Terrorist watch lists,” it says, “must be tightly focused on true terrorists who pose a genuine threat. Bloated lists are bad because they ensnare many innocent travelers as suspected terrorists, and because they waste screeners’ time and divert their energies from looking for true terrorists.”

Among the individuals whose names were found on the list by 60 Minutes and other media organizations: Sen. Edward Kennedy, Nelson Mandela, Bolivian President Evo Morales, Saddam Hussein (in custody at the time), Rep. John Lewis, James Moore (author of Bush’s Brain), and John William Anderson, age 6.

http://www.aclu.org/privacy/spying/watchlistcounter.html

Now one must admit that certain children really are terrible brats, who ought to be watched more closely by their parents, but is it really necessary for the secret police to become involved? And if a United States Senator can be listed as a “suspect,” then who is above suspicion?

A “terrorist” watch list that includes the names of more than one million people seems to be clear evidence that the Department of Homeland Security is either a) very paranoid indeed, or b) very interested in using terrorism as a pretext for spying on U.S. citizens who have committed no crimes.

That is, they have established a system that allows them to “find and eliminate members of society who are capable of the mere thought of challenging existing authority.”

FTAC: The Fixated Threat Assessment Center

Psychological profiling, black listing and preemptive arrests are “Thought Police” tactics used in Europe, too, not just in the U.S. The British have their own system, called FTAC.

In a chapter titled “Psychology and Public Control,” Jim Marrs writes: “The British government, in May 2007, responding to news accounts, acknowledge it had secretly established a new national antiterrorist unit to protect VIPs by first profiling, then arresting persons considered to be potentially dangerous. Amazingly, this power to detain suspects even before they actually committed a crime was based on mental health laws.”

Marrs cites a news story by London Times reporter Joanna Bale. She reports that “until now it has been up to mental health professionals to determine if someone should be forcibly detained, but the new unit uses the police to identify suspects, increasing fears that distinctions are being blurred between criminal investigations and doctors’ clinical decisions.”

Experts believe that this arrangement “is set to reignite controversy over the detention of suspects without trial.”

“There is grave danger of this being used to deal with people where there is insufficient evidence for a criminal prosecution,” said Gareth Crossman, policy director for Britain’s National Council for Civil Liberties.

“This blurs the line between medical decisions and police actions. If you are going to allow doctors to take people’s liberty away, they have to be independent. That credibility is undermined when the doctors are part of the same team as the police. This raises serious concerns. First, that you have a unit that allows police investigation to lead directly to people being sectioned without any kind of criminal proceedings. Secondly, it is being done under the umbrella of antiterrorism at a time when the government is looking for ways to detain terrorists without putting them on trial.”

Scotland Yard has refused to discuss how many suspects have been forcibly hospitalized by the team, because of “patient confidentiality.” Meanwhile, conservative members of the British government have hailed FTAC as the first joint mental health – police unit in the United Kingdom and a “prototype for future joint services” in other areas. They are introducing legislation to broaden the definition of mental disorders to give doctors — and now police — more power to detain people.

Mass Surveillance and the ‘Electronic Concentration Camp’

Jim Marrs worries that joint psychologist-police units like the FTAC in Britain might serve as a prototype for similar units in the U.S. “Is this coming to America soon?” Marrs asks.

Harlan Girard would probably answer: “It’s already here!”

Mr. Girard is the Managing Director of the International Committee Opposing Microwave Weapons (ICOMW), and he firmly believes that the United States government has already established what he calls an “Electronic Concentration Camp System.”

See the homepage of his website here: http://www.icomw.org/

Essentially, the ECCS is a network of microwave towers and broadcast centers that can virtually imprison any citizen of the United States that the Thought Police wish to target. It’s a people zapping system, used to track, torture and psychologically harrass inconvenient people who, for one reason or another, have been placed on the government’s long list of enemies.

To support this claim, Girard has amassed an impressive collection of documents, posted at the website’s archive, here: http://www.icomw.org/archive.asp

The documents in this archive clearly indicate that the U.S. government has no need of the small FTAC units used by the British Government. The number of peace protestors and politically “inconvenient” people who have suddenly begun to hear voices in their heads strongly suggests that the U.S. government has built and fielded something much bigger, much more powerful, and much more scary: a fully developed and fully operational Electronic Concentration Camp System.
If the secret police, operating under the umbrella of counterterrorism, wish to “section” an inconvenient citizen “without any criminal proceedings,” they simply enroll that individual into the ECCS.

Technically, the “Targeted Individuals” remain free, but they are tortured 24/7 with microwave weapons, often to the point of losing their minds. They hear voices and experience a wide variety of horrible sensations. If they voluntarily turn themselves in to a psychiatric hospital, they are immediately diagnosed as schizophrenic and sectioned. Thus they are discredited and stigmatized for life. Those who turn to mainstream media are openly mocked.

In 2007, The Washington Post did a profile on Mr. Girard and other voice hearers, who are commonly called “wavies.” (See the link among the News links lists to the left.)

While the reporter kept a skeptical distance from Mr. Girard, she did at least do some background research on mind-invasive technologies. The Post filed an FOIA request with the U.S. Air Force and did manage to obtain documents showing that the Air Force Research Laboratory (AFRL) has conducted several “voice to skull” experiments during the past decade.

It may be interesting to note that AFRL is also one of the primary research sponsors (along with the Navy) for the High-Frequency Active Auroral Reasearch Project (HAARP) — a 35-acre antenna farm near Fairbanks, Alaska, that is powerful enough to focus microwave beams anywhere on the face of the earth.

According to Dr. Nick Begich, author of the book Angels Don’t Play This HAARP (http://www.earthpulse.com/), the Air Force can broadcast from these antennae at frequencies that match the frequency range of the human brain.

In Chapter 23 “Psychocivilized Society and the CIA,” Dr. Begich explores “the use of electromagnetic waves for mind manipulation,” and concludes that it would be very possible to use HAARP as a non-lethal weapon that could be rationalized as an alternative to military force.

Whether HAARP acts as the hub of the ECCS is another question. HAARP certainly operates as part of the Air Force’s “Star Wars” ballistic missile early warning system, scanning for Soviet Missile launches. That means it is a subordinate wing of NORAD, the North American Air-Defense Command — an underground city buried beneath Cheyenne Mountain near Colorado Springs.

NORAD is a “hardened” and extremely secure underground site, equipped with supercomputers and direct uplinks to a wide variety of top secret space platforms and space-based beam weapons. It makes an excellent candidate for the HQ of the kind of “Electronic Concentration Camp” that Harlan Girard has envisioned.

NORAD certainly does have full access to the kinds of spy satellites and laser beams that worry the “wavies.” It may incorporate many other systems besides HAARP, and it may be no accident that the Sci-Fi series “Stargate” is supposedly set in NORAD’s underground bunker.

Given NORAD’s vast array of high-tech toys and its direct links to the Pentagon and the NSA, the possiblity that it might be HQ for a top secret “Thought Police” unit does not seem to be entirely out of the question.

Total Information Awareness

Civil liberties groups cried “Thought Police” in 2002 when they first discovered the U.S. Defense Department’s Information Awareness Office and its Total Information Awareness doctrine. Run for the Defense Advanced Research Projects Agency (DARPA) by former Vice Adm. John Poindexter, the TIA “counterterrorism” program caused quite a brouhaha because it advocated pre-emptive policing through use of a massive data mine that would interconnected a wide array of powerful surveillance systems:

http://en.wikipedia.org/wiki/Information_Awareness_Office

DARPA’s own website tells us that “The goal of the Total Information Awareness program is to revolutionize the ability of the United States to detect, classify and identify foreign terrorists — and decipher their plans — and thereby enable the U.S. to take timely action to successfully pre-empt and defeat terrorist acts.”

http://infowar.net/tia/www.darpa.mil/iao/TIASystems.htm

See also this article on the “Homegrown Terrorism Prevention Act” from Project Censored (The Top 25 Censored Stories of 2009):
http://www.projectcensored.org/top-stories/articles/6-the-homegrown-terrorism-prevention-act/

Under this act, which nearly became law in 2007, local police departments might have been given legal cover for the use of nonlethal, mind-invasive technology against their own populace. They could zap “suspects” in the name of preventing “homegrown terror.”

Indeed, pre-emptive policing can be used to rationalize almost every form of privacy violation. One need simply argue that the rights of the individual can and must be overriden by police in order to protect and defend the physical safety of society as a whole. It’s for the greater good.

Conclusion

What Orwell did was simply to carry the twin doctrines of total information awareness and preemptive policing to their logical extreme. He imagined a world in which no one had any right to privacy whatever. None. All personal privacy is sacrificed on the altar of national security — for the greater good.

In the sacred name of “national security,” the technocrats who run the nightmarish police state of 1984 arrogantly assume the right to invade the inner sanctum of the mind itself. They read the thoughts of every citizen, dabble their fingers in the stuff that souls are made of, and sit in arrogant, authoritarian judgement over all.

Perhaps the vision of such a police state being realized in 1984 may cause people to smirk. That was, after all, more than 25 years ago, and we don’t have such a police state now, do we?

To those who smirk, however, one might call attention to the many patents on mind-invasive technology that may be found listed in the left-hand column of this blog. One must also point out that the U.S. Department of Defense did not necessarily do away with DARPA’s Information Awareness Office or its Total Information Awareness doctrine.

As with most black programs that are discovered by Congress and the media, these programs have been given new names and parked under the camouflage of other departments within the intelligence community. They still exist.

See Schneier on Security “Total Information Awareness Is Back”

http://www.schneier.com/blog/archives/2006/10/total_informati.html

“Report: NSA’s Warrantless Spying Resurrects Banned Total Information Awareness Program” http://www.blog.wired.com/27bstroke6/2008/03/nsas-warrantles.html

Now consider this: If the doctrines of pre-emptive policing and total information awareness remain in place, can the massive use of mind-invasive technology be far behind?

Orwell may have been off by a few years. But his understanding of the basic arrogance of intelligence agencies and his vision of a nightmarish police state were frightfully accurate. With the quiet advent of mind-reading technologies, the chilling age of the Thought Police has secretly, stealthily and finally arrived.