Project Monarch – Nazi Mind Control- The Rotary Leadership Institute Analysis and Disclosure

Project Monarch – Nazi Mind Control- The Rotary Leadership Institute Analysis and Disclosure 
Download PDF RotaryInternationalProjectMonarch-NaziMindControl
by Ron Patton
A Brief History of Control
The Anglo Alliance
The Evolution of Project MKULTRA
Definition and Description
Alters and Triggers
Bloodlines and Twinning
Levels of MONARCH Programming
Method and Components
Programmers and Places
Notable Names
Deprogrammers and Exposers
Endnotes
Amidst the subtle cerebral circumvention of the gullible populace, through a
multitude of manipulated mediums, lies one of the most diabolical atrocities
perpetrated upon a segment of the human race; a form of systematic mind control
which has permeated every aspect of society for almost fifty years.
To objectively ascertain the following, one may need to re-examine preconceived
ideologies relating to the dualistic nature of mankind.
Resolving the philosophical question of whether we are inherently good or
inherently evil is tantamount in shaping our perception of reality; specifically, the
spiritual variable within the equation of life.
This exposition is substantiated by declassified U.S. government documents,
individuals formerly connected to the U.S. intelligence communities, historical
writings, researchers knowledgeable in mind control, publications from mental
health practitioners, and interviews taken from survivors unwittingly subjected to a
highly complex form of trauma-based mind control known as MONARCH
programming.
A word of caution for survivors of intensively systematic mind control and/or some
form of ritualized abuse: There are numerous “triggers” in this article. It is
therefore recommended not to read it unless appropriate support systems are in
place or if you have a thoroughly reintegrated personality
A Brief History of Control
The Mystery Religions of ancient Egypt, Greece, India and Babylon helped lay the
foundation for occultism, meaning “hidden knowledge.” One of the earliest
writings giving reference to occultism is the Egyptian Book of the Dead, a
compilation of rituals explicitly describing methods of torture and intimidation (to
create trauma), the use of potions (drugs) and the casting of spells (hypnotism),
ultimately resulting in the total enslavement of the initiate.[1] These have been the
main ingredients for a part of occultism known as Satanism, throughout the ages.
During the 13th Century, the Roman Catholic church increased and solidified its
dominion throughout Europe with the infamous Inquisition. Satanism survived this
period of persecution, deeply entrenching itself under the veil of various esoteric
groups.
In 1776, a Bavarian Jesuit by the name of Adam Weishaupt was commissioned by
the House of Rothschild to centralize the power base of the Mystery Religions into
what is commonly known as the Illuminati, meaning “Enlightened Ones.” This was
an amalgamation of powerful occultic bloodlines, elite secret societies and
influential Masonic fraternities, with the desire to construct the framework for a
“New World Order.” The outward goal of this Utopia was to bring forth universal
happiness to the human race. However, their underlying intention was to gradually
increase control over the masses, thus becoming masters of the planet.
The Anglo Alliance
By the 19th century, Great Britain and Germany were recognized as the primary
geographic areas of Illuminati control. It then should be of little surprise to know
the first work in Behavioral Science research was established in England in 1882,
while much of the early medical and psychiatric techniques involved in mind
control were pioneered at the Kaiser Wilhelm Institute in Germany. The Tavistock
Institute of Human Relations was set up in London in 1921 to study the “breaking
point” of humans. Kurt Lewin, a German psychologist, became the director of the
Tavistock Institute in 1932, about the same time Nazi Germany was increasing its
research into neuropsychology, parapsychology and multi-generational occultism.
Interestingly, a progressive exchange of scientific ideas was taking place between
England and Germany, most notably in the field of eugenics: the movement
devoted to “improving” the human species through the control of hereditary
factors in mating. The nefariously enigmatic union between the two countries was
bonded, partly through the Order of the Golden Dawn, a secret society which
consisted of many high ranking officials in the Nazi party and British aristocracy.
Top SS Nazi officer Heinrich Himmler, was in charge of a scientific project called
Lebersborn, which included selective breeding and adoption of children, a
peculiarly large number of twins among them.[2] The purpose of the program was
to create a super-race (Aryans) who would have total allegiance to the cause of the
Third Reich(New World Order).
Much of the preliminary experimentation concerning genetic engineering and
behavior modification was conducted by Dr. Josef Mengele at Auschwitz, where
he coldly analyzed the effects of trauma-bonding, eye-coloring and “twinning”
upon his victims. Beside the insidious surgical experimentation performed at the
concentration camp, some of the children were subjected to massive amounts of
electroshock. Sadly, many of them did not survive the brutality.
Concurrently, “brain-washing” was carried out on inmates at Dachau, who were
placed under hypnosis and given the hallucinogenic drug mescaline. During the
war, parallel behavioral research was led by Dr. George Estabrooks of Colgate
University. His involvement with the Army, CID, FBI and other agencies remains
shrouded in secrecy. However, Estabrooks would occasionally “slip” and discuss
his work involving the creation of hypno-programmed couriers and hypnoticallyinduced
split personalities.[3]
After WWII, the U.S. Department of Defense secretly imported many of the top
German Nazi and Italian Fascist scientists and spies into the United States via
South America and the Vatican. The code name for this operation was Project
PAPERCLIP.[4] One of the more prominent finds for the U.S. was German
General Reinhard Gehlen. Hitler’s Chief of Intelligence against Russia. Upon
arriving in Washington D.C. in 1945, Gehlen met extensively with President
Truman, General William “Wild Bill” Donovan, Director of the Office of Strategic
Services(OSS) and Allen Dulles, who would later become the stalwart head of the
CIA. The objective of their brain-storming sessions was to reorganize the nominal
American intelligence operation, transforming it into a highly-efficient covert
organization. The culmination of their efforts produced the Central Intelligence
Group in 1946, renamed the Central Intelligence Agency(CIA) in 1947.
Reinhard Gehlen also had profound influence in helping to create the National
Security Council, from which the National Security Act of 1947 was derived. This
particular piece of legislation was implemented to protect an unconscionable
number of illegal government activities, including clandestine mind control
programs.
The Evolution of Project MKULTRA
With the CIA and National Security Council firmly established, the first in a series
of covert brain-washing programs was initiated by the Navy in the fall of 1947.
Project CHATTER was developed in response to the Soviet’s “successes” through
the use of “truth drugs.” This rationale, however was simply a cover story if the
program were to be exposed. The research focused on the identification and testing
of such drugs for use in interrogations and the recruitment of agents.[5] The
project was officially terminated in 1953.
The CIA decided to expand their efforts in the area of behavior modification, with
the advent of Project BLUEBIRD, approved by director Allen Dulles in 1950. Its
objectives were to; (1) discover a means of conditioning personnel to prevent
unauthorized extraction of information from them by known means, (2) investigate
the possibility of control of an individual by application of special interrogation
techniques, (3) investigate memory enhancement and (4) establish defensive
means for preventing hostile control of agency personnel. In August 1951, Project
BLUE BIRD was renamed Project ARTICHOKE, which evaluated offensive uses
of interrogation techniques, including hypnosis and drugs The program ceased in
1956. Three years prior to the halt of Project ARTICHOKE, Project MKULTRA
came into existence on April 13, 1953 along the lines proposed by Richard Helms,
Deputy Director of Central Intelligence (DDCI) with the rationale of establishing a
“special funding mechanism of extreme sensitivity.”[6]
The hypothetical etymology of “MK” may possibly stand for “Mind Kontrolle.”
The obvious translation of the German word “Kontrolle” into English is
“control.”[7] A host of German doctors, procured from the post war Nazi talent
pool, were an invaluable asset toward the development of MKULTRA. The
correlation between the concentration camp experiments and the numerous
sub-projects of MKULTRA are clearly evident. The various avenues used to
control human behavior under MKULTRA included radiation, electroshock,
psychology, psychiatry, sociology, anthropology, graphology, harassment
substances and paramilitary devices and materials “LSD” being the most widely
dispensed “material”. A special procedure, designated MKDELTA, was
established to govern the use of MKULTRA abroad. MKULTRA/DELTA
materials were used for harassment, discrediting or disabling purposes.[8] Of the
149 subprojects under the umbrella of MKULTRA having been identified, Project
MONARCH, officially begun by the U.S. Army in the early 1960’s (although
unofficially implemented much earlier) appears to be the most prominent and is
still classified as TOP SECRET for “National Security” reasons.[9] MONARCH
may have culminated from MKSEARCH subprojects, such as operation
SPELLBINDER, which was set up to create “sleeper” assassins (i e. “Manchurian
candidates”) who could be activated upon receiving a key word or phrase while in
a post-hypnotic trance. Operation OFTEN, a study which attempted to harness the
power of occultic forces was possibly one of several cover programs to hide the
insidious reality of Project MONARCH.
Definition and Description
The name MONARCH is not necessarily defined within the context of royal
nobility, but rather refers to the monarch butterfly. When a person is undergoing
trauma induced by electroshock, a feeling of light-headedness is evidenced; as if
one is floating or fluttering like a butterfly. There is also a symbolic representation
pertaining to the transformation or metamorphosis of this beautiful insect: from a
caterpillar to a cocoon (dormancy, inactivity ), to a butterfly (new creation) which
will return to its point of origin. Such is the migratory pattern that makes this
species unique.
Occultic symbolism may give additional insight into the true meaning Psyche is the
word for both “soul” and “butterfly” coming from the belief that human souls
become butterflies while searching for a new reincarnation. [10]
Some ancient mystical groups, such as the Gnostics, saw the butterfly as a symbol
of corrupt flesh. The “Angel of Death” (remember Mengele?) in Gnostic art works
was portrayed crushing the butterfly.[11] A marionette is a puppet that is attached
to strings and is controlled by the puppet master, hence MONARCH programming
is also referred to as the “Marionette Syndrome.” “Imperial Conditioning” is
another term used, while some mental health therapists know it as “Conditioned
Stimulus Response Sequences.” Project MONARCH could be best described as a
form of structured dissociation and occultic integration, in order to
compartmentalize the mind into multiple personalities within a systematic
framework. During this process, a Satanic ritual, usually including Cabalistic
mysticism, is performed with the purpose of attaching a particular demon or group
of demons to the corresponding alter(s). Of course, most skeptics would view this
as simply a means to enhance trauma within the victim, negating any irrational
belief that demonic possession actually occurs.
Alters and Triggers
Another way of examining this convoluted victimization of body and soul is by
looking at it as a complex computer program: A file (alter) is created through
trauma, repetition and reinforcement. In order to activate (trigger) the file, a
specific access code or password (cue or command) is required. The
victim/survivor is called a “slave” by the programmer/handler, who in turn is
perceived as “master” or “god.” About 75% are female, since they possess a
higher tolerance for pain and tend to dissociate easier than males. Subjects are
used mainly for cover operations, prostitution and pornography; involvement in the
entertainment industry is notable. A former military officer connected to the DIA,
told this writer, “In the ‘big picture’ these people [MONARCH victims] are in all
walks of life, from the bum on the street to the white-collar guy”. In corroboration,
a retired CIA agent vaguely discussed the use of such personnel to be used as
“plants” or “chameleons” for the purpose of infiltrating a designated group,
gathering information and/or injecting an ulterior agenda.
There are an inordinate amount of alters in the victim/survivor with numerous
back-up programs, mirrors and shadows. A division of light-side (good) and
dark-side (bad) alters are interwoven in the mind and rotate on an axis.
One of the main internal structures, (of which their are many) within the system is
shaped like a double-helix, consisting of seven levels. Each system has an internal
programmer which oversees the “gatekeeper” (demons?) who grant or deny entry
into the different rooms. A few of the internal images predominately seen by
victims/survivors are trees, the Cabalistic “Tree of Life,” with adjoining root
systems, infinity loops, ancient symbols and letters, spider webs, mirrors or glass
shattering, masks, castles, mazes, demons/monsters/aliens, sea shells, butterflies,
snakes, ribbons, bows, flowers, hour glasses, clocks, robots, chain-of-command
diagrams and/or schematics of computer circuitry boards.
Bloodlines and Twinning
A majority of the victims/survivors come from multi-generational Satanic families
(bloodlines) and are ostensibly programmed “to fill their destiny as the chosen
ones or chosen generations” (a term coined by Mengele at Auschwitz). Some are
adopted out to families of similar origin. Others used in this neurological nightmare
are deemed as the “expendable ones” (non-bloodliners), usually coming from
orphanages, foster care homes, or incestuous families with a long history of
pedophilia. There also appears to be a pattern of family members affiliated with
government or military intelligence agencies.
Many of the abused come from families who use Catholicism, Mormonism, or
charismatic Christianity as a “front” for their abominable activities (though
members of other religious groups are also involved.)
Victims/survivors generally respond more readily to a rigid religious (dogmatic,
legalistic) hierarchical structure because it parallels their base programming.
Authority usually goes unchallenged, as their will has been usurped through
subjective and command-oriented conditioning.
Physical identification characteristics on victims/survivors often include multiple
electrical prod scars and/or resultant moles on their skin. A few may have had
various parts of their bodies mutilated by knives, branding irons, or needles,
Butterfly or occult tattoos are also common. Generally, bloodliners are less likely
to have the subsequent markings, as their skin is to “remain pure and
unblemished.”
The ultimate purpose of the sophisticated manipulation of these individuals may
sound unrealistic, depending upon our interpretive understanding of the physical
and spiritual realms. The deepest and darkest alters within bloodliners are
purported to be dormant until the “Anti-Christ’ is revealed. These “New World
Order” alters supposedly contain call-back orders and instructions to train and/or
initiate a large influx of people (possibly clones or “soulless ones”), thereby
stimulating social control programs into the new millennium. Non-biological
“twinning” is yet another bizarre feature observed within MONARCH
programming. For instance, two young non related children would be
ceremoniously initiated in a magical “soul-bonding” ritual so they might be
“inseparably paired for eternity” (possibly another Mengele connection?). They
essentially share two halves of the programmed information, making them
interdependent upon one another. Paranormal phenomenon such as astral
projection, telepathy, ESP, etc. appear to be more pronounced between those who
have undergone this process.
Levels of MONARCH Programming [12]
ALPHA. Regarded as “general” or regular programming within the base control
personality; characterized by extremely pronounced memory retention, along with
substantially increased physical strength and visual acuity. Alpha programming is
accomplished through deliberately subdividing the victims personality which, in
essence, causes a left brain-right brain division, allowing for a programmed union
of L and R through neuron pathway stimulation.
BETA. Referred to as “sexual” programming. This programming eliminates all
learned moral convictions and stimulates the primitive sexual instinct, devoid of
inhibitions. “cat” alters may come out at this level.
DELTA. This is known as “killer” programming, originally developed for training
special agents or elite soldiers (i.e. Delta Force, First Earth Battalion, Mossad, etc.)
in covert operations. Optimal adrenal output and controlled aggression is evident.
Subjects are devoid of fear; very systematic in carrying out their assignment.
Self-destruct or suicide instructions are layered in at this level.
THETA considered to the “psychic” programming. Bloodliners (those coming
from multi-generational Satanic families) were determined to exhibit a greater
propensity for having telepathic abilities than did non-bloodliners. Due to its
evident limitations, however, various forms of electronic mind control systems
were developed and introduced, namely, bio-medical human telemetry devices
(brain implants), directed-energy lasers using microwaves and/or electromagnetics.
It is reported these are used in conjunction with highly-advanced computers and
sophisticated satellite tracking systems.
OMEGA. A “self-destruct” form of programming, also known as “Code Green.”
The corresponding behaviors include suicidal tendencies and/or self-mutilation.
This program is generally activated when the victim/survivor begins therapy or
interrogation and too much memory is being recovered.
GAMMA. Another form of system protection is through “deception”
programming, which elicits misinformation and misdirection. This level is
intertwined with demonology and tends to regenerate itself at a later time if
inappropriately deactivated.
Method and Components
The initial process begins with creating dissociation within the subject, usually
occurring from the time of birth to about six years. This is primarily achieved
through the use of electroshock (ECT) and is at times performed even when the
child is in the mother’s womb. Due to the severe trauma induced through ECT,
sexual abuse and other methods, the mind splits off into alternate personalities
from the core. Formerly referred to as Multiple Personality Disorder, it is
presently recognized as Dissociative Identity Disorder and is the basis for
MONARCH programming. Further conditioning of the victim’s mind is enhanced
through hypnotism, double-bind coercion, pleasure-pain reversals, food, water,
sleep and sensory deprivation, along with various drugs which alter certain
cerebral functions.
The next stage is to embed and compress detailed commands or messages within
the specified alter. This is achieved through the use of hi-tech headsets, in
conjunction with computer-driven generators which emit inaudible sound waves or
harmonics that affect the RNA covering of neuron pathways to the subconscious
and unconscious mind. “Virtual Reality” optical devices are sometimes used
simultaneously with the harmonic generators projecting pulsating colored lights,
subliminals and split-screen visuals. High voltage electroshock is then used for
memory dissolution.
Programming is updated periodically and reinforced through visual, auditory and
written mediums. Some of the first programming themes included the Wizard of Oz
and Alice and Wonderland, both heavily saturated with occultic symbolism. Many
of the recent Disney movies and cartoons are used in a two-fold manner:
desensitizing the majority of the population, using subliminals and neuro-linguistic
programming, and deliberately constructing specific triggers and keys for base
programming of highly-impressionable MONARCH children.
A prime example of how subliminal programming works is by looking at the recent
Disney cinematic sensation Pochahontas, curiously billed as their “33rd” (highest
degree in Scottish Rite Freemasonry) animated movie. In the movie, Grandmother
Willow is a mystical 400 year old tree who counsels the motherless Pochahontas to
listen to her heart and help her realize all the answers lie within. Grandmother
Willow is constantly talking in “double-speak” and using “reversals” (i.e.
“Sometimes the right path is not the easiest one”; the esoteric derivative being: the
left path [the path that leads to destruction] is the easiest one. In Illuminati
Structured MPD Systems, the willow tree represents the occultic powers of
Druidism. The intrinsic imagery of the tree’s branches, leaves and root systems are
very significant, as some of the dark spiritual proper ties associated with the
Willow Tree Programming are:
(I) The branches are used to whip victims in rituals for “cleansing” purposes, (2) A
willow tree can endure severe weather disturbances (i.e. storms) and is known for
it’s pliability or flexibility. Victims/Survivors of the programming describe the
willow’s branches wrapping around them, with no hope of escape, (3) The deep
root system of the willow tree makes the victim/survivor feel as if they are falling
deeper and deeper into an abyss while in a hypnotic trance.
Music plays an instrumental role in programming, through combinations of variable
tones, rhythms and words. Frightmeister Stephen King’s numerous novels and
subsequent movies, are purported by credible sources to be used for such
villainous purposes. One of his latest books, Insomnia, features a picture of King
with the trigger phrase “WE NEVER SLEEP,” (indicative of someone with MPD/
DID) below an all-seeing eye. A partial list of other mediums used to reinforce
base programming are:
Pinnochio, Sleeping Beauty, Snow White, Beauty and the Beast, Aladdin, The
Little Mermaid, The Lion King, E. T., Star Wars, Ghost Busters, Trancers II,
Batman, Bewitched, Fantasy Island, Reboot, Tiny Toons, Duck Tails, The Dead
Sea Scrolls and The Tall Book of Make Believe. A few movies which depict or
portray some aspect of MONARCH programming are Hell raiser 3, Raising Cain,
Labyrinth, Telefon, Johnny Mneumonic, Point of No Return, The Lawnmower
Man and Closet Land.
Programmers and Places
It’s difficult to figure out who the original programmer of this satanic project was,
due to the substantial amount of disinformation and cross-contamination
propagated by the “powers that be.” The two that went by the color-coded name
of Dr. Green are a Jewish doctor named Dr. Gruenbaum, who supposedly
collaborated with the Nazis during WWII, and Dr. Josef Mengele, whose
trademark of cold blooded and calculating brutality has not only scarred the souls
of survivors from Auschwitz, but also a countless number of victims throughout
the world. Mengele’s direct involvement at the infamous Auschwitz concentration
camp was suspiciously downplayed during the Nuremberg Trials, and consequently
no intensified effort by the U.S. and it’s allies was directed toward his capture.[13]
As a means to confuse serious investigators as to his whereabouts, U.S. officials
would report Mengele being a non-threatening, recluse in Paraguay or Brazil, or
that he was simply dead (the “Angel of Death” miraculously must have come back
to life at least five different times).
His unprecedented research, at the expense of thousands of lives, undoubtedly was
a significant bonus to U.S. interests, Besides using the pseudonym of Dr. Green,
survivors knew him as Vaterchen (daddy), Schoner Josef (beautiful Joseph), David
and Fairchild. A gracefully handsome man of slight stature, Mengele would disarm
people with his gentle demeanor, while at other times, he would explode into
violent rages.[14] Other characteristics remembered by survivors were the cadence
of his shiny black boots as he paced back and forth and his I-love-you/llove-
you-not” daisy game. When he pulled off the last daisy petal, he would
maliciously torture and kill a small child in front of the other child he was
programming. Distraught survivors also recalled being thrown naked into cages
with monkeys, who were trained to viciously abuse them. Evidently, Mengele
enjoyed reducing people to the level of animals. He also would purposely restrain
his victims from crying, screaming, or showing any excessive emotion.
Dr. D. Ewen Cameron, also known as Dr. White, was the former head of the
Canadian, American and World Psychiatric Associations. Because of Cameron’s
extensive experience and credentials, the ClA’s Allen Dulles funneled millions of
dollars throughout organizations like the society for the Investigation of Human
Ecology, which Cameron ruthlessly presided over. Experimentations were
conducted at several locations in Montreal, mostly at McGill University, St Mary’s
Hospital and Allan Memorial Institute.
Besides the conventional methods of psychiatric tyranny, such as electroshock
drug injections and lobotomies, Cameron conceived the technique of “psychic
driving,” wherein unsuspecting patients were kept in a drug induced coma for
several weeks and administered a regimen of electroshocks, while electronic
helmets were strapped to their heads and repetitive auditory messages were
transmitted at variable speeds.[15]
Many of those exploited were abused children which had been run through the
Roman Catholic orphanage system. Not surprisingly, Dr Cameron has been
conveniently left out of most psychiatric journals. This may have been, in fact,
largely due to Project MKULTRA being publicly exposed in 1970, through
lawsuits filed by Canadian survivors and their families. The CIA and Canadian
government settled out of court so as not to be required to officially admit to any
wrongdoing.
A former U.S. Army Lt. Col. in the DIA’s Psychological Warfare Division,
Michael Aquino, is the latest in a line of alleged government-sponsored sadists.
Aquino, an eccentric genius, founded the Temple of Set, an offshoot of Anton
LaVey’s Church of Satan. His obsession with Nazi pagan rituals and his hypnotic
manipulation of people made him an ideal candidate for the position of “Master
Programmer.” Aquino was connected with the Presidio Army Base day care
scandal, in which he was accused child molestation. Much to the dismay of the
young victims’ parents, all charges were dismissed. Code-named “Malcolm”,
Aquino developed training tapes on how to create a MONARCH slave and worked
as a liaison between Government/Military Intelligence and various criminal
organizations and occult groups in the distribution of MONARCH slaves.[16]
Heinrich Mueller was another important programmer who went under the code
names “Dr. Blue” or “Gog.” He apparently has two sons who have carried on the
trade. The original “Dr. Black” was apparently Leo Wheeler, the nephew of
deceased General Ear1e G. Wheeler, who was the commander of the Joint Chiefs
of Staffs during the Vietnam War. Wheeler’s protege, E. Hummel is active in the
Northwest, along with W. Bowers (from the Rothschild bloodline).
Other alleged master mind manipulators, past and present, are: Dr. Sydney
Gottleib, Lt. Col John Alexander, Richard Dabney Anderson (USN), Dr. James
Monroe, Dr. John Lilly, Lt. Comdr. Thomas Narut, Dr William Jennings Bryan, Dr.
Bernard L. Diamond, Dr. Martin T. Orne, Dr. Louis J. West, Dr Robert J. Lifton,
Dr. Harris Isbel and Col. Wilson Green In order to keep MKULTRA from being
easily detected, the CLA segmented its subprojects into specialized fields of
research and development at universities, prisons, private laboratories and
hospitals Of course, they were rewarded generously with government grants and
miscellaneous funding.
The names and locations of some of the major institutions involved in MONARCH
programming experimentation were/are:
Cornell, Duke, Princeton, UCLA, University of Rochester, MIT, Georgetown
University Hospital, Maimonides Medical Center, St. Elizabeth’s Hospital
(Washington D.C.), Bell Laboratories, Stanford Research Institute, Westinghouse
Friendship Laboratories, General Electric, ARCO and Manking Research
Unlimited, The “final product” was/is usually created on military installations and
bases, where maximum security is required. Referred to as (re) programming
centers or near-death trauma centers, the most heavily identified are:
China Lake Naval Weapons Center, The Presidio, Ft. Dietrick, Ft. Campbell, Ft.
Lewis, Ft. Hood, Redstone Arsenal, Offutt AFB, Patrick AFB, McClellan AFB,
MacGill AFB, Kirkland AFB, Nellis AFB, Homestead AFB, Grissom AFB,
Maxwell AFB and Tinker AFB
Other places recognized as major programming sites are Langley Research Center,
Los Alamos National Laboratories, Tavistock Institute and areas in or by Mt.
Shasta, CA, Lampe, MO and Las Vegas, NV.
Notable Names
One of the first documented cases of a MONARCH secret agent was that of the
voluptuous 1940’s model, Candy Jones. The book, The Control of Candy Jones,
(Playboy Press) portrays her 12 years of intrigue and suspense as a spy for the
CIA. Jones, whose birth name is Jessica Wilcox, apparently fit the physiological
profile as to be one of the initial experiments or human guinea pigs under the
government’s “scientific” project, MKULTRA.
The most publicized case of MONARCH monomania has surfaced through the
book TRANCE Formation of America:
The True Life Story of a ClA Slave by Cathy O’Brien. On the back cover it
emphatically states, “Cathy O’Brien is the only vocal and recovered survivor of
the Central Intelligence Agency’s MKULTRA Project Monarch mind control
operation” This documented autobiography contains compelling accounts of
O’Brien’s years of unrelenting incest and eventual introduction into Project
MONARCH by her perverted father. Along with co-author Mark PhiIlips, her
rescuer and deprogrammer, Cathy covers an almost unbelievable array of
conspiratorial crime: forced prostitution (white slavery) with those in the upper
echelons of world politics, covert assignments as a “drug mule” and courier, and
the country-western music industry’s relationship with illegal CIA activities.
Paul Bonaci a courageous survivor who endured almost two decades of
degradation under Project MONARCH, has disclosed strong corroborating
evidence of widescale crimes and corruption from the municipal/state level all the
way up to the White House.[17] He has testified about sexually-abused males
selected from Boy’s Town in Nebraska and taken to nearby Offut AFB, where he
says they were subjected to intense MONARCH programming, directed mainly by
Commander Bill Plemmons and former Lt. Col. Michael Aquino.[18] After
thoroughly tormenting the young boys into mindless oblivion, they were used
(along with girls) for pornography and prostitution with several of the nation’s
political and economic power brokers.
Bonnaci recalled being transported from the Air Force base via cargo planes to
McClelland AFB in California. Along with other unfortunate adolescents and
teenagers, he was driven to the elite retreat, Bohemian Grove. The perpetrators
took full advantage of these innocent victims, committing unthinkable perversions
in order to satisfy their deviant lusts. Some victims were apparently murdered,
further traumatizing already terrified and broken children. An unsuitable actress of
marginal talent (now deceased), a morally-corrupt T.V. evangelist, a heralded
former Green Beret officer and a popular country-western singer are a few others
likely having succumbed to MONARCH madness. Lee Harvey Oswald, Sirhan-
Sirhan, Charlie Manson, John Hinckley Jr., Mark Chapman, David Koresh, Tim
McVeigh and John Salvi are some notable names of infamy, strongly suspected of
being pawns who were spawned by MKULTRA.
Deprogrammers and Exposers
Dr. Corydon Hammond, a Psychologist from the University of Utah, delivered a
stunning lecture entitled “Hypnosis in MPD: Ritual Abuse” at the Fourth Annual
Eastern Regional Conference on Abuse and Multiple Personality, June 25, 1992 in
Alexandria, Virginia. He essentially confirmed the suspicions of the attentive
crowd of mental health professionals, wherein a certain percentage of their clients
had undergone mind control programming in an intensively systematic manner.
Hammond alluded to the Nazi connection, military and CIA mind control research,
Greek letter and color programming and specifically mentioned the Monarch
Project in relation to a form of operative conditioning.
Shortly after his ground breaking speech, he received death threats. Not wanting to
jeopardize the safety of his family, Dr. Hammond stopped disseminating any
follow-up information, until recently. Mark Phillips, a former electronics
subcontractor for the Department of Defense, was privy to some of the top secret
mind control activities perpetrated by the U.S. government. His inquisitive
demeanor, strong conscience and heart-felt concern for Cathy O’Brien, a
“Presidential Model’ under Project MONARCH, prompted him to reveal the
inner-workings of this grand deception beginning about 1991. As the story goes, he
helped Ms. O’Brien escape from her captors and was able to deprogram her in
about a years time in Alaska. The controversial Phillips has his share of critics who
are skeptical of the veracity of his claims. New Orleans therapist Valerie Wolf
introduced two of her patients before the President’s Committee on Human
Radiation Experiments on March 15, 1995 in Washington D.C. The astonishing
testimony made by these two brave women included accounts of German doctors,
torture, drugs, electroshock, hypnosis and rape, besides being exposed to an
undetermined amount of radiation. Both Wolf and her patients stated they
recovered the memories of this CIA program without regression or hypnosis
techniques.[19] Wolf presently devotes much of her time to counseling such
survivors.
A former labor attorney for Atlantic Richfield Co., David E. Rosenbaum,
conducted a nine year investigation (1983-1992) concerning allegations of physical
torture and coercive conditioning of numerous employees at an ARCO plant in
Monaca, PA.[20] His clients, Jerry L. Dotey and Ann White, were victims of
apparent radiation exposure; but as Mr. Rosenbaum probed deeper in the
subsequent interview sessions, a “Pandora’s Box” was unveiled. His most
astonishing conclusion was that Jerry Dotey and Ann White were likely the
off-spring of Adolf Hitler, based in part on the uncanny resemblance from photos
(facial features; bone structure and size were taken into consideration).
Rosenbaum also states, “They both exhibit feelings and experiences that indicate
they are twins.” Dotey and White were allegedly subjected to torture of many
kinds while under drug induced hypnosis, with each one undergoing at least three
training techniques by plant physicians. Each victim was trained to enter into a
hypnotic state upon the occurrence of specific stimuli, usually involving a “cue”
word or phrase and trained to “remember to forget” what transpired in the
hypnotic state. They were repeatedly subjected to identical stimulus-response
sequence, to produce nearly automatic reactions to the particular status.
MKULTRA veteran, Dr. Bernard Diamond, Dr. Martin Orne and Dr. Josef
Mengele regularly visited the ARCO plant, according to Rosenbaum. The special
conditioning of Dotey and White was intended for the artificial creation of dual
German personalities. Rosenbaum, who is Jewish, has maintained a deep
friendship with the two, despite the seemingly precarious circumstances.
Other renowned therapists involved in deprogramming are Cynthia Byrtus, Pamela
Monday, Steve Ogilvie, Bennett Braun, Jerry Mungadze and Colin Ross. Some
Christian counselors have been able to eliminate parts of the programming with
limited success.
Journalists who have recently expounded on the subject matter in exemplary
fashion are Walter Bowart, Operation Mind Control, Jon Rappoport, U.S.
Government Mind-Control Experiments on Children and Alex Constantine,
Psychic Dictatorship In The USA
Conclusion
The most incriminating statement to date made by a government official as to the
possible existence of Project MONARCH was extracted by Anton Chaitkin, a
writer for the publication, The New Federalist.
When former CIA Director William Colby was asked directly, “What about
monarch?” he replied angrily and ambiguously, “We stopped that between the late
1960’s and the early 1970’s.” Suffice to say that society, in its apparent state of
cognitive dissonance, is generally in denial of the over whelming evidence of this
multifarious conspiracy. Numerous victims/ survivors of Project MONARCH are
in desperate need of help. However, the great majority of people are too
preoccupied with themselves to show any genuine compassion toward these
severely wounded individuals. Apathy has taken over the minds of the masses,
who choose to exist within the comforts of this world. Reality has thus become
obscured by relativism and selfishness.
Although there has been some progress in deprogramming and reintegrating
therapies, a much greater problem needs to be rectified. The Holy Bible addresses
this problem as the fragmentation of the soul (Ezekiel 13:20). A spiritual
restoration is what is truly needed (Psalm 23:3) but can only take place by
completely trusting in Jesus Christ as the way to salvation (John 3:16; I Peter 3:18)
and deliverance from demonic oppression and/or possession (Mark 16:17). The
true humility of Christ and the love of God effectively counters the pride and
hatred of Satan.
Statistically, the road to recovery for these survivors of unimaginable depravity is a
long and tedious one, but God is the ultimate healer and only within his time,
through His strength and by His grace, can the captives be set free (Isaiah 61:1).
Endnotes
1. David L. Carrico, The Egyptian Masonic Satanic Connection, 1992
2. Walter H. Bowart, Operation Mind Control, Flatland Editions, 1994, p. 216
3. Martin Cannon, Mind Control and the American Government, Prevailing Winds Research, 1994,
p. 19
4. Linda Hunt, Secret Agenda, St. Martin’s Press, 1991
5. Final Report of the Select Committee to Study Governmental Operations, U.S. Senate, April
1976, p. 337
6. Ibid, p. 390
7. John Marks, The Search For The Manchurian Candidate, Times Books, 1979, pp 60-61
8. Final Report of the Select Committee to Study Governmental Operations, U.S. Senate, April 1976,
p. 391
9. Mark Phillips and Cathy O’Brien, Project Monarch, 1993
10. Barbara G. Walker, The Woman’s Dictionary of Symbols and Sacred Objects, Harper Collins,
1988
11. Marshall Cavendish, Man, Myth and Magic, 1995
12. Dr. Corydon Hammond, The Greenbaum Speech, 1992; Mark Phillips and Cathy O’Brien,
Project Monarch Programming Definitions, 1993
13. Gerald L. Posner, Mengele: The Complete Story, McGraw-Hill, 1986
14. Lucette Matalon Lagnado, Dr. Josef Mengele and the Untold Story of the Twins of Auschwitz,
Morrow, 1991
15. Gordon Thomas, Journey into Madness: The True Story of Secret CIA Mind Control and Medical
Abuse, Bantam Books, 1989
16. Cathy O’Brien and Mark Phillips, Trance Formation of America, 1995
17. John DeCamp, The Franklin Cover-Up, Child Abuse, Satanism and Murder in Nebraska, AWT
Inc, 1992
18. Anton Chaitkin, “Franklin Witnesses Implicate FBI and U.S. Elites in Torture and Murder of
Children”, The New Federalist, 1993
19. Jon Rappoport, “CIA Experiments with Mind Control on Children”, Perceptions Mag’,
September/October 1995, p. 56
20. David E. Rosenbaum, Esq., First Draft Overview of Investigation of the Group, 1983-1993
Reprinted with permission from PARANOIA: The Conspiracy Reader. 1 year (4 issues) for $20
($30 Int’l Airmail).
Paranoia, PO Box 1041, Providence, RI 02901-1041. A compilation, “The Conspiracy Reader”
(Citadel Press, 1999), is available from any bookstore.RotaryInternationalProjectMonarch-NaziMindControl                     Records of the Central Intelligence Agency (CIA) (Record Group 263) Files released in response to the Nazi War Crimes Disclosure Act and the Japanese Imperial Government Disclosure Act http://www.archives.gov/iwg/declassified-records/rg-263-cia-records/index.html

Advertisements

Live Blood Analysis – Observable Effects of RF/MW

Live Blood Analysis – Observable Effects of RF/MW

Take Back Your Power – a critical investigation of the Smart Metering phenomenon and Smart Grid. More than 5,000 studies now show RF/MW radiation to be harmful to human biology, animals and plants. Acute and chronic exposure to RF (radio-frequency) and MW (microwave) radiation can, even at very low power-densities, lead to not only the negative health effects shown in this video, but calcium ion damage in cells, endothelial cell dysfunction, nitric oxide depletion, oxidative stress, melatonin disruption, blood-brain-barrier leakage, DNA damage, sperm damage and more. Glucose metabolism changes within the brain are observable after just minutes of cell phone use.

The mechanisms for damage from non-thermal, non-ionising radiation exposure are now becoming clear.

Unfortunately, so-called “safety” thresholds maintained in the UK are woefully out of date and obsolete, permitting a deluge of highly-profitable, RF-emitting technologies to be introduced into our lives. Whilst attempts by campaigners in every country are being made to stem and reverse the tide of these environmental toxins, you can take positive action to protect yourself and your family by limiting your own exposure to RF and MW-emitting devices, such as Smart Meters, cell phones, WiFi routers and devices, wireless baby monitors, wireless alarm systems, wireless games consoles, etc

For more information on Smart Meters, visit http://www.StopSmartMeters.org.uk. To watch the Take Back Your Power documentary, from 5 September 2013, visit http://www.StopSmartMeters.org.uk/film.

You have the lawful right to refuse a Smart Meter. http://www.DontSmartMeter.me

Please alert your neighbours, friends and families to this important information.

I went to undergrad with jeremy Bailenson at the universiry of michigan in ann arbor michigan. Getting inside your head: Virtual Reality guru Jeremy Bailenson’s Writing. “Before we get to writing, here’s a virtual reality question. How soon will governments and corporations be able to control our behavior with virtual reality? And how?” Life | The Man of Twists and Turns. I went to undergrad with dr Jeremy Bailensen. He went to the university of Michigan undergrad and got a phd from UCSB in virtual sexual reality and is a professor at Stanford.

I went to undergrad with jeremy Bailenson at the universiry of michigan in ann arbor michigan. Getting inside your head: Virtual Reality guru Jeremy Bailenson’s Writing. “Before we get to writing, here’s a virtual reality question. How soon will governments and corporations be able to control our behavior with virtual reality? And how?” Life | The Man of Twists and Turns. I went to undergrad with dr Jeremy Bailensen. He went to the university of Michigan undergrad and got a phd from UCSB in virtual sexual reality and is a professor at Stanford. He gave me a Mickey in 2007 in downtown San Fran. He also was a member of the skull and bones fraternity zeta psi. The same fraternity George h bush was a member and Prescott bush and George w bush. All his research was funded by the mitre corporation where the CIA is located.
http://www.themanoftwistsandturns.com/2011/04/10/getting-inside-your-head-virtual-reality-guru-jeremy-bailenson%E2%80%99s-writing-life-interview/
” Before we get to writing, here’s a virtual reality question. How soon will governments and corporations be able to control our behavior with virtual reality? And how?”

U.S. Electromagnetic Weapons – THE EXPOSURE OF WATERGATE MKULTRA COINTELPRO . . .

http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mindcon31b.htm
According to testimony by Senator Edward Kennedy in 1977,
“Some 2 years ago, the Senate Health Subcommittee heard chilling testimony about the human experimentation activities of the Central Intelligence Agency. The Deputy Director of the CIA revealed that over 30 universities and institutions were involved in an ‘extensive testing and experimentation’ program which included covert drug tests on unwitting citizens ‘at all social levels, [high and low], native Americans and foreign.’ Several of these [tests involved] the administration of LSD to ‘unwitting subjects in [social] situations.’ … The Central Intelligence Agency drugged American citizens without their knowledge or consent. It used university facilities and personnel without their knowledge.”    Bailenson’s Writing Life Move over cards, cocaine, and nicotine, Virtual Reality is the new addiction. It isn’t restricted to the realms of academe or science fiction. Whether you know it or not, it’s going to change your life. It already may have done so. Stanford University Professor Jeremy Bailenson is co-author of a new book, Infinite Reality, which explains how our world is being altered by…a world that isn’t really there. A compelling thinker and one of the foremost young experts on VR, Bailenson’s book (on the shelves April 11) is sure to change the way you look at all aspects of the future and its intersection with rapidly developing technologies. With the arrival of “avatars” of ourselves, it might even change how you look at yourself. Here’s what he told me about his work and the new book: Before we get to writing, here’s a virtual reality question. How soon will governments and corporations be able to control our behavior with virtual reality? And how? Children play video games for more time per day than they watch movies and read books combined. Video games are becoming more “immersive,” that is, closer and closer to virtual reality, each year. Whether or not governments will use the medium to “control” us is up for debate, but there is little doubt that the next generation of lawmakers will look to virtual reality first and other media second when shaping laws, creating entertainment, and conducting commerce. How long did it take you to get this book published? From start—phone call from an agent suggesting I write a book—to finish—book available in stores–the process was about three years. What’s a typical writing day? I wake up early, drink coffee, and get my best writing done between 7am and 10am, and typically put in another few hours in the afternoon. Some days are longer days on which I pound the prose for double digit hours but those are the exception, not the rule. It’s a marathon, not a sprint… Plug “Infinite Reality.” How would you describe what it’s about? And of course why’s it so great? Infinite Reality is a survival guide for anyone seeking to understand how the virtual revolution is changing life as we know it—for example psychology, religion, education, entertainment, relationships, and business. For the past fifteen years, Blascovich and I have been running experiments to understand what happens to the mind inside virtual reality, with the idea that “someday” the technology would be a part of the average person’s daily life. It turns out “someday” has arrived. Children between the ages of 6 and 16 spend over 8 hours per day using digital media, and Internet addiction is quickly becoming a rival to substance abuse and gambling. Infinite Reality gives readers the tools to understand what Virtual Reality is and how it will affect their lives. What’s it like to co-write a book? The great part is being able to bounce ideas off one another and to have another person who is a highly invested editor. In our penultimate edit, Jim and I sat side by side and read OUT LOUD every single word of the book, and then argued over prose, grammar, and content. We averaged about thirty minutes per page. Needless to say it was a grueling month. What’s your favorite sentence in all literature, and why? “Cyberspace. A consensual hallucination experienced daily by billions”. In the late seventies when William Gibson is setting the stage for the virtual revolution we are experiencing today, he really captured the essence of virtual reality. Today there are many people who prefer their “hallucinations” to the physical world. You’re a fan of Gibson’s “Neuromancer.” Some people say his sci-fi fiction “invented” the internet and cyberspace. Is that true? Did fiction-writing actually lead to all these subsequent scientific developments? Neuromancer was without a doubt what inspired me to become a scholar of avatars. Gibson’s unprecedented vision of cyberspace redefines what it means to be human—mortality is optional, people can transform their gender, age, and identity at the drop of a hat, and the notions of pleasure and pain move beyond the flesh. Indeed these themes are pervasive throughout my research and throughout our book Infinite Reality. I first read it in high school, and like many Stanford students I force to read it in my courses, I didn’t really “get it”. It’s a challenging read on the first try, and some of the big ideas take a few reads before they grab hold. I didn’t pick the book up again for about a decade, in my fifth year of graduate school, where I was floundering without direction in my research, running cognitive psychology experiments and then designing computer programs that mimicked thought. But before dropping out of academia altogether, one job advertisement in particular resonated with what I had read in Neuromancer, and I decided to give university life one more try. I took a research position at UCSB studying avatars. Since then, Neuromancer has been my crutch. Large government grants have been awarded to me for building and testing Gibson’s ideas. Academic papers are improved by Gibson quotes that sum up the big ideas of the research. PhD students walk out of my office with a copy when searching for dissertation topics. Undergraduates who can’t imagine the world without the “cyberspace” Gibson predicted (or perhaps facilitated) grumble about using it as a textbook in my lecture classes. Is there any other sci-fi fiction author whose work seems scientifically well-informed to an actual scientist like you? Can you recommend a book? Yes—the book “Altered Carbon” by Richard Morgan is a must-read for anyone who wants a vision of the next avatar revolution. Gibson describes a world in which digital technology transforms humanity. Morgan has a different take and focuses on a world in which humans have conquered biology and can “occupy”—that is transport their personality into—“off the shelf” bodies. Do you use other media, like music or art, to get yourself into the mood to write? Or to open up your creative faculties? All Black Sabbath, all the time. What’s the strangest thing that happened to you while researching the book? I was at a meeting at a Fortune 500 corporation, discussing virtual reality with the head of their research division. Without warning at our 8am meeting she showed me two devices which were designed for “teledildonics”—virtual sex between two people who are not in the same physical place. We examined and discussed two “his and her” devices in which people can intimately touch one another over the Internet. You’re about to become a father. When your daughter is in college, how will virtual reality have changed the way she lives and studies? Imagine the best teacher who ever lived—for example Einstein for physics or Vonnegut for writing. Now imagine a digital avatar that looked like him, had his personality, had all of his knowledge, and was verbally and nonverbally responsive to questions and confused looks. Now, think about a digital MP3 song. It lasts forever and can by copied infinitely for free. So my daughter, like every other student, will be tutored one-on-one, by the best teacher who ever lived. Will she still be reading books? She still will be reading words, but a “book” will likely be a distant relative of its paper ancestors. Reading will be interactive, with words and images changing based on your reactions, and there will be a lot more “showing” and a lot less “telling”. – See more at: http://www.themanoftwistsandturns.com/2011/04/10/getting-inside-your-head-virtual-reality-guru-jeremy-bailenson%E2%80%99s-writing-life-interview/#sthash.Bkyg9Gve.dpuf

Los Alamos National Laboratory, now under supervision of University of California, prepared a report for Federal Emergency Management Agency (FEMA) setting forth that use of microwave radiation on terrorists could kill them, stun them or at least modify their behavior by changing their “perceptions.” At this point the cloak is donned, and the report continues: “There are reports of Eurasian communist countries performing research with combined fields of signals from several different microwave frequencies to produce at least perceptual distortions in humans.”

 Los Alamos National Laboratory, now under supervision of University of California, prepared a report for Federal Emergency Management Agency (FEMA) setting forth that use of microwave radiation on terrorists could kill them, stun them or at least modify their behavior by changing their “perceptions.” At this point the cloak is donned, and the report continues: “There are reports of Eurasian communist countries performing research with combined fields of signals from several different microwave frequencies to produce at least perceptual distortions in humans.”    

SECRET AND SUPPRESSED: BANNED IDEAS AND HIDDEN HISTORY, edited by Jim Keith   The ‘Frey Effect’ – Microwave Hearing   ( The ability of certain parameters of EMF to cause health effects, including neurological and behavioral disturbances, has been part of the military and CIA arsenal for years. )

There had been an ongoing controversy over health effects of electromagnetic fields (EMF) for years (e.g., extremely low frequency radiation and the Navy’s Project Seafarer; emissions of high power lines and video display terminals; radar and other military and industrial sources of radio frequencies and microwaves, such as plastic sealers and molders.) Less is known of Department of Defense (DOD) and Central Intelligence Agency (CIA) interest in anti-personnel applications of the invisible energies. The ability of certain parameters of EMF to cause health effects, including neurological and behavioral disturbances, has been part of the military and CIA arsenal for years.

Capabilities of the energies to cause predictable and exploitable effects or damages can be gleaned from discussion of health effects from environmental exposures. Interestingly, some scientists funded by the DOD or CIA to research and develop invisible electromagnetic weapons have voiced strong concern (perhaps even superior knowledge or compensatory to guilt) over potentially serious consequences of environmental exposures.

Eldon Byrd who worked for Naval Surface Weapons, Office of Non-Lethal Weapons, was commissioned in 1981 to develop electromagnetic devices for purposes including “riot control,” clandestine operations and hostage removal. In the context of a controversy over reproductive hazards to Video Display Terminal (VDT) operators, he wrote of alterations in brain function of animals exposed to low intensity fields. Offspring of exposed animals “exhibited a drastic degradation of intelligence later in life… couldn’t learn easy tasks… indicating a very definite and irreversible damage to the central nervous system of the fetus.” With VDT operators exposed to weak fields, there have been clusters of miscarriages and birth defects (with evidence of central nervous system damage to the fetus). Byrd also wrote of experiments where behavior of animals was controlled by exposure to weak electromagnetic fields. “At a certain frequency and power intensity, they could make the animal purr, lay down and roll over.”

Notorious Jose Delgado, advocate of a psycho-civilized society through mind control, no longer implants electrodes in the brains of mental patients and prisoners; he now induces profound behavioral changes (hyper-activity, passivity, etc.) by exposing animals to precisely tuned EMFs. He has also written of genetic damage produced by weak EMF fields, similar to those emitted by VDTs. Invariably, brain tissue damage and skeletal deformation was observed in new born chicks that had been exposed. He was concerned enough to check emissions from the appliances in his kitchen.

Ross Adey induces calcium efflux in brain tissue with low power level fields (a basis for the CIA and military’s “confusion weaponry”) and has done behavioral experiments with radar modulated at electroencephalogram (EEG) rhythms. He is understandably concerned about environmental exposures within 1 to 30 Hz (cycles per second), either as a low frequency or an amplitude modulation on a microwave or radio frequency, as these can physiologically interact with the brain even at very low power densities.

Microwaves
Microwave health effects is a juncture where Department of Defense and environmental concerns collide and part ways.

Security concerns, according to Sam Koslov of Defense Advanced Research Projects Agency (DARPA), first prompted U.S. study of health effects of low intensity (or non-thermal) microwaves. At times, up to 70-80% of the research was funded by the military. From 1965 to 1970, a study dubbed Project Pandora was undertaken to determine the health and psychological effects of low intensity microwaves, the so-called “Moscow signal” registered at the American Embassy in Moscow. Initially, there was confusion over whether the signal was an attempt to activate bugging devices or for some other purpose. There was suspicion that the microwave irradiation was being used as a mind control system. CIA agents asked scientists involved in microwave research whether microwaves beamed at humans from a distance could affect the brain and alter behavior. Dr. Milton Zarat who undertook to analyze Soviet literature on microwaves for the CIA, wrote: “For non-thermal irradiations, they believe that the electromagnetic field induced by the microwave environment affects the cell membrane, and this results in an increase of excitability or an increase in the level of excitation of nerve cells. With repeated or continued exposure, the increased excitability leads to a state of exhaustion of the cells of the cerebral cortex.”

Employees first learned of the irradiation ten years after Project Pandora began. Before that, information had been parcelled out on a strict “need to know” basis, which excluded most employees at the compound. Due to secrecy, and probably reports like Dr. Zaret’s, Jack Anderson speculated that the CIA was trying to cover up a Soviet effort at behavior modification through irradiation of the U.S. diplomats, and that the cover up was created to protect the CIA’s own mind control secrets.

Finally, an unusually large number of illnesses were reported among the residents of the compound. U.S. Ambassador Walter Stoessel developed a rare blood disease similar to leukemia; he was suffering headaches and bleeding from the eyes. A source at the State Department informally admitted that excessive radiation had been leaking from his telephone; an American high frequency radio transmitter on the roof of the building had, when operating, induced high frequency signals well above the U.S. safety standard through the phones in the political section, as well as in lines to Stoessel’s office. No doubt, National Security Agency or CIA electronic devices also contributed to the electromagnetic environment at the embassy, although values for these were never released, as they are secret. Stoessel was reported as telling his staff that the microwaves could cause leukemia, skin cancer, cataracts and various forms of emotional illness. White blood cell counts were estimated to be as high as 40% above normal in one third of the staff, and serious chromosome damage was uncovered.

The Soviets began research on biological effects of microwaves in 1953. A special laboratory was set up at the Institute of Hygiene and Occupational Diseases, Academy of Medical Sciences. Other labs were set up in the U.S.S.R. and in Eastern Europe that study both effects of microwaves and low frequency electromagnetic radiation.

Years ago, in the halls of science, complaints could be heard that Soviet experiments regarding bio-effects couldn’t be duplicated due to insufficient details in their scientific literature, although, according to one DOD official, 75% of the U.S. papers on the subject carried insufficient parameters for duplication. Scientists even questioned, with McCarthy like sentiments, whether the Soviets were attempting to frighten or disinform with false scientific reporting of bio-effects. It was unthinkable, according to cruder scientific theory, that non-thermal levels of microwaves could cause harm. Impetus for a study of such effects came not from concern for the public, but rather in the military and intelligence community’s suspicion of the Soviets, and their equally strong interest in developing exploitable anti-personnel effects – an interest that continues unabated today.

The CIA and DOD “security” concerns metamorphosized into research and development of invisible weapons capable of impacting on health and psychological processes. In fact, due to the finding of startling effects, DARPA’s security became even tighter, and a new code name – “Bizarre” – was assigned to the project.

Military Disinformation
Scientist Allen Frey of Randomline, Inc. was always more interested in low intensity microwave hazards: thermal effects were known. During Project Pandora, the Navy funded such projects of his, as how to use low average power intensities, to: induce heart seizures; create leaks in the blood brain barriar, which would allow neurotoxins in the blood to cross and cause neurological damage or behavioral disorders; and how to produce auditory hallucinations or microwave hearing, during which the person can hear tones that seem to be coming from within the head or from directly behind it.

In 1976, the Defense Intelligence Agency (DIA) released a report in which they attributed the results of Dr. Frey’s studies to the Soviets. According to Dr. Frey, who acknowledges that his work was misattributed, he had thought up the projects himself. The DIA, but not the CIA, is allowed to use “mirror imaging” and “net assessment” in their reports, ie., respectively, the attribution of one’s own motives and weapons capabilities to “the other side”, in this case, the Soviets. It follows, that there is nothing to prevent them from releasing a report prepared in this manner, and thus muddy the water of decision making, pervert public opinion, stoke up congressional funding or enlist the support of naive scientists to counter “the threat”. There was strong convern over CIA disinformation abroad, leaking back to the home front, through the American press, but apparently the DIA, at least on some issues, can dish it up with impunity.

Dr. R.O. Becker, twice nominated for the Nobel prize for his health work in bio-electromagneticsm, was more explicit in his concern over illicit government activity. He wrote of “obvious applications in covert operations designed to drive a target crazy with “voices.” The 1976 DIA report also credits the Soviets with other capabilities, stating, “Sounds and possibly even words which appear to be originating intercranially can be induced by signal modulations at very low power densities.” Dr. Sharp, a Pandora researcher at Walter Reed Army Institute of Research, some of whose work was so secret that he couldn’t tell his boss, conducted an experiment in which the human brain has received a message carried to it by microwave transmission. Sharp was able to recognize spoken words that were modulated on a microwave carrier frequency by an “audiogram”, an analog of the words’ sound vibrations, and carried into his head in a chamber where he sat.

Dr. James Lin of Wayne State University has written a book entitled, Microwave Auditory Effects and Applications. It explores the possible mechanisms for the phenomenon, and discusses possibilities for the deaf, as persons with certain types of hearing loss can still hear pulsed microwaves (as tones or clicks and buzzes, if words aren’t modulated on). Lin mentions the Sharp experiment and comments, “The capability of communicating directly with humans by pulsed microwaves is obviously not limited to the field of therapeutic medicine.”

What is frightening is that words, transmitted via low density microwaves or radio frequencies, or by other covert methods, might be used to create influence. For instance, according to a 1984 U.S. House of Representatives report, a large number of stores throughout the country use high frequency transmitted words (above the range of human hearing) to discourage shoplifting. Stealing is reported to be reduced by as much as 80% in some cases. Surely, the CIA and military haven’t overlooked such useful technology.

Dr. Frey also did experiments on reduction of aggression. Rats who were accustomed to fighting viciously when their tails were pinched, accepted the pinching with relative passivity when irradiated with pulsed microwaves in the ultra high frequency rage (UHF) at a power density of less than 1,000 microwatts/cm^2. He has also done low intensity microwave experiments degrading motor coordination and balance. When asked about weapons applications of his work, he answered by referring to himself as “just a biological theorist”, and his work for the Navy, “basic medical research.”

Lies Before Congress
In 1976, George H. Heilmeier, director of Defense Advances Research Projects Agency (DARPA) responded to a mailgram to President Ford from Don Johnson of Oakland, paraphrasing Johnson’s concern, and assuring him that the DARPA sponsored Army/Navy Pandora experiments were “never directed at the use of microwaves as a surveillance tool, nor in a weapons concept.” Don Johnson lingered in the memory of one DOD official who sponsored microwave research in the 1970s. Johnson was enigmatically described as “brilliant… schizophrenic… he knew too much… a former mental patient… buildings where work was done.” (Scientists who have disagreed with the DOD on health effects of microwaves and on the U.S. exposure standard, have received scant more respect and have had their funding cut.)

The next year, Heilmeier elaborated in a written response to an inquiry before Congress. “…This agency [DARPA] is not aware of any research projects, classified or unclassified, conducted under the auspices of the Defense Department, now ongoing, or in the past, which would have probed possibilities of utilizing microwave radiation in a form of what is popularly known as ‘mind control.’ We do not foresee the development, by DARPA of weapons using microwaves and actively being directed toward altering nervous system function or behavior. Neither are we aware of any of our own forces… developing such weapons…”

Lies Exposed
Finally, memoranda were released that rendered the goals of Pandora transparent. Richard Cesaro, initiator of Pandora and director of DARPA’s Advanced Sensor program, justified the project in that “little or no work has been done in investigation of the subtle behavioral changes which may be evolved by a low-level electromagnetic field.” Researchers had long ago established that direct stimulus of the brain could alter behavior. The question raised by radio frequencies – microwaves or radio frequencies of the UHF or VHF band – was whether the electromagnetic could have a similar effect at very low levels. Pandora’s initial goal: to discover whether a carefully constructed microwave signal could control the mind. In the context of long term, low-level effects: Cesaro felt that central nervous system effects could be important, and urged their study “for potential weapons applications.” After testing a low-level modulated microwave signal on a chimpanzee, and within approximately a week causing stark performance decrements and behavioral disorganization. Cesaro wrote, “the potential of exerting a degree of control on human behavior by low-level microwaves seems to exist.” On the basis of the primate study, extensive discussions took place and plans were made to extend the studies to humans.

According to a former DOD security analyst, one such microwave experiment with human subjects took place at Lorton Prison in the early 1970s. He said that such research (in a weapons context) has occurred on behavioral effects of microwaves since 1976. He also asked, “Why are you so concerned about then? What about now? They can call anyone a terrorist. Who are they using it on now?”

Behavioral Effects
In June, 1970, a government think tank, Rand Corporation, published a report by R.J. MacGregor, entitled “A Brief Survey of Literature Relating to Influence of Low Intensity Microwaves on Nervous Function.” After noting that the U.S. microwave guideline in effect in 1970 for the public, 10,000 microwatts/^2 (now the industrial and military “guideline”), is proscribed from consideration of the rate that thermal effects are dissipated, the author, a specialist in modeling neural networks, states that scientific studies have consistently shown that humans exhibit behavioral disturbances when subjected to non-thermal levels of microwaves, well below this level. The symptoms that MacGregor lists for those humans exposed more or less regularly at work or in the living environment are insomnia, irritability, loss of memory, fatigue, headache, tremor, hallucination, autonomic disorders and disturbed sensory funtioning. He reports that swelling and distention of nerve cells have been produced at intensities as low as 1,000 microwatts/cm^2 (the current U.S. guideline for the public).

In a companion Rand paper, June, 1970, entitled “A Direct Mechanism for the Direct Influence of Microwave Radiation on Neuroelectric Function,” MacGregor sets forth the idea that the electrical component of microwave radiation induces transmembrane potentials in nerve cells and thereby disturbs nervous function and behavior.

Microwaves penetrate and are absorbed more deeply so that they can produce a direct effect on the central nervous system. With smaller wave lengths the principal absorption occurs near the body surface and causes peripheral or “lower” nervous system effects.

Dr. Milton Zaret who analysed neurological effects for the CIA during Project Pandora (he is now one of the few doctors willing to take the government on by testifying on behalf of plaintiffs filing claims for microwave health damage), wrote that, “receptors of the brain are susceptible and react to extremely low intensities of microwave irradiation if this is delivered in accordance with appropriate “coding.” Coding is reported to be influenced by the character of the signal so as to be a function, for example, of the shape and amplitude of the pulse or waveform.

Remotely Reinforcing Specific Brain Rhythms
Dr. Ross Adey, formerly of the Brain Research Center at University of Southern California, Los Angeles, now at Loma Linda University Medical School, Loma Linda, California, was among the first of the Pandora researchers. His work is more precise in inducing specific behavior, rather than merely causing disorganization or decrements in performance -that is, apart from his studies on inducing calcium efflux in brain tissue, which causes interference with the fucntioning of the brain and is one basis of “confusion weaponry.”

More specifically, Adey’s thesis is that if the electroencephalogram (EEG) has informational significance, one can induce behavioral changes if one imposes environmental fields that look like EEG. During Adey’s career, he has correlated a wide variety of behavioral states with EEG, including emotional states (e.g., stress in hostile questioning), increments of decision making and conditioning, correct versus incorrect performance, etc., and he has imposed electromagnetic fields that look like EEG, which has resulted in altered EEG and behavior.

In published accounts of Adey’s work, he has shown that it is possible to apply low biologic frequencies by using a radio frequency carrier modulated at specific brain frequencies. He demonstrated that if the biological modulation on the carrier frequency is close to frequencies in the natural EEG of the subject, it will reinforce or increase the number of manifestations of the imposed rhythms, and modulate behavior.

The conditioning paradigm: animals were trained through aversion to produce specific brain wave rhythms; animals trained in a field with the same rhythm amplitude modulated on it, differed significantly from control animals in both accuracy and resistance to extinction (at least 50 days versus 10 in the controls). When the fields were used on untrained animals, occurrence of the applied rhythm increased in the animals’ EEG.

Dr. Adey is an accomplished scientist, which leads one to believe the significance of this experiment goes beyond mere reinforcement of the animal’s brain waves. Did the rhythms that he chose to apply have special significance with relation to information processing or conditioning? The 4.5 theta rhythm that he applied was the natural reoccuring frequency that he had measured in the hippocampus during a phase of avoidance learning. The hippocampus, as Adey wrote in an earlier paper, “…involves neural processes connected with consolidation of memory traces. It relates closely to the need for focusing attention, and the degree to which recapitulation of past experience is imposed.” One might add, to ensure survival.

Does it follow that an EEG modulated carrier frequency can be used to enhance human avoidance learning? You bet, provided the same careful procedures are followed with humans as were with animals, the same result would accrue. Recall again the goals of Pandora – to discover whether a carefully constructed electromagnetic signal could direct the mind.

The obvious question becomes, how many and with how much accuracy can behavioral states or “frames of mind” be intentionally imposed, that is, apart from the certain technological capability to promote disorganization and degradation of perception and performance through use of the fields.

In fact, many components of learning or conditioning including affect (i.e., “feeling” or emotional states) can be imposed through use of the fields from a distance. E.g., behavioral arousal, orienting reflex, subliminal stress (alarm reaction without realization of the contextual significance), so-called levels of consciousness, inhibition of cerebral functions, which would render one more susceptible to suggestion or influence, and so on. All components necessary to produce behavioral conditioning, including ways to provide contextual significance, can be applied from a distance (i.e., without direct brain contact, as was necessary in older behavior modification experiments.)

Applications
The end of Project Pandora may have signified the end of research into the cause of effects of the varying frequencies registered at the American embassy in Moscow – some known to be due to CIA and National Security Agency equipment, but interest in microwave and biological frequency weapons did not wane. Indeed, there are indications of applications. As we have seen, research that began in response to a security concern, transformed almost overnight into a search for weapons applications, while cloaked in disinformation about the Soviets. What types of weapons?

There Are Three Possibilities:
(1) that microwaves, perhaps modulated with low biological frequencies, are used from a distance to cause performance decrements and disorganization by interfering with neuro-electric function; or by causing central nervous system effects, subjective feelings of ill health, or health syndrome associated with periodic exposures at intensities below 10,000 microwatts/cm^2;

(2) that microwaves are used to create organ specific effects, e.g., tissues with less blood circulation, like the gall bladder, lens of the eye, etc., can compensate less to increased heating; heart disfunctions can be caused; lesions or necrosis of internal tissues can be induced without a subject necessarily feeling heat, and symptoms might manifest later, at certain frequencies, slight heating or “hot spots” can be created at the center of the head; there is an ongoing Navy contract to find parameters to disrupt human metabolic functions; or

(3) that they are used in an interdisciplinary approach to remote conditioning by creating information processing effects, as Dr. Adey’s work shows, or to induce “feeling” or “emotional” elements of cognition, such as excitatory reactions, subliminal stress, behavioral arousal, enhanced suggestibility by inhibition of higher functions, or various other EEG or behavioral effects.

There are strong indications that microwaves have been used to cause the decrements. There is no question but that the U.S. military and the CIA know the behavioral or psycho-active significance of applied biological rhythms and other frequencies, as this was part of the thrust of their work during Pandora. Inducing emotion or feelings through use of electromagnetic fields, and then sychronizing the feelings with words (symbolic of ideas) would be an effective way to induce preferences or attitude change, because it would mirror natural thought processes. The question seems less whether conditioning through use of covert technology is possible, than whether there has been a policy choice to use it. If the results of their research are used as part of a system that can condition behavioral responses from a distance, it is a secret that they hold close like a baby.

Richard Helms wrote of such a system in the mid-1960s while he was CIA Plans Director. He spoke of “sophisticated approaches to the ‘coding’ of information for transmittal to population targets in the ‘battle for the minds of men’…” and of “an approach integrating biological, social and physical-mathematical research in attempts… to control behavior.” He found particularly notable, “use of modern information theory, automata theory, and feedback concepts… for a technology for controlling behavior… using information inputs as causative agents.” Due to Project Pandora, it is now known that applied biological (and other) frequencies can also be used as direct “information inputs” (e.g., of feeling or emotion) and to reinforce brain rhythms associated with conditioning and information processing. One way to get such a signal into a human may be through use of a high frequency carrier frequency. Results of research into information processing, unconscious processes, decision making, memory processes and evoked brain potentials would likely be expolited or integrated in an interdisciplinary system.

Covert technological influence is not so foreign to the American way of life as one may think. It was reported in a 1984 U.S. House of Representatives hearing that high frequency audio transmissions are applied, for instance, in some department stores to prevent theft (one East Coast department store chain was reported to have saved $600,000 over a nine-month period), and in some grocery stores with the result that employee induced cash shortages significantly decreased and employees are better mannered. In other words, as Helms wrote of, verbal messages are delivered at frequencies above human hearing. Technology for commercial applications is relatively sophisticated (one studio uses a “layered” approach and 31 channels in preparing tapes; some employ a “dual coding” approach, integrating scientific knowledge of information processing modes of the two brain hemispheres, and others use techniques where a consumer is spoken to as a three year old child.) There is no U.S. law specifically regulating these types of transmission (over radio and TV a Federal Communication Commission “catch all” provision might apply). If industry uses indetectable audio transmissions to meet security concerns, it seems that the military and CIA would exploit the same technology and would have developed much more sophisticated technology for applications. The public’s conception of “subliminals” is naive compared to capabilities.

It seems reasonable to conclude that to the extent that such an approach exists to manipulate behavior, “defensive” applications would consist of applying it wherever a potential threat exists or to counter a threat. For instance, Central America is an area where those in officialdom keenly feel the “threat of Soviet domination.” If there is technology available that could conceivably influence Central Americans toward the Soviets, then the U.S. would use the same kind of technology to “even the score.” The same is true within the U.S.; if covert technological influence might be had against Americans, the same feared technology would be applied to counter the threat. Special security risks might include peace groups, whom are felt to be threatened by Soviet influence (a big security concern in Western Europe and in the U.S.), progressives, or any group or individual felt to pose a challenge to U.S. goals subsumed under the rubric of “national security interest.”

Given the nature and dubious goals of lumbering military inertia, and circuitous CIA “mirror logic”, leads one to the conclusion that “defending” against possible or actual attempts to manipulate behavior means moving to the offensive, and perhps, having the “edge” with applications. Possible or actual threats, according to tenets of military and intelligence craft, means “the other side” has the technology if the United States does. Also, it would be too difficult to monitor behavior altering transmissions and to defend against them. Short of exposing such technology there would be no way to defend except by having one’s own “system” (of behavioral patterns consisting of a set of signals signifying “yes” and “no,” or “good” feeling and “bad” feeling that can be linked to ideas). Recall that apart from Project Pandora, the CIA spent decades during MKULTRA and related projects, devising operational techniques to surreptitiously influence and affect behavior. Workable invisible weapons are too useful for arms control talks, and don’t readily lend themselves to proofs of use or “verification” processes. Additionally, the importance of finding ways to circumvent dissent may have been one of the most significant lessons of Vietnam.

Over the counter audio aside, the military has studied and considered for usefulness in a warfare and psychological warfare context a wide range of biologicals or pharmacological substances. In the memo referred to above, Helms wrote that the U.S. is five years ahead of the Soviets in pharmacological agents producing behavioral effects. Some of these substances would increase susceptibility to influence if incorporated in the multidisciplinary approach he wrote of. For difficult subscribers, perhaps in foreign parts, there are substances that have psychological or psychobiological effects ranging from subtle through devastating, and that cause increased susceptibility to conditioning. Some of these substances are similar to ones which are recognized by neurotoxicologists or behavioral toxicologists as occupational hazards; some are variations of substances used experimentally in laboratories to produce selective damage in certain neuronal tracts. Many substances needn’t be injected or orally ingested, as they may be inhaled or applied with “skin transferral agents,” i.e. chemicals like the popular industrial solvent, dimethylsulphoxide (DMSO), which can, in fact, enhance the applied substance’s effect. For instance, some compounds cause damage that produces increased sensitivity to stimulus, distraction (or flooding of thought associations), and enhance susceptibility to influence. I.e., a state where automatic parallel information processing, which usually takes place outside of awareness, and interferes with conscious or more intentional limited channel processing. While causing acute mental symptoms wouldn’t be the goal in groups, producing mild distraction, an ego weakened blurring between the sense of “I” and “you”, would enhance some kinds of conditioning and promote suggestibility; then, perhaps transmitted “thought associations,” “the voice of God”, “lucky advice” or whatever, can more easily get through and have an effect. A side effect of lowered resistance to sub-threshold stimulus might be that some would become aware of illicit influence (even under normal circumstances there is a wide variation in sensitivity among individuals to sub-threshold stimulus; normal individuals whom psychology terms “reducers” are much more sensitive in this way; actually, most schizophrenics are extreme reducers, and therefore, much more aware of stimulus that others aren’t cognizant of). Convenient to the agencies involved in covert influence, is that among primary syptoms of schizophrenia or mental illness are ideas that one is being influenced by “transmissions” (e.g. radio frequencies), “voices” or even telepathy; unless complaints about covert psychological weapons are well organized, they would tend to be discounted as indicative of mental imbalance.

There are many ways to create temporary or permanent staes that increase receptivity to suggestion and/or conditioning. It is interesting to note that scientific studies have correlated exposure to electromagnetic fields alone with mental hospital admissions and worsening of symptoms of mental patients, even as an etiological factor in the onset of mental illness. (A marker disease for exposure to microwaves is damage behind the lens of the eye; a disproportionate number of persons so damaged also suffer from mental disease or neurological impairment.)

The CIA is also interested in neuropeptides; these have profound effects when administered within a conditioning paradigm.

Specific Targets
Weapons against whom? Safe to say, in order to enlist the aid of scientists, the military and CIA would act true to form, that is, to motivate and overcome reluctance due to dictates of conscience, they would evoke a serious security risk, like the Soviets, during initial phases of development. In fact, on the “unclassified” face of it, a number of reports have openly suggested use of “microwaves” against “terrorists”.

 Los Alamos National Laboratory, now under supervision of University of California, prepared a report for Federal Emergency Management Agency (FEMA) setting forth that use of microwave radiation on terrorists could kill them, stun them or at least modify their behavior by changing their “perceptions.” At this point the cloak is donned, and the report continues: “There are reports of Eurasian communist countries performing research with combined fields of signals from several different microwave frequencies to produce at least perceptual distortions in humans.” 

 
 
image
 
 
 
 
 
The ‘Frey Effect’ – Microwave Hearing

LINK  – LINK Advanced Security SECRET AND SUPPRESSED: BANNED IDEAS AND HIDDEN HISTORY, edited by Jim Keith
 
Preview by Yahoo
 
 

 

 

The Spy Factory Examine the high-tech eavesdropping carried out by the National Security Agency. Aired February 03, 2009 on PBS

The Spy Factory

Examine the high-tech eavesdropping carried out by the National Security Agency. Aired February 03, 2009 on PBS  http://www.pbs.org/wgbh/nova/military/spy-factory.html                                                        Program Description
 

In this program, an eye-opening documentary on the National Security Agency by best-selling author James Bamford and Emmy Award-winning producer Scott Willis, NOVA exposes the ultra-secret intelligence agency’s role in the failure to stop the 9/11 attacks and the subsequent eavesdropping program that listens in without warrant on millions of American citizens.

The Spy Factory

PBS Airdate: February 3, 2009

NARRATOR: Halfway between Baltimore and Washington, D.C., is a hidden city, the headquarters of the National Security Agency, NSA. Here, tens of thousands of mathematicians, computer scientists, analysts, linguists and voice interceptors work in absolute secrecy.

JAMES BAMFORD (Author, The Shadow Factory): For those in the know, the joke was that NSA stood for “no such agency.” For those on the inside, the joke was that NSA stood for “never say anything.”

NARRATOR: NSA’s job? To secretly listen in on telephone conversations, email communications, anything and everything that might warn of plots to do harm.

ERIC HASELTINE (National Security Agency, Director of Research, 2002–2005): The scope of what happens at NSA is mind-boggling. I don’t think the average person can even begin to conceive of the staggering depth and breadth of what they have to do.

NARRATOR: But was NSA doing its job before the 9/11 attacks? It’s a question that has never been thoroughly investigated.

MICHAEL SCHEUER (Former Central Intelligence Agency Analyst): None of this information that we’re speaking about this evening is in the 9/11 Commission Report. They simply ignored all of it.

NARRATOR: But author James Bamford has investigated and come up with a chilling tale of terrorists, living in San Diego, communicating with bin Laden’s operations center in Yemen, moving freely about, and all the while, NSA is listening in.

JAMES BAMFORD: But the NSA never alerted any other agency that the terrorists were in the United States and moving across the country towards Washington.

NARRATOR: Since the 9/11 attacks, NSA’s role has grown even bigger, along with its license to listen in on Americans here and abroad.

ADRIENNE KINNE (Former National Security Agency Voice Interceptor): It was incredibly uncomfortable to be listening to private, personal conversations of Americans. It’s almost like going through and finding somebody’s diary.

NARRATOR: But is this flood of information making America any safer? Looking into The Spy Factory, right now on NOVA.

Major funding for NOVA is provided by the following:

One of the factors impacting energy prices is growing global demand. And one way to put downward pressure on prices is to make more supply available. ExxonMobil has invented a breakthrough technology that we’ve just begun using, here in the U.S., to access cleaner-burning natural gas that’s locked in very tight, hard rocks. We could produce enough gas from one U.S. source alone to heat 50 million homes for almost a decade.

And David H. Koch. And…

Discover new knowledge: HHMI.

And by the Corporation for Public Broadcasting, and by contributions to your PBS station from viewers like you. Thank you.

NARRATOR: On the southbound lane of the Baltimore-Washington Parkway, traffic is stalled as commuters crowd down a special restricted exit that disappears into the thick woods. Beyond, hidden from view and protected by electrified fences and heavily armed guards, is the largest, most secret and most technologically advanced intelligence agency in the world: the National Security Agency, NSA.

Its mission: making and breaking codes; tapping into foreign signals, sifting through the international phone calls, emails, text and instant messages that blanket the modern world.

Every day, more than 20,000 people flood into this secret city. Unlike undercover CIA operatives, spying in hostile territory, NSA’s spies use technology in what is believed to be the largest collection of mathematicians, linguists and computer scientists on the planet. Author James Bamford has written about NSA for the past 25 years.

JAMES BAMFORD: For the few in the know, the joke was always that NSA stood for “no such agency.” For those on the inside, the joke was that NSA stood for “never say anything.”

During the cold war, NSA circled nearly the entire Soviet Union with listening posts, to intercept military and diplomatic communications. NSA even listened in on Soviet leaders calling to the Kremlin from their limousines. At its headquarters in Fort Meade, Maryland, NSA used acres of supercomputers to break any coded communications.

NARRATOR: But when the Soviet Union collapsed, a new enemy emerged, one NSA was never designed to engage. That enemy was Al Qaeda. Eric Haseltine was NSA’s Director of Research.

ERIC HASELTINE: The Russians were easy to find and hard to kill, and terrorists are hard to find and easy to kill.

NARRATOR: Unlike the Soviets, Al Qaeda was a small, scattered, moving target. Headquartered in remote, mountain training camps, its soldiers communicated by cell and satellite phones.

ERIC HASELTINE: And if you look at the job of NSA, to find the enemy, they had to go from looking at an enemy that they kind of knew who they were and where they were, to one that they didn’t know who they were or where they were or how they communicated.

NARRATOR: For NSA, the challenge was to change tactics to match an increasingly dangerous adversary. In cities across Asia and the Middle East, Al Qaeda operatives were using public payphones and internet cafes to plan a series of strikes that would culminate in the 9/11 attacks.

TIM SAMPLE (Former Staff Director, United States Congress House Intelligence Committee): At that point, it was a race. It was a race between how much could we rebuild and have the type of capabilities that you need against an individual or a small group of individuals who operate around the world and pay little attention to borders. Can you do that? And can you rebuild the intelligence community in time?

NARRATOR: Those questions still resonate today. Was the National Security Agency, the organization responsible for intercepting foreign calls and messages, listening in on Al Qaeda prior to 9/11? What role did the NSA play? And are we any safer today?

Surprisingly, the 9/11 Commission never investigated the NSA’s role as fully as it did those of the CIA or FBI, but by carefully piecing together a variety of unclassified public records, the story of NSA and its role in the “war on terror” emerges.

JAMES BAMFORD: In my research, I used thousands of documents available in the public record. They included intelligence agency memos, transcripts of terrorist trials, and a secret FBI chronology of the 9/11 terrorists’ movements obtained under the Freedom of Information Act. One fact is clear from these sources: they were monitoring the Al Qaeda leader long before 9/11.

NARRATOR: In November, 1996, a known Al Qaeda contact buys an Inmarsat satellite phone from a store in a New York suburb. That phone is for Osama bin Laden. Once he starts dialing from Afghanistan, NSA’s listening posts quickly tap into his conversations. Analysts at the CIA, like Michael Scheuer—head of Alec Station, the CIA’s newly formed bin Laden tracking unit—are also eager to get the information.

MICHAEL SCHEUER: Osama bin Laden’s Inmarsat telephone was really a godsend. It gave us an idea, not only of where he was in Afghanistan, but where Al Qaeda, as an organization, was established, because there were calls to various places in the world.

NARRATOR: For NSA, tapping into satellite calls is a basic tactic in what’s known as “signals intelligence.” Inmarsat phones transmit signals straight to a satellite orbiting over the Indian Ocean. By tracking all calls in and out of Afghanistan, the NSA quickly determines bin Laden’s number: 873-682505331. Once they have this, they home in on both sides of his conversations, listening to bin Laden by means of a huge dish in space, and to the person he’s speaking to with a dish-shaped antenna on the ground.

MICHAEL SCHEUER: In the intelligence business, signals intelligence is among the most important kind of intelligence options that you have—the electronic communications that are in the air, whether from telephone to telephone, from satellite to satellite, from Inmarsat radio to Inmarsat radio—and NSA collects those with a very broad array of electronic collection capability, but once you collect them, all you have is the signals. And ultimately, it all comes down to the human being.

NARRATOR: Human analysts plot out which numbers are being called from bin Laden’s phone and how frequently. They quickly discover that most of the calls from bin Laden’s phone in Afghanistan are going to a house in Yemen, 2,000 miles to the south.

JAMES BAMFORD: Yemen is central to understanding how Al Qaeda operates. It’s where Osama bin Laden’s father was born and raised. It has a culture of clans and secrets. It didn’t surprise me that bin Laden chose its capital city, Sana’a, for his logistics and communications headquarters. What was surprising was that I found it tucked away in one of the city’s poorest neighborhoods. The headquarters was hidden in a small undistinguished house the CIA said was the home of one of bin Laden’s closest associates.

NARRATOR: Bin Laden’s phone calls aren’t encrypted, so there is no code for NSA’s supercomputers to break. Instead, NSA voice interceptors and linguists painstakingly translate, transcribe and write summaries of the calls. The summaries are shared with the CIA, but its analysts at Alec Station want more. They believe that only by carefully studying each word will it be possible to understand bin Laden’s intentions.

MICHAEL SCHEUER: Over time, if you read enough of these conversations, you first get clued in to the fact that maybe “bottle of milk” doesn’t mean “bottle of milk.” And if you follow it long enough, you develop a sense of what they’re really talking about. But it’s not possible to do unless you have the verbatim transcript.

We went to Fort Meade to ask then the NSA’s deputy director for operations for the transcripts, and she said, “We are not going to share that with you.” And that was the end.

NARRATOR: NSA declined NOVA’s repeated requests for interviews, but its policy since its founding has been to never share raw data, even with other intelligence agencies. Scheuer is so determined to get it, he persuades the CIA to build its own ground station. But without a satellite, he can only get half of the conversations.

MICHAEL SCHEUER: We would collect it, translate it, send it to NSA and ask them for the other half of it, so we could better understand it, but we never got it.

NEWSCASTER (8/7/98): A terrorist attack on Americans half a world away.

NARRATOR: August 7, 1998: Al Qaeda strikes two U.S. embassies in east Africa.

NEWSCASTER (8/7/98): The principle suspect is Osama bin Laden.

NARRATOR: Both NSA and CIA are monitoring the Al Qaeda network, but neither gives any warning of the two precisely timed attacks.

MICHAEL SCHEUER: Truth of the matter is, though, we had various reports from human intelligence sources within East Africa that there was an Al Qaeda operation brewing somewhere on the east coast of Africa. We could never really pin it down.

NARRATOR: The embassy attacks are technically on American soil, so the FBI is called in and finds out about the house in Yemen.

MARK ROSSINI (Former Federal Bureau of Investigation Supervisory Agent): I first learned about the communications center in Yemen when I got to Nairobi, after the embassy bombing there. That house was a focal point for operatives in the field to call in, that number would then contact bin Laden to pass along information and receive instruction back.

NARRATOR: With only a handful of ways to pin down bin Laden’s location—reconnaissance satellites, spies on the ground and signals intelligence—NSA’s expertise is becoming increasingly important.

ERIC HASELTINE: If you’ve only got very few people who are hiding out in a cave somewhere, you’re looking for a very small target and very few targets, as opposed to a big army division or a big missile complex. So, imagery intelligence was of relatively less value. Human intelligence, in an environment where a terrorist network is all relatives, blood relatives…it becomes tougher to get information in that kind of network.

I think one interpretation was that NSA understood that they were becoming more important, in the grand scheme of things, in the war on terror.

NEWSCASTER (10/12/00): An American ship is attacked in Yemen.

NARRATOR: October 12, 2000: Al Qaeda strikes again. This time, it’s an attack on the U.S.S. Cole, moored off the coast of Yemen.

NEWSCASTER: Yemen’s Port Authority had been penetrated…immediately suspect Osama bin Laden.

NARRATOR: Once again, the U.S. intelligence community fails to give a timely warning of the attack. Frank Blanco, NSA’s Executive Director at the time, says NSA was still stuck confronting terrorist tactics with Cold War technology.

FRANK BLANCO (National Security Agency Executive Director, 1999–2001): You’ve got targets that are very mobile. They use a variety of communications, which are cell phones, laptops. NSA had to begin to think about, “What is the real technology that is necessary and how much is it going to cost and where do we get the money?”

NARRATOR: Money is a pressing issue. After the Cold War, Congress had reduced NSA’s budget by a third, while criticizing it for violating privacy laws.

CONGRESSPERSON 1: …concerned about the privacy rights of American citizens.

CONGRESSPERSON 2: There is no legitimate excuse for that.

CONGRESSPERSON 3: It is intolerable to think of the United States Government, of big brother, or anybody else…

NARRATOR: By law, NSA was prohibited from spying on American soil without approval from a special court, created by FISA, the Foreign Intelligence Surveillance Act.

JAMES BAMFORD: When I interviewed General Michael Hayden, the head of NSA, I was surprised when he told me that they were monitoring less than half a dozen people in the United States. He was very busy fighting Hollywood’s image of NSA like you saw in movie, Enemy of the State.

GENE HACKMAN (Film Clip, Enemy of the State): The National Security Agency conducts worldwide surveillance. Fax, phones, satellite communications — they’re the only ones including the military who could possibly have anything like this.

ERIC HASELTINE: To us, in the intelligence community, movies like Enemy of the State are quite amusing, because it made us look omniscient, we could collect anything we want and it’s just not that way. It’s not that way, at all. You may collect a lot of stuff, but you don’t know what you’ve got. Really, the biggest technology challenge was how do you deal with volumes of information like that and find dots, connect dots and understand dots. That’s the problem.

NARRATOR: In late December, 1999, NSA finds one very important dot: it intercepts an alarming call to the house in Yemen, instructing two Al Qaeda foot soldiers to fly to Kuala Lumpur, Malaysia, for what sounds like a terrorist summit. The foot soldiers are Khalid al-Mihdhar and Nawaf al-Hazmi. This is the phone call that sets in motion the 9/11 attacks.

JAMES BAMFORD: After picking up this critical call, NSA passed on their first names to the FBI and the CIA but not their last names. Nawaf’s last name had been in the NSA’s database for over a year, because of his association with bin Laden’s operations center in Yemen, but apparently the NSA never looked it up.

NARRATOR: The CIA does find al-Mihdhar’s name in its database. They ask security agents to make a copy of his passport as he passes through a checkpoint in Dubai. When analysts at CIA headquarters see it, they are astonished to find a valid U.S. visa inside. Alec Station, the CIA’s bin Laden unit, now has two FBI agents detailed to it, Doug Miller and Mark Rossini.

MARK ROSSINI: Once they arrived in Kuala Lumpur, of course, the CIA requested the intelligence service over there in Malaysia to conduct surveillance of these subjects and find out as much as they can. They took photographs, followed them. And you read from that one of the individuals had a visa to come to the U.S.

NARRATOR: Fearing an Al Qaeda terrorist may be headed to the U.S., the agents are determined to tell the FBI, but a CIA official will not allow it.

MARK ROSSINI: I guess I was the more senior agent. So I went up to the individual that had the ticket on the Yemeni cell, the Yemeni operatives. And I said to her, I said, “What’s going on? You know, we’ve got to tell the Bureau about this. These guys clearly are bad. One of them, at least, has a multiple-entry visa to the U.S. We’ve got to tell the FBI.”

And then she said to me, “No, it’s not the FBI’s case, not the FBI’s jurisdiction.”

So I go tell Doug. And I’m like, “Doug, what can we do?” If we had picked up the phone and called the Bureau, I would have been violating the law. I would have broken the law. I would have been removed from the building that day. I would have had my clearances suspended, and I would be gone.

JAMES BAMFORD: This is one of the most astonishing parts of the story. The CIA had FBI operatives working within their bin Laden unit, but when the FBI operatives found out that one, and possibly two, of the terrorists had visas to the United States, were heading for the United States, the CIA wouldn’t let them tell their headquarters that they were coming. Only the FBI could have put out alerts to stop Khalid al-Mihdhar and Nawaf al-Hazmi if they tried to enter the United States.

NARRATOR: January 15, 2000, Los Angeles International Airport: United Airlines Flight 2 arrives from Bangkok, where the CIA lost al-Mihdhar and al-Hazmi’s trail. They pass through U.S. Immigration undetected. Within two weeks they move into the anonymity of a San Diego suburb.

MARK ROSSINI: The FBI put together this chronology as part of its investigation into the 9/11 attack. The timeline, the declassified copy, is the movements and the activities of the hijackers while they are in the U.S., hiding in plain sight.

NARRATOR: They get drivers licenses in their own names. They use a local bank to pick up international wire transfers from a known Al Qaeda finance chief. Their telephone number is even listed in the San Diego white pages: Alhazmi Nawaf M 858-279-5919.

JAMES BAMFORD: The CIA was forbidden from operating within the United States, and the FBI didn’t know they were here, so the only way to track the terrorists was if NSA continued to monitor the conversations as they called back to the house in Yemen.

NARRATOR: But nine days after al-Hazmi and al-Mihdhar arrive in California, the NSA has a catastrophic failure.

FRANK BLANCO: I remember getting a phone call on January 24, 2000, that began with, “We have a problem.” NSA systems had actually stopped working.

NARRATOR: The most technologically advanced intelligence agency in the world, capable of monitoring millions of simultaneous conversations, is deaf.

FRANK BLANCO: NSA was brain-dead. It took probably three to four, maybe even five days to bring everything back up the way it was.

NARRATOR: It is unclear whether, during those five days, NSA misses any calls from the hijackers in San Diego. But what is certain, as the FBI chronology spells out, is that the hijackers waste no time settling into their new neighborhood.

MARK ROSSINI: Here, as it says in the chronology: February 5, 2000: al-Mihdhar signed a lease to rent an apartment at 6401 Mount Ada Road, in San Diego.

February 25: Al-Mihdhar purchased a Toyota Corolla, in San Diego, California.

February 28: records at Progressive Insurance Company verify Al-Mihdhar’s insurance policy, number 604725921-0, Huggy Bear Insurance Corporation.

March 20: the San Diego telephone number associated with Nawaf al-Hazmi made a call, which lasted 16 minutes, to Yemen.

NARRATOR: That is one of many calls made from San Diego to bin Laden’s operations center, the house in Yemen that NSA has been monitoring for over three years. But NSA would not pass on that information to any other intelligence agency. Eleanor Hill investigated NSA’s role in 9/11 for Congress.

ELEANOR HILL (Staff Director, United States Congress 9/11 Committee): We were very surprised to learn that, you know, they had this information. And if there are contacts from known terrorists in the United States with terrorist facilities abroad, that’s exactly the kind of information our intelligence community needs to have. They didn’t have it.

MARK ROSSINI: You put the NSA intel and the FBI intel together, you have both sides of the conversation. So they come in, we follow them, find out where they’re going; listen to their homes, listen to their conversations at their home, or cell phone, whatever; emails. The possibilities are endless once you’re able to peer into someone’s life.

JAMES BAMFORD: Incredibly, the NSA never informed the FBI that these calls were coming from the United States, and we may never know why. No one from NSA will discuss it, and the 9/11 Commission never investigated it. They either didn’t realize the two terrorists were calling from the United States—which is hard to believe because even I have caller I.D., which shows where calls are coming from—or what’s more likely is that they ignored it because then they would have had to hand the contacts over to the FBI.

NARRATOR: April 12, 2000: almost three months after the hijackers arrive in the U.S., NSA director Michael Hayden hints at another possible explanation for NSA’s silence. Already warned by Congress to respect Americans’ privacy rights, Hayden responds to the House Intelligence Committee with extreme caution.

GENERAL MICHAEL HAYDEN (National Security Agency Director, 1999–2005): Let me put a fine point on this. If, as we are speaking here this afternoon, Osama bin Laden is walking across the Peace Bridge from Niagara Falls, Ontario, to Niagara Falls, New York, as he gets to the New York side, he is an American person. And my agency must respect his rights against unreasonable search and seizure, as provided by the Fourth Amendment to the Constitution.

JAMES BAMFORD: But General Hayden knew that the law permitted the agency to eavesdrop on the terrorists without interruption if they entered the United States.

MARK ROSSINI: You could link back who they were, their connection to bin Laden, the connection to the Yemeni house, et cetera. You could have gone to any court, any judge in the FISA court and say, “We want a FISA on that residence in San Diego.”

It would have been easy. And we would have surveilled them, and we would have learned more information. People who are going to watch this, they’re going to say, “Oh, it’s hindsight 20–20.” But, no, I’m not talking hindsight 20–20. I’m talking basic, logical investigation.

NARRATOR: Again, the FBI chronology, compiled after the 9/11 attacks, describes precisely how al-Mihdhar and al-Hazmi begin training for their 9/11 operation.

MARK ROSSINI: April 4, 2000: Nawaf al-Hazmi received one hour of introductory flight instruction from the National Air College, located at 3760 Glenn Curtis Road, San Diego.

May 4: Khalid al-Mihdhar debit card purchase: two Jeppesen training kits.

June 10, 2000: Al-Mihdhar departed U.S. via Lufthansa Flight 457 from Los Angeles, California to Frankfurt, Germany.

NARRATOR: Khalid al-Mihdhar is heading home to see a newborn son. For the next 13 months he will live with his wife and baby in the house in Yemen, the house NSA is monitoring. He will even apply for a new U.S. visa, and, incredibly, he will get it.

December 8, 2000: Hani Hanjour, another 9/11 hijacker, touches down in San Diego. Three days later he joins Nawaf al-Hazmi on a road trip to New Jersey, where the rest of the hijackers are assembling. Once more, the FBI chronology, compiled after the attacks, documents their five-month trip.

MARK ROSSINI: March 1, 2001: Hanjour has eight hours of simulator training at Jet Tech.

April 1: Nawaf al-Hazmi received a speeding ticket and received a summons for failure to wear a seatbelt.

May 1: Al-Hazmi filed a police report with Fairfax County, Virginia, police department, alleging he was mugged by an unknown black male.

NARRATOR: June 21, 2001: a reporter from the Middle East Broadcasting Corporation interviews bin Laden’s lieutenants in Afghanistan. They hint that a major attack may soon take place. U.S. forces in the Mideast are put on the highest alert.

After the interview is released, NSA’s traffic analysis detects a huge spike of threatening communications.

ELEANOR HILL: There was a great anticipation that there was going to be an attack on U.S. interests by Al Qaeda. Most people believed it was going to be overseas. And so, tragically, their focus was on their job, which was looking overseas and not so much on what was happening in the U.S., which they viewed as the FBI’s job.

MARK ROSSINI: As the chronology goes on: July 4, 2001: Al-Mihdhar entered the U.S. on Saudi Arabian Flight 53, via J.F.K., in New York City, using a B1 business visa and listing his intended address as the Marriot Hotel, New York City. That was the Marriot Hotel at the World Trade Center.

NARRATOR: To make final preparations for their attack, al-Hazmi, al-Mihdhar and Hanjour drive south on the New Jersey Turnpike. They avoid staying in large cities. They avoid hotel chains with computerized registration. Instead, the crew drives into the Maryland town of Laurel and checks in to the low-budget Valencia Motel. By now they have their final assignment, targeting the Pentagon.

JAMES BAMFORD: Throughout their whole journey, whether they were in San Diego or they were in New Jersey or they were in Laurel, Maryland, they were communicating back and forth to the bin Laden ops center in Yemen. NSA was listening in on the ops center, recording the conversations and then transcribing them. But the NSA never alerted any other agency that the terrorists were in the United States and moving across the country, towards Washington.

NARRATOR: On the face of it, Laurel, Maryland, looks like a typical Washington suburb.

JAMES BAMFORD: What’s very different is that this town happens to be right next door to NSA’s headquarters.

NARRATOR: While NSA has detected a spike in communications threatening an imminent attack, Bin Laden’s hit men have taken refuge right in their backyard.

MARK ROSSINI: August 18: Hani Hanjour rented mailbox number 433.

The day before the hijacking: Nawaf al-Hazmi, Walmart, $36.65; Food Factory, Khalid al-Midhar.

9/6/2001: Nawaf al-Hazmi, Khalid al-Midhar, Hani Hanjour: Gold’s Gym, Greenbelt, Maryland.

JAMES BAMFORD: The hijackers seemed to blend in very well. Even when they shopped for improvised weapons for the hijackings, they shopped in a Target Store just down the street from NSA. No one thought what they were doing was suspicious.

So here you have these two groups of people: one, the terrorists who were plotting the largest terrorist operation in U.S. history. And you have NSA, which had been listening to some of their phone calls for years. And now they are living side by side, neither of them knowing that the other is there.

What was really tragic is that if General Hayden had looked out his eighth floor window, west, towards Laurel, just two miles away, he could have almost seen the motel in which the hijackers were living. I mean, it’s one of the biggest ironies in the history of American intelligence.

NARRATOR: On the day of the 9/11 attacks, most of NSA’s employees are ordered to leave their headquarters. Afraid that NSA might be another target, some of the few who remain move from their upstairs offices to lower floors. Others tack up black curtains to block their windows. They seem to have no idea what their own agency and the CIA both knew but had said nothing about.

ELEANOR HILL: Had we been able to realize how significant that was, put it together and get it to the agencies who could have made use of it in time, would there have been a different end to the 9/11 story?

MARK ROSSINI: I can’t come up with a rational reason why I didn’t break the rules, pick up the phone, and tell that the hijackers, or really bad guys, are in the U.S. And I don’t know if I’ll ever be able to come to terms with that. I don’t know. I really don’t know.

MICHAEL HAYDEN: On the 13th of September, I gave an address to an empty room, but we beamed it throughout our entire enterprise, about free peoples always having to decide the balance of security and their liberties, and then I told the workforce, there are going to be a lot of pressures to push that banner down toward security, and our job at NSA was to keep America free by making Americans feel safe again.

NARRATOR: Those pressures aren’t long in coming. When Hayden is asked by Vice President Cheney what more NSA can do, he answers, “Not much, without breaking FISA laws,” the laws force that force NSA to obtain a warrant to listen in on Americans.

Three weeks after the attacks, President Bush bypasses those laws, by secretly issuing an executive order: NSA will no longer have to worry about obtaining warrants to eavesdrop inside America. If 9/11 was a wake-up call, the response is a license to listen to almost anything and everything.

TIM SAMPLE: And part of that wake-up call, certainly right after 9/11, included the fact that you needed to take some strict measures. You needed to take some action that would allow you to not let that happen again.

NARRATOR: But to make the new program work, Hayden must finally bring the National Security Agency into the modern age. The backbone of global communications had moved from easily intercepted satellite signals in space, to fiber optic cables buried under the ocean. To understand the challenge NSA faces, NOVA follows one email message as it circles the globe.

In Malaysia’s capital city of Kuala Lumpur, James Bamford is researching Al Qaeda’s communications network. In a busy cafe, he types out an email message to NOVA’s producers, in Boston. Bamford’s message is harmless but contains the kinds of keywords and phrases that NSA supercomputers are programmed to detect, phrases like “blow up the White House,” “destroy the Capitol building,” “biological warfare.”

When he presses “send,” Bamford’s message is instantly mixed in with dozens of other messages on the same wireless network, then routed to a large telecommunications center in the city. There, voice calls are converted from analog to digital signals and streamed, as pulses of light, through a fiber optic cable that dives into the South China Sea, off Malaysia’s Coast.

Along the way, Bamford’s message is merged with thousands of phone calls, emails and faxes, in dozens of languages, from hundreds of Asian cities. The jumble of data crosses under the Pacific Ocean at the speed of light.

Just five hundredths of a second after the message was sent, it comes ashore, six feet under this lonely stretch of California beach, near Morro Bay. There, beneath screeching gulls and surfers in wet suits, Asian communications stream in. A few miles inland, the message passes through a small, nondescript building near San Luis Obispo.

JAMES BAMFORD: If you want to tap into international communications, it seems like the perfect place is San Luis Obispo. That’s where 80 percent of all communications from Asia enters the United States.

NARRATOR: But under NSA’s new orders, they don’t tap in here. Instead the cables run straight from San Luis Obispo to a building in San Francisco.

The building, at 611 Folsom Street, is AT&T’s regional switching center. All the international traffic snakes up to the seventh floor, and it is here that a crucial change takes place. The seventh floor is also where AT&T’s domestic traffic is routed—a cacophony of millions of conversations: cries and laughter, hopes and dreams, emails, faxes, bank statements, hotel reservations, love poems and death notices, all sent by people from inside the United States. The only thing they have in common is a reasonable expectation of privacy.

NARRATOR: In 2003, an AT&T engineer notices that the cables on the seventh floor have been rerouted, and a mirror image of all the traffic, both domestic and international, is now being sent to a secret room one floor below.

MARK KLEIN (Former AT&T Technician): It was obvious that this was some kind of NSA installation. I figured out that what they were doing was a blind wholesale copying of the entire internet data flow. And this meant randomly scooping up huge amounts of purely domestic data, as well as international data.

BRIAN REID (Internet Systems Consortium): When I hear the word wiretap, I’ve always imagined some person in a trench coat and a black hat and sunglasses, skulking around after dark, secretly tapping into a wire and hoping that no one notices. But what they’ve done in that facility is by full light of day, they’ve cut the fiber optic cables and then reconnected them in a splitter. What they have built is a facility that is capable of monitoring absolutely all data communication through it.

NARRATOR: Brian Reid, a communications expert, has examined AT&T’s internal documents that Klein provided. They show that the secret room contains electronic equipment specifically designed for signals intelligence, equipment programmed to sift through millions of messages, searching for keywords like the ones Bamford sent from Kuala Lumpur.

BRIAN REID: The most curious piece of equipment in that room is a completely flexible monitoring system that can be told on a moment’s notice, “Please monitor all conversations that contain the word hummingbird. Please monitor all conversation that goes to Mobile, Alabama. Please monitor all conversations that contain both the word hummingbird and go to Mobile, Alabama.”

NARRATOR: NSA has turned its giant ear to listen in on America.

BRIAN REID: Based on everything I know, I believe that there are between 15 and 30 of these secret rooms around the U.S.

NARRATOR: The post-9/11 rules authorized NSA to listen in to Americans both inside and outside the U.S., without any special court approval.

ADRIENNE KINNE: After 9/11, we were essentially put in charge of a new system which intercepted satellite phone communications in Iraq and Afghanistan and surrounding areas.

NARRATOR: Calls and data from the Middle East and North Africa are collected and relayed to a listening post, tucked in the hills, outside Augusta, Georgia. As a voice interceptor, Adrienne Kinne listened to some of those calls. Assigned by the Army to NSA, she was called back to active duty after 9/11.

ADRIENNE KINNE: For a voice interceptor, the computer system would essentially pop up, and it would be very similar, I would say, to iTunes, where you could just go through and click on various conversations, and it would have the phone number, the time up, time down. We were told that we were to listen to all conversations that were intercepted, to include those of Americans and other allied countries.

NARRATOR: Some of those conversations are personal, some even intimate.

ADRIENNE KINNE: And there was no directive to say that when you had conversations like this come through, that you should delete them. That’s what we did when I was on active duty in ’94 to ’98. We would never collect on an American. I had a real problem with the fact that people were listening to it and I was listening to it. The time that that interceptor, that voice interceptor, is spending listening to conversations in the States, that’s time that they can’t spend looking or listening for actual conversations related to terrorist organizations.

NARRATOR: As NSA began tapping in to fiber optic cables as well as satellites, information began to flood in like never before.

According to a Congressional study in 2008, some intelligence data sources grow at a rate of four petabytes—that’s four quadrillion bytes—per month, the equivalent of 12 filing cabinets of new information for every American citizen, every year. But what does it all mean?

ERIC HASELTINE: Computers, today, tell people what things are: “Here’s some data that you asked for.” They don’t tell you what it means. So there is some work going on to try to marry the power of computers to the power of humans.

NARRATOR: Specialized software can help extract important information based on context and meaning. Dr. Robert L. Popp does advanced research on these kinds of programs, known as classifiers.

DR. ROBERT L. POPP: Say you wanted to build a classifier for Al Qaeda, the term, the concept, Al Qaeda. The way it would work is you, as an analyst, would go find all these documents—whether they’re emails or things on the web or whatever—but all these documents that in your judgment are narratives associated with the concept of Al Qaeda.

NARRATOR: In the future, by refining the software and harnessing enough computing power, these classifiers could potentially reduce the mountain of information human analysts have to examine.

ERIC HASELTINE: So the next frontier may be, “Computer, do you see any unusual associations that I didn’t think to ask you about that I ought to have asked you about when it relates to a threat against the homeland?”

NARRATOR: But most experts agree that may take decades. And it could only help mine information in documents, emails and faxes. When it comes to human conversations, technology is of little help. It still takes people wearing headphones and listening in.

DAVID MURFEE FAULK (Former National Security Agency Voice Interceptor): I decided, a couple weeks after 9/11, to enlist, and go do Arabic. And I hoped to go hunt Osama at that time.

NARRATOR: David Murfee Faulk was one of the thousands of new linguists trained to work in the trenches of NSA’s signals intelligence operations.

DAVID MURFEE FAULK: NSA spends literally billions of dollars to obtain signals, to process them, move them from place to place without people knowing, to get them to an end user, a translator who can make some sense of them and write up a transcription.

What I found was a large number of translators simply not meeting minimal requirements in language skills, basically running some very expensive, very complicated equipment, without the kind of knowledge or context that they would need to do that properly.

NARRATOR: Before 9/11, the budget for U.S. intelligence was $26.7 billion. By 2008 that budget nearly doubled. NSA’s portion is secret, but believed to be over a third, more than the departments of Treasury, Interior or Labor. Its ranks have swelled to over 35,000.

TIM SAMPLE: Given all the additional money spent now, on rebuilding the intelligence community and its capabilities, are we really safer as a nation? I think generally, for me, the answer is yes—the fact that we haven’t had another attack, the fact that we have better coordination and better information-sharing. Are we to the point where we can relax and put our guard down? No. I think if we do, then we run the risk of changing the answer.

ELEANOR HILL: It’s very, very hard to draw a hard and fast line between where foreign intelligence stops and domestic intelligence starts. That doesn’t mean we want our foreign intelligence agencies on every street corner in America. But it does mean that you have to have very good communication and coordination between the foreign intelligence agencies, like the CIA and NSA, and our domestic agencies, like the FBI,

because if you don’t, things are going to slip between the cracks. And that’s exactly what happened with 9/11.

JAMES BAMFORD: The problem with reporting on a story like this is that you’re really searching in the dark. There’s no way to sit on the outside and really know what’s going on on the inside.

And, without an official inquiry, some questions can’t be answered: Why did the NSA fail to act or pass on information that could have warned of 9/11? Why didn’t it share information with the CIA and FBI that could possibly have stopped the plot?

As for the question of whether we are any safer now than we were before, we should have been safe the way it was. NSA had all the information that it needed to stop the hijackers, and it already had laws that allowed it to track them. So now, with NSA’s new rules, with all the money it’s spent, with all the data it collects, is NSA doing a better job or is its job that much harder because it’s just being flooded with data? How much information is enough, and won’t too much information end up making the world more dangerous?

NARRATOR: On NOVA’s Spy Factory Web site, dig deeper into this topic, with original content including interactives, interviews and more. Find it on PBS.org.

This NOVA program is available on DVD. The companion book, The Shadow Factory, is also available. To order, visit shoppbs.org or call us at 1-800-PLAYPBS.

NOVA is a production of WGBH Boston.

SECRET AND SUPPRESSED: BANNED IDEAS AND HIDDEN HISTORY, edited by Jim Keith The ‘Frey Effect’ – Microwave Hearing ( The ability of certain parameters of EMF to cause health effects, including neurological and behavioral disturbances, has been part of the military and CIA arsenal for years. ) http://discover-time.blogspot.com/

http://www.stopthecrime.net/source.html

The ‘Frey Effect’ – Microwave Hearing
http://discover-time.blogspot.com/  
If eavesdropping on anything you say, write, or do could increase someone’s wealth or influence you are a potential target.
Saturday, November 5, 2011
Brainwashing
Link – Mind control (also known as brainwashing, coercive persuasion, mind abuse, thought control, or thought reform) refers to a process in which a group or individual: systematically uses unethically manipulative methods to persuade others to conform to the wishes of the manipulator(s), often to the detriment of the person being manipulated.
The term has been applied to any tactic, psychological or otherwise, which can be seen as subverting an individual’s sense of control over their own thinking, behavior, emotions or decision making.
Posted by Astrology Email at 4:08 PM No comments:
Monday, August 29, 2011
Eavesdropping Detection Solutions
http://www.tscm-za.com/oscorgreen.html

http://www.pimall.com/nais/e.omni.html

http://www.tscm.com/TSCM101tutorials.html

http://tscm.com/bugfrqVLF.html

Posted by Astrology Email at 10:15 AM No comments:
Monday, August 22, 2011
Timeline History of NSA
Link – National Security Agency (NSA), an independent agency within the U.S. Dept. of Defense. Founded by presidential order in 1952, its primary function is to encode and decode communications intelligence and to protect U.S. signals and information systems.

The NSA includes the Central Security Service, established in 1972 to promote a full partnership between the NSA and the cryptological elements of the armed forces, and the National Cryptologic School.
The agency, which is headquartered in Fort Meade, Md., is the largest employer of mathematicians in the country. Its director must be a military officer. For many years the NSA was the most hidden of U.S. intelligence agencies; its large budget was secret and its existence barely acknowledged.
The mission of its Information Systems Security department (INFOSEC) is to protect classified and sensitive information stored on government computers or networks.
J. Bamford, The Puzzle Palace (1982) & Body of Secrets (2001)
Wiki – James Bamford
Bamford, James (1982). The Puzzle Palace: a Report on America’s Most Secret Agency. Houghton Mifflin. ISBN 0140067485.
Bamford, James (2001). The Puzzle Palace: Inside the National Security Agency, America’s Most Secret Intelligence Organization. Viking Pr. ISBN 0140231161.
Bamford, James (April 30, 2002). Body of Secrets: Anatomy of the Ultra-Secret National Security Agency. Anchor. ISBN 0385499086.
Bamford, James (May 10, 2005). A Pretext for War: 9/11, Iraq, and the Abuse of America’s Intelligence Agencies. Anchor. ISBN 140003034X.
Bamford, James (September 16, 2008). The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America. Doubleday. ISBN 0385521324.
Posted by Astrology Email at 4:57 AM No comments:
Alternative Futures: You Are Nodes For The SEAS Program
US Military Psychological Operations Video Link Alternative Futures

Background US Psychological Operations used domestically: covers Rumsfeld’s Information Operations Roadmap – Link and current Pentagon plans to create a digital “parallel universe” to test PSYOP.

EXCERPT – ARTICLE
Sentient World Simulation (SWS) is a computer-based project designed to “generate alternative futures” and no surprise, the US Defense Department is actively involved.

According to one of the project’s developers, Purdue University professor Alok Chaturvedi, “SWS consists of a synthetic environment that mirrors the real world in all it key aspects – Political, Military, Economic, Social, Information, and Infrastructure.” The goal is to copy each person on earth into the SWS parallel universe, and then see how they respond to external events such as natural disasters or political upheavals.
Sidebar: every brain has its own unique (fingerprint) radio frequency signal – Link
The concept paper Chaturvedi co-authored additionally notes, “SWS provides an environment for testing Psychological Operations (PSYOP),” to help the military “develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners.”
Blurring the lines between military and civilian Psychological Operations is nothing new. In 1989, US forces in Panama blasted Guns N’ Roses’ “Welcome to the Jungle” into the Vatican Embassy during negotiations for the handover of General Manuel Noriega, and from 1998-1999, US military PSYOP personnel interned at both CNN and NPR.

More recently, a 2003 Pentagon document called Information Operations Roadmap detailed the US military’s approach to exploiting information in order to “keep pace with warfighter needs and support defense transformation.” Personally approved by former Defense Secretary Rumsfeld, the document was declassified in 2006 and covers everything from the Pentagon’s plans for Computer Network Attack (“We Must Fight the Net”) to beefing up the use of Psychological Operations (“We Must Improve PSYOP”) to manipulating information through means including: “Radio/ TV/Print/ Web media designed to directly modify behavior and distributed in theater supporting military endeavors in semi or non-permissive environment.”

Sentient World: On The Grandest Scale

Wiki – Synthetic Environment

SEAS LAB

Social Simulation

Link – Document

Air Power

Psyops

Psywarrior

NOVA | The Spy Factory | PBS Video Link

http://www.pbs.org/wgbh/nova/spyfactory/
In The Spy Factory, an eye-opening documentary on the National Security Agency (NSA) by best-selling author James Bamford and Emmy Award-winning producer Scott Willis, NOVA exposes the ultra-secret intelligence agency’s role in the failure to stop the 9/11 attacks and the subsequent eavesdropping program that listens in without warrant on millions of American citizens.

NOVA The Spy Factory Part One
Part Two
Part Three
Part Four
Part Five
Part Six
Part Seven

Posted by Astrology Email at 1:24 AM No comments:
Tuesday, August 2, 2011

Home Link: http://gop-astrology.blogspot.com

Link
The ‘Frey Effect’ – Microwave Hearing
Astrology Analysis
by
Mark Andrew Holmes

Posted by Astrology Email at 8:26 AM No comments:
Friday, July 22, 2011
LINK

– LINK Advanced Security

SECRET AND SUPPRESSED: BANNED IDEAS AND HIDDEN HISTORY, edited by Jim Keith

There had been an ongoing controversy over health effects of electromagnetic fields (EMF) for years (e.g., extremely low frequency radiation and the Navy’s Project Seafarer; emissions of high power lines and video display terminals; radar and other military and industrial sources of radio frequencies and microwaves, such as plastic sealers and molders.) Less is known of Department of Defense (DOD) and Central Intelligence Agency (CIA) interest in anti-personnel applications of the invisible energies. The ability of certain parameters of EMF to cause health effects, including neurological and behavioral disturbances, has been part of the military and CIA arsenal for years.

Capabilities of the energies to cause predictable and exploitable effects or damages can be gleaned from discussion of health effects from environmental exposures. Interestingly, some scientists funded by the DOD or CIA to research and develop invisible electromagnetic weapons have voiced strong concern (perhaps even superior knowledge or compensatory to guilt) over potentially serious consequences of environmental exposures.

Eldon Byrd who worked for Naval Surface Weapons, Office of Non-Lethal Weapons, was commissioned in 1981 to develop electromagnetic devices for purposes including “riot control,” clandestine operations and hostage removal. In the context of a controversy over reproductive hazards to Video Display Terminal (VDT) operators, he wrote of alterations in brain function of animals exposed to low intensity fields. Offspring of exposed animals “exhibited a drastic degradation of intelligence later in life… couldn’t learn easy tasks… indicating a very definite and irreversible damage to the central nervous system of the fetus.” With VDT operators exposed to weak fields, there have been clusters of miscarriages and birth defects (with evidence of central nervous system damage to the fetus). Byrd also wrote of experiments where behavior of animals was controlled by exposure to weak electromagnetic fields. “At a certain frequency and power intensity, they could make the animal purr, lay down and roll over.”

Notorious Jose Delgado, advocate of a psycho-civilized society through mind control, no longer implants electrodes in the brains of mental patients and prisoners; he now induces profound behavioral changes (hyper-activity, passivity, etc.) by exposing animals to precisely tuned EMFs. He has also written of genetic damage produced by weak EMF fields, similar to those emitted by VDTs. Invariably, brain tissue damage and skeletal deformation was observed in new born chicks that had been exposed. He was concerned enough to check emissions from the appliances in his kitchen.

Ross Adey induces calcium efflux in brain tissue with low power level fields (a basis for the CIA and military’s “confusion weaponry”) and has done behavioral experiments with radar modulated at electroencephalogram (EEG) rhythms. He is understandably concerned about environmental exposures within 1 to 30 Hz (cycles per second), either as a low frequency or an amplitude modulation on a microwave or radio frequency, as these can physiologically interact with the brain even at very low power densities.

Microwaves
Microwave health effects is a juncture where Department of Defense and environmental concerns collide and part ways.

Security concerns, according to Sam Koslov of Defense Advanced Research Projects Agency (DARPA), first prompted U.S. study of health effects of low intensity (or non-thermal) microwaves. At times, up to 70-80% of the research was funded by the military. From 1965 to 1970, a study dubbed Project Pandora was undertaken to determine the health and psychological effects of low intensity microwaves, the so-called “Moscow signal” registered at the American Embassy in Moscow. Initially, there was confusion over whether the signal was an attempt to activate bugging devices or for some other purpose. There was suspicion that the microwave irradiation was being used as a mind control system. CIA agents asked scientists involved in microwave research whether microwaves beamed at humans from a distance could affect the brain and alter behavior. Dr. Milton Zarat who undertook to analyze Soviet literature on microwaves for the CIA, wrote: “For non-thermal irradiations, they believe that the electromagnetic field induced by the microwave environment affects the cell membrane, and this results in an increase of excitability or an increase in the level of excitation of nerve cells. With repeated or continued exposure, the increased excitability leads to a state of exhaustion of the cells of the cerebral cortex.”

Employees first learned of the irradiation ten years after Project Pandora began. Before that, information had been parcelled out on a strict “need to know” basis, which excluded most employees at the compound. Due to secrecy, and probably reports like Dr. Zaret’s, Jack Anderson speculated that the CIA was trying to cover up a Soviet effort at behavior modification through irradiation of the U.S. diplomats, and that the cover up was created to protect the CIA’s own mind control secrets.

Finally, an unusually large number of illnesses were reported among the residents of the compound. U.S. Ambassador Walter Stoessel developed a rare blood disease similar to leukemia; he was suffering headaches and bleeding from the eyes. A source at the State Department informally admitted that excessive radiation had been leaking from his telephone; an American high frequency radio transmitter on the roof of the building had, when operating, induced high frequency signals well above the U.S. safety standard through the phones in the political section, as well as in lines to Stoessel’s office. No doubt, National Security Agency or CIA electronic devices also contributed to the electromagnetic environment at the embassy, although values for these were never released, as they are secret. Stoessel was reported as telling his staff that the microwaves could cause leukemia, skin cancer, cataracts and various forms of emotional illness. White blood cell counts were estimated to be as high as 40% above normal in one third of the staff, and serious chromosome damage was uncovered.

The Soviets began research on biological effects of microwaves in 1953. A special laboratory was set up at the Institute of Hygiene and Occupational Diseases, Academy of Medical Sciences. Other labs were set up in the U.S.S.R. and in Eastern Europe that study both effects of microwaves and low frequency electromagnetic radiation.

Years ago, in the halls of science, complaints could be heard that Soviet experiments regarding bio-effects couldn’t be duplicated due to insufficient details in their scientific literature, although, according to one DOD official, 75% of the U.S. papers on the subject carried insufficient parameters for duplication. Scientists even questioned, with McCarthy like sentiments, whether the Soviets were attempting to frighten or disinform with false scientific reporting of bio-effects. It was unthinkable, according to cruder scientific theory, that non-thermal levels of microwaves could cause harm. Impetus for a study of such effects came not from concern for the public, but rather in the military and intelligence community’s suspicion of the Soviets, and their equally strong interest in developing exploitable anti-personnel effects – an interest that continues unabated today.

The CIA and DOD “security” concerns metamorphosized into research and development of invisible weapons capable of impacting on health and psychological processes. In fact, due to the finding of startling effects, DARPA’s security became even tighter, and a new code name – “Bizarre” – was assigned to the project.

Military Disinformation
Scientist Allen Frey of Randomline, Inc. was always more interested in low intensity microwave hazards: thermal effects were known. During Project Pandora, the Navy funded such projects of his, as how to use low average power intensities, to: induce heart seizures; create leaks in the blood brain barriar, which would allow neurotoxins in the blood to cross and cause neurological damage or behavioral disorders; and how to produce auditory hallucinations or microwave hearing, during which the person can hear tones that seem to be coming from within the head or from directly behind it.

In 1976, the Defense Intelligence Agency (DIA) released a report in which they attributed the results of Dr. Frey’s studies to the Soviets. According to Dr. Frey, who acknowledges that his work was misattributed, he had thought up the projects himself. The DIA, but not the CIA, is allowed to use “mirror imaging” and “net assessment” in their reports, ie., respectively, the attribution of one’s own motives and weapons capabilities to “the other side”, in this case, the Soviets. It follows, that there is nothing to prevent them from releasing a report prepared in this manner, and thus muddy the water of decision making, pervert public opinion, stoke up congressional funding or enlist the support of naive scientists to counter “the threat”. There was strong convern over CIA disinformation abroad, leaking back to the home front, through the American press, but apparently the DIA, at least on some issues, can dish it up with impunity.

Dr. R.O. Becker, twice nominated for the Nobel prize for his health work in bio-electromagneticsm, was more explicit in his concern over illicit government activity. He wrote of “obvious applications in covert operations designed to drive a target crazy with “voices.” The 1976 DIA report also credits the Soviets with other capabilities, stating, “Sounds and possibly even words which appear to be originating intercranially can be induced by signal modulations at very low power densities.” Dr. Sharp, a Pandora researcher at Walter Reed Army Institute of Research, some of whose work was so secret that he couldn’t tell his boss, conducted an experiment in which the human brain has received a message carried to it by microwave transmission. Sharp was able to recognize spoken words that were modulated on a microwave carrier frequency by an “audiogram”, an analog of the words’ sound vibrations, and carried into his head in a chamber where he sat.

Dr. James Lin of Wayne State University has written a book entitled, Microwave Auditory Effects and Applications. It explores the possible mechanisms for the phenomenon, and discusses possibilities for the deaf, as persons with certain types of hearing loss can still hear pulsed microwaves (as tones or clicks and buzzes, if words aren’t modulated on). Lin mentions the Sharp experiment and comments, “The capability of communicating directly with humans by pulsed microwaves is obviously not limited to the field of therapeutic medicine.”

What is frightening is that words, transmitted via low density microwaves or radio frequencies, or by other covert methods, might be used to create influence. For instance, according to a 1984 U.S. House of Representatives report, a large number of stores throughout the country use high frequency transmitted words (above the range of human hearing) to discourage shoplifting. Stealing is reported to be reduced by as much as 80% in some cases. Surely, the CIA and military haven’t overlooked such useful technology.

Dr. Frey also did experiments on reduction of aggression. Rats who were accustomed to fighting viciously when their tails were pinched, accepted the pinching with relative passivity when irradiated with pulsed microwaves in the ultra high frequency rage (UHF) at a power density of less than 1,000 microwatts/cm^2. He has also done low intensity microwave experiments degrading motor coordination and balance. When asked about weapons applications of his work, he answered by referring to himself as “just a biological theorist”, and his work for the Navy, “basic medical research.”

Lies Before Congress
In 1976, George H. Heilmeier, director of Defense Advances Research Projects Agency (DARPA) responded to a mailgram to President Ford from Don Johnson of Oakland, paraphrasing Johnson’s concern, and assuring him that the DARPA sponsored Army/Navy Pandora experiments were “never directed at the use of microwaves as a surveillance tool, nor in a weapons concept.” Don Johnson lingered in the memory of one DOD official who sponsored microwave research in the 1970s. Johnson was enigmatically described as “brilliant… schizophrenic… he knew too much… a former mental patient… buildings where work was done.” (Scientists who have disagreed with the DOD on health effects of microwaves and on the U.S. exposure standard, have received scant more respect and have had their funding cut.)

The next year, Heilmeier elaborated in a written response to an inquiry before Congress. “…This agency [DARPA] is not aware of any research projects, classified or unclassified, conducted under the auspices of the Defense Department, now ongoing, or in the past, which would have probed possibilities of utilizing microwave radiation in a form of what is popularly known as ‘mind control.’ We do not foresee the development, by DARPA of weapons using microwaves and actively being directed toward altering nervous system function or behavior. Neither are we aware of any of our own forces… developing such weapons…”

Lies Exposed
Finally, memoranda were released that rendered the goals of Pandora transparent. Richard Cesaro, initiator of Pandora and director of DARPA’s Advanced Sensor program, justified the project in that “little or no work has been done in investigation of the subtle behavioral changes which may be evolved by a low-level electromagnetic field.” Researchers had long ago established that direct stimulus of the brain could alter behavior. The question raised by radio frequencies – microwaves or radio frequencies of the UHF or VHF band – was whether the electromagnetic could have a similar effect at very low levels. Pandora’s initial goal: to discover whether a carefully constructed microwave signal could control the mind. In the context of long term, low-level effects: Cesaro felt that central nervous system effects could be important, and urged their study “for potential weapons applications.” After testing a low-level modulated microwave signal on a chimpanzee, and within approximately a week causing stark performance decrements and behavioral disorganization. Cesaro wrote, “the potential of exerting a degree of control on human behavior by low-level microwaves seems to exist.” On the basis of the primate study, extensive discussions took place and plans were made to extend the studies to humans.

According to a former DOD security analyst, one such microwave experiment with human subjects took place at Lorton Prison in the early 1970s. He said that such research (in a weapons context) has occurred on behavioral effects of microwaves since 1976. He also asked, “Why are you so concerned about then? What about now? They can call anyone a terrorist. Who are they using it on now?”

Behavioral Effects
In June, 1970, a government think tank, Rand Corporation, published a report by R.J. MacGregor, entitled “A Brief Survey of Literature Relating to Influence of Low Intensity Microwaves on Nervous Function.” After noting that the U.S. microwave guideline in effect in 1970 for the public, 10,000 microwatts/^2 (now the industrial and military “guideline”), is proscribed from consideration of the rate that thermal effects are dissipated, the author, a specialist in modeling neural networks, states that scientific studies have consistently shown that humans exhibit behavioral disturbances when subjected to non-thermal levels of microwaves, well below this level. The symptoms that MacGregor lists for those humans exposed more or less regularly at work or in the living environment are insomnia, irritability, loss of memory, fatigue, headache, tremor, hallucination, autonomic disorders and disturbed sensory funtioning. He reports that swelling and distention of nerve cells have been produced at intensities as low as 1,000 microwatts/cm^2 (the current U.S. guideline for the public).

In a companion Rand paper, June, 1970, entitled “A Direct Mechanism for the Direct Influence of Microwave Radiation on Neuroelectric Function,” MacGregor sets forth the idea that the electrical component of microwave radiation induces transmembrane potentials in nerve cells and thereby disturbs nervous function and behavior.

Microwaves penetrate and are absorbed more deeply so that they can produce a direct effect on the central nervous system. With smaller wave lengths the principal absorption occurs near the body surface and causes peripheral or “lower” nervous system effects.

Dr. Milton Zaret who analysed neurological effects for the CIA during Project Pandora (he is now one of the few doctors willing to take the government on by testifying on behalf of plaintiffs filing claims for microwave health damage), wrote that, “receptors of the brain are susceptible and react to extremely low intensities of microwave irradiation if this is delivered in accordance with appropriate “coding.” Coding is reported to be influenced by the character of the signal so as to be a function, for example, of the shape and amplitude of the pulse or waveform.

Remotely Reinforcing Specific Brain Rhythms
Dr. Ross Adey, formerly of the Brain Research Center at University of Southern California, Los Angeles, now at Loma Linda University Medical School, Loma Linda, California, was among the first of the Pandora researchers. His work is more precise in inducing specific behavior, rather than merely causing disorganization or decrements in performance -that is, apart from his studies on inducing calcium efflux in brain tissue, which causes interference with the fucntioning of the brain and is one basis of “confusion weaponry.”

More specifically, Adey’s thesis is that if the electroencephalogram (EEG) has informational significance, one can induce behavioral changes if one imposes environmental fields that look like EEG. During Adey’s career, he has correlated a wide variety of behavioral states with EEG, including emotional states (e.g., stress in hostile questioning), increments of decision making and conditioning, correct versus incorrect performance, etc., and he has imposed electromagnetic fields that look like EEG, which has resulted in altered EEG and behavior.

In published accounts of Adey’s work, he has shown that it is possible to apply low biologic frequencies by using a radio frequency carrier modulated at specific brain frequencies. He demonstrated that if the biological modulation on the carrier frequency is close to frequencies in the natural EEG of the subject, it will reinforce or increase the number of manifestations of the imposed rhythms, and modulate behavior.

The conditioning paradigm: animals were trained through aversion to produce specific brain wave rhythms; animals trained in a field with the same rhythm amplitude modulated on it, differed significantly from control animals in both accuracy and resistance to extinction (at least 50 days versus 10 in the controls). When the fields were used on untrained animals, occurrence of the applied rhythm increased in the animals’ EEG.

Dr. Adey is an accomplished scientist, which leads one to believe the significance of this experiment goes beyond mere reinforcement of the animal’s brain waves. Did the rhythms that he chose to apply have special significance with relation to information processing or conditioning? The 4.5 theta rhythm that he applied was the natural reoccuring frequency that he had measured in the hippocampus during a phase of avoidance learning. The hippocampus, as Adey wrote in an earlier paper, “…involves neural processes connected with consolidation of memory traces. It relates closely to the need for focusing attention, and the degree to which recapitulation of past experience is imposed.” One might add, to ensure survival.

Does it follow that an EEG modulated carrier frequency can be used to enhance human avoidance learning? You bet, provided the same careful procedures are followed with humans as were with animals, the same result would accrue. Recall again the goals of Pandora – to discover whether a carefully constructed electromagnetic signal could direct the mind.

The obvious question becomes, how many and with how much accuracy can behavioral states or “frames of mind” be intentionally imposed, that is, apart from the certain technological capability to promote disorganization and degradation of perception and performance through use of the fields.

In fact, many components of learning or conditioning including affect (i.e., “feeling” or emotional states) can be imposed through use of the fields from a distance. E.g., behavioral arousal, orienting reflex, subliminal stress (alarm reaction without realization of the contextual significance), so-called levels of consciousness, inhibition of cerebral functions, which would render one more susceptible to suggestion or influence, and so on. All components necessary to produce behavioral conditioning, including ways to provide contextual significance, can be applied from a distance (i.e., without direct brain contact, as was necessary in older behavior modification experiments.)

Applications
The end of Project Pandora may have signified the end of research into the cause of effects of the varying frequencies registered at the American embassy in Moscow – some known to be due to CIA and National Security Agency equipment, but interest in microwave and biological frequency weapons did not wane. Indeed, there are indications of applications. As we have seen, research that began in response to a security concern, transformed almost overnight into a search for weapons applications, while cloaked in disinformation about the Soviets. What types of weapons?

There Are Three Possibilities:
(1) that microwaves, perhaps modulated with low biological frequencies, are used from a distance to cause performance decrements and disorganization by interfering with neuro-electric function; or by causing central nervous system effects, subjective feelings of ill health, or health syndrome associated with periodic exposures at intensities below 10,000 microwatts/cm^2;

(2) that microwaves are used to create organ specific effects, e.g., tissues with less blood circulation, like the gall bladder, lens of the eye, etc., can compensate less to increased heating; heart disfunctions can be caused; lesions or necrosis of internal tissues can be induced without a subject necessarily feeling heat, and symptoms might manifest later, at certain frequencies, slight heating or “hot spots” can be created at the center of the head; there is an ongoing Navy contract to find parameters to disrupt human metabolic functions; or

(3) that they are used in an interdisciplinary approach to remote conditioning by creating information processing effects, as Dr. Adey’s work shows, or to induce “feeling” or “emotional” elements of cognition, such as excitatory reactions, subliminal stress, behavioral arousal, enhanced suggestibility by inhibition of higher functions, or various other EEG or behavioral effects.

There are strong indications that microwaves have been used to cause the decrements. There is no question but that the U.S. military and the CIA know the behavioral or psycho-active significance of applied biological rhythms and other frequencies, as this was part of the thrust of their work during Pandora. Inducing emotion or feelings through use of electromagnetic fields, and then sychronizing the feelings with words (symbolic of ideas) would be an effective way to induce preferences or attitude change, because it would mirror natural thought processes. The question seems less whether conditioning through use of covert technology is possible, than whether there has been a policy choice to use it. If the results of their research are used as part of a system that can condition behavioral responses from a distance, it is a secret that they hold close like a baby.

Richard Helms wrote of such a system in the mid-1960s while he was CIA Plans Director. He spoke of “sophisticated approaches to the ‘coding’ of information for transmittal to population targets in the ‘battle for the minds of men’…” and of “an approach integrating biological, social and physical-mathematical research in attempts… to control behavior.” He found particularly notable, “use of modern information theory, automata theory, and feedback concepts… for a technology for controlling behavior… using information inputs as causative agents.” Due to Project Pandora, it is now known that applied biological (and other) frequencies can also be used as direct “information inputs” (e.g., of feeling or emotion) and to reinforce brain rhythms associated with conditioning and information processing. One way to get such a signal into a human may be through use of a high frequency carrier frequency. Results of research into information processing, unconscious processes, decision making, memory processes and evoked brain potentials would likely be expolited or integrated in an interdisciplinary system.

Covert technological influence is not so foreign to the American way of life as one may think. It was reported in a 1984 U.S. House of Representatives hearing that high frequency audio transmissions are applied, for instance, in some department stores to prevent theft (one East Coast department store chain was reported to have saved $600,000 over a nine-month period), and in some grocery stores with the result that employee induced cash shortages significantly decreased and employees are better mannered. In other words, as Helms wrote of, verbal messages are delivered at frequencies above human hearing. Technology for commercial applications is relatively sophisticated (one studio uses a “layered” approach and 31 channels in preparing tapes; some employ a “dual coding” approach, integrating scientific knowledge of information processing modes of the two brain hemispheres, and others use techniques where a consumer is spoken to as a three year old child.) There is no U.S. law specifically regulating these types of transmission (over radio and TV a Federal Communication Commission “catch all” provision might apply). If industry uses indetectable audio transmissions to meet security concerns, it seems that the military and CIA would exploit the same technology and would have developed much more sophisticated technology for applications. The public’s conception of “subliminals” is naive compared to capabilities.

It seems reasonable to conclude that to the extent that such an approach exists to manipulate behavior, “defensive” applications would consist of applying it wherever a potential threat exists or to counter a threat. For instance, Central America is an area where those in officialdom keenly feel the “threat of Soviet domination.” If there is technology available that could conceivably influence Central Americans toward the Soviets, then the U.S. would use the same kind of technology to “even the score.” The same is true within the U.S.; if covert technological influence might be had against Americans, the same feared technology would be applied to counter the threat. Special security risks might include peace groups, whom are felt to be threatened by Soviet influence (a big security concern in Western Europe and in the U.S.), progressives, or any group or individual felt to pose a challenge to U.S. goals subsumed under the rubric of “national security interest.”

Given the nature and dubious goals of lumbering military inertia, and circuitous CIA “mirror logic”, leads one to the conclusion that “defending” against possible or actual attempts to manipulate behavior means moving to the offensive, and perhps, having the “edge” with applications. Possible or actual threats, according to tenets of military and intelligence craft, means “the other side” has the technology if the United States does. Also, it would be too difficult to monitor behavior altering transmissions and to defend against them. Short of exposing such technology there would be no way to defend except by having one’s own “system” (of behavioral patterns consisting of a set of signals signifying “yes” and “no,” or “good” feeling and “bad” feeling that can be linked to ideas). Recall that apart from Project Pandora, the CIA spent decades during MKULTRA and related projects, devising operational techniques to surreptitiously influence and affect behavior. Workable invisible weapons are too useful for arms control talks, and don’t readily lend themselves to proofs of use or “verification” processes. Additionally, the importance of finding ways to circumvent dissent may have been one of the most significant lessons of Vietnam.

Over the counter audio aside, the military has studied and considered for usefulness in a warfare and psychological warfare context a wide range of biologicals or pharmacological substances. In the memo referred to above, Helms wrote that the U.S. is five years ahead of the Soviets in pharmacological agents producing behavioral effects. Some of these substances would increase susceptibility to influence if incorporated in the multidisciplinary approach he wrote of. For difficult subscribers, perhaps in foreign parts, there are substances that have psychological or psychobiological effects ranging from subtle through devastating, and that cause increased susceptibility to conditioning. Some of these substances are similar to ones which are recognized by neurotoxicologists or behavioral toxicologists as occupational hazards; some are variations of substances used experimentally in laboratories to produce selective damage in certain neuronal tracts. Many substances needn’t be injected or orally ingested, as they may be inhaled or applied with “skin transferral agents,” i.e. chemicals like the popular industrial solvent, dimethylsulphoxide (DMSO), which can, in fact, enhance the applied substance’s effect. For instance, some compounds cause damage that produces increased sensitivity to stimulus, distraction (or flooding of thought associations), and enhance susceptibility to influence. I.e., a state where automatic parallel information processing, which usually takes place outside of awareness, and interferes with conscious or more intentional limited channel processing. While causing acute mental symptoms wouldn’t be the goal in groups, producing mild distraction, an ego weakened blurring between the sense of “I” and “you”, would enhance some kinds of conditioning and promote suggestibility; then, perhaps transmitted “thought associations,” “the voice of God”, “lucky advice” or whatever, can more easily get through and have an effect. A side effect of lowered resistance to sub-threshold stimulus might be that some would become aware of illicit influence (even under normal circumstances there is a wide variation in sensitivity among individuals to sub-threshold stimulus; normal individuals whom psychology terms “reducers” are much more sensitive in this way; actually, most schizophrenics are extreme reducers, and therefore, much more aware of stimulus that others aren’t cognizant of). Convenient to the agencies involved in covert influence, is that among primary syptoms of schizophrenia or mental illness are ideas that one is being influenced by “transmissions” (e.g. radio frequencies), “voices” or even telepathy; unless complaints about covert psychological weapons are well organized, they would tend to be discounted as indicative of mental imbalance.

There are many ways to create temporary or permanent staes that increase receptivity to suggestion and/or conditioning. It is interesting to note that scientific studies have correlated exposure to electromagnetic fields alone with mental hospital admissions and worsening of symptoms of mental patients, even as an etiological factor in the onset of mental illness. (A marker disease for exposure to microwaves is damage behind the lens of the eye; a disproportionate number of persons so damaged also suffer from mental disease or neurological impairment.)

The CIA is also interested in neuropeptides; these have profound effects when administered within a conditioning paradigm.

Specific Targets
Weapons against whom? Safe to say, in order to enlist the aid of scientists, the military and CIA would act true to form, that is, to motivate and overcome reluctance due to dictates of conscience, they would evoke a serious security risk, like the Soviets, during initial phases of development. In fact, on the “unclassified” face of it, a number of reports have openly suggested use of “microwaves” against “terrorists”.

Los Alamos National Laboratory, now under supervision of University of California, prepared a report for Federal Emergency Management Agency (FEMA) setting forth that use of microwave radiation on terrorists could kill them, stun them or at least modify their behavior by changing their “perceptions.” At this point the cloak is donned, and the report continues: “There are reports of Eurasian communist countries performing research with combined fields of signals from several different microwave frequencies to produce at least perceptual distortions in humans.”

Cable News Network recently aired a report on electromagnetic weapons and showed an official document that was a contingency plan to use electromagnetic weapons against terrorists. It wasn’t made clear who the terrorists were or what the contingency was. Prior to the news show, however, reports had surfaced, the source a DOD medical engineer, that in the content of conditioning, microwaves and other modalities had regularly been used against Palestinians.

It makes sense that the Palestinians would be targeted as a group for experimental purposes and to meet strategic goals. For instance, to exacerbate discord between political factions, a “bad feeling” (biologically uncomfortable or threatening) would simply be associated through use of sound with the idea of the “other” faction. It is an easy psychological trick to induce negative attribution (where a “bad feeling” is caused to be misattributed to something in our environment): feeling, followed close in time with information input will color a thought, and become a conditioned emotional response (CER) if repeated. An excitatory autonomic reation requires a cognitive appraisal or “labelling” of the inducing cause. Both the autonomic reaction and the labelling can be transmitted from a distance using electromagnetic fields, like radio frequencies or microwaves and “sound.”

Specific frequencies at low intensities can predictably influence sensory processes. Feeling: pleasantness – unpleasantness, strain – relaxation, and excitement – quiescence, can be created with the fields. Negative feelings and avoidance are strong biological phenomena and relate to survival. Feelings are the true basis of much “decision-making” and often occur as sub-threshold impressions. Anger and other negative feelings are easy to cause to be displaced, and most people believe in the “trueness” of their feelings. Ideas including names can be synchronized with the the feelings that the fields can induce.

Greenham Common
Rather than belabor the obvious, for when DOD develops a weapon it can be said with certainty that it will be tested and, if possible, where it would be useful to meet their goals; another example will put motives and, at least, one type of application in more realistic perspective.

Women peace activists have kept an ongoing vigil at the periphery of the U.S. Air Force base at Greenham in England since 1981. They are protesting build-up of nuclear weapons. The U.S. Cruise missiles, which are nuclear warheads small enough to be mounted on the back of a truck called a launcher vehicle, arrived at the base in March, 1984. Since then the women in the encampment and members of the Cuisewatch network have insured that when the launcher vehicle and its convoy are taken out into the British countryside, the “dispersal exercises” aren’t as secret as the military intended them to be. The women of the network, non-violent activists, have been subjected to intense harassment in an effort to be rid of their presence.

In the Fall of 1984, things changed dramatically; many, if not most of the women began suffering illness; and, simultaneously, the massive police and military presence at the base virtually disappeared, and new and different antenna were installed at the base. In a report prepared by Rosalie Bertell, commissioner for International Commission of Health Professionals for Human Rights, a non-governmental organization based in Geneva, Switzerland, the unusual patterns of illness ranged from “severe headaches, drowsiness, menstrual bleeding at abnormal times or post-menopausal, to bouts of temporary paralysis, faulty speech coordination and in one case apparent circulatory failure requiring hospitalization.”

Other symptoms documented by peace activist Kim Bealy, who coordinates investigations into reports of illness at specific places around the base, included; vertigo, retinal bleeding, burnt face (even at night), nausea, sleep disturbances and palpitations. Psychbological symptoms included lack of concentration, disorientation, loss of memory, irritability and a sense of panic in non-panic situations. The symptoms have virtually all been associated in medical literature with exposure to microwaves and most listed can be induced through low intensity or non-thermal exposures.

Measurements were taken around the base by members of Electronics for Peace and by others. Strong signals, up to one hundred times the normal background level were detected on a number of occasions. In fact, signals ten times stronger than those felt to be emanating from normal base transmitting systems were found.

The strongest signals generally appeared in the areas where the women said that they suffered ill effects. For instance, they were found to cover the women’s encampment near the “green gate” (gates to the base are designated by color), but stopped abruptly at the edge of the road leading to the gate. The strength of the signals were also found to reflect the activity of the women: e.g., they increased rapidly when the women started a demonstration. Visitors to the encampment, both men and women, reported experiencing the same types of symptoms and the same pattern of variation as the Greenham women. It may be revealing that British personnel who guard the perimeter of the base work very short shifts (two hours at a time) and only for two weeks.

What else has been used against the women of Greenham Commons? If high frequency verbal transmissions are used in U.S. department stores and have a significant effect in meeting their security goals, it seems likely that the military would also exploit the same technology. What would such a message tell the women? “There is something wrong with this place, ‘I’ want to get out of here, ‘I’ don’t like it here…” Perhaps auditory transmissions would be simultaneous with the transmissions that were making them feel unwell.

In a review prepared by National Bureau of Standards, Law Enforcement Standards Laboratory, for Nuclear Defense Agency, Intelligence and Security Directorate, use of low intensity microwaves was considered for application as a “psychological deterrent.” The report stated, “…microwave radiation has frequently been cited as being responsible for non-thermal effects in integrated central nervous system activity. The behavioral consequences most frequently reported have been disability, listlessness and increased irritability.” The report fails to mention just as frequently cited low intesity microwave health effects as chromosome damage; congenital birth defects; autonomic nervous system disregulation, including disruption of bio-cycles; impaired immune function; brain damage and other neurological abnormalities, including leaks in the blood brain barrier and depletion of some neurotransmitters; among a host of other health impairments not to be taken lightly.

A reckless form of biological and psychological control has been perpetuated whether the source of the symptoms of the Greenham Commons is radar surveillance aimed at the women, or if there is conscious application of the microwaves as a “deterrent” or a means to drive the women away. Calculated efforts were also directed at preventing or eroding community support. In the summer of 1985, women planning to visit the camp had to be notified that long term health effects might ensue for women who were pregnant or intended to be. As activist Kim Bealy put it, “It would now appear that we are protecting the missiles by killing people slowly.”

Health complaints similar to those of the women at Greenham Common are being made by women peace activists at Seneca, New York, and from activists at other locations. The symptoms at Greenham seem to occur on an occasional basis now, perhaps due to the Intermediate Range Nuclear Forces (INF) treaty, which applies to the missiles housed there, or due to somewhat increased public or congressional awareness.

It is not necessary that the transmission take place from equipment in the vicinity of a target (although the Greenham women seemed to be suffering from transmissions made from within the base.) Propagation of microwaves has been very well studied and is very sophisticated, e.g., a two inch beam can be sent from a satellite, point to point, to a receiving dish on earth; and, it was reported in 1978, that the CIA had a program called Operation Pique, which included bouncing radio signals or microwaves off of the ionosphere to affect the mental functions of people in selected areas, including Eastern European nuclear installations.

In the U.S. the military has intentionally obfuscated discussion of environmental health effects. With their ally “industry” they have won, at least for the time being, the right to perpetuate their interests, to the detriment of the public’s best interests. Scientists who have spoken up on the environmental impact of military microwave or electromagnetic systems have been treated as security risks, and have had their funds cut, so great is the military’s concern in protecting their communications systems by ensuring themselves unlimited use of radio frequencies or microwaves.

The upshot is that in the U.S. at this time, there is no legally enforceable microwave standard. There never has been an enforceable standard for the public or the workplace. Microwaves at intensities within the suggested “guideline” have finally been shown, even by U.S. research, to cause health damage.

Worse, some industrial exposures are extraordinarily high. For instance, plastic sealers, a low income group comprised mainly of women within childbearing years, use equipment that exposes them to over 10,000 microwatts of microwaves or radio frequencies throughout an eight hour day, and in some case, to hundreds of milliwatts. As energy absorbed from their equipment flows to ground, so much heat has been felt in the ankles of some workers that they have learned to do their tasks with their feet elevated on plastic. They are not provided metal shielding as workers are in more health conscious countries.

While most of the public are only exposed to very low levels of microwaves and radio frequencies, a considerable number (between one and two percent) live or work near emitters, such as radio and television transmitters, military and airport radar, and industrial tools utilizing these frequencies. Therefore, it is likely that they are exposed to levels that have been proven to be unhealthful or downright dangerous.

References for Remote Mind Control Technology
McAuliffe, Kathleen, The Mind Fields, OMNI magazine, Omni Publications, February, 1985
ISN News, Reproductive Hazards From Video Display Terminals, Planetary Association for Clear Energy, 1985.
Adey, W. Ross, Neurophysiologic Effects of Radiofrequency and Microwave Radiation, Bulletin of the New York Academy of Medicine, V.55, #11, December, 1979; The Influences of Impressed Electrical Fields at EEG Frequencies on Brain and Behavior, in Behavior and Brain Electrical Activity, Burch, N. and Altshuler, H.I., eds., Plenum Press, 1975; Effects of Modulated Very High Frequency Fields on Specific Brain Rhythms in Cats, Brain Research, V.58., 1973; Spectral Analysis of Low Frequency Components in the Electrical Activity of the Hippocampus During Learning, Electroencephalography and Clinical Neurophysiology, V.23, 1967.
Koslov, Sam, Bridging the Gap, in Nonlinear Electrodynamics in Biological Systems, Adey, W.R. and Lawrence, A.F., eds., Plenum Press, 1983.
Steneck, Nicholas, The Microwave Debate, MIT Press, 1984.
Brodeur, Paul, The Zapping of America, W.W. Norton and Co, 1977.
Marha, Karel, Microwave Radiation Standards in Eastern Europe, IEEE Transactions on Microwave Theory and Techniques, V.MTT-19, #2, February, 1971.
Zarat, Milton, Human Injury Relatable to Nonionizing Radiation, IREE-ERDA Symposium – “The Biological Effects of Electromagnetic Radiation,” 1978.
Annals of New York Academy of Sciences, V. 247, February, 1975.
Frey, Allan, Behavioral Biophysics, Psychological Bulletin, V.65, #5, 1965; Human Auditory System Response in Modulated Electromagnetic Energy, Journal of Applied Physiology, V.17, #4, 1962; Neural Function and Behavior: Defining to Relationship, Annals of the New York Academy of Sciences, V.247, February, 1975; Exposure to RF Electromagnetic Energy Decreases Aggressive Behavior, Biolectromagnetics, V.12, 1986.
MacGregor, R.J., A Brief Survey of Literature Relating to Influence of Low Intensity Microwaves on Nervous Function, Rand Report, R-4397, 1970; A Direct Mechanism for the Influence of Microwave Radiation on Neuroelectric Potentials, Rand Corporation, P-4398, 1970.
Becker, Robert O., The Body Electric, William Morrow and Company, Inc. 1985.
Bowart, Walter, Operation Mind Control, Dell Publishing, 1978.
Subliminal Communication Technology, House of Representatives, Committee on Science and Technology, Subcommittee on Transportation, Aviation and Materials, 1984.
Rosenfeld, Sam and Anne, The Roots of Individuality: Brain Waves and Perception, Mental Health Studies and Reports Branch, National Institute of Mental Health, October, 1975.
Harvey, J., Ickes, W., Kidd, R., New Directions in Attribution Research, V.2, John Wiley and Sons, 1978.
Regna, Joseph, Microwaves Versus Hope, Science for the People, V.19., #5, September/October 1987.
Bealy, Kim, Electromagnetic Pollution: A Little Known Health Hazard, A New Means of Control?, Preliminary Report, Greenham Comman Women’s Peace Camp, Inlands House, Southbourne, Emsworth, Hants, P0108JH.
Kramer, J. and Maguire, P., Psychological Deterrents in Nuclear Theft, National Bureau of Standards for Intelligence and Security Directorate, Defense Nuclear Agency, NBSIR 76-1007, March, 1976.
Lapinsky, G. and Goodman, C., Psychological Deterrents to Nuclear Theft: An Updated Literature Review and Bibliography, Center for Consumer Technology, National Bureau of Standards for Surety and Operations Directorate, Defense Nuclear Agency, NBSIR 80-2038, June, 1980.
World Health Organization, Environmental Health Criteria 16, Radiofrequency and Microwaves, Geneva, Switzerland, 1981.

Direct Energy Weapons
Link

1. The Invisible Pain Ray: The ‘Holy Grail of Crowd Control’

Source: Pasadena Star News
It sounds like a weapon out of Star Wars. The Active Denial System, or ADS, works like an open-air microwave oven, projecting a focused beam of electromagnetic radiation to heat the skin of its targets to 130 degrees. This creates an intolerable burning sensation forcing those in its path to instinctively flee (a response the Air Force dubs the “goodbye effect”).
The Pentagon’s Joint Non-Lethal Weapons Program (JNLWP) says, “This capability will add to the ability to stop, deter and turn back an advancing adversary, providing an alternative to lethal force.” Although ADS is described as non-lethal, a 2008 report by physicist and less-lethal weapons expert Dr. Jürgen Altmann suggests otherwise:
” … the ADS provides the technical possibility to produce burns of second and third degree. Because the beam of diameter 2 m and above is wider than human size, such burns would occur over considerable parts of the body, up to 50% of its surface. Second- and third-degree burns covering more than 20% of the body surface are potentially life-threatening – due to toxic tissue-decay products and increased sensitivity to infection – and require intensive care in a specialized unit. Without a technical device that reliably prevents re-triggering on the same target subject, the ADS has a potential to produce permanent injury or death. “
The weapon was initially tested in Afghanistan, but later recalled due to a combination of technical difficulties and political concerns, including the fear that ADS would be used as a torture tool making it “not politically tenable,” according to a Defense Science Board report. The tens of millions of dollars spent to develop the ADS did not necessarily go to waste, however.
While the weapon may be too controversial for use on the battlefield, it appears that nothing is too sadistic for use on US prisoners, so the ADS has since been modified into a smaller version by Raytheon, for use in law enforcement. Last year, the renamed Assault Intervention System (AIS) was installed at the Pitchess Detention Center’s North County Correction Facility at the behest of the Los Angeles County Sheriff’s Department (LASD). Former LASD Commander, Charles “Sid” Heal had been lobbying for the pain ray for years, calling it the “Holy Grail of Crowd Control,” due to its ability to make people scatter almost instantly.
The device is operated by a jail officer with a joystick, and is intended to break up prison riots, inmate brawls and prevent assaults on officers. Sheriff Lee Baca added that it would allow officers to quickly intervene without having to physically enter the area to incapacitate prisoners.
The ACLU claims that use of such a device on American prisoners is “tantamount to torture.” The organization even sent a letter to the sheriff in charge, demanding he never use the energy weapon against inmates. “The idea that a military weapon designed to cause intolerable pain should be used against county jail inmates is staggeringly wrongheaded,” said Margaret Winter, associate director of the ACLU National Prison Project. “Unnecessarily inflicting severe pain and taking such unnecessary risks with people’s lives is a clear violation of the Eighth Amendment and due process clause of the U.S. Constitution.”
The pain ray’s use in the Pitchess Detention Center is a pilot program. If successful, the weapon could find its way into other prisons around the country. The National Institute of Justice has also expressed interest in a hand-held, rifle-sized, short-range weapon that could be effective at tens of feet for law enforcement officials.
2. The Laser Blinding ‘Dazzler’

Source: Air Force Fact Sheet
The Personal Halting and Stimulation Response rifle, or PHaSR, is a massive laser shooter. PHaSR technology is being co-funded by the National Institute of Justice (NIJ), Joint Non-Lethal Weapons Program (JNLWP), and the Office of the Secretary of Defense, and is being developed by the Air Force Research Laboratory. While JNLWP is interested in the technology for military applications, NIJ is focusing on its law enforcement use.
So what is the purpose of this light-shooting toy? Well, it won’t kill you, but it will temporarily blind you — or as the NIJ prefers to say, it will “dazzle” you into disorientation — by shooting you with two low-power diode-pumped lasers.
Protocol IV, the Blinding Laser Protocol of the United Nations Convention on Conventional Weapons, states that, “The use of laser weapons that are specifically designed, as their sole combat function or as one of their combat functions, to cause permanent blindness to unenhanced vision is prohibited.”
After the US agreed to the Blinding Laser Protocol in 1995 under President Clinton, the Pentagon was forced to cancel several blinding laser weapon programs that were in the works. But the PHaSR rifle can skirt this regulation because the blinding effect is apparently temporary due to its low-intensity laser.
According to a U.S. Air Force fact sheet, “The laser light from PHaSR temporarily impairs aggressors by dazzling them with one wavelength. The second wavelength causes a repel effect that discourages advancing aggressors.” The JNLWP website says that a significant amount of research and experimentation is still required to gain a full understanding of the safety, military effectiveness, and limitations of these future capabilities.
3. The Taser on Steroids

Source: Taser website
The Albuquerque Police Department now has Taser shotguns in its arsenal. Most of us are familiar with hand-held Tasers and understand that they only work if the police are standing pretty close to you (about 20 feet).
But Taser has developed the Taser X12, a 12-gauge shotgun that instead of firing lethal bullet rounds, is designed to fire Taser projectile rounds. Known as Extended Range Electronic Projectiles (XREP), the XREP cartridge is a self-contained, wireless projectile that delivers the same neuro-muscular incapacitation bio-effect (a fancy way of saying electric shock) as the handheld Taser, but up to 100 feet.
According to a July 21 press release, Taser International has taken the XREP to the next level, teaming up with the Australian electronic gun company Metal Storm to enhance the 12-gauge Multi-Shot Accessory Under-Barrel Launcher (MAUL).
The two companies will combine Metal Storm’s MAUL stacked projectile technology to “provide semi-automatic fire as fast as the operator can squeeze the trigger,” which boasts a full weapon reload of up to five rounds in less than two seconds. Picture five rounds of Taser XREP cartridges flying out in less than two seconds up to 30 yards away — that is the plan.
In September 2010 Raw Story reported that the rate of Taser-related deaths were on the rise. The story cited an Amnesty International report from 2008 that found 351 Taser-related deaths in the US between June 2001 and August 2008, a rate of just slightly above four deaths per month. About 90 percent of the victims were unarmed and did not appear to pose any serious threat, according to an article in the Boston Review. The Amnesty report points out that Tasers are “inherently open to abuse as they are easy to carry and easy to use and they can inflict severe pain at the push of a button without leaving substantial marks.“ In Amnesty’s US 2010 report, the Taser-related death toll had increased to 390. If the MAUL-Taser combined shooter find its way into police departments around the country, it may not bode well for the rate of Taser-related deaths.
Another project of Taser International, which was unveiled in 2009, is the Shockwave Area-Denial System, which blankets a large area with electrified darts, and a wireless Taser projectile with a 100-meter range, helpful for picking off “ringleaders” in unruly crowds. In 2007, Taser’s French distributor announced plans for a stun-gun-equipped flying saucer that fires stun darts at criminal suspects or rioters; however, it has yet to be unveiled. Clearly there is no limit to Taser International’s capacity for creativity.
4. Calmative Agents for Riot Control
Calmatives are chemical or biological agents with sedative, sleep-inducing or similar psychoactive effects. Although the 1997 Chemical Weapons Convention prohibits the use of riot control agents in warfare, JNWLP and NIJ have long considered calmatives for both military and law enforcement applications, such as dispersing a crowd, controlling a riot or calming a noncompliant offender.
The most well-known and widely used riot-control agents are tear gas (CS) and chloroacetophenone (CN), also known as mace. A few ways that more advanced non-lethal calmatives might be administered, depending on the law enforcement environment, would include a topical or transdermal skin application, an aerosol spray, an intramuscular dart, or a rubber bullet filled with an inhalable agent.
In the March 2010 issue of Harper’s magazine, Ando Arike gives an extensive overview of riot control technology in his article “The Soft Kill: New Frontiers in Pain Compliance.” He wrote:
Pentagon interest in “advanced riot-control agents” has long been an open secret, but just how close we are to seeing these agents in action was revealed in 2002, when the Sunshine Project, an arms-control group based in Austin, Texas, posted on the Internet a trove of Pentagon documents uncovered through the Freedom of Information Act. Among these was a fifty-page study titled “The Advantages and Limitations of Calmatives for Use as a Non-Lethal Technique,” conducted by Penn State’s Applied Research Laboratory, home of the JNLWD-sponsored Institute for Non-Lethal Defense Technologies.
Penn State’s College of Medicine researchers agreed, contrary to accepted principles of medical ethics, that “the development and use of non-lethal calmative techniques is both achievable and desirable,” and identified a large number of promising drug candidates, including benzodiazepines like Valium, serotonin-reuptake inhibitors like Prozac, and opiate derivatives like morphine, fentanyl, and carfentanyl, the last commonly used by veterinarians to sedate large animals. The only problems they saw were in developing effective delivery vehicles and regulating dosages, but these problems could be solved readily, they recommended, through strategic partnerships with the pharmaceutical industry.
Little more was heard about the Pentagon’s “advanced riot-control agent” program until July 2008, when the Army announced that production was scheduled for its XM1063 “non-lethal personal suppression projectile,” an artillery shell that bursts in midair over its target, scattering 152 canisters over a 100,000-square-foot area, each dispersing a chemical agent as it parachutes down. There are many indications that a calmative, such as fentanyl, is the intended payload—a literal opiate of the masses.
5. Screaming Microwaves That Pierce the Skull

Source: Wired
Researchers are in the process of developing the Mob Excess Deterrent Using Silent Audio or MEDUSA (that’s right, from Greek mythology), which uses a beam of microwaves to induce uncomfortable auditory sensations in the skull. The device exploits the microwave audio effect, in which short microwave pulses rapidly heat tissue, causing a shockwave inside the skull that can be detected by the ears. MEDUSA’s audio effect is loud enough to cause discomfort or even incapacitation. It may also cause a little brain damage from the high-intensity shockwave created by the microwave pulse.
MEDUSA’s intended purpose is deterring crowds from entering a protected perimeter, like a nuclear site, and temporarily incapacitating unruly individuals. So far the weapon remains in development and is funded by the Navy.
6. Ear-Splitting Siren

Source: Associated Press
The Long Range Acoustic Device, or LRAD, built by American Technology Corporation, focuses and broadcasts sound over ranges of up to hundreds of yards. LRAD has been around for years, but Americans first took notice when police used it in Pittsburgh to ward off protesters at the 2009 G-20 summit. It is generally used in two ways: as a megaphone to order protesters to disperse; or, if they disobey, as an “ear-splitting siren” to drive them away. While LRAD may not be deadly, it can permanently damage hearing, depending on how it’s used.
Similar sonic blasters have proven deadly. One is the Thunder Generator, an Israeli-developed shock wave cannon used by farmers to scare away crop-threatening bird. According to a Defense News report last year, the Israeli Ministry of Defense has licensed a firm called ArmyTec to market the Thunder Generator for military and security applications.
It works using gas from a cylinder of domestic liquid petroleum, which is mixed with air and then detonated, producing a series of high-intensity blasts. Patented “pulse detonation” technology ensures high-decibel blasts. With an effective range of up to 50 meters, the makers say it is extremely loud but will not do any lasting damage. They warn, however, that within 10 meters the Thunder Generator could cause permanent damage or even death.
Posted by Astrology Email at 3:57 PM No comments:
Home
Subscribe to: Posts (Atom)