tag:blogger.com,1999:blog-27195408160327963982024-02-19T11:55:13.230-05:00Targeted Individuals Canada(Formerly Human Rights Violations Canada) is site for targeted individuals of organized stalking and electronic harassmentsTIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comBlogger302125tag:blogger.com,1999:blog-2719540816032796398.post-59790685480247912722015-08-06T00:00:00.000-04:002015-08-06T00:00:00.568-04:00US Electromagnetic Weapons and Human Rights 6/6<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><b>A Study of the History of US Intelligence Community Human Rights Violations and Continuing Research in Electromagnetic Weapons</b></span></span></div>
<div style="text-align: justify;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br /></span></span></div>
<div style="text-align: justify;">
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-CA</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin-top:0cm;
mso-para-margin-right:0cm;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0cm;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<br />
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><b><span style="color: #b50400;">THE SCIENTISTS</span></b> </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
<b>Dr. Ewen
Cameron</b> <b><sup><span style="color: #0000dd;">71</span></sup></b> </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Once the details of MKULTRA came to light, the focus in the media and in the
Senate, was on the use of drugs, especially LSD. While the researchers within
the project did indeed concentrate on developing a variety of hallucinogenic
concoctions, they did so with an end in mind. The goal was to devise means and
methods of enabling undercover operatives, soldiers, contractors or anyone who
was involved in secret projects, to be able to keep those secrets if they were
captured or interrogated. Hypnosis, combined with drugs, sensory deprivation
and systematic abuse were seen as a means to that end. The leader in this
pharmaceutical and psychological research was Dr. <b>Ewen Cameron</b>. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Cameron was at the time, one of the most esteemed psychiatrists in the world.
As president of the American Psychiatric Association, Canadian Psychiatric
Association, and one of the founders of the World Psychiatric Association, Dr.
Cameron began experimenting on brainwashing techniques as early as the 1930s
with schizophrenic patients. At this time lobotomies were not yet in common
use, though the procedure would begin to be implemented in 1936 on a wide
scale. Electroshock therapy was some years from being accepted as a primary
means of changing behavior.<b><sup><span style="color: #0000dd;">72</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">71</span> This section about Dr. Cameron
is based on Orlikow Vs. United States, CIA Settlement of Some Complaints. Ewen
Cameron and the Allan Memorial Institute - Subproject 68 funded by CIA from
March 18, 1957 to June 30, 1960 Without conceding liability, in 1988 the CIA
agreed to pay $750,000 to settle a case brought on behalf of nine plaintiffs
who were subjected to federally funded mind control experiments sponsored by
the CIA and conducted by prominent psychiatrist Ewen Cameron, M.D. The
experiments included heavy doses of LSD, electroshock and psychic driving. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">72</span> See “CIA Brainwashing
Experiments”, MacLean’s; January 28, 1985, Vol. 98 Issue 6, p46, 1/3p and “A
cold-war horror show’s last act”, US News & World Report; October 17, 88,
Vol. 105 Issue 15, p13, 1/3p.</span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Cameron relied on torturous and highly stressful techniques for breaking down
the personality of his patients. Schizophrenics would be stripped down naked
beneath red lights for eight hours a day, sometimes for up to eight months with
repeated messages inundating their senses. In other experiments Cameron would
attempt to induce the delirium associated with a high fever by cooking his
patients in an electric cage until their body temperature reached 102 degrees. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
From January of 1957 until September of 1960 Cameron became one of the
promising researchers the <b>CIA</b> turned to in order to develop means and
methods of “brainwashing” and programming human beings to do the will of
the agency. Cameron received $64,242.44<b><sup><span style="color: #0000dd;"> 73</span></sup></b>
from the CIA. to develop a combination of techniques that would destroy an
individual’s memory of an event and enable the programmer to control their
behavior through post-hypnotic commands. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Cameron used a variety of drug
combinations coupled with prolonged sleep deprivation, isolation, hypnosis, and
electro convulsive therapy in order to “wipe” an individual’s memory. His
techniques worked, to a certain extent, but ethical considerations led the CIA
to cut Cameron’s funding in the US, prompting Cameron to move to Canada to
continue his work with funding channeled through the Canadian Government. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
He continued his work, officially, from 1961 until 1964 in Montreal where he
received an additional $57,750.<b><sup><span style="color: #0000dd;">74</span></sup></b>
During this time Cameron combined his techniques (in a “therapy” he called
de-patterning) with electroconvulsive therapy in which the voltage introduced
into one subjects brain, Linda Macdonald, exceeded the APA’s guidelines by 76.5
times. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">He succeeded in wiping her memory
and to this day, she cannot remember anything prior to 1963. In a January 17,
1984 broadcast of the Canadian Broadcasting System, a program called “The Fifth
Estate” detailed the experiments of Cameron, prompting a burst of investigative
journalism culminating in a class-action suit brought against the CIA by former
subjects. In 1988, the case was settled out of court for $750,000, divided
between 8 plaintiffs. Linda Macdonald received $100,000 and legal fees from the
Canadian government, but Cameron himself, faced no punishment.<b><sup><span style="color: #0000dd;">75</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><b>Dr. Jose Delgado</b> </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Whereas Cameron focused on creating traumatized individuals through intense
psychological pressure, Dr. <b>Jose Delgado</b> was investigating the direct
route to control of “human subjects.” </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Delgado physically invaded the brains of subjects with electrodes in order to
create emotions and control actions with the push of a button. As he stated
himself, </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 5pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">“We need a program of psychosurgery for political
control of our society. The purpose is physical control of the mind. Everyone
who deviates from the given norm can be surgically mutilated. The individual
may think that the most important reality is his own existence, but this is
only his personal point of view. This lacks historical perspective. Man does
not have the right to develop his own mind. This kind of liberal orientation
has great appeal. We must electrically control the brain. Someday armies and
generals will be controlled by electric stimulation of the brain.” <b><sup><span style="color: #0000dd;">76</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">In his paper “Intracerebral Radio
Stimulation and Recording in Completely Free Patients,” Delgado observed that: </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 5pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">“Radio Stimulation on different points in the
amygdala and hippocampus in the four patients produced a variety of effect,
including pleasant sensations, elation, deep thoughtful concentration, odd
feelings, super relaxation (an essential precursor for deep hypnosis) colored
visions, and other responses.”<b><sup><span style="color: #0000dd;"> 77</span></sup></b>
</span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">73</span> CIA MORI ID 17468: <a href="http://www.wanttoknow.info/mindcontrol" target="_blank"><span style="color: #0000dd;">www.wanttoknow.info/mindcontrol</span></a> <br />
<span style="color: #0000dd;">74</span> Collins, Anne. In the Sleep Room. The
Story of CIA Brainwashing in Canada. Ken Porter Books, 1988 <br />
<span style="color: #0000dd;">75</span> Tyner, Arlene. Mind-Control Part 1:
Canadian and US Survivors Seek Justice, PROBE Magazine, March-April, 2000 <br />
<span style="color: #0000dd;">76</span> Dr. Jose M.R. Delgado Director of Neuropsychiatry,
Yale University Medical School. Congressional Record, No. 26, Vol. 118 February
24, 1974. <br />
<br />
Delgado, to his credit, did make great strides toward a better understanding
the physiology of brain structures and their attendant behavioral and emotional
correlates, strides that did not go unnoticed by the intelligence community and
the military. </span></span></div>
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="line-height: 115%;"><br />
While Delgado worked in an area of specific interest, the direct stimulation of
brain structures through implanted electronics, other researchers explored means
of creating multiple personalities and programming the alternate personalities
that emerged to do a variety of intelligence related work as operatives, still
others explored the effects of various drug combinations and other
“programming” and interrogation techniques aimed at creating super spies and
breaking down enemy agents.</span> - <b>Source:</b> Peter Phillips, Lew Brown and Bridget Thornton, December 2006, Sonoma State University, Project Censored, Media Freedom Foundation, ProjectCensored Website, (<a href="http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mindcon31.htm#Table%20of%20Contents" target="_blank">READ MORE</a>) #US Electromagnetic Weapons and Human Rights, #electromagneticweapons, #HumanRights, #OSEH, #MindControl, #DEW</span></span></div>
</div>
TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-35892234110083085862015-07-30T00:00:00.000-04:002015-07-30T00:00:06.319-04:00US Electromagnetic Weapons and Human Rights 5/6<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><b>A Study of the History of US Intelligence Community Human Rights Violations and Continuing Research in Electromagnetic Weapons</b></span></span></div>
<div style="text-align: justify;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br /></span></span></div>
<div style="text-align: justify;">
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-CA</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin-top:0cm;
mso-para-margin-right:0cm;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0cm;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<br />
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><b><span style="color: #b50400;">ILLEGAL
EXPERIMENTATION</span></b> </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
<u>MKULTRA</u> was, however, neither the first nor the last project funded by
government or industry to experiment on people in the name of some greater
good. A quick review of the history of secret experimentation and medical
atrocities reveals a pattern of deadly behavior The Tuskegee Experiments in
1932 cruelly condemned scores of black men to death from syphilis.<b><sup><span style="color: #0000dd;">66</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
The Pellagra Incident, in which millions died over two decades, in spite of the
fact that the US Public Health Service knew at the time that these deaths were
caused by little more than a niacin deficiency.<b><sup><span style="color: #0000dd;">67</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
In 1940 scientists exposed four-hundred prisoners in Chicago with malaria (a US
experiment Nazis cited at the Nuremberg trials to defend their own
experimentation).<b><sup><span style="color: #0000dd;">68</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
During WWII, Seventh Day Adventist conscientious objectors were enlisted into <i>Operation
Whitecoat</i> by the US Army and the Adventist Church. They were told that they
were being tested for defensive research purposes while the government was in
fact testing offensive chemical and biological weapons.<b><sup><span style="color: #0000dd;">69</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
After WWII, matters became far worse for those who were caught up in the web of
illegal scientific testing. In 1947 Colonel <b>E.E. Kirkpatrick</b> of the US
Atomic Energy Commission issued a secret document stating that the agency would
begin administering intravenous doses of radioactive substances to human subjects.
At the same time atomic tests in which the residents of Utah and Nevada were
purposely exposed to radioactive fallout. There were also a series of
operations during the 1940s and 1950s in which US cities were attacked secretly
by the military through the spread of biological agents in order to track their
propagation through a real population.<b><sup><span style="color: #0000dd;">70</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
<span style="color: #0000dd;">65</span> Project
MKULTRA, The CIA’s Program of Research in Behavioral Modification, August 3,
1977, US Senate, Select Committee on Intelligence, and Subcommittee on Health
and Scientific Research of the Committee on Human Resources. <br />
<span style="color: #0000dd;">66</span> Jean Heller (Associated Press), “Syphilis
Victims in the US Study Went Untreated for 40 Years” New York Times, July 26,
1972: and VN Gamble, “Under the Shadow of Tuskegee: African Americans and
Health Care.” American Journal of Public Health 7(1997):1773-1778. <br />
<span style="color: #0000dd;">67</span> Jon M. Harkness, “Prisoners and
Pellagra”, Public Health Reports, Sep/Oct96, Vol. 111 Issue 5, p 463. <br />
<span style="color: #0000dd;">68</span> “They Were Cheap and Available: Prisoners
as Research Subjects in Twentieth Century America.” British Medical Journal
315:1437. <br />
<span style="color: #0000dd;">69</span> Krista Thompson Smith, “Adventists and
Biological Warfare”, Spectrum Magazine, Vol 25, no. 3, March 1996 and David R.
Franz, DVM, PhD, Cheryl D. Parrott, Ernest T. Takafuji, MD, MPH, “The US Biological
Warfare and Biological Defense Programs” in Medical Aspects of Chemical and
Biological Warfare, Part 1; The Textbook of Military Medicine, Office of
Surgeon General, Borden Institute 1997; p. 425-436. <br />
<span style="color: #0000dd;">70</span> Atomic Energy Commission Secret Memo by Kirkpatrick,
E. E. Col. A January 8, 1947, This was a draft memo from Colonel Kirkpatrick,
Acting Manager, Field Operations of AEC, to the AEC Berkeley Area Engineer,
puts the AEC stamp on termination of human testing, while simultaneously
revealing it was going on under the Manhattan Project-at the request of
Oppenhiemer: </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 5pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">“Until the
Atomic Energy Commission is able to consider sponsoring this type of
experimentation, authorization cannot be given for the use of radioactive
materials in human subjects under this contract.” </span></span></div>
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="line-height: 115%;">A
more current report from the National Security Archives that clearly lays out
the timeline and the assault by researchers on “subjects” can be found at </span><span style="line-height: 115%;"><a href="http://www.gwu.edu/%7Ensarchiv/radiation/dir/mstreet/commeet/meet12/brief12/tab_f/br12f1d.txt" target="_blank"><span style="color: #0000dd; line-height: 115%;">http://www.gwu.edu/~nsarchiv/radiation/dir/mstreet/commeet/meet12/brief12/tab_f/br12f1d.txt</span></a></span><span style="line-height: 115%;">
----“ Personal Statement from Elizabeth Zitrin, Attorney at Law Public Member
of the Ad Hoc Committee on Radiation Experiments”. For information on
biological warfare experiments a good starting place is : Biological Warfare: A
Historical Perspective, by LTC George W. Christopher, USAF, MC; LTC Theodore J.
Cieslak, MC, USA, MAJ Julie A. Pavlin, MC, USA, and LTC (P) Edward M. Eitzen
Jr., MC, USA.—Operational Medicine Division, United States Army Medical
Research Institute of Infectious Diseases, Fort Detrick, Maryland, as posted at
</span><span style="line-height: 115%;"><a href="http://www.fas.org/nuke/guide/usa/cbw/bw.htm" target="_blank"><span style="color: #0000dd; line-height: 115%;">http://www.fas.org/nuke/guide/usa/cbw/bw.htm</span></a></span> - <b>Source:</b> Peter Phillips, Lew Brown and Bridget Thornton, December 2006, Sonoma State University, Project Censored, Media Freedom Foundation, ProjectCensored Website, (<a href="http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mindcon31.htm#Table%20of%20Contents" target="_blank">READ MORE</a>)
#US Electromagnetic Weapons and Human Rights, #electromagneticweapons, #HumanRights, #OSEH, #MindControl, #DEW</span></span></div>
</div>
TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-36825721719740320882015-07-23T00:00:00.000-04:002015-07-23T00:00:07.459-04:00US Electromagnetic Weapons and Human Rights 4/6<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><b>A Study of the History of US Intelligence Community Human Rights Violations and Continuing Research in Electromagnetic Weapons</b></span></span></div>
<div style="text-align: justify;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br /></span></span></div>
<div style="text-align: justify;">
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-CA</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin-top:0cm;
mso-para-margin-right:0cm;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0cm;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<br />
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><b><span style="color: #b50400;">MK-ULTRA</span></b> </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
In terms of mind-control and the breaking down of prisoners for military
interrogations, the events at Abu-Ghraib, Guantanamo, and in the <b>CIA</b>
network of secret prisons dotting the globe, all have their intellectual origin
in the work carried out by a network of scientists under the behest of the
intelligence community beginning in the World War II period. Mind-control, per
se, refers to a well-funded, broad based series of programs designed to explore
the furthest reaches of human cognitive ability. The Nazis, as well as the
Japanese, had been experimenting on prisoners throughout the war. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Recovery of the records of these experiments led the US to proceed with
investigations into new means of interrogations and the building of resistance
to interrogations of US personnel..<b><sup><span style="color: #0000dd;">55</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
The CIA, in association with various other agencies, undertook a long series of
experiments on unsuspecting prisoners, students, military personnel and others
recruited into one of the at least 162 subprojects of what became known as <a href="http://www.bibliotecapleyades.net/esp_sociopol_mindcon.htm#Monarch_Program" target="_blank"><span style="color: #0000dd;">MKULTRA</span></a>.<b><sup><span style="color: #0000dd;">56</span></sup></b> Interest was certainly piqued by the
case of <u>Cardinal Mindseztny</u> and the reports of brainwashing techniques
used on American soldiers in prisoner of war camps in Korea<b><sup><span style="color: #0000dd;">57</span></sup></b>. But even prior to the Korean War the
resiliency of the human mind was being tested by researchers on the black
budget. These projects reportedly at times violated every conceivable notion of
human rights and dignity.<b><sup><span style="color: #0000dd;">58</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
<b>Frank Olson</b>, a mid-level CIA operative, worked on the development of
aerosol delivery of drugs and poisons at Ft. Detrick, Maryland. His work, which
is still classified, was funded through MKULTRA. Olson took a trip to England
where MI6 and the CIA were working together on ways to prevent allied spies and
servicemen from yielding to interrogation. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">52</span> Tesla: Life and Legacy, Missing
Papers, archived at PBS: <a href="http://www.pbs.org/tesla/ll/ll_mispapers.html" target="_blank"><span style="color: #0000dd;">http://www.pbs.org/tesla/ll/ll_mispapers.html</span></a>. <br />
<span style="color: #0000dd;">53</span> Tesla: Master of Lightning PBS
documentary Dec. 12th, 2000. <br />
<span style="color: #0000dd;">54</span> Box#8 of Declassified CIA documents
pertaining to MKULTRA contains the following fragment: The Application of
Tesla’s Technology in Today’s World. Obtain, online, through the National
Security Archives at <a href="http://www.gwu.edu/%7Ensarchiv/" target="_blank"><span style="color: #0000dd;">http://www.gwu.edu/~nsarchiv/</span></a> <br />
<span style="color: #0000dd;">55</span> Harris, S. (1994) Factories Of Death:
Japanese Biological Warfare, 1932-45, And The American Cover-Up. London:
Routledge.Tanaka, Y. 1998. Hidden Horrors: Japanese War Crimes in World War II.
Boulder, Colorado: Westview Press, Michalczyk, J. J. 1994. Medicine, ethics,
and the Third Reich: Historical and Contemporary Issues (METR) Kansas City,
Missouri: Sheed & Ward<br />
<span style="color: #0000dd;">56</span> This site provides a selection of
memorandum from within the CIA, in which funding is discussed. <br />
<a href="http://cryptome.org/mkultra-0003.htm" target="_blank"><span style="color: #0000dd;">http://cryptome.org/mkultra-0003.htm</span></a> Digital MK-Ultra files can be found at: <a href="http://www.intellnet.org/mkultra/" target="_blank"><span style="color: #0000dd;">http://www.intellnet.org/mkultra/</span></a> general note about MK-ULTRA funding)<br />
<span style="color: #0000dd;">57</span> Stephen Budiansky, Erica E. Goode and Ted
Gest, “The Cold War Experiments”, U.S News and World Report January 24, 1994. <br />
<span style="color: #0000dd;">58</span> Patricia Greenfield, CIA’s Behavior
Caper, APA Monitor, December 1977, pp. 1, 10-11</span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Olson also traveled to Frankfurt,
where the two agencies conducted fatal experiments on prisoners of war and
others considered to be “expendable.” Olson had an ethical dilemma with the
research and, after voicing his concerns, returned to the United States. On
November 28, 1953, Olson was in room 1018ª of the Hotel Statler in New York. At
2 a.m., Olson fell from the 10th floor window of his room to his death on the
sidewalk below. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">The headline reported his death
as an accident or suicide. This report was discredited when, in 1975, another
official lie was issued to ease his family’s suffering and deflect public
scrutiny. This time Olson was called the victim of an LSD experiment.59 Media
reports cited in the New York Times focused on the sensational aspects of LSD
use and psychic warfare, but did not dwell on the more egregious violations of
human rights and dignity inherent in the programs overseen by the CIA.60 </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
The truth was not revealed until 1994 when his son finally had his body exhumed
and examined. The autopsy showed that Olson’s left temple had been fractured
before he fell. According to the <i>New York Times Magazine</i> <b>CIA</b>
tradecraft books from 1953, that have since been released teach that “one of
the surest methods of killing somebody without a trace involves impairing their
reflexes with alcohol (or drugs) and then stepping up behind them and stunning
them with a blow to the temple. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
After that you quickly grab their ankles and in a single motion flip them over
a bridge, balcony or out of a window more than 70 feet off of the ground.”<b><sup><span style="color: #0000dd;"> 61</span></sup></b> What Olson saw, and what cost him
his life and his family their peace of mind for 30 years, was the beginning of
a long term strategy to develop means of making individual both resistant to
“brainwashing” and to control the actions of individuals.<b><sup><span style="color: #0000dd;">62</span></sup></b> The cover story that was used to
justify the beginning of the project was that there was a “brainwashing gap”
with the Koreans.<b><sup><span style="color: #0000dd;">63</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">59</span> Thomas O’Toole, “CIA Infiltrated
17 Area Groups, Gave out LSD Suicide Revealed,” front-page story Washington
Post, June 11, 1975. <br />
<span style="color: #0000dd;">60</span> Carl Bernstein, “The CIA and the Media:
How Americas Most Powerful News Media Worked Hand in Glove with the Central
Intelligence Agency and Why the Church Committee Covered It Up”, Rolling Stone,
October 20, 1977. <br />
<span style="color: #0000dd;">61</span> Michael Ignatieff, “What did the C.I.A.
Do to Eric Olson’s Father?” New York Times Magazine, April 1, 2001. <br />
<span style="color: #0000dd;">62</span> ibid. and The Frank Olson Project at <a href="http://www.frankolsonproject.org/Contents.html" target="_blank"><span style="color: #0000dd;">http://www.frankolsonproject.org/Contents.html</span></a> <a href="http://www.frankolsonproject.org/Statements/FamilyStatement2002.html" target="_blank"><span style="color: #0000dd;">http://www.frankolsonproject.org/Statements/FamilyStatement2002.html</span></a>. Dr. Eric Olson continues to do what he can to bring to light the truth
of his father’s death. At the above website there are memorandum written by
Dick Cheney to Donald Rumsfeld in regards to the families lawsuit during the
Ford administration in 1975 <br />
<span style="color: #0000dd;">63</span> Reported in the New York Times as “Mind
Control Studies had Origin in Trial of Mindszenty”, Aug. 2, 1977, p.16. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">64</span> See Athan G. Theoharis,
“Researching the Intelligence Agencies: The Problem of Covert Activities”, The
Public Historian, 1984 National Council on Public History, University of
California Press.</span></span></div>
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="line-height: 115%;"><br />
Experimenters used college students, servicemen, mental patients, the poor and,
in several instances, children as young as four years old, in attempts to
create untraceable assassins, couriers and other operatives. MKULTRA
sub-projects involved the services of many notable universities and used a
number of false front corporations such as the Foundation for the Study of
Human Ecology and think tanks such as RAND, to shield the source of funding
from those with ethical “problems.”<b><sup><span style="color: #0000dd;"> 64</span></sup></b>
We would still know nothing of these activities had it not been for the release
of 16,000 pages of documents in 1977 through the FOIA request filed by the surviving
family of Frank Olson. </span><span style="line-height: 115%;"><br />
</span><span style="line-height: 115%;"><br />
Unfortunately CIA Director Richard Helms ordered the destruction of any MKULTRA
records shortly before the order came in to his office<b><sup><span style="color: #0000dd;">65</span></sup></b>, leaving an incomplete picture of a
concerted effort by various agencies to create new and better means of
controlling the thoughts, emotions and thus behavior, of unsuspecting
individuals. </span>- <b>Source:</b> Peter Phillips, Lew Brown and Bridget Thornton, December 2006, Sonoma State University, Project Censored, Media Freedom Foundation, ProjectCensored Website, (<a href="http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mindcon31.htm#Table%20of%20Contents" target="_blank">READ MORE</a>) #US Electromagnetic Weapons and Human Rights, #electromagneticweapons, #HumanRights, #OSEH, #MindControl, #DEW</span></span></div>
</div>
TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-79042470210953491272015-07-16T00:00:00.000-04:002015-07-16T00:00:07.959-04:00US Electromagnetic Weapons and Human Rights 3/6<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><b>A Study of the History of US Intelligence Community Human Rights Violations and Continuing Research in Electromagnetic Weapons</b></span></span></div>
<div style="text-align: justify;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br /></span></span></div>
<div style="text-align: justify;">
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-CA</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin-top:0cm;
mso-para-margin-right:0cm;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0cm;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<br />
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><b><span style="color: #b50400;">TESLA AND EMF</span></b> <br />
<br />
Military interest into the weaponization of the electromagnetic spectrum has a
long history, based on the theoretical work of <a href="http://www.bibliotecapleyades.net/esp_tesla.htm" target="_blank"><b><span style="color: #0000dd;">Nikola Tesla</span></b></a>. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Radar, in its early inception,
was seen not only as a means of tracking the position and speed of enemy
targets, but as a potential weapon in its own right. There are very real
problems however with overcoming the normal decrease in effect of an
electromagnetic field over distance. This effect is a natural function of the
laws of physics and applies to both electrical and magnetic fields<b><sup><span style="color: #0000dd;">39</span></sup></b>. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">In short, the strength of a field
drops off in inverse proportion to the distance of the target from the source.
Without a means of concentrating and directing a beam of energy across long
distances, any effect that an EMF weapon may have would be limited to its
immediate vicinity. From 1900 until his death in 1943, Nikola Tesla worked to
develop just such a weapon. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
In a letter to the New York Times editor in 1908 <u>Telsa wrote</u>, </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">“When I spoke of future warfare I
meant that it should be conducted by direct application of electrical waves
without the use of aerial engines or other implements of destruction... What I
said in regard to the greatest achievement of the man of science whose mind is
bent upon the mastery of the physical universe, was nothing more than what I
stated in one of my unpublished addresses, from which I quote: </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 40.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">“According to an adopted theory,
every ponderable atom is differentiated from a tenuous fluid, filling all space
merely by spinning motion, as a whirl of water in a calm lake. By being set in
movement this fluid, the ether, becomes gross matter. Its movement arrested,
the primary substance reverts to its normal state. It appears, then, possible
for man through harnessed energy of the medium and suitable agencies for
starting and stopping ether whirls to cause matter to form and disappear. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 40.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 5pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">At his command, almost without effort on his part,
old worlds would vanish and new ones would spring into being. He could alter
the size of this planet, control its seasons, adjust its distance from the sun,
guide it on its eternal journey along any path he might choose, through the
depths of the universe. He could make planets collide and produce his suns and
stars, his heat and light; he could originate life in all its infinite forms.
To cause at will the birth and death of matter would be man’s grandest deed,
which would give him the mastery of physical creation, make him fulfill his
ultimate destiny.”<b><sup><span style="color: #0000dd;"> 40</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Tesla made several claims during
the latter years of his life, published by the <i>New York Times</i> in what
became an annual event. His theory of the hidden nature of our universe
supplants those of many of his contemporaries in that he was able to infer a
multidimensional model of the universe that is only now being investigated
through the theoretical mathematics of our leading physicists.<b><sup><span style="color: #0000dd;">41</span></sup></b> </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
<span style="color: #0000dd;">39</span> There are
two laws of note here: the inverse square law, which relates to forces such as
gravity, and the inverse cube law, which relates to electromagnetic forces.
Both equations describe the relationship between the power of the force and the
decrease in that forces effect over distance. In regards to magnetism we refer
to the work of Maxwell. One easily accessible online source for his equations
is: <a href="http://www.rialian.com/rnboyd/maxwell.htm" target="_blank"><span style="color: #0000dd;">http://www.rialian.com/rnboyd/maxwell.htm</span></a> A good place to start for understanding the man and his work is
the James Clerk Maxwell Foundation at: <a href="http://www.clerkmaxwellfoundation.org/html/links.html" target="_blank"><span style="color: #0000dd;">http://www.clerkmaxwellfoundation.org/html/links.html</span></a> </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">40</span> New York Times, April 21st, 1908
(p.5 column 6) Tesla Letter to the Editor :. <br />
<span style="color: #0000dd;">41</span> “The Cosmic Triangle: Revealing the State
of the Universe,” in the May 28, 1999 issue of the journal Science discusses
Dark Energy and Margaret Cheney, Tesla: A Man Out of Time, Dell Publishing,
1983. <br />
<br />
Tesla also developed means of remotely controlling aircraft as early as 1915,
foreshadowing the Unmanned Ariel Vehicles (UAVs) of today’s battlefields. In
1934 Tesla offers to build a “Death Ray” that would make the power of an
opponents air force obsolete. This was one of the earliest recorded statements
regarding directed energy weapons.<b><sup><span style="color: #0000dd;">42</span></sup></b>
Tesla’s offer to build this device for the US government for a bargain price,
but with many caveats, was refused by officials who, preferred instead to pump
money into the new Army Air Corp, which in turn gave rise to the military
aviation complex that we have today.<b><sup><span style="color: #0000dd;">43</span></sup></b>
</span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Before the war the airline industry was not a major part of the economic life
of the nation.<b><sup><span style="color: #0000dd;">44</span></sup></b> With huge
wartime contracts, however, corporations such as Hughes, McDonnell Douglas,
Lockheed, and Northrop quickly grew in power commensurate with the financial
bonanza that was unearthed in the battlefields of Europe and the Pacific.<b><sup><span style="color: #0000dd;">45</span></sup></b> These companies formed the core of
the “military-industrial complex.” </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Their investors and managers
began to consolidate their clout in political circles to keep the nation on a
wartime economic footing, a simple and vastly powerful weapon that would make
aircraft, bombs, missiles and attendant industries irrelevant would certainly
be seen as a direct threat to the growing power of military arsenal. Instead, a
“black budget” program was put into motion, which exploited the work of Robert
Oppenheimer, Albert Einstein and others. The Manhattan Project, developed by
the DOD in 1942, generated a vastly destructive weapon that required a
well-established and unbelievably expensive aerospace industry, along with
unprecedented levels of secrecy and autonomy from Congress and the public.<b><sup><span style="color: #0000dd;">46</span></sup></b> </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">42</span> Front page New York Times, July
11 1934 was entitled, “TESLA, AT 78, BARES NEW ‘DEATH BEAM’” and told of the
inventor’s proposal that would “send concentrated beams of particles through
the free air, of such tremendous energy that they will bring down a fleet of
10,000 enemy airplanes at a distance of 250 miles...“ <br />
<span style="color: #0000dd;">43</span> To illustrate the control of science for
corporate profit, Tesla’s practical applications all shared one thing in
common, the were devoid of any profitable application. As a result, Tesla’s
development of wireless electricity has never borne fruit, leaving us still in
the 21st century surrounded by a landscape of transmission wires, faulty
electrical grids, destructive (though profitable) electrical generation
systems, wars for oil, and a suffering environment. See Marc J. Seifer, The
Life and Times of Nikola Tesla, Citadel Press, 1998. <br />
<span style="color: #0000dd;">44</span> John B. Rae, Climb to Greatness: The
American Aircraft Industry, 1920-1960, Cambridge: MIT Press, 1968. Roger E.
Bilstein, The American Aerospace Industry: From Workshop to Global Enterprise,
New York: Twayne Publishers, 1996.<br />
<span style="color: #0000dd;">45</span> Carol L. Cook, The Aerospace Industry:
Its History and How it Affects the US Economy, Yale-New Haven Teachers
Institute, 2005. <br />
<span style="color: #0000dd;">46</span> See the National Atomic Museum’s archives
concerning the Manhattan Project at<br />
<a href="http://www.atomicmuseum.com/tour/manhattanproject.cfm" target="_blank"><span style="color: #0000dd;">http://www.atomicmuseum.com/tour/manhattanproject.cfm</span></a> and the Brookings Institute’s archives at <br />
<a href="http://www.brook.edu/FP/PROJECTS/NUCWCOST/MANHATTN.HTM" target="_blank"><span style="color: #0000dd;">http://www.brook.edu/FP/PROJECTS/NUCWCOST/MANHATTN.HTM</span></a></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
The US government also ignored Tesla’s offer to produce a “<i>city killing
machine</i>,” which was composed of <u>an electromagnetic shield and a wireless
torpedo</u>. Tesla made several proposals during the 1930s, none of which
received funding. Among Tesla’s claims, published annually on his birthday in
the New York Times, were methods of harnessing the power of the sun to
electrify the earth and provide free electrical power to anybody, anywhere. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Tesla did, however, conceive of at least one device that became a major part of
our nation’s arsenal - radar. <br />
<br />
As early as 1917 he published his theory and developed the first prototype in
1934. It is from the basis of this technology that future research into
weaponizing the electromagnetic spectrum proceeded. At the same time Tesla was
working on methods of <a href="http://www.bibliotecapleyades.net/tesla/esp_tesla_12.htm" target="_blank"><span style="color: #0000dd;">transmitting and
receiving communication signals through interplanetary space</span></a> and reading the images on a
sleeping person’s retina (by extension mind reading). His prediction that
future wars would be fought with electromagnetic means foreshadowed the rise of
electronic warfare and the non-lethal weapons technology being deployed today. <b><sup><span style="color: #0000dd;">47</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
At first glance, it would seem probable that the military had taken over the
management of Tesla’s material. In fact, a number of projects related to his
life’s work were in development. For instance, the building of beam weapons at
Wright Patterson Air Force Base under the code name “Project Nick”<b><sup><span style="color: #0000dd;"> 48</span></sup></b> headed by Brigadier General <b>L.C.
Craigie</b>. This project was however, cancelled due to an apparent lack of
understanding of Tesla’s means of transmitting high-energy waves without a loss
of power over great distances. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><i>Defense Advanced Research
Projects Agency</i> (<b>DARPA</b>)
began another project in 1958 codenamed “Seesaw” at Lawrence Livermore Labs<b><sup><span style="color: #0000dd;">49</span></sup></b> aimed at combating reported Soviet
advances in electromagnetic weapons and defenses, advances that many believe
came about after 1952 when the bulk of Tesla’s research and personal effects
were turned over to his nephew, Sava Kosanovic, who promptly whisked them away
to Yugoslavia. Eight years later Soviet Premier Nikita Khrushchev would state
that, “A new and fantastic weapon is in the hatching stage,”<b><sup><span style="color: #0000dd;"> 50</span></sup></b> horrifying many and prompting calls
for more effective means of using EMF, espionage and counter-espionage. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
On February 9, 1981, the office of the Undersecretary of Defense Research and
Engineering department sent a letter to the FBI that requested the papers of
Tesla, stating, “We believe that certain of Tesla’s papers may contain basic
principles which would be of considerable value to certain ongoing research
within the DOD. It would be very helpful to have access to these papers. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
The letter was signed by Lt. Col. Allan J. Mclaren, an R.O.T.C. graduate from
M.I.T. in 1960, who later went on to become a project director with Lockheed
Martin Space Systems from which he retired in 2003.<b><sup><span style="color: #0000dd;">51</span></sup></b> </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
This section of his memo to the FBI was not declassified until 1993. In
response, the FBI issued the same response as to all of the other inquiries
with one exception, this time they identified who it was that examined the
stored effects; it was the Office of Scientific Research and Development from
47 New York Times, 1937,</span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 5pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">“…will send concentrated beams of particles through
the free air, of such tremendous energy that they will bring down a fleet of
10,000 enemy airplanes at a distance of 250 miles from the defending nation’s
border and will cause armies of millions to drop dead in their tracks When put
into operation, Dr. Tesla said, this latest invention of his would make war
impossible. This death-beam, he asserted, would surround each country like an
invisible Chinese wall, only a million times more impenetrable. It would make
every nation impregnable against attack by airplanes or by large invading
armies.” </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">For an interesting article about <a href="http://www.bibliotecapleyades.net/tesla/esp_tesla_2.htm" target="_blank"><span style="color: #0000dd;">Tesla’s “Death Ray</span></a><span style="color: #0000dd;">” </span>and the relationship to Tunguska
see: <a href="http://www.bibliotecapleyades.net/ciencia/esp_ciencia_tunguska02.htm" target="_blank"><span style="color: #0000dd;">Tesla's Wireless Power Transmitter and the Tunguska Explosion of 1908</span></a></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
<span style="color: #0000dd;">48</span> Tesla:
Master of Lightning, archived at PBS: <a href="http://www.pbs.org/tesla/ll/ll_mispapers.html" target="_blank"><span style="color: #0000dd;">www.pbs.org/tesla/ll/ll_mispapers.html</span></a> </span></span></div>
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd; line-height: 115%;">49</span><span style="line-height: 115%;">
Tesla: Life and Legacy, Missing Papers, archived at PBS: </span><span style="line-height: 115%;"><a href="http://www.pbs.org/tesla/ll/ll_mispapers.html" target="_blank"><span style="color: #0000dd; line-height: 115%;">http://www.pbs.org/tesla/ll/ll_mispapers.html</span></a></span><span style="line-height: 115%;"> <br />
<span style="color: #0000dd;">50</span> Max Frankel, “Khrushchev Says Soviets
Will Cut Forces a Third; Sees ‘Fantastic Weapon’, New York Times, January
15,1960. <br />
<span style="color: #0000dd;">51</span> See Tesla’s FBI files at the FBI FOIA
site located at </span><span style="line-height: 115%;"><a href="http://foia.fbi.gov/foiaindex/tesla.htm" target="_blank"><span style="color: #0000dd; line-height: 115%;">http://foia.fbi.gov/foiaindex/tesla.htm</span></a></span><span style="line-height: 115%;"> <br />
</span><span style="line-height: 115%;"><br />
MIT, a breeding ground of CIA. technical types the Office of Naval Intelligence
and agents from US Naval Research.<b><sup><span style="color: #0000dd;">52</span></sup></b>
What they may have been looking for had likely already been taken, according to
a recent PBS special entitled Tesla: Life and Legacy, Tesla’s nephew reported
that Tesla’s most recent journal was missing from the bulk of material stored
by the OAP.<b><sup><span style="color: #0000dd;">53</span></sup></b> In recent
years high profile projects such as the <i>High Altitude Auroral Project</i> (“</span><span style="line-height: 115%;"><a href="http://www.bibliotecapleyades.net/esp_HAARP.htm" target="_blank"><span style="color: #0000dd; line-height: 115%;">HAARP</span></a></span><span style="line-height: 115%;">”),
the <i>Strategic Defense Initiative</i> (“<u>Star Wars</u>”), and many of the
devices promoted by proponents of “Non-Lethal Weapons” have Tesla’s
intellectual fingerprints all over them.<b><sup><span style="color: #0000dd;">54</span></sup></b></span> - <b>Source:</b> Peter Phillips, Lew Brown and Bridget Thornton, December 2006, Sonoma State University, Project Censored, Media Freedom Foundation, ProjectCensored Website, (<a href="http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mindcon31.htm#Table%20of%20Contents" target="_blank">READ MORE</a>) #US Electromagnetic Weapons and Human Rights, #electromagneticweapons, #HumanRights, #OSEH, #MindControl, #DEW</span></span></div>
</div>
TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-46708353206516328752015-07-09T00:00:00.000-04:002015-07-09T00:00:07.604-04:00US Electromagnetic Weapons and Human Rights 2/6<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><b>A Study of the History of US Intelligence Community Human Rights Violations and Continuing Research in Electromagnetic Weapons</b></span></span></div>
<div style="text-align: justify;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br /></span></span></div>
<div style="text-align: justify;">
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-CA</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin-top:0cm;
mso-para-margin-right:0cm;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0cm;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<br />
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><b><span style="color: #b50400;">PSYCHOLOGICAL WAR</span></b> <br /> </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Modern <i>Psychological Operations</i> (<b>Psy-Ops</b>) were significantly
advanced in the Second World War <b><sup><span style="color: #0000dd;">25</span></sup></b>
and were brought to bear on the American public during the 1950s with the
formation of a widespread network of social scientists, journalists,
politicians, military specialists and intelligence operatives. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Psy-Ops were used to promote a
variety of programs in cooperation with the Industrial Military Complex. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Their key piece of information
warfare was the Communist Red Menace.<b><sup><span style="color: #0000dd;">26</span></sup></b>
</span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
<span style="color: #0000dd;">25</span> See William
E. Daugherty and Morris Janowitz, A Psychological Warfare Casebook, Baltimore,
MD: Johns Hopkins University Press, 1958. In particular, see Daugherty’s
article on “US Psychological Warfare Organizations in World War II,” pp.
126-136. <br />
<span style="color: #0000dd;">26</span> For a current view of these kinds of
operations and how they are outsourced see James Bamford’s article in the
Rolling Stone, The Man Who Sold the War Meet John Rendon, Bush’s General In The
Propaganda War, November 17, 2005. For more information on CIA control of the
media refer to Carl Bernstein, “The CIA and the Media—How America’s Most
Powerful News Media Worked Hand in Glove with the Central Intelligence Agency
and Why the Church Committee Covered It Up”, Rolling Stone, October 20, 1977,
p.63 - the title of the original operation was “Mockingbird” influence
was global in scope, counting among his close friends Henry Luce, publisher of
Newsweek. <br />
</span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
One of the opening salvos in this war of deception was fired by <u>George
Kennan</u>, the American ambassador to Moscow, describing the Soviet threat in
a “long cable” sent to Washington in 1946. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Kennan spent decades studying the Russian political scene. He became convinced
that there would be little chance of cooperation with the Soviets and
recommended a number of actions, most notably the institution of “political
war” through the newly formed CIA - a decision he later regretted, even arguing
for the elimination of the CIA in 1997.<b><sup><span style="color: #0000dd;">27</span></sup></b>
</span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">In the late 1950s, a right-wing
cadre of men within the new CIA was busy building secret armies, planning
assassinations, and generally devising plans for world domination that still
play out today. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
<u>Operation Gladio</u> was one example, well documented and international in
scope, in which right-wing members of the US intelligence community created
“stay-behind” armies in many of the nations of Europe. Those armies managed to
infiltrate the highest levels of politics (most notably in Italy where the term
“Gladio” refers to a double-edged sword) and have been held responsible for
numerous false-flag terrorist acts through the 1980s and 1990s. <i>Terror and
propaganda often go hand-in-hand</i> in the extremist elements within our
military and intelligence communities.<b><sup><span style="color: #0000dd;">28</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
To counter the divisions within the intelligence community, a greater voice was
given to organizations formal and informal. In the 1950s, one such group, the
first <i>Committee on the Present Danger</i> (CPD), promulgated a series of
“gap crises.” The Bomber Gap, the Missile Gap, the Space Gap, and the
Brainwashing and Psychotronic Gap were used to justify increased military
technology spending. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Congress was led to believe that
the Soviets were a much greater threat than they actually were, and that a
terrifying new weapon was being developed that threatened America. They were
thus convinced to vote for virtually any black budget proposal that came their
way. The CPD ran a series of broadcasts to the public through the Mutual
Broadcasting Network that spread fear in the minds of the public. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Under the first civilian CIA Director, <b>Allen Welsh Dulles</b>, the Company
began to push forward with its agenda of manufacturing consent from the
American people for a new state of perpetual war industrialization. Dulles was
a well-connected individual, a successful spy for the OSS in Switzerland during
the war, related to three secretaries of state, and the chief advisor to Dewey
when he ran for President in 1948. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Dulles had access to the highest
echelons of policy making and his influence was global in scope, counting among
his close friends <u>Henry Luce</u>, publisher of Newsweek.</span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
<span style="color: #0000dd;">27</span> George F.
Kennan. “Spy and Counterspy.” The New York Times, May 18, 1997. For a sympathetic
biography see George F. Kennan and The Making of American Foreign Policy,
1947-1950, Wilson D. Miscamble, C.S.C, 1993 Princeton University Press. George
F. Kennan. “Policy Planning Staff memorandum on the inauguration of organized
political warfare,“ May 4, 1948. Published in Foreign Relations of the United
States, 1945-1950: Emergence of the Intelligence Establishment. Discusses the
need for political warfare: that is, measures short of war, such as propaganda
and covert operations. <br />
<span style="color: #0000dd;">28</span> History News Network, USA 13 June 2005,
Terrorism in Western Europe: An Approach to NATO’s Secret Stay-Behind Armies,
by Daniele Ganser, The Whitehead Journal of Diplomacy and International
Relations 1 June 2005, Kennan published his analysis anonymously in Foreign Affairs,
the official magazine of the Council for Foreign Relations (CFR). [Mr. X (Alias
‘George C. Kennan): “The Sources of Soviet Conduct,” in Foreign Affairs, July
1947.] <br />
(<a href="http://www.isn.ethz.ch/php/documents/collection_gladio/Terrorism_Western_Europe.pdf" target="_blank"><span style="color: #0000dd;">http://www.isn.ethz.ch/php/documents/collection_gladio/Terrorism_Western_Europe.pdf</span></a>) <br />
</span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Relying heavily upon established circles of contacts within the nation’s media
elites, Dulles recruited key members of the media to work directly for the CIA
under <i>Operation Mockingbird</i>. Mockingbird was a psychological information
campaign against the American people. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
In a campaign that would lead to acceptance of blanket secrecy for “national
security”, “the Red Scare” became the excuse for spending vast sums of money on
weapon systems and an increase in covert operations both in foreign countries
and within the United States. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">In the 1950s and 1960s, movies,
news articles, books, radio and television programs were carefully laced with
anti-Communist messages and images designed to produce an acceptance of the
policies being promoted by the defense elite’s propaganda machine.29 </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">“Among the executives who lent
their cooperation to the Agency were William Paley of the Columbia Broadcasting
System, Henry Luce of Time Inc., Arthur Hays Sulzberger of the New York Times,
Barry Bingham Sr. of the Louisville Courier-Journal and James Copley of the
Copley News Service. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 40.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 5pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Other organizations, which cooperated with the CIA,
include the American Broadcasting Company, the National Broadcasting Company,
the Associated Press, United Press International, Reuters, Hearst Newspapers,
Scripps-Howard, Newsweek magazine, the Mutual Broadcasting System, The Miami
Herald, and the old Saturday Evening Post and New York Herald-Tribune. By far
the most valuable of these associations, according to CIA officials, have been
with The New York Times, CBS, and Time Inc.”<b><sup><span style="color: #0000dd;">
30</span></sup></b> </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">One of the engineers of this
deception was a former head of the stay-behind network, <b>Edward W. Barrett</b>,
director of the <i>Interdepartmental Psychological Strategy Board</i> (<b>IPSB</b>)
and, not coincidentally an editor at Newsweek. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Barrett was seen as being very
effective in his efforts to manipulate public opinion. At the same time, CPD
was a “non-political group of citizens of the western coast” and launched a
media campaign in favor of the urgent reinforcement of the national defense.
Among the organizers of the Committee were <u>Frank Altschul</u> (Director of
the Council for Foreign Relations), <u>William Donovan</u> (former head of the
OSS during WWII) and General <u>Dwight D. Eisenhower</u>.<b><sup><span style="color: #0000dd;">31</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
All of this activity was more than enough to stoke the fears of the public and
encourage policy makers to accept the Cold War view of the world. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">This allowed Truman to convince
Congress to approve a tripled military budget that provided funding for secret
research and development and turn a blind eye (in the name of National
Security) to “black operations” programs authorized under the new Cold War
rubric of “containment” and aimed at undermining otherwise peaceful nations and
fomenting war, torture and assassination in countries as diverse as Iran,
Guatemala and Indochina.<b><sup><span style="color: #0000dd;">32</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">29</span> Victor Marchetti and John D.
Marks, The CIA and The Cult of Intelligence, Dell Books,1975 (as a matter of
general interest this is reportedly the first book the Government went to court
to have censored. There are 168 missing pages as a result of the courts ruling
but the spaces were retained in the first edition.) <br />
<span style="color: #0000dd;">30</span> “The CIA and the Media,” Carl Bernstein
Rolling Stone, Oct. 20, 1977 <br />
<span style="color: #0000dd;">31</span> David F. Krugler, Will It Play in Peoria?
The 1950 Campaign of Truth and the Reconstruction of Cold War Propaganda,
British Association of American Studies Annual Conference April 1997 University
of Birmingham, Birmingham, England</span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">32</span> William Blum, Killing Hope: US
Military and CIA Interventions Since World War II, Monroe, Maine: Common
Courage Press, 1995; Ralph McGehee, Deadly Deceits: My 25 years in the CIA, New
York: Sheridan Square Publications, 1983. <a href="http://www.sourcewatch.org/index.php?title=CIA%20Footnote%20on%20Ops" target="_blank"><span style="color: #0000dd;">http://www.sourcewatch.org/index.php?title=CIA
Footnote on Ops</span></a>) <br />
</span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Post-war developments in Europe, especially the British withdrawal from Greece,
led Truman to decide it was necessary to have a permanent American presence in
the old continent to counteract the Communist influence.33 </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">General George C. Marshall,
Secretary of State, designed a vast plan that mixed economic assistance and
secret actions aimed at establishing democracies and making sure that voters in
foreign countries made “the right choice.” National Security Council directive
NSC 10/2, essentially written by Kennan, made official the creation of an
anti-Communist interference network.34</span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
The US intelligence community had an ace in the hole, <b>Reinhardt Gehlen</b>,
a Nazi spymaster with an existing network of agents became the front man in
Eastern Europe for American intelligence. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
General Reinhardt Gehlen proved to be troublesome for the CIA over the years.
Communist counterspies infiltrated his network, his information was often
incorrect, and he had downplayed his eagerness to serve the Reich. But Gehlen
was only one of thousands of Nazis recruited to assist in the new “Cold War”
through <a href="http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mj12_17.htm" target="_blank"><span style="color: #0000dd;">Operation Paperclip</span></a>.<b><sup>35</sup></b> In fact, the intelligence assets acquired by
bringing the Gestapo onto the US public payroll was overshadowed by the
acquisition of dozens of brilliant Nazi scientists and researchers. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
At this juncture, Truman, through the application of the 1947 National Security
Act and the newly formed National Security Council<b><sup><span style="color: #0000dd;">36</span></sup></b>, authorized a vast number of secret
projects involving chemical, biological, nuclear and electromagnetic
experiments. Former Nazis were put in charge of many of the most sensitive
programs and facilities. The <i>Army Ballistic Missile Agency</i> (<b>ABMA</b>)
was entrusted to the former SS officer <b>Wernher von Braun</b>. <b><sup><span style="color: #0000dd;">37</span></sup></b> <u>Kurt Debus</u>, another ex-SS
officer, directed Cape Canaveral. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">At this time scientists began
working on “black” projects in earnest, including attempts at finally
developing the “lost” theories of Nikola Tesla, the Serbian-born American
physicist, into military and intelligence applications.<b><sup><span style="color: #0000dd;">38</span></sup></b> </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="line-height: 115%;"><br />
<span style="color: #0000dd;">33</span> Daniele Ganser, NATO’s Secret Armies.
Operation Gladio and Terrorism in Western Europe, Frank Cass Publishers, 2004. <br />
<span style="color: #0000dd;">34</span> See the Federation of American Scientists
Intelligence resource program, National Security Council [NSC] Truman
Administration [1947-1953] at </span><span style="line-height: 115%;"><a href="http://www.fas.org/irp/offdocs/nsc-hst/index.html" target="_blank"><span style="color: #0000dd; line-height: 115%;">http://www.fas.org/irp/offdocs/nsc-hst/index.html</span></a></span><span style="line-height: 115%;">.
<br />
<span style="color: #0000dd;">35</span> Linda Hunt, Secret Agenda: The United
States Government, Nazi Scientists and Project Paperclip, 1945-1990, St.
Martin’s Press, 1991. <br />
<span style="color: #0000dd;">36</span> The National Security Act of 1947 can be
accessed at </span><span style="line-height: 115%;"><a href="http://www.state.gov/r/pa/ho/time/cwr/17603.htm" target="_blank"><span style="color: #0000dd; line-height: 115%;">http://www.state.gov/r/pa/ho/time/cwr/17603.htm</span></a></span><span style="line-height: 115%;">
<br />
<span style="color: #0000dd;">37</span> Biography of Werner VonBraun produced by
NASA: </span><span style="line-height: 115%;"><a href="http://www.hq.nasa.gov/office/pao/History/sputnik/braun.htm" target="_blank"><span style="color: #0000dd; line-height: 115%;">www.hq.nasa.gov/office/pao/History/sputnik/braun.htm</span></a></span><span style="line-height: 115%;">
and at the Marshall Space Flight Center located at </span><span style="line-height: 115%;"><a href="http://history.msfc.nasa.gov/vonbraun/index.html" target="_blank"><span style="color: #0000dd; line-height: 115%;">http://history.msfc.nasa.gov/vonbraun/index.html</span></a></span><span style="line-height: 115%;">
<br />
<span style="color: #0000dd;">38</span> Hunt, L. Secret Agenda. The United States
Government, Nazi Scientists, and Project Paperclip, 1945 to 1990. New York: St.
Martin’s Press, 1991. Simpson, C. “Blowback. The First Full Account of
America’s Recruitment of Nazis, and the Disastrous Effect on Our Domestic and
Foreign Policy.” New York: Weidenfeld and Nicolson, 1988</span> - <b>Source:</b> Peter Phillips, Lew Brown and Bridget Thornton, December 2006, Sonoma State University, Project Censored, Media Freedom Foundation, ProjectCensored Website, (<a href="http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mindcon31.htm#Table%20of%20Contents" target="_blank">READ MORE</a>) #US Electromagnetic Weapons and Human Rights, #electromagneticweapons, #HumanRights, #OSEH, #MindControl, #DEW
</span></span></div>
</div>
TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-33804670940135734012015-07-02T00:00:00.000-04:002015-07-02T00:00:05.457-04:00US Electromagnetic Weapons and Human Rights 1/6<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><b>A Study of the History of US Intelligence Community Human Rights Violations and Continuing Research in Electromagnetic Weapons</b></span></span></div>
<div style="text-align: justify;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br /></span></span></div>
<div style="text-align: justify;">
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-CA</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin-top:0cm;
mso-para-margin-right:0cm;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0cm;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<br />
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><b><span style="color: #b50400;">Research Statement</span></b><br />
<br />
This research explores the current capabilities of the US military to use <i>electromagnetic</i>
(<b>EMF</b>) devices to harass, intimidate, and kill individuals and the
continuing possibilities of violations of human rights by the testing and
deployment of these weapons. To establish historical precedent in the US for
such acts, we document long-term human rights and freedom of thought violations
by US military/intelligence organizations. Additionally, we explore
contemporary evidence of on-going government research in EMF weapons
technologies and examine the potentialities of continuing human rights abuses. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
In the 1950s and 60s the CIA began work to find means for influencing human
cognition, emotion and behavior. Through the use of the psychological
understanding of the human being as a social animal and the ability to
manipulate a subject’s environment through isolation, drugs and hypnosis, US
funded scientists have long searched for better means of controlling human
behavior.<span> </span>This research has included the
use of wireless directed electromagnetic energy under the heading of
“Information Warfare” and “Non-Lethal Weapons.” </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">New technological capabilities
have been developed in black budget projects<b><sup><span style="color: #0000dd;">1</span></sup></b>
over the last few decades— including the ability to influence human emotion,
disrupt thought, and present excruciating pain through the manipulation of
magnetic fields. The US military and intelligence agencies have at their
disposal frightful new weapons, weapons that have likely already been covertly
used and/or tested on humans, both here and abroad, and which could be directed
against the public in the event of mass protests or civil disturbance. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">1 </span>Black budgets are
government-funded projects that are classified/secret to Congress and the
American people. For an in-depth analysis on the topic, see Weiner, Tim, Blank
Check: The Pentagon’s Black Budget, Warner: 1990. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Human Rights belong to people collectively. To believe in rights for some and
not others is a denial of the humanness of people worldwide. Yet, denial is
exactly what Congress and <b>George W. Bush</b> did with the signing of the
Military Commission Act of 2006. The new official US policy is that torture and
suspension of due process are acceptable for anyone the president deems to be a
terrorist or supporter. This act is the overt denial of the inalienable rights
of human beings propagated in our Declaration of Independence and the Universal
Declaration of Human Rights. More so, US actions declared to the world that the
US suspends human rights for those it believes are evil. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
The precious words, </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 5pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">“We hold these truths to be self-evident, that all
men are created equal, that they are endowed by their Creator with certain
unalienable Rights, that among these are Life, Liberty and the pursuit of
Happiness,” did not declare that only some men (and women) possess unalienable
rights. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Our independence was founded on
the understanding that all men and women are recognized by this nation as
having innate rights derived by their humanity. <br />
<br />
Likewise, the <i>Universal Declaration of Human Rights</i>, created by the United
Nations in 1948, signed and ratified by the US Congress, specifies in its
preamble that “recognition of the inherent dignity and of the equal and
inalienable rights of all members of the human family is the foundation of
freedom, justice and peace in the world.” <br />
<br />
The <i>Universal Declaration of Human Rights</i> has been a guide for
international law for most of six decades, and as such binds the United States
to its general principles. Article 10 states that “everyone is entitled to full
equality, to a fair and public hearing by an independent and impartial
tribunal, in the determination of his rights and obligations and of any
criminal charge against him,” and Article 5 specifically prohibits torture or
cruel, inhuman or degrading treatment or punishment. Both of these basic human
rights have been superceded by the passage the of Military Commissions Act of
2006. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Additionally, the Universal Declaration of Human rights declares that everyone
has the right to freedom of thought and freedom of expression and opinion. This
means that humans have the inalienable right to be able to freely think their
own thoughts and discover their own truths. This paper addresses this most
fundamental human right and explores the pending threats to individual freedom
of thought posed by new EMF weapons technologies. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Freedom of thought or cognitive liberty is the natural human right of each
person to be secure in their ability to perceive the world to the best of their
ability. To have true cognitive liberty in a world as complex as ours would
mean that first we must have access to truthful and unbiased information about
the actions of others and the general state of the world. The Center for
Cognitive Liberties defines this as “the right of each individual to think
independently and autonomously, to use the full spectrum of his or her mind,
and to engage in multiple modes of thought.”<b><sup><span style="color: #0000dd;">
2</span></sup></b> Without accurate representations we cannot make
independently informed choices. It is imperative that the human body and mind
be considered sacrosanct. To invade a person’s body without their consent is an
egregious human rights crime. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
The circumstance may soon arrive in which anti-war or human rights protesters
suddenly feel a burning sensation akin to touching a hot skillet over their
entire body. Simultaneously they may hear terrifying nauseating screaming,
which while not produced externally, fills their brains with overwhelming
disruption. Not only are both phenomena currently possible, but designs for
more powerful EMF technologies receive continuous funding from the US
Government. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
We are in a time of extremism, permanent war, and the unilateral manifestation
of ethnocentrism and power by a cabal of people in the US government. These
power elites have been in operation for decades and are set on nothing less
than the total US military domination of the world. They defy the foundational
values of the American people to achieve their ends. This is not a new
phenomenon. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
The repression of human rights has been present within the US Government throughout
our history. <b><sup><span style="color: #0000dd;">3</span></sup></b> A long
thread of sociological research documents the existence of a dominant ruling
class in the US that sets policy and determines national political priorities. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
<span style="color: #0000dd;">2</span> See the
Center for Cognitive Liberty at <a href="http://www.cognitiveliberty.org/" target="_blank"><span style="color: #0000dd;">http://www.cognitiveliberty.org/</span></a> <br />
<span style="color: #0000dd;">3</span> For a full discussion on the Global
Dominance Group currently operating in the US see: <a href="http://www.projectcensored.org/downloads/Global_Dominance_Group.pdf" target="_blank"><span style="color: #0000dd;">http://www.projectcensored.org/downloads/Global_Dominance_Group.pdf</span></a> <br />
<br />
The <u>American ruling class</u> is complex and inter-competitive, maintaining
itself through interacting families of high social standing with similar life
styles, corporate affiliations, and memberships in elite social clubs and
private schools.<b><sup><span style="color: #0000dd;">4</span></sup></b> </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
This American ruling class is self-perpetuating, <b><sup><span style="color: #0000dd;">5</span></sup></b> maintaining its influence through
policy-making institutions such as the National Manufacturing Association,
National Chamber of Commerce, Business Council, Business Roundtable, Conference
Board, American Enterprise Institute, <a href="http://www.bibliotecapleyades.net/esp_sociopol_cfr.htm" target="_blank"><span style="color: #0000dd;">Council on Foreign
Relations</span></a> and
other business-centered policy groups.<b><sup><span style="color: #0000dd;">6</span></sup></b>
<b>C. Wright Mills</b>, in his 1956 book <i>The Power Elite</i>, documents how
World War II solidified a trinity of power in the US, comprised of corporate,
military and government elites in a centralized power structure motivated by
class interests and working in unison through “higher circles” of contact and
agreement. Mills described how the power elite were those “who decide whatever
is decided” of major consequence.<b><sup><span style="color: #0000dd;">7</span></sup></b>
</span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">4</span> G. William Domhoff, Who Rules
America? (New York: McGraw Hill, 2006 [5th ed.] and Peter Phillips, A Relative
Advantage: Sociology of the San Francisco Bohemian Club, 1994, (<a href="http://library.sonoma.edu/regional/faculty/phillips/bohemianindex.html" target="_blank"><span style="color: #0000dd;">http://library.sonoma.edu/regional/faculty/phillips/bohemianindex.html</span></a>) </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">5 </span>Early studies by Charles Beard in
the Economic Interpretations of the Constitution of the United States (1929),
established that economic elites formulated the US Constitution to serve their
own special interests. Henry Klien (1933) in his book Dynastic America claimed
that wealth in America has power never before known in the world and was
centered in the top 2% of the population owning some 60% of the country.
Ferdinard Lundberg (1937) wrote American’s Sixty Families documenting
inter-marring self-perpetuating families where wealth is the “indispensable
handmaiden of government. C.Wright Mills determined in 1945 (American Business
Elites, Journal of Economic History, Dec. 1945) that nine out of ten business
elites from1750 to 1879 came from well to do families. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">6</span> See R. Brady, Business as a
System of Power, (New York: Columbia University Press, 1943) and Val Burris,
Elite Policy Planning Networks in the United State, American Sociological
Association paper 1991. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">7</span> C. Wright Mills, The Power
Elite, (New York: Oxford University Press, 1956)</span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
With the advent of the military-industrial complex after World War II,
President Eisenhower observed that an internal military industrial power
faction was consolidating their long-term plans for the domination of America
and, eventually, the world. Eisenhower was in no position to fight these men,
and history records his feelings on the subject with the text of his short
farewell address: </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">“….But threats, new in kind or
degree, constantly arise. Of these, I mention two only… </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
…This conjunction of an immense military establishment and a large arms
industry is new in the American experience. The total influence – economic,
political, even spiritual – is felt in every city, every Statehouse, every
office of the Federal government. We recognize the imperative need for this
development. Yet we must not fail to comprehend its grave implications. Our
toil, resources and livelihood are all involved; so is the very structure of
our society. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
In the councils of government, we must guard against the acquisition of unwarranted
influence, whether sought or unsought, by the military-industrial complex. The
potential for the disastrous rise of misplaced power exists and will persist. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
We must never let the weight of this combination endanger our liberties or
democratic processes. We should take nothing for granted. Only an alert and
knowledgeable citizenry can compel the proper meshing of the huge industrial
and military machinery of defense with our peaceful methods and goals, so that
security and liberty may prosper together. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 40.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 5pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Akin to, and largely responsible for the sweeping
changes in our industrial-military posture, has been the technological
revolution during recent decades. In this revolution, research has become
central, it also becomes more formalized, complex, and costly. A steadily
increasing share is conducted for, by, or at the direction of, the Federal
government.”<b><sup><span style="color: #0000dd;"> 8</span></sup></b> </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">We now understand that <u>Eisenhower</u>
was referring to the conjunction of redirected tax monies to research secret
new technology aimed at nothing less than increasing the controlling power of
the military industrial elite to a global scale. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
One particular faction of ambitious men, the former cold warriors and emerging
neo-conservatives, were close followers of philosopher Leo Strauss. This elite
group included not just generals and industrialists but philosophers,
scientists, academics, and politicians have now become the most powerful public-private
war organization ever known. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Strauss espoused an elitist philosophy that fawned over the characteristics of
those who inherited wealth and lived lives of leisure to pursue whatever their
interests may be. His ideas have been transformed into a cogent ideology in
which the media, religion, and government are used to subdue the masses while
the real “nobles” follow their own will without regard to the laws designed to
control lesser men. Strauss was likewise fond of secrecy, as a necessity for control,
because if the lesser men found out what was being done to them they would no
doubt be upset. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
“The people will not be happy to learn that there is only one natural right –
the right of the superior to rule over the inferior, the master over the slave,
the husband over the wife, and the wise few over the vulgar many.” In On
Tyranny, Strauss refers to this natural right as the “tyrannical teaching” of
his beloved ancients.<b><sup><span style="color: #0000dd;">9</span></sup></b> <br />
Leo Strauss, Albert Wohlstetter, and others at the University of Chicago’s Committee
on Social Thought receive wide credit for promoting the neo-conservative agenda
through their students, Paul Wolfowitz, Allan Bloom, and Bloom’s student
Richard Perle. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Canadian cultural review magazine Adbusters, defines neo-conservatism as, </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 5pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">“The belief that Democracy, however flawed, was
best defended by an ignorant public pumped on nationalism and religion. Only a
militantly nationalist state could deter human aggression …such nationalism
requires an external threat and if one cannot be found it must be
manufactured.”<b><sup><span style="color: #0000dd;">10</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">8</span> Public Papers of the Presidents,
Dwight D. Eisenhower, 1960, p. 1035- 1040<br />
<span style="color: #0000dd;">9</span> Leo Strauss, “On Tyranny,” Edited by
Victor Gourevitch and Michael S. Roth, University Of Chicago Press, 2000. <br />
<span style="color: #0000dd;">10</span> Guy Caron, “Anatomy of a Neo-Conservative
White House,” Canadian Dimension, May 1, 2005. <br />
<br />
The neo-conservative philosophy emerged as a reaction to the 1960s era of
social revolutions. Numerous officials and associates in the Reagan and George
H.W. Bush presidencies were strongly influenced by the neo-conservative
philosophy including: John Ashcroft, Charles Fairbanks, Richard Cheney, Kenneth
Adelman, Elliot Abrams, William Kristol and Douglas Feith.<b><sup><span style="color: #0000dd;">11</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Within the Ford administration
there was a split between Cold War traditionalists seeking to minimize
confrontations through diplomacy and detente and neo-conservatives advocating
stronger confrontations with the Soviet’s “Evil Empire.” The latter group
became more entrenched when <a href="http://www.bibliotecapleyades.net/bush/bushb.htm" target="_blank"><span style="color: #0000dd;">George H.W. Bush
became CIA Director</span></a>. Bush
allowed the formation of “Team B” headed by <u>Richard Pipes</u> along <u>with
Paul Wolfowitz, Lewis Libby, Paul Nitze</u> and others, who formed the second <i>Committee
on the Present Danger</i> to raise awareness of the Soviet threat and the
continuing need for a strong aggressive defense policy. Their efforts led to
strong anti-Soviet positioning during the Reagan administration. <b><sup><span style="color: #0000dd;">12</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
The <i>Committees on the Present Danger</i> (<b>CPD</b>) extend from the 1950s
Russian threat to the present. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
The current CPD proudly boasts on their website; </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">“In times of great challenge to
the security of the United States, Republicans, Democrats, and Independents
have traditionally joined to make an assertive defense of American interests. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 40.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Twice before in American history,
The Committee on the Present Danger has risen to this challenge. It emerged in
1950 as a bipartisan education and advocacy organization dedicated to building
a national consensus for a strong defense against Soviet expansionism. In 1976,
the Committee on the Present Danger reemerged, with leadership from the labor
movement, bipartisan representatives of the foreign policy community and
academia, all of whom were concerned about strategic drift in US security
policy. With victory in the Cold War, the mission of the Committee on the
Present Danger was considered complete and consequently was deactivated. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 40.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 5pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Today, the current CPD promotes radical Islamists
as the primary threat to the American people and millions of others who prize
liberty. They claim that the threat is global. They also claim that they
operate from cells in a number of countries. Rogue regimes seek power by making
common cause with terrorist groups. The prospect that this deadly collusion may
include weapons of mass murder was the justification for the invasion of Iraq.”<b><sup><span style="color: #0000dd;">13</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">11</span> Alain Frachon and Daniel Vernet,
“The Strategist and the Philosopher: Leo Strauss and Albert Wlhlestetter,” Le
Monde, April 16, 2003, English translation: Counterpunch 6/2/03. <br />
<span style="color: #0000dd;">12</span> Anne Hessing Cahn, Team B; The
Trillion-dollar Experiment, Bulletin of the Atomic Scientists, April 1993,
Volume 49, No. 03 <br />
<span style="color: #0000dd;">13</span> The Committee on the Present Danger
mission statement can be accessed at <a href="http://www.fightingterror.org/whoweare/index.cfm" target="_blank"><span style="color: #0000dd;">http://www.fightingterror.org/whoweare/index.cfm</span></a> <br />
<br />
Journalist <u>John Pilger</u> recalls his interview with neo-conservative <b>Richard
Perle</b> during the Reagan administration: </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 5pt 40.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">“I interviewed Perle when he was advising Reagan;
and when he spoke about ‘total war,’ I mistakenly dismissed him as mad. He
recently used the term again in describing America’s ‘war on terror’, “No
stages, This is total war. We are fighting a variety of enemies. There are lots
of them out there. All this talk about first we are going to do Afghanistan,
then we will do Iraq... this is entirely the wrong way to go about it. If we
just let our vision of the world go forth, and we embrace it entirely and we
don’t try to piece together clever diplomacy, but just wage a total war... our
children will sing great songs about us years from now.”<b><sup><span style="color: #0000dd;">14</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">There is ample evidence available
to show that some individuals within government and industry have little
problem with violating the public trust and using their positions to kill,
maim, torture and destroy. It is of the utmost importance to our traditional
American values of human rights and cognitive liberty that we recognize this
threat from within. We must move to identify those who show these proclivities
and ensure that their activities have adequate oversight. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Stanley Milgram’s famous experiment involving obedience to authority proved
that individuals are fairly easily cowed into submitting to anyone who has a
claim of authority, and that on average 61 percent of people will administer pain
to another person if instructed to do so.<b><sup><span style="color: #0000dd;">15</span></sup></b>
Both test groups in these experiments rationalized their behavior by appealing
to “the greater good.” Because it was for the “advancement of science” they
were able to be convinced they should ignore personal judgment and obey the
instructions given to them by the experimenters.<b><sup><span style="color: #0000dd;">16</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
<u>Martin Orne</u>, who was one of those paid by the CIA to conduct experiments
on obedience, showed in 1962 that people would go to tremendous lengths to
please a person in authority. Orne conducted research that involved presenting
subjects with a stack of 2,000 pages of random numbers and instructing them to
add each two adjacent numbers until he returned. Over 90 percent of the test
subjects continued in this meaningless task for up to five hours.<b><sup><span style="color: #0000dd;">17</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Today the combination of political climate and technological capability
presents a condition in which widespread manipulation of, not only the flow of
information through the media, but also the manipulation of the emotional
states and cognitive ability in large populations could be achieved. If policy
elites are unaccountable to the public for their actions, and the public has
been emotionally manipulated to support them, we can assume that they will
certainly abuse their positions in the pursuit of their agendas. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
<span style="color: #0000dd;">14</span> John
Pilger, “The World Will Know The Truth,” New Statesman (London) (December 16
2002). <br />
<span style="color: #0000dd;">15</span> Stanley Milgram “Obedience to Authority:
An Experimental View”, New York: HarperCollins, 2004. <br />
<span style="color: #0000dd;">16</span> “Obedience as a determinant of behavior
is of particular relevance to our time,” Behavioral Study of Obedience, Stanley
Milgram, Yale University, Journal of Abnormal and Social Psychology, Vol. 67,
No. 4, p. 371 <br />
<span style="color: #0000dd;">17</span> See Martin Orne-Orne, Martin T., “On The
Social Psychology of the Psychological Experiment: With Particular Reference to
Demand Characteristics and Their Implications,”Am. Psychol. 17 (1962): 776-783,
Orne, M.T. The potential uses of hypnosis in interrogation. In A.D. Biderman
(Ed.), The Manipulation of Human Behavior (pp. 169215). New York: John Wiley
& Sons, 1961 <br />
<br />
Previous human rights and cognitive liberty violations are evidenced in <b>CIA</b>
and <b>FBI</b> records pertaining to the infamous <a href="http://www.bibliotecapleyades.net/esp_sociopol_mindcon.htm#Monarch_Program" target="_blank"><span style="color: #0000dd;">MK-ULTRA project</span></a> and the grim record of harassment and subversion uncovered in the <a href="http://www.bibliotecapleyades.net/esp_cointelpro.htm" target="_blank"><span style="color: #0000dd;">COINTELPRO</span></a> program in force through the
1950s and into the 1970s. We also examined some of the cases of illegal
experimentation on the public dating back to the 1930s. We consider, in depth,
the forms of electromagnetic weapons entering the battlefield today that trace
their origins back through the secret projects of the Defense Department in the
1950s and 1960s. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
Psychological Warfare, Information War, and mind control may seem to be exotic
topics, but the impact of these technologies and techniques is profound. Our
minds are being impacted through a longstanding series of programs aimed at
manipulating public opinion through intelligence agencies, think tanks,
corporate media and a host of non-governmental organizations designed to engender
fear, division and uncertainty in the public.<b><sup><span style="color: #0000dd;">18</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Media manipulation involving the
artificial framing of our collective reality is often a hit or miss
proposition, but psychological operations have been carried out in the past,
and are being carried out even today, through the practices of “Information
Warfare,” directed at enemies abroad and at the American people.<b><sup><span style="color: #0000dd;">19</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
According to <b>Mary C. FitzGerald</b> of the Hudson Institute, <i>New-concept
weapons</i>, such as laser, electromagnetic, plasma, climatic, genetic and
biotechnological are the central principle driving the modernization of
national defense. The potential for these weapons to be used for both good and
bad deserves a great deal of attention, but there is little to be found in the
media or discussed by our administration.<b><sup><span style="color: #0000dd;">20</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
The US is a system of many institutions including those whose sole function is
to provide government oversight. When problems arise that threaten the
stability of the country or the safety of the people, the US government is
designed to have checks and balances that allow the people to challenge
misconduct either directly or through congressional representatives.
Increasingly, oversight is disintegrating. According to a 2006 report in the
Boston Globe, the intelligence committee does not read most intelligence
reports in their entirety.<b><sup><span style="color: #0000dd;">21</span></sup></b></span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
The media is complicit in omitting information necessary to make democratic
decisions.<b><sup><span style="color: #0000dd;">22</span></sup></b> A global
dominance agenda includes penetration into the boardrooms of the corporate
media in the US. A research team at Sonoma State University recently finished
conducting a network analysis of the boards of directors of the ten big media
organizations in the US. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">18</span> For an analysis on the
interlocking of the corporate media, think tanks and government organizations,
see Peter Phillips, Bridget Thornton and Lew Brown “ The Global Dominance Group
and the US Corporate Media” in Censored 2007, Seven Stories Press. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">19</span> See: Snow, Nancy, Information
War American Propaganda, Free Speech, and Opinion Control Since 9/11, 2004
Seven Stories Press and Chomsky, Noam Media Control: The Spectacular
Achievements of Propaganda, 2002 Seven Stories Press <br />
<span style="color: #0000dd;">20</span> In researching this article, there are no
instances of remarks by senior White House, Pentagon, or Congressional
officials that specifically address the human effects of non-lethal EMF
weapons. A search in Lexis Nexis from 20012006 returned no results in American
mainstream media. <br />
<span style="color: #0000dd;">21</span> Classified Intelligence Bills Often Are
Unread: Secret Process Can Discourage House Debate, Susan Milligan, Boston
Globe August 6, 2006. <br />
<span style="color: #0000dd;">22</span> The Global Dominance Group and the US
Corporate media, by Peter Phillips, Bridget Thornton and Lew Brown, published
in Censored 2007, Seven Stories Press, 2006, Chapter 10, </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">The team determined that only 118
people comprise the membership on the boards of director of the ten big media
giants. These 118 individuals in turn sit on the corporate boards of 288
national and international corporations. Four of the top 10 media corporations
in the US have DOD contractors on their boards of directors including: </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 76.5pt; text-indent: -18pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span>·<span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;">
</span></span>William
Kennard: New York Times, <a href="http://www.bibliotecapleyades.net/sociopolitica/sociopol_carlyle.htm" target="_blank"><span style="color: #0000dd;">Carlyle Group</span></a> </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 76.5pt; text-indent: -18pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span>·<span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;">
</span></span>Douglas
Warner III, GE (NBC), Bechtel </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 76.5pt; text-indent: -18pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span>·<span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;">
</span></span>John
Bryson: Disney (ABC), Boeing </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 0.0001pt 76.5pt; text-indent: -18pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span>·<span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;">
</span></span>Alwyn
Lewis: Disney (ABC), Halliburton </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 37.5pt 5pt 76.5pt; text-indent: -18pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span>·<span style="-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;">
</span></span>Douglas
McCorkindale: Gannett, Lockheed-Martin </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Given an interlocked media
network, big media in the US effectively represent corporate America’s
interests. The media elite, a key component of policy elites in the US, are the
watchdogs of acceptable ideological messages, the controllers of news and
information content, and the decision makers regarding media resources.</span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><br />
It is not suggested that everyone in the government believes in global
domination, nor that it is the intent of every government official to ‘cover
up’ misconduct.<b><sup><span style="color: #0000dd;">23</span></sup></b>
Scientists involved in potentially harmful technology are not ‘mad scientists.’
In fact, there are many reports in the public sphere addressing government and
military misconduct that are put forth by people within these very
institutions. The problem is when the government threatens whistleblowers,
intimidates officials with job loss, infiltrates activist organizations, and
increases surveillance<b><sup><span style="color: #0000dd;">24</span></sup></b>. </span></span></div>
<div class="MsoNormal" style="line-height: normal; margin: 0cm 1.5pt 0.0001pt 4.5pt;">
<br /></div>
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;"><span style="color: #0000dd;">23</span> Remarks on Classification, The
Hon. Lee Hamilton, Information Security Oversight Office, October 18, 2005. “At
a time when the US intelligence community is under intense scrutiny in the
aftermath of 9/11 and the failure to find weapons of mass destruction in Iraq,
we only increase public skepticism about our government by denying the public
information.” <br />
<span style="color: #0000dd;">24</span> See: Valerie Plame, the Richard Leiby,
Spy Who Got Shoved Out Into the Cold, Washington Post, October 29, 2005; Page
C01; Amended 2006 surveillance bill by Bush; The FBI and the Engineering of
Consent, Noam Chomsky, From Public Eye Magazine, Volume One, Number Two; and
Demian Bulwa, Oakland: Police spies chosen to lead war protest, San Francisco
Chronicle, Friday, July 28, 2006. - <b>Source:</b> Peter Phillips, Lew Brown and Bridget Thornton, December 2006, Sonoma State University, Project Censored, Media Freedom Foundation, ProjectCensored Website, (<a href="http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mindcon31.htm#Table%20of%20Contents" target="_blank">READ MORE</a>) #US Electromagnetic Weapons and Human Rights, #electromagneticweapons, #HumanRights, #OSEH, #MindControl, #DEW
</span></span><br />
</div>
</div>
TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-84000062527870081772015-07-01T00:00:00.000-04:002015-07-01T00:00:02.228-04:00Targeted Individuals Speaks 2/4<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: center;">
<object class="BLOGGER-youtube-video" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" data-thumbnail-src="http://1.gvt0.com/vi/U0c_-3JjTqE/0.jpg" height="300" width="500"><param name="movie" value="http://www.youtube.com/v/U0c_-3JjTqE&fs=1&source=uds" /><param name="bgcolor" value="#FFFFFF" /><param name="allowFullScreen" value="true" /><embed width="500" height="300" src="http://www.youtube.com/v/U0c_-3JjTqE&fs=1&source=uds" type="application/x-shockwave-flash" allowfullscreen="true"></embed></object></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/VA7h9ZjNeV8?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/bzHd2n-47mA?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/bgjV4TWqNJQ?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/xc-qgrGTtFc?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b>FAIR USE NOTICE:</b> This site may contain copyrighted materials the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of criminal justice, political, human rights, economic, democracy, scientific, & social justice issues. We believe this is not an infringement of any such copyrighted materials as in accordance to the fair dealing clauses of the Canadian Copyright Act, that allow users to engage in certain activities relating to non-commercial and not for profit research, private study, criticism, review, or news reporting. We are making an exerted effort to mention the source of the material, along with the name of the author, performer, maker, or broadcaster for the dealing to be fair again in accordance with the allowable clause. For more info visit: Wikipedia: Fair Dealing Canada (www.en.wikipedia.org/wiki/Fair_dealing).</div>
#TargetedIndividuals, #RichmondCalifornia, #SpacedBasedWeapons, #DEW, #TargetedIndividualsSpeaks
</div>
TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-71324983536149447782015-04-03T21:50:00.000-04:002015-04-03T21:50:00.270-04:00Targeted Individuals Speaks! (1/4)<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/IQboElHAh8I?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/uJI7NiXHwJI?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/xPoL6df-A4o?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/iIFKseuB4TA?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/fOAXO4LagLQ?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/yKFtyfBtvWw?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/OD7Fhr7RTBk?feature=player_embedded' frameborder='0'></iframe></div>
#DEW, #directedenergyweapons, #targetedindividuals, #electronicharassment, #OSEH, #PrivacyMatters, #PoliceStateCanada, TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-40289564274200671552015-04-01T00:00:00.000-04:002015-04-01T00:00:07.743-04:00The Videos of our Times 1/4<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/emo8HFpjI20?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/wtkrIsn8oac?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/elQyzTfxNuU?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/0pe2mA5bVs0?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/fvJa4BHONGE?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/oLiVsRX641A?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/-DnkAl4AeKY?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/r5Ug9RK-01E?feature=player_embedded' frameborder='0'></iframe></div>TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-9574455304356923802014-11-03T20:56:00.000-05:002014-11-03T20:56:00.091-05:00First Livecast of FFCHS and other videos of our times...<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/4CfuVJDv8uY?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/8pxXlvie70U?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/edGWixPk3t4?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/WJO2mMGj2Aw?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/yAnOCBq1ePM?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/j3y4vMsXmH0?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/5Nxog313rh0?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/b1XGPvbWn0A?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/0YTChm0-IEg?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/nNuCD2BO3dM?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<a href="http://guerillamedianetwork.com/livecast-freedom-from-covert-harassment-surveillance-8-hours/" target="_blank"><b>Freedom From Covert Harassment & Surveillance 10/18/14</b></a><br />
<ul>
<li style="text-align: justify;"><a href="http://guerillamedianetwork.com/wp-content/uploads/2014/10/FFCHS-LiveCast-Saturday-October-18-2014-Hour1.mp3" target="_blank">FFCHS LiveCast – Sat Oct 18, 2014 – Hour 1</a></li>
<li style="text-align: justify;"><a href="http://guerillamedianetwork.com/wp-content/uploads/2014/10/FFCHS-LiveCast-Saturday-October-18-2014-Hour2.mp3" target="_blank">FFCHS LiveCast – Sat Oct 18, 2014 – Hour 2</a></li>
<li style="text-align: justify;"><a href="http://guerillamedianetwork.com/wp-content/uploads/2014/10/FFCHS-LiveCast-Saturday-October-18-2014-Hour3.mp3" target="_blank">FFCHS LiveCast – Sat Oct 18, 2014 – Hour 3</a></li>
<li style="text-align: justify;"><a href="http://guerillamedianetwork.com/wp-content/uploads/2014/10/FFCHS-LiveCast-Saturday-October-18-2014-Hour4.mp3" target="_blank">FFCHS LiveCast – Sat Oct 18, 2014 – Hour 4</a></li>
<li style="text-align: justify;"><a href="http://guerillamedianetwork.com/wp-content/uploads/2014/10/FFCHS-LiveCast-Saturday-October-18-2014-Hour5.mp3" target="_blank">FFCHS LiveCast – Sat Oct 18, 2014 – Hour 5</a></li>
<li style="text-align: justify;"><a href="http://guerillamedianetwork.com/wp-content/uploads/2014/10/FFCHS-LiveCast-Saturday-October-18-2014-Hour6.mp3" target="_blank">FFCHS LiveCast – Sat Oct 18, 2014 – Hour 6</a></li>
<li style="text-align: justify;"><a href="http://guerillamedianetwork.com/wp-content/uploads/2014/10/FFCHS-LiveCast-Saturday-October-18-2014-Hour7.mp3" target="_blank">FFCHS LiveCast – Sat Oct 18, 2014 – Hour 7</a></li>
<li style="text-align: justify;"><a href="http://guerillamedianetwork.com/wp-content/uploads/2014/10/FFCHS-LiveCast-Saturday-October-18-2014-Hour8.mp3" target="_blank">FFCHS LiveCast – Sat Oct 18, 2014 – Hour 8</a></li>
</ul>
</div>
TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-79059738945178854402014-02-16T23:07:00.000-05:002014-02-16T23:07:00.137-05:00Targeted Individuals' Recent Videos<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/4Qh3KG1p8WU?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/L96pE10o4vs?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/X5WrNQdI3KQ?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/obG7TurjOfs?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/l5PdGy6RI1E?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/PSEunzbNbsE?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/PXn6Ti9Jmv4?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/u63aXfto-t8?feature=player_embedded' frameborder='0'></iframe></div>
TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-71894485096818142842014-02-09T00:00:00.000-05:002014-02-09T00:00:02.891-05:00Open Your Eyes (Videos)<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/Pee06rnp-s0?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/mkB0sUzJ9Rk?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/dhOUVVnk66w?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/zjHtBAkncgk?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/QU961SGps8g?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/nIx-Qzdey2I?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/jxlXD6CRY4k?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/IwQa5eokieY?feature=player_embedded' frameborder='0'></iframe></div>
</div>
TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-53880490553807850302013-01-21T00:00:00.000-05:002013-01-21T00:00:02.017-05:00MORE VIDEOS<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/lBCdsQbRAcM?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/5yuxwkwIYXY?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/fhZxVilqhes?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/wrDC0NY87v8?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/dR6-kNAWdL4?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/xj9J1an6eRA?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<object class="BLOGGER-youtube-video" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" data-thumbnail-src="http://1.gvt0.com/vi/payut3pRR_Q/0.jpg" height="300" width="500"><param name="movie" value="http://www.youtube.com/v/payut3pRR_Q&fs=1&source=uds" /><param name="bgcolor" value="#FFFFFF" /><param name="allowFullScreen" value="true" /><embed width="500" height="300" src="http://www.youtube.com/v/payut3pRR_Q&fs=1&source=uds" type="application/x-shockwave-flash" allowfullscreen="true"></embed></object></div>TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-58251448596355411042013-01-14T00:00:00.000-05:002013-01-14T00:00:10.359-05:00Medea Benjamin vs Killer Drones (Videos)<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/H6hBjDlPIbQ?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/ou5nO7T1xgA?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/zSr10fIx72c?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/xycTrBhjPdM?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/NLfcFkwZV9c?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<a href="http://www.globalexchange.org/events/speaker/medea-benjamin" target="_blank"><b>Medea Benjamin</b><b>Medea Benjamin</b></a> (born Susan Benjamin on September 10, 1952) is an American political activist, best known for co-founding <a href="http://www.codepink.org/article.php?id=51" target="_blank">Code Pink</a> and, along with her husband, activist and author Kevin Danaher, fair trade advocacy group Global Exchange. Benjamin also was a Green Party candidate in 2000 for the United States Senate. The Los Angeles Times has described her as "one of the high profile leaders" of the peace movement and in 1999, San Francisco Magazine included her on its "power list" of the "60 Players Who Rule the Bay Area."...In 2012, she authored Drone Warfare: Killing by Remote Control, published by OR books, and toured the country speaking out against drone warfare. - <b>Wikipedia</b> (<a href="http://en.wikipedia.org/wiki/Medea_Benjamin" target="_blank">READ MORE</a>)</div>
<div style="text-align: justify;">
<b>Related Reading:</b></div>
<ul>
<li style="text-align: justify;"><a href="http://www.codepink.org/article.php?id=51" target="_blank">Code Pink</a></li>
<li style="text-align: justify;"><a href="http://www.commondreams.org/news2007/1204-08.htm" target="_blank">Update: US peace activists released</a></li>
<li style="text-align: justify;"><a href="http://www.smartvoter.org/2000/11/07/ca/state/vote/benjamin_m/bio.html" target="_blank">Full Biography for Medea Susan Benjamin Candidate for United States Senator (2000)</a></li>
<li style="text-align: justify;"><a href="http://www.thepeoplesvoice.org/TPV3/Voices.php/2013/01/02/american-politics-and-the-innocent-child" target="_blank">American Politics and the Innocent Children Killed</a></li>
<li style="text-align: justify;"><a href="http://www.youtube.com/watch?v=Gxq-U20KgQM" target="_blank">United National Anti-War Coalition Interview With Medea Benjamin</a> (Video)</li>
</ul>
TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-33646602033425079492013-01-06T16:29:00.000-05:002013-01-06T16:29:32.996-05:00Targeted Individuals Speaks (Videos)<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/U4VqqKAZBZ0?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/PfET792nhWw?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/18PtOXrzDVE?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/184bscAWwRM?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/bVbPIY63zTY?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<object class="BLOGGER-youtube-video" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" data-thumbnail-src="http://1.gvt0.com/vi/O0JI_o7N-vg/0.jpg" height="300" width="500"><param name="movie" value="http://www.youtube.com/v/O0JI_o7N-vg&fs=1&source=uds" /><param name="bgcolor" value="#FFFFFF" /><param name="allowFullScreen" value="true" /><embed width="500" height="300" src="http://www.youtube.com/v/O0JI_o7N-vg&fs=1&source=uds" type="application/x-shockwave-flash" allowfullscreen="true"></embed></object></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/1xlkLsvzimI?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/819WLl3Fy5w?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/qYyqv7YGPBk?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/sooVPpQhq24?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/pGsvXfno3Ag?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/Gun1IgLFSw0?feature=player_embedded' frameborder='0'></iframe></div>
TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-1534255941136389632012-12-22T00:00:00.000-05:002012-12-22T00:00:08.879-05:00Jacob Appelbaum<div dir="ltr" style="text-align: left;" trbidi="on">
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBTyeV-NjqW7gHkDnU_QRLwZvZQp0TI9r0sZoAGhoeCZ4qntAk3BWpm6OeBVaSb4olCSoCwQ0mcicIkTAvVH3ivv7s82KCukexwM3saWTB8L-ksL0tJdPp2-mUOE1HgoSxWARxEC9Cg1Kz/s1600/Jacob+Appelbaum.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" oda="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBTyeV-NjqW7gHkDnU_QRLwZvZQp0TI9r0sZoAGhoeCZ4qntAk3BWpm6OeBVaSb4olCSoCwQ0mcicIkTAvVH3ivv7s82KCukexwM3saWTB8L-ksL0tJdPp2-mUOE1HgoSxWARxEC9Cg1Kz/s400/Jacob+Appelbaum.JPG" width="500" /></a></div>
<strong>a secretive, labyrinth-like system</strong> "...Appelbaum, featured in a New York Times story this past Sunday, is a developer for Tor Hidden Services, a secretive, labyrinth-like system that WikiLeaks relies upon to keep its sources anonymous. A host of other organizations and individuals--including the military--also use Tor, which is run by a Massachusetts-based nonprofit. Appelbaum has become an evangelist for TOR, a sometimes spokesperson for WikiLeaks and a subject of FBI scrutiny. Agents questioned him for hours this summer upon his return from a trip to Europe. Appelbaum is continuing to work on Tor at the UW, according to his boss, Yoshi Kohno, who runs a lab devoted to computer security and privacy. "His other work for the lab is currently embargoed, so I'm afraid I can't go into too much detail," Kohno replies initially when asked about his new employee..." - <strong>Nina Shapiro</strong> (<a data-mce-href="http://blogs.seattleweekly.com/dailyweekly/2010/12/jacob_appelbaum_wikileaks_enab.php" href="http://blogs.seattleweekly.com/dailyweekly/2010/12/jacob_appelbaum_wikileaks_enab.php" target="_blank">READ MORE</a>)</div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<br /></div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<strong>access to freedom of speech is a universal right</strong> "...The only way we'll make progress in the human race is if we have dialogue," he says. "Everyone should honor the United Nations human rights charter that says access to freedom of speech is a universal right. Anonymous communication is a good way for this to happen. Tor is just an implementation that helps spread that idea...Tor works in a similar way. When you use the Internet, your computer makes a connection to the Web server you wish to contact. The server recognizes your computer, notes its IP address and sends back the page you've requested. It's not difficult, however, for a government agency or a malicious hacker to observe this whole transaction: They can monitor the server and see who is contacting it, or they can monitor your computer and see whom you're trying to contact. Tor prevents such online spying by introducing intermediaries between your computer and the system you're trying to reach. Say, for example, that you live in San Francisco and you want to send an e-mail to your friend, a high-level mole in the Iranian Revolutionary Guard. If you e-mail your friend directly, the Guard's network could easily see your computer's IP address, and discover your name and personal information. But if you've installed Tor, your e-mail gets routed to one of 2,000 relays — computers running Tor — scattered across the world. So your message bounces to a relay in Paris, which forwards it to a second relay in Tokyo, which sends it on to a third relay in Amsterdam, where it is finally transmitted to your friend in Tehran. The Iranian Guard can only see that an e-mail has been sent from Amsterdam. Anyone spying on your computer would only see that you sent an e-mail to someone in Paris. There is no direct connection between San Francisco and Tehran. The content of your e-mail is not hidden — for that, you need encryption technology — but your location is secure..." - <strong>Nathaniel Rich</strong> (<a data-mce-href="http://www.rollingstone.com/culture/news/meet-the-american-hacker-behind-wikileaks-20101201" href="http://www.rollingstone.com/culture/news/meet-the-american-hacker-behind-wikileaks-20101201" target="_blank">READ MORE</a>)</div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<br /></div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<strong>wide-open eyes</strong> "...It's only been a single day and the entire world is talking about this information. The collaborative effort put into the initial analysis of these documents is unprecedented, and the foundation laid by New York Times, Guardian and Der Spiegel in respect to initial analysis of the material will certainly serve as a sound basis for further investigations by the media, historians and researchers, as well as general public scrutiny. People in the United States of America have the ability to democratically change this situation if they are unhappy with the truth; they now have information that will assist them in having a clearer picture. Perhaps they will demand more transparency and more accountability. It is clear that they will find out how the war is actually going, and see what they're financing. This isn't unique to the United States: it impacts the people of every country with troops in Afghanistan. The world has wide-open eyes. Together, we can make better, more honest decisions. Furthermore, the people of Afghanistan are not shocked by this information. Nobody needs to tell them what the conditions are like on the ground. They don't have reports with this level of specificity, rather they live with everyday terror and fear. In some cases, we can see more clearly now that the Taliban are doing terrible things, and they're far better equipped than the "camel jockeys" they're portrayed as in the American media. These are scary guys with scary capabilities. Why aren't we being told this truth regularly after nine years? Why would the US government hide this from the world? Why are the rest of the governments complicit in this silence? Additionally, it sounds like our allies are the ones supplying them with some of those capabilities. Some wings of the US government were apparently aware of that. But I'd wager that most Americans were unaware. This strongly suggests a need for policy change. How can the people of the US fund another situation that is not unlike when America was using Afghanistan as proxy during the Cold War? Didn't we learn our lesson the first half dozen times we did something like this? If not, let's learn it now..." - <strong>Xeni Jardin</strong> (<a data-mce-href="http://www.boingboing.net/2010/07/26/wikileaks-qa-with-ja.html" href="http://www.boingboing.net/2010/07/26/wikileaks-qa-with-ja.html" target="_blank">READ MORE</a>)</div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<object class="BLOGGER-youtube-video" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" data-thumbnail-src="http://0.gvt0.com/vi/GMN2360LM_U/0.jpg" height="300" width="500"><param name="movie" value="http://www.youtube.com/v/GMN2360LM_U&fs=1&source=uds" />
<param name="bgcolor" value="#FFFFFF" />
<embed width="500" height="300" src="http://www.youtube.com/v/GMN2360LM_U&fs=1&source=uds" type="application/x-shockwave-flash"></embed></object></div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<br /></div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<strong>Jacob Appelbaum</strong> is an independent computer security researcher and hacker. He is currently employed by the University of Washington, and is a core member of the Tor project. Appelbaum is known for representing Wikileaks at the 2010 Hope conference. He has subsequently been repeatedly targeted by US law enforcement agencies, who obtained a court order for his Twitter account data, detained him 12 times at the US border after trips abroad, and seized a laptop and several mobile phones. Appelbaum, under the handle "ioerror", has been an active member of the Cult of the Dead Cow hacker collective since 2008, and is the co-founder of the San Francisco hackerspace Noisebridge with Mitch Altman. He has worked for Greenpeace and has volunteered for the Ruckus Society and the Rainforest Action Network. He is also a photographer and ambassador for the art group monochrom. - <strong>Wikipedia</strong> (<a data-mce-href="http://en.wikipedia.org/wiki/Jacob_Appelbaum" href="http://en.wikipedia.org/wiki/Jacob_Appelbaum" target="_blank">READ MORE</a>)</div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<br /></div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<strong>Related Reading:</strong></div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<ul>
<li><a data-mce-href="https://www.torproject.org/about/corepeople.html.en" href="https://www.torproject.org/about/corepeople.html.en" target="_blank">The Tor Project</a></li>
<li><a data-mce-href="http://freedomboxfoundation.org/" href="http://freedomboxfoundation.org/" target="_blank">The FreedomBox Foundation</a></li>
<li><a data-mce-href="http://www.gnome.org/" href="http://www.gnome.org/" target="_blank">Gnome</a></li>
<li><a data-mce-href="http://www.nytimes.com/2008/02/22/technology/22chip.html?_r=3&hp&oref=slogin&oref=slogin&oref=slogin" href="http://www.nytimes.com/2008/02/22/technology/22chip.html?_r=3&hp&oref=slogin&oref=slogin&oref=slogin" target="_blank">Researchers Find Way to Steal Encrypted Data</a></li>
<li><a data-mce-href="http://grapevine.is/News/ReadArticle/Jacob-Appelbaum-Detained-At-Keflavik-Airport" href="http://grapevine.is/News/ReadArticle/Jacob-Appelbaum-Detained-At-Keflavik-Airport" target="_blank">Jacob Appelbaum Detained At Keflavík Airport</a></li>
<li><a data-mce-href="http://www.salon.com/2012/04/21/e_2/" href="http://www.salon.com/2012/04/21/e_2/" target="_blank">Surveillance State evils</a></li>
<li><a data-mce-href="http://online.wsj.com/article/SB10001424052970203476804576613284007315072.html" href="http://online.wsj.com/article/SB10001424052970203476804576613284007315072.html" target="_blank">Secret Orders Target Email</a></li>
<li><a data-mce-href="http://www.democracynow.org/2012/4/20/we_do_not_live_in_a" href="http://www.democracynow.org/2012/4/20/we_do_not_live_in_a" target="_blank">"We Don’t Live in a Free Country": Jacob Appelbaum on Being Target of Widespread Gov’t Surveillance</a> (Video)</li>
</ul>
</div>
</div>TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-37436884873926227782012-12-20T00:00:00.000-05:002012-12-20T00:00:02.943-05:00Laura Poitras<div dir="ltr" style="text-align: left;" trbidi="on">
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguFdzO4Ia25vYuq40ckxmxgTX1UcPgMSvFj6Xhr_j-gkuR0GkDyqM4ENhrvJHYVgSyrYAUfirex4Zvyu_FFfuvzZRKeOOhoMmiRteCmaXgjTv08t6NfR5Dd78T0Y6E6r1gavCRwr8kcSJc/s1600/laura+poitras.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" oda="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguFdzO4Ia25vYuq40ckxmxgTX1UcPgMSvFj6Xhr_j-gkuR0GkDyqM4ENhrvJHYVgSyrYAUfirex4Zvyu_FFfuvzZRKeOOhoMmiRteCmaXgjTv08t6NfR5Dd78T0Y6E6r1gavCRwr8kcSJc/s400/laura+poitras.jpg" width="500" /></a></div>
<strong>constant harassment</strong> "...Poitras’ intent all along with these two documentaries was to produce a trilogy of War on Terror films, and she is currently at work on the third installment. As Poitras described it to me, this next film will examine the way in which The War on Terror has been imported onto U.S. soil, with a focus on the U.S. Government’s increasing powers of domestic surveillance, its expanding covert domestic NSA activities (including construction of a massive new NSA facility in Bluffdale, Utah), its attacks on whistleblowers, and the movement to foster government transparency and to safeguard Internet anonymity. In sum, Poitras produces some of the best, bravest and most important filmmaking and journalism of the past decade, often exposing truths that are adverse to U.S. government policy, concerning the most sensitive and consequential matters (a 2004 film she produced for PBS on gentrification of an Ohio town won the Peabody Award and was nominated for an Emmy). But Poitras’ work has been hampered, and continues to be hampered, by the constant harassment, invasive searches, and intimidation tactics to which she is routinely subjected whenever she re-enters her own country. Since the 2006 release of “My Country, My Country,” Poitras has left and re-entered the U.S. roughly 40 times. Virtually every time during that six-year-period that she has returned to the U.S., her plane has been met by DHS agents who stand at the airplane door or tarmac and inspect the passports of every de-planing passenger until they find her (on the handful of occasions where they did not meet her at the plane, agents were called when she arrived at immigration). Each time, they detain her, and then interrogate her at length about where she went and with whom she met or spoke. They have exhibited a particular interest in finding out for whom she works..." - <strong>Glenn Greenwald</strong> (<a data-mce-href="http://www.salon.com/2012/04/08/u_s_filmmaker_repeatedly_detained_at_border/singleton/" href="http://www.salon.com/2012/04/08/u_s_filmmaker_repeatedly_detained_at_border/singleton/" target="_blank">READ MORE</a>)</div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<br /></div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<strong>interrogations produced nothing of value</strong> "...Creating sympathy for people who are harmed by our actions and suggesting we take responsibility for our own are just some of the powerful things that art can do. But confusing ideas that are dangerous to your interests—for example, the suggestion that the huge growth of our security state haven’t reaped us tangible benefits and may in fact have done some damage—and dangerous to the country is a mistake intelligent people out to be ashamed to make. Greenwald points out that DHS concluded that their interrogations of Poitras had produced nothing of value, and yet continued to perform them. Maybe those agencies should answer some questions about what they expect to get next time around, and why harassing Poitras is a valuable use of their time. It’s a far milder query than the ones Poitras is being interrogated for posing." - <strong>Alyssa Rosenberg</strong> (<a data-mce-href="http://thinkprogress.org/alyssa/2012/04/10/460754/laura-poitras/?mobile=nc" href="http://thinkprogress.org/alyssa/2012/04/10/460754/laura-poitras/?mobile=nc" target="_blank">READ MORE</a>)</div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<br /></div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<strong>pre-emptive military force</strong> "...The statement reveals how Obama has angered his anti-war political base. Poitras says DHS put her on its watch list after she made My Country, My Country, a documentary about the 2005 Iraq elections. "The use of pre-emptive military force and the goal of implementing democracy in the Middle East mark a radical shift in U.S. policy and world politics," Poitras told PBS. "I felt compelled to document this war and its consequences. In the course of that documentary, Poitras filmed an attack on American troops. "If she had advance knowledge of the attack, she did not call and warn the battalion," wrote John R. Bruning in The Devil's Sandbox. "It stood to reason that she did," he also wrote. Poitras has also filmed a documentary, The Oath, about a former driver and bodyguard of Osama bin Laden's named Abu Jandal. "Poitras treats her subject with some sympathy as Jandal explains his stance against targeting civilians and how he came to tell the FBI about his experience," The National said in a review of the film..." - <strong>Joel Gehrke</strong> (<a data-mce-href="http://campaign2012.washingtonexaminer.com/blogs/beltway-confidential/us-filmmakers-obama-dhs-draconian-unamerican/471656" href="http://campaign2012.washingtonexaminer.com/blogs/beltway-confidential/us-filmmakers-obama-dhs-draconian-unamerican/471656" target="_blank">READ MORE</a>)</div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<br /></div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<strong>chilling unchecked government invasion</strong> "..."Poitras is now forced to take extreme steps — ones that hamper her ability to do her work — to ensure that she can engage in her journalism and produce her films without the U.S. Government intruding into everything she is doing. She now avoids traveling with any electronic devices." After citing the fact that Poitras had been reluctant to bring up the DHS' treatment of her in the past, he recounts her last experience with Customs and Border Patrol agents at Newark Airport, in which she was told she could not take notes during her interrogation and was accused of not cooperating with "an investigation." Greenwald concludes, "even for someone in Poitras’ position, this continuous unchecked government invasion is chilling in both senses of the word: it’s intimidating in its own right, and deters journalists and others from challenging government conduct..." - <strong>Bryce J. Renninger</strong> (<a data-mce-href="http://www.indiewire.com/article/documentary-community-responds-to-laura-poitras-report-of-unjust-treatment-with-statement-from-cinema-eye" href="http://www.indiewire.com/article/documentary-community-responds-to-laura-poitras-report-of-unjust-treatment-with-statement-from-cinema-eye" target="_blank">READ MORE</a>)</div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<br /></div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/FNXLWfHGuYQ?feature=player_embedded' frameborder='0'></iframe></div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<br /></div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<strong>Laura Poitras</strong> is an American documentary film director and producer. She resides in New York City. She co-directed, produced and shot her 2003 documentary Flag Wars, about gentrification in Columbus, Ohio. It received a Peabody Award, Best Documentary at both the 2003 South by Southwest (SXSW) Film Festival and the Seattle Gay and Lesbian Film Festival, and the Filmmaker Award at the Full Frame Documentary Film Festival. The film also launched the 2003 PBS POV series. It was nominated for a 2004 Independent Spirit Award and a 2004 Emmy Award. Poitras' other films include Oh say can you see... (2003) and Exact Fantasy (1995). Her 2006 film My Country, My Country about life for Iraqis under U.S. occupation was nominated for an Academy Award. Her 2010 film The Oath, about two Yemenis men caught up in America’s War on Terror, won the "Excellence in Cinematography Award for U.S. Documentary" at the 2010 Sundance film festival. The two films are part of a trilogy. The third part will focus on how the War on Terror increasingly focuses on Americans through surveillance, covert activities and attacks on whistleblowers. Poitras says her work has been hampered by constant harassment by border agents during more than three dozen border crossings into and out of the United States. She has been detained for hours and interrogated and agents have seized her computer, cell phone and reporters notes and not returned them for weeks. Once she was threatened with being refused entry back into the United States. In response to a Glenn Greenwald article about this, a group of film directors started a petition to protest the government's actions against her. In February 2010, Poitras won the "True Vision Award" at the True/False Film Festival. The award is for filmmakers whose work shows a dedication to the creative advancement of the art of nonfiction film making. In spring 2012 Poitras took an active part in the three month exposition of Whitney Biennial exhibition of contemporary American art. - <strong>Wikipedia</strong> (<a data-mce-href="http://en.wikipedia.org/wiki/Laura_Poitras" href="http://en.wikipedia.org/wiki/Laura_Poitras" target="_blank">READ MORE</a>)</div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<br /></div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<strong>Related Reading:</strong></div>
<div data-mce-style="text-align: justify;" style="text-align: justify;">
<ul>
<li>IMDB: <a data-mce-href="http://www.imdb.com/name/nm0688636/" href="http://www.imdb.com/name/nm0688636/" target="_blank">Laura Poitras</a></li>
<li>Official Web-site: <a data-mce-href="http://www.mycountrymycountry.com/" href="http://www.mycountrymycountry.com/" target="_blank">My Country My Country</a></li>
<li><a data-mce-href="http://whitney.org/Events/LauraPoitrasObservationAndTrust" href="http://whitney.org/Events/LauraPoitrasObservationAndTrust" target="_blank">Laura Poitras: Surveillance Teach-In</a></li>
<li><a data-mce-href="http://www.thenational.ae/featured-content/work-in-progress/to-publish/the-inside-story" href="http://www.thenational.ae/featured-content/work-in-progress/to-publish/the-inside-story" target="_blank">The inside story</a></li>
<li><a data-mce-href="http://beyondthebox.org/the-oath-honored-at-the-sundance-film-festival/" href="http://beyondthebox.org/the-oath-honored-at-the-sundance-film-festival/" target="_blank">The Oath Honored at the Sundance Film Festival</a></li>
<li><a data-mce-href="http://www.columbiatribune.com/news/2010/feb/28/picturing-a-better-vision/" href="http://www.columbiatribune.com/news/2010/feb/28/picturing-a-better-vision/" target="_blank">Picturing a better vision</a></li>
<li><a data-mce-href="http://www.deadline.com/2012/04/documentary-directors-protest-homeland-security-treatment-of-helmer-laura-poitras/" href="http://www.deadline.com/2012/04/documentary-directors-protest-homeland-security-treatment-of-helmer-laura-poitras/" target="_blank">Documentary Directors Protest Homeland Security Treatment Of Helmer Laura Poitras</a></li>
<li><a data-mce-href="http://www.npr.org/templates/story/story.php?storyId=127238681" href="http://www.npr.org/templates/story/story.php?storyId=127238681" target="_blank">Laura Poitras, Puzzling Over A Jihadi's Journey</a> (Audio)</li>
<li><a data-mce-href="http://www.democracynow.org/2012/4/20/detained_in_the_us_filmmaker_laura" href="http://www.democracynow.org/2012/4/20/detained_in_the_us_filmmaker_laura" target="_blank">Detained in the U.S.: Filmmaker Laura Poitras Held, Questioned Some 40 Times at U.S. Airports</a> (Video)</li>
</ul>
</div>
</div>TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-66867930240238078582012-12-18T00:00:00.000-05:002012-12-18T00:00:10.453-05:00William Binney<div style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzSjJrTnRG-0l6zT8DbegAq9hYhPbpFAmqSgk2gFEoiwyB5Q9esOIcCHrGyj9D408dfa_dkCIooF_XwYd7Nsl3LwfIbXJzruNHwyh2rbP36_hB_gniPWDZQKn8UU1PAKhADqgz4Ay4wDPf/s1600/Bill+Binney+02.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" qda="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzSjJrTnRG-0l6zT8DbegAq9hYhPbpFAmqSgk2gFEoiwyB5Q9esOIcCHrGyj9D408dfa_dkCIooF_XwYd7Nsl3LwfIbXJzruNHwyh2rbP36_hB_gniPWDZQKn8UU1PAKhADqgz4Ay4wDPf/s400/Bill+Binney+02.JPG" width="500" /></a></div>
<strong>muscular code-breaking program</strong> "...The NSA wants it all, foreign and domestic. No more pretense. No need for the pretext of terrorist threats, or even actual terrorists. Nor, heaven forbid, oversight in the form of courts and warrants. Checks and balances are sooo last century. The intelligence community's wet dream of total information awareness is taking a giant step closer to fruition in the Utah desert where the agency is constructing the mother of all data-gathering facilities. As reported by James Bamford in the April issue of Wired, the installation will be five times the size of the U.S. Capitol, (and we know how useful that building has been). It will host 100,000 square feet of servers, 1 million square feet of data storage, and 900,000 square feet for tech support and administration. (They could probably save taxpayers a lot of money by outsourcing all that tech support to India. But I digress.) Beyond capturing the minutia of your daily life, the center will conduct a muscular code-breaking program using the latest-generation supercomputer. Reportedly, it is much faster than the "warehouse-sized" Cray XT5 previously used by the NSA which, at a speed of 1.75 petaflops, was the world's fastest, at least back in 2009. Considerably more horsepower will be required in order to crack hardened data shells. Capturing messages doesn't mean they can actually be read. Encryption methods have gotten so sophisticated that unraveling the algorithm used in the Advanced Encryption Standard by means of a brute-force computer attack, "would likely take longer than the age of the universe," or an episode of Desperate Housewives. It seems that the NSA has a backlog of encrypted messages it would like to read, plus a daily stream of financial, diplomatic, military, and other deep web data..." - <strong>Victor Rozek</strong> (<a href="http://www.itjungle.com/tfh/tfh041612-story04.html" target="_blank">READ MORE</a>)</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<strong>to spy on US citizens</strong> "...The NSA also has the ability to eavesdrop on phone calls directly and in real time. According to Adrienne J. Kinne, who worked both before and after 9/11 as a voice interceptor at the NSA facility in Georgia, in the wake of the World Trade Center attacks “basically all rules were thrown out the window, and they would use any excuse to justify a waiver to spy on Americans.” Even journalists calling home from overseas were included. “A lot of time you could tell they were calling their families,” she says, “incredibly intimate, personal conversations.” Kinne found the act of eavesdropping on innocent fellow citizens personally distressing. “It’s almost like going through and finding somebody’s diary,” she says. But there is, of course, reason for anyone to be distressed about the practice. Once the door is open for the government to spy on US citizens, there are often great temptations to abuse that power for political purposes, as when Richard Nixon eavesdropped on his political enemies during Watergate and ordered the NSA to spy on antiwar protesters. Those and other abuses prompted Congress to enact prohibitions in the mid-1970s against domestic spying. Before he gave up and left the NSA, Binney tried to persuade officials to create a more targeted system that could be authorized by a court. At the time, the agency had 72 hours to obtain a legal warrant, and Binney devised a method to computerize the system. “I had proposed that we automate the process of requesting a warrant and automate approval so we could manage a couple of million intercepts a day, rather than subvert the whole process.” But such a system would have required close coordination with the courts, and NSA officials weren’t interested in that, Binney says. Instead they continued to haul in data on a grand scale. Asked how many communications—”transactions,” in NSA’s lingo—the agency has intercepted since 9/11, Binney estimates the number at “between 15 and 20 trillion, the aggregate over 11 years..." - <strong>James Bamford</strong> (<a href="http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1" target="_blank">READ MORE</a>)</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<strong>Trailblazer Project</strong> "Trailblazer was a United States National Security Agency (NSA) program intended to analyze data carried on communications networks like the internet. It was able to track communication methods such as cell phones and e-mail. It ran over budget, failed to accomplish several goals, and was cancelled...In 2005, President George W. Bush ordered the Federal Bureau of Investigation (FBI) to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually this investigation led to the people who had filed the 2002 DoD Inspector General request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at the heads of himself and his wife. Wiebe said it reminded him of the Soviet Union. None of these people were ever charged with any crime. Drake was raided in November 2007 and his computers and documents were confiscated..." - <strong>Wikipedia</strong> (<a href="http://en.wikipedia.org/wiki/Trailblazer_Project" target="_blank">READ MORE</a>)</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<strong>unnamed surveillance program</strong> "...An electronic surveillance program, whose actual name is currently unknown, was implemented by the National Security Agency (NSA) of the United States in the wake of the September 11, 2001 attacks. It was part of the President's Surveillance Program which was in turn conducted under the overall umbrella of the War on Terrorism. The NSA, a signals intelligence agency, implemented the program to intercept al Qaeda communications overseas where at least one party is not a US person. In 2005 the New York Times disclosed that technical glitches resulted in some of the intercepts including communications were "purely domestic" in nature, igniting the NSA warrantless surveillance controversy. Later works, such as James Bamford's The Shadow Factory, would describe how the nature of the domestic surveillance was much, much more widespread than initially disclosed. In a 2011 New Yorker article, former NSA worker Bill Binney said that his people told him "They’re getting billing records on U.S. citizens! They’re putting pen registers on everyone in the country!..." - <strong>Wikipedia</strong> (<a href="http://en.wikipedia.org/wiki/NSA_electronic_surveillance_program" target="_blank">READ MORE</a>)</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<strong>everybody is a target</strong> "...By this time, the NSA network has long outgrown a single room in the AT&T building in San Francisco, says Binney: “I think there are ten to twenty of them. This is not just San Francisco; they have them in the middle of the country and also on the East Coast.” Binney suspects the new center in Utah will simply collect all the data there is to be collected. Virtually, no one can escape the new surveillance, created in the US for the War on Terror. Some data, of course, would be crucial in the anti-terrorism battle: exposing potential adversaries. The question is how the NSA defines who is and who is not a potential adversary. “Everybody is a target; everybody with communication is a target,” remarks another source close to the Utah project..." - <strong>Patrick Henningsen</strong> (<a href="http://brainmaping.com/wordpress/?p=826" target="_blank">READ MORE</a>)</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizQO1zpUdrMmDyor4SMonP6EA8oxpX8LSn4e4EQeVFbIaa509iAcUl98-5LW4r2-9xxmbox4J4rbRRWmviR0HFchFL-yHSKALLgvN_X3oLI54ZHlzGh97HfCgbQaorDvDzm_QhYf_n_S3C/s1600/Bill+Binney+01.JPG" imageanchor="1" style="clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="240" qda="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizQO1zpUdrMmDyor4SMonP6EA8oxpX8LSn4e4EQeVFbIaa509iAcUl98-5LW4r2-9xxmbox4J4rbRRWmviR0HFchFL-yHSKALLgvN_X3oLI54ZHlzGh97HfCgbQaorDvDzm_QhYf_n_S3C/s320/Bill+Binney+01.JPG" width="320" /></a></div>
<strong>William Binney</strong> is a former NSA crypto-mathematician who quit NSA after he realized it was openly and deliberately ignoring privacy limitations built into the Constitution, said in an interview with Bamford, holding his thumb and forefinger close together: “We are this far from a turnkey totalitarian state.” Binney headed up a team that built the infrastructure to spy on everyone all the time and, at the time, recommended that NSA install its “tapping gear” only at the nation’s “landing sites” — physical locations where fiber optic cables come ashore — to limit its eavesdropping to international communications only and preserving Americans’ right to privacy. But NSA ignored Binney’s recommendation and instead decided to build its spy center in Utah, connecting it with satellites and listening posts in Colorado, Georgia, Texas, Hawaii, and elsewhere, with direct links to NSA headquarters in Fort Meade, Maryland, NSA’s research facility in Oak Ridge, Tennessee, and last but not least, the White House. - <strong>Bob Adelmann</strong> (<a href="http://thenewamerican.com/tech-mainmenu-30/computers/11246-nsas-stellar-wind-cover-is-blown" target="_blank">READ MORE</a>)</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
</div>
<div style="text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/m6okymtdAWs?feature=player_embedded' frameborder='0'></iframe></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<strong>Related Reading:</strong> </div>
<ul>
<li><div style="text-align: justify;">
<a href="http://original.antiwar.com/engelhardt/2012/04/03/data-mining-you/" target="_blank">Data Mining You</a></div>
</li>
<li><div style="text-align: justify;">
<a href="http://blogs.chicagotribune.com/news_columnists_ezorn/2012/04/out-in-the-desert.html" target="_blank">Out in the desert</a> </div>
</li>
<li><div style="text-align: justify;">
<a href="http://americanfreepress.net/?p=3596" target="_blank">CIA Super Spy Centers Near Completion</a> </div>
</li>
<li><div style="text-align: justify;">
<a href="http://stevenmcollins.com/WordPress/?p=5289" target="_blank">Exposé of the NSA By Top Insider</a> </div>
</li>
<li><div style="text-align: justify;">
<a href="http://www.zerohedge.com/news/%E2%80%9Cwe-are-far-turnkey-totalitarian-state-big-brother-goes-live-september-2013" target="_blank">“We Are This Far From A Turnkey Totalitarian State" - Big Brother Goes Live September 2013</a></div>
</li>
<li><div style="text-align: justify;">
<a href="https://www.eff.org/deeplinks/2012/03/nsa-chief-denies-ability-warrantlessly-wiretap-despite-evidence" target="_blank">NSA Chief Appears to Deny Ability to Warrantlessly Wiretap Despite Evidence</a> </div>
</li>
<li><div style="text-align: justify;">
<a href="http://www.deseretnews.com/article/865552362/National-Security-Agency-not-vouching-for-details-about-its-Utah-spy-center.html" target="_blank">National Security Agency not vouching for details about its Utah spy center</a> </div>
</li>
<li><div style="text-align: justify;">
<a href="http://www.cato-at-liberty.org/top-nsa-mathematician-i-should-apologize-to-the-american-people-its-violated-everyones-rights/" target="_blank">Top NSA Mathematician: ‘I should apologize to the American people. It’s violated everyone’s rights.’</a> </div>
</li>
<li><div style="text-align: justify;">
<a href="http://www.youtube.com/watch?v=pkX11sbucnQ" target="_blank">Coast To Coast AM March 29 2012 - NSA Surveillance, Mysterious ObjectsBooms, & Fukushima Part 2</a> (Video)</div>
</li>
</ul>TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-60295280483507129062012-12-16T00:00:00.010-05:002012-12-16T00:00:08.111-05:00Asian TIs<div dir="ltr" style="text-align: left;" trbidi="on"><object class="BLOGGER-youtube-video" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" data-thumbnail-src="http://0.gvt0.com/vi/_v2izt3Xljk/0.jpg" height="300" width="500"><param name="movie" value="http://www.youtube.com/v/_v2izt3Xljk&fs=1&source=uds" /><param name="bgcolor" value="#FFFFFF" /><embed width="500" height="300" src="http://www.youtube.com/v/_v2izt3Xljk&fs=1&source=uds" type="application/x-shockwave-flash"></embed></object><br />
<div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Zhang Huimin</strong> "...The most frightening is the usage of the invisible electromagnetic waves that virtually deprived me of any sense of well-being. Not only were my brain and body attacked, my sleep deprived, but also my sense of direction was disoriented. My emotion was under control, and sometimes I sense that they are capable of reading my thoughts, if not seeing what I see. The attack of these unseen electromagnetic waves is often a direct response to my emotional swings, and I figure that the use of mind control machine or thoughts reading is involved in this high-tech surveillance. The persecution continued after I returned to Boston in the summer of 2004, and at the moment I am constantly under the attack from electromagnetic waves, which affects different parts of my body: eyes, heart, nose, brain, and have visibly undermined my health condition. They have now taken over my breath, and at one time made my eyes swollen through continuous attack. I was kept awake at nights, and sometimes hide myself in the closet to escape from the merciless invasion. My own experiences drove me into extensive research, and I discovered that at least two other Chinese intellectuals are under similar electromagnetic persecution. One of them is Chen Yuansen, a writer who has received Canadian political protection for his writing that recounts the brutal history during the Land Reform, a history that has been hitherto kept as a secret by the CCP. Another man has received such attack for over 30 years, ever since the 70's, because of his refusal to cooperate during the Cultural Revolution. The man is now in the US. The personal accounts of these two victims are enclosed..." - <strong>Xiandos</strong> (<a href="http://en.xiandos.info/2005-05-25:_Zhang_Huimin_-_An_Urgent_Plead_from_a_Political_Asylum:_Victims_of_Chinese_Electromagnetic_Weapon" target="_blank">READ MORE</a>)</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Chen Yuansen</strong> "...One day in December, Chen met a Chinese lady from the Mainland who was working in the IT Department in Montreal. He asked her about the slow performance of his laptop. After she examined it, she told him that the anti-virus software he installed in his laptop also acted as spy ware. She told him, "As long as your computer is connected to the Internet, the Ministry of Public Security in Beijing knows everything that you are doing." She went on to explain that the software was developed two years ago by a company in Zhongguancun, Beijing for the Chinese Ministry of Public Security. Chen was shocked and wasn't sure what to do. He didn't know how to explain it to his daughter, and instead went to ask his trustworthy friends for advice..." - <strong>Feng Daosheng</strong> (<a href="http://www.theepochtimes.com/news/5-2-8/26329.html" target="_blank">READ MORE</a>)</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Iris Chang</strong> "...There are aspects of my experience in Louisville that I will never understand. Deep down I suspect that you may have more answers about this than I do. I can never shake my belief that I was being recruited, and later persecuted, by forces more powerful than I could have imagined. Whether it was the CIA or some other organization I will never know. As long as I am alive, these forces will never stop hounding me…Days before I left for Louisville I had a deep foreboding about my safety. I sensed suddenly threats to my own life: an eerie feeling that I was being followed in the streets, the white van parked outside my house, damaged mail arriving at my P.O. Box. I believe my detention at Norton Hospital was the government’s attempt to discredit me…I had considered running away, but I will never be able to escape from myself and my thoughts. I am doing this because I am too weak to withstand the years of pain and agony ahead.” …The report stated that Iris had been taking two medications: the mood stabilizer Depakote, an anticonvulsant similar to lithium; and a smaller dosage of Risperdal, an antipsychotic drug commonly used to control mania, which is also thought to reduce suicide risk. Sluggishness is a common side effect of Depakote, because it subdues the manic phase of bipolar disorder by depressing the central nervous system..." - <strong>Heidi Benson</strong> (<a href="http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2005/04/17/CMGCNBQRRP1.DTL" target="_blank">READ MORE</a>)</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Alan Yu</strong> "...The best way to read thoughts is to make the subject fall asleep and dreams because at those time the person being investigated has very little control what his mind is thinking, and this allow the investigator to influence the subject to dream about matters which the investigators think are important. So the investigator will conduct their investigations mostly at night. But you must remember, they can read your thoughts any time even when you completely awake. If the investigators are interested in some special information, then they will not just read the thoughts, but they will also actively direct subject to think about the things the investigators are interested. Not only can the EMR mind machine decode brain patterns, it can also send information to the brain using brain patterns. As an example, the investigators might send a picture of something the investigator is interested to the subject's brain, and this will trigger the subject start thinking about the information the investigators are after. This also allow the investigators to study the personality and the history of the subject..." - <strong>Xxxxx</strong> (<a href="http://www.netti.fi/~makako/mind/yu.htm" target="_blank">READ MORE</a>)</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Khanh Dac Pham</strong> "...I flew to Kuala Lumpur, Malaysia. When I was on the flight, they used brain-communicator weapon to project a man appearing in my brain. He is Hoai Linh, a stager at oversea. He said something during the flying but I could not remember. After leaving Kuala Lumpur International Airport (KLIA), I stayed at room No.208 in Orkid Inn Hotel, 258 Jln Pudu 55100 Kuala Lumpur Malaysia. During two days here, that was awe-inspiring days. Le Minh wing had used high-tech weapons to grill me. Specially, these weapons brought on real torture but it did not track on me. They disappeared my tongue with many tortures. I could not burst out. Then they bended round my body. It was an awe-inspiring sight. They continuously torture me till to become crazy mind and torture body. After that, somebody said “we are Spring Party. Do you want to follow?”. And I said “I do not want to follow politic way”. Then, they did not say anything and I did not hear any their sound. Le Minh wing enforced me to kotow and crawl around the room. They said “you are a prisoner of C.I.A and here is C.I.A prison”. They robbed me a swatch and a hand-phone. Then a Malaysian said “if you want to stay in Malaysia, you have to do the same, crawling”. At that time, I was very crazy and I did that. And they said “a man will come to my room and fuck my vent. And he could beat me”. Then, they said “they are kidding”. After that, a U.S wing, Malaysia & Russia wing argued together. And let me as a sample for torturing...They used an weapon to disappear the water in my body. Then, they had used high-tech weapon as at the room of the hotel. And they incised my inside body and concurrently threatened in mind. They incised me two phases. Second time was more torture. What awe-inspiring was for me! They enforced me to go to the border of Vietnam and Cambodia to carry Heroin to Vietnam for Le Minh. I denied. Theretofore, I said “I want to be death by a shoot at head”. They did not agree and continuously tortured me at the air port. Then, they enforced me to run to a forest. Otherwise, they would shoot my legs. But I requested to shoot my head. They did not shoot and they tried other methods to enforce me into a forest. I was at that forest for a day with their threatening...I reported the police by speaking and then writing a report by the police’s speaking. Then, I found to some hotels nearby for staying but I have not found it. They said “somebody will take you soon”. Then, a Malaysia, tour assistant took me back Orkid Inn Hotel but Time Square Branch. Next few days, I changed the hotel. And they began to swear me all day. Then, I went back to my country. After I went back my country, they continuously threatened me and they wanted to cut my penis again. This time, they projected a man in my brain..." - <strong>Khanh Dac Pham</strong> (<a href="http://wordpressblog.dakha.com/?p=137" target="_blank">READ MORE</a>)</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Takahiro Goto</strong> "...I am a Japanese victim of thought reading and mind assaults by media, university professors etc.. This page is against psychotronic abuse of mind-control human experiments. I had no concept and no imagination for mind-invasion until August 1998 when NHK TV media began to make continual verbal attacks through their programs. I had to live with tremendous fear of 24 hours surveillance for five years, and I am deprived of my life for a long time. Many university professors, graduate students and people who know each other participated in this violent operation. I have been deprived of much of my life and opportunities. Helicopters and ambulances continue to torture me making huge noise around me. I was nearly killed. Every one need to understand the horrible aspect of this violent technology and we should prevent to make any miserable human sacrifices..." - <strong>Takahiro Goto</strong> (<a href="http://www5f.biglobe.ne.jp/~terre/index_english.html" target="_blank">READ MORE</a>)</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Wenlong Ma</strong> "...I live in Taiwan China. My nationality is Chinese. I realized I was attacked on May 2002 in Fuzhou of China. On April 2002, I went to Fuzhou to meet with a girlfriend who was introduced by my uncle. I met with Yuan ( a Taiwan business man in China ) and gave my passport to him. But on the second day, I “heard” that Yuan wanted to kill me, so I ran to Shanghai. Because I was very ill when I was on the train, So I got off train in Wuyi Mountain , Fujian . But on the second day, I felt that some people were following me, so I took another train to Shanghai . In Shanghai I received a call from Yuan ask me to pay him some money. He returned my passport. I stayed in Shanghai for only few days and went back to Taiwan .After I went back Taiwan , the torturers started to torture and harass me. I “heard” all the voices from my neighbors. I lived on the third floor, everyday I heard the forth floor knock the floor, and second floor also knocked the floor everyday. The “Voices” often said” kill his father, kill his mother, kill his sisters”. My dad already passed away on August 95. Now I have suffered for 5 years, I could not read, I could not work, I could not live a normal life, I could not sleep well, I could not think freely. And I was under the threat of murder. I am not the first victim. If we don’t work to stop it, I am sure I will not be the last one.I hope through our hard working, we can stop such fascists torture, we can protect world freedom and human Rights..." - <strong>Wenlong Ma</strong> (<a href="http://tw.myblog.yahoo.com/ivan-123" target="_blank">READ MORE</a>)</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Soleilmavis</strong> "...The first week I stay in Shanghai, they do not torture and harass me. I go to buy some food and also go to buy some CD. But since the second week, they start to torture and harass me very cruelly. And most of the time I have to lie down on the bed. They even don’t allow me to sleep at night for few days. I have to call a cleaner to help me, send letters; buy food; clean house. They start disturbing me listening to music, they never done that before. On 21 Jul, I send some CD to United Nations; I wish that those CD can record their disturbing voices. Their voices sound from neighbors. So I even make a mistake when I write letters to United Nations. I say:” They are in my neighbor because their voices sound come from neighbors house.” There are also some people come to my room and search my things when I am not home. From the Television, I see many people wear ties which the color I like very much. No matter whether they know it is my favorite color or they don´t know it is my favorite color, it is still a grateful thing for me. This always makes me to remember a story…I also send a letter to United Nations to convey my strong wish to go to School to study. Because those voices tortures and harassed me and did not allow me study in Australia, so I wish that I can go to other country to study. I receive a letter from United Nations and tell me even they can not support my study personally, but they give me an address of Europe Union where they have some information for higher education. One day, I also go to Peace Hotel to have a breakfast. I see 2 Australian men and one Chinese man taking their food and they are talking about. One of them says:” I have been to Hong Kong, Thailand and Guangzhou.” The Chinese man says:” It is hard to live a life in Europe..." - <strong>Soleilmavis</strong> (<a href="http://targetedindividualscanada.wordpress.com/2011/10/10/soleilmavis/" target="_blank">READ MORE</a>)</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Zhang Shujie</strong> "...Zhang was called to a meeting with state security agents in the city of Chongqing on February 24, 2011. This was at the start of a large-scale pre-emptive crackdown in China to snuff out discussion of a ‘Jasmine Revolution’ inspired by events in the Middle East and North Africa. Zhang was not allowed to contact a lawyer or to inform his family. Security agents said they ‘knew everything’ about his activities and told him he could be detained indefinitely, i.e. ‘disappeared’, unless he gave them information about everyone he had met or been in contact with, ‘confessed’ his links with the CWI, and agreed to ‘cooperate’ with the security forces. Such methods are typical for the state security forces in China. When Zhang was first taken for interrogation he was held for 28 hours during which time he was made to stand, deprived of his spectacles and refused food for several hours. Despite the fact that he was never formally charged with an offence, his computer, mobile phone and bank documents were seized and examined for evidence. He was warned he could face several years imprisonment for ‘contact with a banned organisation’ and for ‘crimes relating to state security’. He was told that he could avoid this fate if he ‘cooperated’ with the security forces. With no alternative, Zhang agreed to their demands. Unknown to police and against their explicit instructions, he contacted CWI comrades to seek advice and help..." - <strong>CWI reporters</strong> (<a href="http://chinaworker.info/en/content/news/1710/" target="_blank">READ MORE</a>)</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Terukatsu Ishibashi</strong> "...Sufferings by the electromagnetic waves in the Japanese version are very varied. this means that the electromagnetic waves can be misused in many different ways. There are, of course, common types of misuses. These common types of misuses suggest that a lot of crimes might be perpetrated by this technology's misuses. Some serious crimes taking place in Japan these days do not seem to be natural for Japanese society. This reality makes one presume the presence of outside factors, for example, mind-control technology. The fact that the problem is a key to understanding our society indicates that the perpetrator is also deeply involved in Japanese society. The situation would be similar in other countries. The problem must be an inevitability of human history though the total reality is still hidden..." - <strong>Entangled in an EM</strong> (<a href="http://entangled-emfield.blogspot.ca/2005/06/microwave-harassment.html" target="_blank">READ MORE</a>)</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Mukazo Mukazo Vunda</strong> "...Using a lot of evidence that has surfaced to date on covert warfare, including first hand accounts by those who say they were or remain targets of such attacks, Mr. Vunda presents the argument societies world-wide are actually confronted with ever expanding covert warfare waged against those who are considered threats to the order. Rather than natural conditions or accident, it is these attacks that are responsible for the peculiar, suspicion raising manner a lot of activists, whistleblowers and the like are known to meet their ends, if not that they are the cause for the present negative mental and physical state of a lot of the victims, even the communities to which they belong since this covert warfare doesn't only manifest as attacks on individuals such as activists and whistleblowers, but as attacks on the entirety of target communities meant at weakening their punch. This can come in the form of the many attacks that have come to our attention to date, of which tetanus vials found to contain human chorionic gonadotrophin (hCG), a naturally occurring hormone essential for maintaining a pregnancy that when introduced into the body together with a tetanus toxoid carrier tricks it into attacking the hormone too, creating a means of birth control, is one. Another could be seen in the deliberate spread of GMO foods, or the American Alexander Cockburn's description of a 1960 American Army Chemical Corps experiment where mosquitoes with yellow fever and dengue fever were dispersed in Savannah, Georgia and Avon Park, Florida (a predominantly African region), events that were obviously repeated around the world, using different agents, wherever a threat was identified..." - <strong>Omega</strong> (<a href="http://mindcontrol.twoday.net/stories/2499300/" target="_blank">READ MORE</a>)</div><div style="text-align: justify;"><br />
</div><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/LJT897HHWkE?feature=player_embedded' frameborder='0'></iframe><br />
<div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Related Reading:</strong><br />
<a href="http://www.hawaii.edu/powerkills/DBG.CHAP2.HTM" target="_blank">Definition of Democide</a><br />
<a href="http://www.darkgovernment.com/echelon.html" target="_blank">The "ECHELON" System</a><br />
<a href="http://bostonreview.net/BR36.4/ndf_ying_ma_china.php" target="_blank">A More Targeted Repression</a><br />
<a href="http://www.cbc.ca/news/technology/story/2011/06/02/technology-google-china-hacking.html" target="_blank">China denies Google hacking allegations</a><br />
<a href="http://citizenlab.org/2012/03/information-operations-and-tibetan-rights-in-the-wake-of-self-immolations-part-i/" target="_blank">Information Operations and Tibetan Rights in the Wake of Self-Immolations: Part I</a><br />
<a href="http://www.targeted-individuals-europe.com/?q=node/7" target="_blank">Unit 731, Japanese Human Medical Experiments during the WW2</a> (Video)</div></div>TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-39536779719065543482012-12-14T00:00:00.012-05:002012-12-14T00:00:13.987-05:00John Ginter<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhErS7q7TR56kKktnR1-3ERBAsDYlw4biFkhEjWg3_U0_TIWweHSl9UxE5M3qBR6PawFXnch_yY_h5E2bsQIcr0B_XKp2KeycwX_-7tRg1CZrObkHWDa7bZAEzlalDKMiYHmKQH-HdPo7JS/s1600/John+Ginter+2.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" dea="true" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhErS7q7TR56kKktnR1-3ERBAsDYlw4biFkhEjWg3_U0_TIWweHSl9UxE5M3qBR6PawFXnch_yY_h5E2bsQIcr0B_XKp2KeycwX_-7tRg1CZrObkHWDa7bZAEzlalDKMiYHmKQH-HdPo7JS/s400/John+Ginter+2.JPG" width="500" /></a></div><div style="text-align: justify;"><strong>Pavlovian conditioning with negative psychological stimulus</strong> "...Using midn control technology, the experimentors knew what I was thinking and feeling. I filed a court case in 1968 stating, "(A) brain device at San Quentin is being used upon (me) to alter or destroy (my) brain" and "the machine emitteed electro-magnetic waves which stimulated petitioner's brain." I think the goal of the behavior experiments performed on us was to develop the computer-brain technology for political purposes and as an intelligence tool. Using Pavlovian conditioning with negative psychological stimulus, maniputators can change your behavior. For example, they verbally attacked my conservative political views all day long for days on end. They would praise all of the persons around me such as the world-famous leader of the Soledad Brothers, George Jacson, who was in a nearby cell. As in brainwashing, they tried to change my values..." - <strong>John Ginter</strong> (<a href="http://www.lambros.name/pdf/Ex_Con_Suit.pdf" target="_blank">READ MORE</a>)</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>M.I.N.D. Device or Magnetic Integrated Neuron Duplicator</strong> "...John Akwei, a victim but not a prisoner, has filed a court case that described alleged "remote neural monitoring and electronic brain link technology" (Washington, DC. Civil Action No 92-0449). The theory behind mind control technology is that the brain emits electromagnetic energy like an eeg that can be detected and analyzed. Computers can correlate behavior and speech to the brainwave signals and the mind can be remotely deciphered. This theory also works in reverse. In stimulating or controlling behavior, the brain communicates via electromagnetic signals and certain frequencies create and correspond with specific mood states and behavior. The brain cannot differentiate a foreign signal from it's own. By targeting the subconscious mind with messages as hypnotists do, the technology can remotely target the subconscious and it becomes a very potent mind control weapon. This is a simple explanation of complex technology but with President Bush proclaiming the 1990s the Decade of the Brain, it is well within the realm of reality. One of the best books on this topic is Dr. Becker's The Body Electric: Electromagnetism and The Foundation of Life, 1985. Using mind control technology, the experimenters knew what I was thinking and feeling. I filed a court case in 1968 and it stated, "...a brain device at San Quentin is being used upon him to alter or destroy his brain." and "The machine emitted electromagnetic waves which stimulated petitioners brain." They could communicate directly with my mind. At one point, they kept me awake for twenty-seven days and nights. Dr. Schmidt, the chief psychiatrist of San Quentin later told me that they had used a M.I.N.D. device or magnetic integrated neuron duplicator on me as well as General Erwin Walker. Walker was the target of a missed gunshot by Oswald at the time of the JFK murder. General Walker, like myself was known for his strong political opinions. I think that the goal of the behavior experiments performed on myself and General Walker were to develop the computer-brain technology for political purposes and as an intelligence tool. They used pavlovian conditioning with negative psychological stimulus, and in this way, they can change your behavior. For example, my political views would be degraded all day long for days on end. The court case, Orlikow v U.S. 682 F.Supp77 (D.C.C.1988) describes the Canadian court case of brainwashing and details a history of mind control experimentation by the CIA. In these experiments, which have relevant similarities to my experience, a Grid Room was used. "The subject's brainwaves were beamed to a nearby reception room, voice analyzers..." (Thomas, Journey Into Madness The True Story of Secret CIA Mind Control and Medical Abuse, 1989)..." - <strong>Raven1</strong> (<a href="http://www.raven1.net/mcf/v/ginter.htm" target="_blank">READ MORE</a>)</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>mind control arsenal</strong> "...American victim's accounts match Russian accounts: 1. U S District Court Eastern District of CA No Misc. 94-097-WBS John M. Ginter, Plaintiff, v. California Department of Corrections, et al., Defendants. John Ginter, San Quentin prisoner with high school education described in his 1967 court case that Dr. Schmidt, the San Quentin psychiatrist called the equipment used on John, "M.I.N.D. or Magnetic Integrated Neuron Duplicator". 2. Los Angeles Times, 3-28-88 part 2 page 1, "A Fearful Fix Grips Figure in Kickbacks" by Kim Murphy, Rex Niles, an FBI informant in a defense contractors kick back case in Los Angeles, CA. Photo caption stated, "His aluminum foil hat has tiny holes in it, says Rex Niles, proof that the government is bombarding him with microwaves in an attempt to kill him." He had detected microwave signals but was still labeled mentally ill." 3. New York Times Magazine, Aug. 31, 1997, "Atomic Guinea Pigs" by Michael D'Antonio "At the Department of Energy, which oversees America's nuclear-weapons research, these people [radiation experiment victims] were referred to collectively as "the Crazies." But the opening of the cold-war archives has brought the Crazies in from the fringe." The mind control victims in Russia and the U.S. are both labeled mentally ill...Victims have two strong arguments for demanding an investigation into their allegations. If the Russians have mind control weapons, the U.S. undoubtedly has a mind control arsenal..." - <strong>V.N Lopatin and V.D. Tsygankov</strong> (<a href="http://www.bibliotecapleyades.net/ciencia/ciencia_psychotronicweapons14.htm" target="_blank">READ MORE</a>)</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdNqIIG2OyRhrS4oqbUezpaV-0YVivGL9IjDPId43J4vT4Ul4_-65SPBCtUjWSuaVtbZLoeABGvibw-3ivvD-9SuNHQRqQw4mBIRQ0e6zqtQB0MF7O0DKCBQjvT6XQ-QeXod5b5LYmSEwh/s1600/john+ginter+1.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" dea="true" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdNqIIG2OyRhrS4oqbUezpaV-0YVivGL9IjDPId43J4vT4Ul4_-65SPBCtUjWSuaVtbZLoeABGvibw-3ivvD-9SuNHQRqQw4mBIRQ0e6zqtQB0MF7O0DKCBQjvT6XQ-QeXod5b5LYmSEwh/s400/john+ginter+1.JPG" width="500" /></a></div><strong>John Ginter</strong> died of lung cancer on October 24, 2007. He was 70. He will be greatly missed. John told the hospice worker that he accomplished the two things he wanted to. One was to take care of his German mother. And the other was "to expose the M.I.N.D. (Magnetic Integrated Neuron Duplicator) device." John was an avid reader and a great mind control researcher. He knew so much about alternative press and issues. In his true story below, John wrote about Dr. Schmidt, the chief psychiatrist of San Quentin who told John that they had used aM.I.N.D. device or magnetic integrated neuron duplicator on him in 1967, as well as General Erwin Walker. Walker was the target of a missed gunshot by Oswald at the time of the JFK murder. General Walker, like John was known for his strong political opinions. As a result of John's experience, I named Mind Justice.org after the M.I.N.D. device and have promised John I will continue looking for this machine. - <strong>Cheryl Welsh</strong> (<a href="http://www.mindjustice.org/ginter.htm" target="_blank">READ MORE</a>)</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Related Reading:</strong><br />
<a href="http://www.mindjustice.org/ginter-transcript.htm#top" target="_blank">John Ginter Interview Transcript</a><br />
<a href="http://www.mindjustice.org/mind.htm" target="_blank">1966 U.S. space research confirms John Ginter's 1968 description of M.I.N.D. device, or magnetic integrated neuron duplicator</a><br />
<a href="http://www.lambros.name/pdf/Ex_Con_Suit.pdf" target="_blank">Ex-Con Plans Class Action Suit</a><br />
<a href="http://targetedindividualscanada.wordpress.com/tag/john-ginter/" target="_blank">Victims’ Stories 1999 – 2005</a><br />
<a href="http://www.mindjustice.org/ginter.mp3" target="_blank">John Ginter Interview Transcript</a> (Audio)<br />
<a href="http://www.mindjustice.org/ginter.wmv" target="_blank">John Ginter Interview Transcript</a> (Video)</div></div>TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-75671009585534990832012-12-12T00:00:00.010-05:002012-12-12T00:00:11.863-05:00Margaret Singer<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilqj4HmFpiJKqOkpDssfbyVA0rIIBXIwCPiBkWq_uUJPQUuh0kKKXrJKO5sj6YQWRXbLtqqvdhF_PYFytRLvF8yM7XCSyFq8UzlYLNtdB88ENwXoa_vfN47o6nMRbQkJDtORF0rWnrkNR3/s1600/M+SINGER.JPG" imageanchor="1"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilqj4HmFpiJKqOkpDssfbyVA0rIIBXIwCPiBkWq_uUJPQUuh0kKKXrJKO5sj6YQWRXbLtqqvdhF_PYFytRLvF8yM7XCSyFq8UzlYLNtdB88ENwXoa_vfN47o6nMRbQkJDtORF0rWnrkNR3/s400/M+SINGER.JPG" width="500" /></a></div><div style="text-align: center;"><br />
</div><div style="text-align: justify;"><strong>"not me myth"</strong> - "...Just as most soldiers believe bullets will hit only others, not themselves, most citizens like to think that their own minds and thought processes are invulnerable. " Other people can be manipulated, but not me," they declare. People like to think that their opinions, values and ideas are inviolate and totally self-regulated. They may admit grudgingly that they are influenced slightly by advertising. Beyond that, they want to preserve a myth in which other persons are weak-minded and easily influenced, but they are strong-minded. People cherish a fantasy that manipulators confront, browbeat and argue people into doing their bidding. They envision Big Brother coming in storm-trooper boots, holding guns to heads and forcing persons to change their beliefs, alter their personalities, and accept new ideologies. Orwell drew on the wisdom of the ages -- most manipulation is subtle and covert. Orwell envisioned the evolution of an insidious, but successful mind and opinion manipulator. He would appear as a smiling, seemingly beneficent Big Brother. But instead of one Big Brother, we see hordes of Big Brothers in the world today...These extremes of social and psychological manipulations of thought and conduct are often disregarded by Americans because the events occurred for away and could be dismissed as merely foreign propaganda, and political acts. The reasoning was based on the "not me myth" -- not in our land could such happen. Then we had to begin looking at certain events that were occurring the California and see that extremes of influence and manipulation were possible here..." (<a href="http://www.ideajournal.com/articles.php?id=12" target="_blank">The "Not Me" Myth: Orwell and the Mind</a>)</div><div style="text-align: center;"><br />
</div><div style="text-align: justify;"><strong>"unscrewed up"</strong> - "...I might look like a little old grandma, but I'm no pushover,'' she told a reporter last year, just before tossing back another shot of Bushmills Irish whiskey, her libation of choice. "My mom spent her whole life assisting other people -- victims, parents or lawyers -- and often for free,'' said Sam Singer, a San Francisco publicist. "Nothing gave her greater joy than helping to get someone unscrewed up.'' She was occasionally threatened by cult leaders and their followers, and she never backed down. Professor Singer liked to tell how, at the age of 80, she frightened off a stalker who had been leaving menacing notes in her mailbox. "I've got a 12-gauge shotgun up here, sonny, and you'd better get off my porch, or you'll be sorry!'' she hollered out the window. "And tell your handlers not to send you back!...'' (<a href="http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2002/05/26/CM67534.DTL" target="_blank">Margaret Singer -- expert on brainwashing</a>)</div><div style="text-align: center;"><br />
</div><div style="text-align: justify;"><strong>"coercive persuasion"</strong> - "...Looking like peaceful persuasion is precisely what makes coercive persuasion less likely to attract attention or to mobilize opposition. It is also part of what makes it such a devastating control technology. Victims of coercive persuasion have: no signs of physical abuse, convincing rationalizations for the radical or abrupt changes in their behavior, a convincing "sincerity, and they have been changed so gradually that they don't oppose it because they usually aren't even aware of it. Deciding if coercive persuasion was used requires case-by-case careful analysis of all the influence techniques used and how they were applied. By focusing on the medium of delivery and process used, not the message, and on the critical differences, not the coincidental similarities, which system was used becomes clear. The Influence Continuum helps make the difference between peaceful persuasion and coercive persuasion easier to distinguish...Coercive persuasion is antithetical to the First Amendment. It is the unfair manipulation of other's biological and psychological weaknesses and susceptibilities. It is a psychological FORCE technology, not of a free society, but of a criminal or totalitarian society. It is certainly not a spiritual or religious technology. Any organization using coercive persuasion on its members as a CENTRAL practice that also claims to be a religion is turning the SANCTUARY of the First Amendment into a fortress for psychological assault. It is a contradiction of terms and should be "disestablished." Coercive persuasion is a subtle, compelling psychological force which attacks an even more fundamental and important freedom than our "freedom of religion..." (<a href="http://www.factnet.org/node/897" target="_blank">How does Mind Control Work?</a>)</div><div style="text-align: center;"><br />
</div><div style="text-align: justify;"><strong>"orchestrated process of exploitative psychological manipulation"</strong> - "...Contrary to popular misconceptions (some intentional on the part of naysayers), a thought reform program does not require physical confinement and does not produce robots. Nor does it permanently capture the allegiance of all those exposed to it. In fact, some persons do not respond at all to the programs, while others retain the contents for varied periods of time. In sum, thought reform should be regarded as "situationally adaptive belief change that is not subtle and is environment-dependent"...Finally, to promulgate the myth that though reform has been rejected by the scientific community, cult apologists doggedly stick to faulty understanding of the process contrary to findings in the literature, they ---- that physical coercion and debilitation are necessary for thought reform to occur, and that the effects of thought reform must be instant, massive, uniform, universally responded to, and enduring. The recent upholding of thought reform in DSM-IV is but one more piece of evidence that this orchestrated process of exploitative psychological manipulation is real and recognized within the professional psychiatric field. To say then that the concept of thought reform is rejected by the scientific community is false and irresponsible. The phenomenon has been studied and discussed since 1951, and continuing studies by social psychologists and other behavioral scientists have solidified our understandings of its components and overall impact..." (<a href="http://www.factnet.org/node/1830/" target="_blank">Mind Control/Brainwashing/Thought Reform Exists</a>)</div><div style="text-align: center;"><br />
</div><div style="text-align: justify;"><strong>Dr. Margaret Thaler Singer</strong>, (1921–2003) was a clinical psychologist and a part-time Adjunct Professor in the Department of Psychology at the University of California, Berkeley, U.S. Singer's main areas of research included schizophrenia, family therapy, brainwashing and coercive persuasion. Singer performed research at the University of Colorado’s School of Medicine, Walter Reed Army Medical Center Institute of Research, the National Institute of Mental Health, the United States Air Force and the Massachusetts Institute of Technology. She received many awards for her work, including the Leo J. Ryan Memorial Award, the Research Scientist Award from the National Institute of Mental Health, and both the Hofheimer Prize and the Stanley R. Dean Award from the American College of Psychiatrists. In the 1960s she began to study the nature of cults and mind control and served on the board of the American Family Foundation. She is the author of the book Cults in Our Midst. She gave expert testimony in several cult-related trials, including the 1976 trial of Patty Hearst, who had previously been kidnapped by the Symbionese Liberation Army, and the 1977 hearing for five members of the Rev. Sun Myung Moon's Unification Church. In 1987, as head of the APA taskforce on Deceptive and Indirect Techniques of Persuasion and Control for the American Psychological Association, Singer oversaw the production of a report that was later rejected by the APA's Board of Social and Ethical Responsibility for Psychology. Thereafter, Singer's expert testimony in four subsequent cases was not accepted. In 1992 she sued the APA for "defamation, frauds, aiding and abetting and conspiracy", but in 1994 she lost. Articles in The New York Times and The Los Angeles Times reported complaints by Singer and her family that she had been enduring harassment and death threats due to her "battles" with the cults. An obituary in The New York Times described harassment, death threats against Singer, and dead animals found on her doorstep, due to her "battles" involving cults and brainwashing. A biography of Singer published by Thomson Gale states that her "enemies among cults" were responsible for harassing her. Another obituary that appeared in The Los Angeles Times claims that cult "operatives" went through Singer's trash and mail, picketed her lectures, hacked into her computer and released live rats in her house. Statements made by her family to the San Francisco Chronicle, include allegations that one "cultist" worked her way into Singer's office, stole students' term papers and sent notes to Singer's students, and that groups harassed her family as well. A Time Magazine article described Singer as an outspoken Scientology critic who traveled under an assumed name to avoid harassment. Margaret Singer died of pneumonia on November 23, 2003 in Berkeley, California, at the Alta Bates Medical Center. She was 82. Singer was survived by her husband, two children, and five grandchildren (<a href="http://en.wikipedia.org/wiki/Margaret_Singer#Honors_and_awards" target="_blank">Wikepedia</a>).</div><div style="text-align: center;"><br />
</div><div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/g9rj4R4QhQg?feature=player_embedded' frameborder='0'></iframe></div><div style="text-align: center;"><br />
</div><div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/WrbDZ7DOoKU?feature=player_embedded' frameborder='0'></iframe></div><div style="text-align: center;"><br />
</div><div style="text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/og3Pgz66fsU?feature=player_embedded' frameborder='0'></iframe></div><div style="text-align: center;"><br />
</div><div style="text-align: center;"><strong>RELATED READING:</strong><br />
<a href="http://factnet.org/" target="_blank">Fight Against Coercive Tactics Network</a><br />
<a href="http://en.wikipedia.org/wiki/Cults_in_our_Midst_(book)" target="_blank">Cults in Our Midst</a><br />
<a href="http://en.wikipedia.org/wiki/Recovery_from_Cults" target="_blank">Recovery from Cults</a><br />
<a href="http://www.cesnur.org/testi/APA_Documents.htm" target="_blank">Documents on Brainwashing Controversies and the APA</a><br />
<a href="http://www.cesnur.org/2003/singer.htm" target="_blank">Margaret Singer, Mother of Anti-Cult Brainwashing Theory, Dies in Berkeley</a><br />
<a href="http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2003/11/25/BAGAG3A5A11.DTL" target="_blank">Margaret Singer -- expert on brainwashing</a><br />
<a href="http://www.religiousfreedomwatch.org/religious-experts/false-experts/margaret-singer/" target="_blank">Who was Margaret Bridget Singer?(Video)</a><br />
<a href="http://www.religiousfreedomwatch.org/religious-experts/false-experts/margaret-singer/" target="_blank">Conditions for Mind Control</a><br />
<a href="http://www.preventelderabuse.org/nexus/singer.html/" target="_blank">An interview with Margaret Singer on Undue Influence</a><br />
<a href="http://www.icsahome.com/infoserv_articles/singer_margaret_6conditions.htm" target="_blank">Dr. Margaret T. Singer's 6 Conditions for Thought Reform</a><br />
<a href="http://www.lermanet2.com/scientologyhelp/singer.htm" target="_blank">Coming Out of the Cults</a><br />
<a href="http://www.rickross.com/reference/singer/singer5.html" target="_blank">Margaret Singer, 82; Expert on Brainwashing, Cults Testified at 1976 Trial of Patricia Hearst</a><br />
<a href="http://dmedia.ucsc.edu/~vdemaso/asg3/Singer/Evaluation/index.htm" target="_blank">Dr. Margaret Singer: An Evaluation of Her work</a><br />
<a href="http://keepingsweetinseattle.wordpress.com/2012/01/22/call-for-religious-communities-to-re-think/" target="_blank">A call for religious communities to re-think Social Justice stalking and help end it.</a><br />
<a href="http://video.google.com/videoplay?docid=3665309377360044214#" target="_blank">Margaret Singer Recovery from Cults 1991 (Video)</a></div></div>TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-3381757182996753582012-12-09T00:00:00.059-05:002012-12-09T00:00:05.469-05:00Philip Kindred Dick<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXEMCxiCcPBXpP3BuwmxIMRWUT06V-6vyq02e0UQrlNykFlyAwOMk2bXP2D-D65LfgkWBDNyhu0PziJK3ApyCnY5R4G_-6fDkxFFt0hTL2p0bJEIav1_SXZNTVNeC9AT_PJ_GoTzeADYaN/s1600/Philip+k+dick+01.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" rea="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXEMCxiCcPBXpP3BuwmxIMRWUT06V-6vyq02e0UQrlNykFlyAwOMk2bXP2D-D65LfgkWBDNyhu0PziJK3ApyCnY5R4G_-6fDkxFFt0hTL2p0bJEIav1_SXZNTVNeC9AT_PJ_GoTzeADYaN/s400/Philip+k+dick+01.JPG" width="500" /></a></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>absolute evil</strong> - "...I enjoyed writing all of them. But I think that if I could only choose a few, which, for example, might escape World War Three, I would choose, first, Eye in the Sky. Then The Man in the High Castle. Martian Time-Slip (published by Ballantine). Dr. Bloodmoney (a recent Ace novel). Then The Zap Gun and The Penultimate Truth, both of which I wrote at the same time. And finally another Ace book, The Simulacra. But this list leaves out the most vital of them all: The Three Stigmata of Palmer Eldritch. I am afraid of that book; it deals with absolute evil, and I wrote it during a great crisis in my religious beliefs. I decided to write a novel dealing with absolute evil as personified in the form of a "human." When the galleys came from Doubleday I couldn't correct them because I could not bear to read the text, and this is still true..." (<a href="http://en.wikiquote.org/wiki/Philip_K._Dick" target="_blank">Wikiquote</a>)</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>spotless mind</strong> - "...Dick died shortly before Blade Runner's release in 1982, and, despite a cult readership, he spent most of his life in poverty. Yet now, more than two decades later, the future he saw has made him one of the most sought-after writers in Hollywood. Paycheck, based on a 1953 short story Dick sold to a pulp magazine for less than $200, will bring close to $2 million to his estate. And movies based on more than a half-dozen other stories and novels are in the works - among them "The King of the Elves" at Disney, "The Short, Happy Life of the Brown Oxford" at Miramax, and A Scanner Darkly at Warner Bros. Dick's anxious surrealism all but defines contemporary Hollywood science fiction and spills over into other kinds of movies as well. His influence is pervasive in The Matrix and its sequels, which present the world we know as nothing more than an information grid; Dick articulated the concept in a 1977 speech in which he posited the existence of multiple realities overlapping the "matrix world" that most of us experience. Vanilla Sky, with its dizzying shifts between fantasy and fact, likewise ventures into a Dickian warp zone, as does Dark City, The Thirteenth Floor, and David Cronenberg's eXistenZ. Memento reprises Dick's memory obsession by focusing on a man whose attempts to avenge his wife's murder are complicated by his inability to remember anything. In The Truman Show, Jim Carrey discovers the life he's living is an illusion, an idea Dick developed in his 1959 novel Time Out of Joint. Next year, Carrey and Kate Winslet will play a couple who have their memories of each other erased in Eternal Sunshine of the Spotless Mind. Memory, paranoia, alternate realities: Dick's themes are everywhere..." (<a href="http://www.wired.com/wired/archive/11.12/philip_pr.html" target="_blank">The Second Coming of Philip K. Dick</a>)</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>transcendentally rational mind</strong> - "...In 1963, Dick won the Hugo Award for The Man in the High Castle.[5] Although he was hailed as a genius in the science fiction world, the mainstream literary world was unappreciative, and he could publish books only through low-paying science fiction publishers such as Ace. Even in his later years, he continued to have financial troubles. In the introduction to the 1980 short story collection The Golden Man, Dick wrote: “Several years ago, when I was ill, Heinlein offered his help, anything he could do, and we had never met; he would phone me to cheer me up and see how I was doing. He wanted to buy me an electric typewriter, God bless him—one of the few true gentlemen in this world. I don’t agree with any ideas he puts forth in his writing, but that is neither here nor there. One time when I owed the IRS a lot of money and couldn’t raise it, Heinlein loaned the money to me. I think a great deal of him and his wife; I dedicated a book to them in appreciation. Robert Heinlein is a fine-looking man, very impressive and very military in stance; you can tell he has a military background, even to the haircut. He knows I’m a flipped-out freak and still he helped me and my wife when we were in trouble. That is the best in humanity, there; that is who and what I love.”...throughout February and March 1974, he experienced a series of visions, which he referred to as “two-three-seventy four” (2-3-74), shorthand for February-March 1974. He described the initial visions as laser beams and geometric patterns, and, occasionally, brief pictures of Jesus and of ancient Rome. As the visions increased in length and frequency, Dick claimed he began to live a double life, one as himself, “Philip K. Dick”, and one as “Thomas”, a Christian persecuted by Romans in the 1st century A.D. Despite his history of drug use and elevated stroke risk, Dick began seeking other rationalist and religious explanations for these experiences. He referred to the “transcendentally rational mind” as “Zebra”, “God” and, most often, “VALIS”. Dick wrote about the experiences in the semi-autobiographical novels VALIS and Radio Free Albemuth. At one point Dick felt that he had been taken over by the spirit of the prophet Elijah. He believed that an episode in his novel Flow My Tears, the Policeman Said was a detailed retelling of a story from the Biblical Book of Acts, which he had never read. Philip K. Dick died in Santa Ana, California, on March 2, 1982. He had suffered a stroke five days earlier, and was disconnected from life support after his EEG had been consistently isoelectric since losing consciousness. After his death, his father Edgar took his son’s ashes to Fort Morgan, Colorado. When his twin sister Jane died, her tombstone had both their names carved on it, with an empty space for Dick’s death date..." (<a href="http://www.radiofreealbemuth.com/blog/?page_id=1392" target="_blank">Philip K. Dick Bio: Author</a>)</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>military operation</strong> - "...Around 1944-46, he underwent intensive psychiatric treatment against agoraphobia and some other psychological troubles. He entered Berkeley High School in 1944. At 18, he left his mother's flat, where he had been living since his parents' divorce. He moved to a flat shared with artists and homosexual poets; doing so was probably only to show his mother he could manage himself alone, since homosexuality didn't attract him. Besides, he quickly moved out to a small attic apartment, of course still in Berkeley. At this time he suffered tachycardia. He quickly became dependent on the medicines he's prescribed...The 17th of November, 1971, somebody broke into his house. He was convinced it was the CIA. This troubling event starts a paranoia in Dick's mind, for nothing of value has been taken away, just perishable food; it appears to have been more a military operation than a simple burglary, not to mention that his safe was opened with explosives! ...Around this period (1972), he met K. W. Jeter and Tim Powers at Cal-State in Fullerton; they attended a lecture by a writing professor named John Schwarz. The next year, he got many threatening phone calls. He sheltered in Canada without Kathy. There, he gave his famous lecture, THE ANDROID AND THE HUMAN, in Vancouver, first at the University of British Columbia and a day or two later as his Guest of Honor speech at the second annual Vancouver Science Fiction Convention; and met another DARK-HAIRED GIRL named Jamis..." (<a href="http://www.gnosis.org/pkd.FAQ.bio.html" target="_blank">Philip K. Dick (1928-1982)</a>)</div><div style="text-align: justify;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7o_i2ceLi9M2GbEDWVI9urmhu-Mw7YGl8eQBz4tnagSQVW-F2ixzE7tZXRZNY9liIKMETEZlfMZtLC819XTaeLNF0Ug01HYQ2OPa9JY7cihCe492pk4lVDS7QoqrFGqd2Bym_1D0xGsXN/s1600/Philip+k+dick+02.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" rea="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7o_i2ceLi9M2GbEDWVI9urmhu-Mw7YGl8eQBz4tnagSQVW-F2ixzE7tZXRZNY9liIKMETEZlfMZtLC819XTaeLNF0Ug01HYQ2OPa9JY7cihCe492pk4lVDS7QoqrFGqd2Bym_1D0xGsXN/s400/Philip+k+dick+02.jpg" width="500" /></a></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Philip Kindred Dick</strong> (December 16, 1928 – March 2, 1982) was an American novelist, short story writer and essayist whose published work is almost entirely in the science fiction genre. Dick explored sociological, political and metaphysical themes in novels dominated by monopolistic corporations, authoritarian governments and altered states. In his later works Dick's thematic focus strongly reflected his personal interest in metaphysics and theology. He often drew upon his own life experiences in addressing the nature of drug abuse, paranoia and schizophrenia, and transcendental experiences in novels such as A Scanner Darkly and VALIS. The novel The Man in the High Castle bridged the genres of alternate history and science fiction, earning Dick a Hugo Award for Best Novel in 1963. Flow My Tears, the Policeman Said, a novel about a celebrity who awakens in a parallel universe where he is unknown, won the John W. Campbell Memorial Award for best novel in 1975. "I want to write about people I love, and put them into a fictional world spun out of my own mind, not the world we actually have, because the world we actually have does not meet my standards," Dick wrote of these stories. "In my writing I even question the universe; I wonder out loud if it is real, and I wonder out loud if all of us are real." Dick referred to himself as a "fictionalizing philosopher." In addition to 44 published novels, Dick wrote approximately 121 short stories, most of which appeared in science fiction magazines during his lifetime. Although Dick spent most of his career as a writer in near-poverty, ten of his stories have been adapted into popular films since his death, including Blade Runner, Total Recall, A Scanner Darkly, Minority Report, Paycheck, Next, Screamers, and The Adjustment Bureau. In 2005, Time magazine named Ubik one of the one hundred greatest English-language novels published since 1923. In 2007, Dick became the first science fiction writer to be included in The Library of America series (<a href="http://en.wikipedia.org/wiki/Philip_K._Dick" target="_blank">Wikepedia</a>).</div><div style="text-align: justify;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/aFL02Dl7f3o?feature=player_embedded' frameborder='0'></iframe></div><div style="text-align: justify;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/lm9wd8EmzTk?feature=player_embedded' frameborder='0'></iframe></div><div style="text-align: justify;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/fLmHDs54pVQ?feature=player_embedded' frameborder='0'></iframe></div><div style="text-align: justify;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/jXeVgEs4sOo?feature=player_embedded' frameborder='0'></iframe></div><div style="text-align: justify;"><br />
</div><div style="text-align: center;"><strong>RELATED READING:</strong><br />
<a href="http://www.philipkdick.com/" target="_blank">Official Web-site: Philip K Dick</a><br />
<a href="http://www.imdb.com/name/nm0001140/bio" target="_blank">IMDB: Philip K Dick</a><br />
<a href="http://www.philipkdick.com/media_files/Order_-_Extend_Deadlines_4-28-09.pdf" target="_blank">Author’s Guild sued Google for massive copyright violations</a><br />
<a href="http://www.themodernword.com/scriptorium/dick.html#Anchor-TRANSMIGRATION-35882" target="_blank">Scriptorium: Philip K Dick</a><br />
<a href="http://www.editoreric.com/greatlit/authors/Dick.html" target="_blank">Genius who crossed the fine line</a><br />
<a href="http://thehauntologicalsociety.blogspot.com/2011/05/philip-k-dick.html" target="_blank">Philip K Dick (Video)</a></div><div style="text-align: justify;"><br />
</div><iframe align="left" frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=hr0a-20&o=1&p=8&l=bpl&asins=B003UESN2A&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;"></iframe><iframe align="left" frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=hr0a-20&o=1&p=8&l=bpl&asins=0195107926&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;"></iframe><iframe align="left" frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=hr0a-20&o=1&p=8&l=bpl&asins=1883536227&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;"></iframe><iframe align="left" frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=hr0a-20&o=1&p=8&l=bpl&asins=1606110489&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;"></iframe>TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-31047495181350117052012-12-06T00:00:00.005-05:002012-12-06T00:00:06.252-05:00Project Monarch by Ron Patton<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPQTeooCv_MQan6Jij-Oix3XqSvImuGYCbZU7krTewFE3gC5lAz7MwLDyUUyEUMmgIWOAB5efksRy_A1ICINZ_OZ9fCrRdcrRkl2jqN870WGw7rUgTi4u52FHBnralo4qJ8AvuwSP5lP3J/s1600/mkultra02.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" oda="true" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPQTeooCv_MQan6Jij-Oix3XqSvImuGYCbZU7krTewFE3gC5lAz7MwLDyUUyEUMmgIWOAB5efksRy_A1ICINZ_OZ9fCrRdcrRkl2jqN870WGw7rUgTi4u52FHBnralo4qJ8AvuwSP5lP3J/s400/mkultra02.jpg" width="500" /></a></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Nazi Mind Control</strong> - Amidst the subtle cerebral circumvention of the gullible populace, through a multitude of manipulated mediums, lies one of the most diabolical atrocities perpetrated upon a segment of the human race; a form of systematic mind control which has permeated every aspect of society for almost fifty years.To objectively ascertain the following, one may need to re-examine preconceived ideologies relating to the dualistic nature of mankind. Resolving the philosophical question of whether we are inherently good or inherently evil is tantamount in shaping our perception of reality; specifically, the spiritual variable within the equation of life. This exposition is substantiated by declassified U.S. government documents, individuals formerly connected to the U.S. intelligence communities, historical writings, researchers knowledgeable in mind control, publications from mental health practitioners, and interviews taken from survivors unwittingly subjected to a highly complex form of trauma-based mind control known as MONARCH programming. A word of caution for survivors of intensively systematic mind control and/or some form of ritualized abuse: There are numerous âtriggersâ in this article. It is therefore recommended not to read it unless appropriate support systems are in place or if you have a thoroughly reintegrated personality.<br />
<div style="text-align: justify;"><strong>A Brief History of Control</strong> - The Mystery Religions of ancient Egypt, Greece, India and Babylon helped lay the foundation for occultism, meaning âhidden knowledge.â One of the earliest writings giving reference to occultism is the Egyptian Book of the Dead, a compilation of rituals explicitly describing methods of torture and intimidation (to create trauma), the use of potions (drugs) and the casting of spells (hypnotism), ultimately resulting in the total enslavement of the initiate.[1] These have been the main ingredients for a part of occultism known as Satanism, throughout the ages. During the 13th Century, the Roman Catholic church increased and solidified its dominion throughout Europe with the infamous Inquisition. Satanism survived this period of persecution, deeply entrenching itself under the veil of various esoteric groups. In 1776, a Bavarian Jesuit by the name of Adam Weishaupt was commissioned by the House of Rothschild to centralize the power base of the Mystery Religions into what is commonly known as the Illuminati, meaning "Enlightened Ones." This was an amalgamation of powerful occultic bloodlines, elite secret societies and influential Masonic fraternities, with the desire to construct the framework for a "New World Order." The outward goal of this Utopia was to bring forth universal happiness to the human race. However, their underlying intention was to gradually increase control over the masses, thus becoming masters of the planet.</div></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>The Anglo Alliance</strong> - By the 19th century, Great Britain and Germany were recognized as the primary geographic areas of Illuminati control. It then should be of little surprise to know the first work in Behavioral Science research was established in England in 1882, while much of the early medical and psychiatric techniques involved in mind control were pioneered at the Kaiser Wilhelm Institute in Germany. The Tavistock Institute of Human Relations was set up in London in 1921 to study the "breaking point" of humans. Kurt Lewin, a German psychologist, became the director of the Tavistock Institute in 1932, about the same time Nazi Germany was increasing its research into neuropsychology, parapsychology and multi-generational occultism. Interestingly, a progressive exchange of scientific ideas was taking place between England and Germany, most notably in the field of eugenics: the movement devoted to "improving" the human species through the control of hereditary factors in mating. The nefariously enigmatic union between the two countries was bonded, partly through the Order of the Golden Dawn, a secret society which consisted of many high ranking officials in the Nazi party and British aristocracy. Top SS Nazi officer Heinrich Himmler, was in charge of a scientific project called Lebersborn, which included selective breeding and adoption of children, a peculiarly large number of twins among them.[2] The purpose of the program was to create a super-race (Aryans) who would have total allegiance to the cause of the Third Reich(New World Order). Much of the preliminary experimentation concerning genetic engineering and behavior modification was conducted by Dr. Josef Mengele at Auschwitz, where he coldly analyzed the effects of trauma-bonding, eye-coloring and "twinning" upon his victims.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Beside the insidious surgical experimentation performed at the concentration camp, some of the children were subjected to massive amounts of electroshock. Sadly, many of them did not survive the brutality. Concurrently, "brain-washing" was carried out on inmates at Dachau, who were placed under hypnosis and given the hallucinogenic drug mescaline. During the war, parallel behavioral research was led by Dr. George Estabrooks of Colgate University. His involvement with the Army, CID, FBI and other agencies remains shrouded in secrecy. However, Estabrooks would occasionally "slip" and discuss his work involving the creation of hypno-programmed couriers and hypnotically-induced split personalities [3]. After WWII, the U.S. Department of Defense secretly imported many of the top German Nazi and Italian Fascist scientists and spies into the United States via South America and the Vatican. The code name for this operation was Project PAPERCLIP [4]. One of the more prominent finds for the U.S. was German General Reinhard Gehlen. Hitlerâs Chief of Intelligence against Russia. Upon arriving in Washington D.C. in 1945, Gehlen met extensively with President Truman, General William "Wild Bill" Donovan, Director of the Office of Strategic Services(OSS) and Allen Dulles, who would later become the stalwart head of the CIA. The objective of their brain-storming sessions was to reorganize the nominal American intelligence operation, transforming it into a highly-efficient covert organization. The culmination of their efforts produced the Central Intelligence Group in 1946, renamed the Central Intelligence Agency(CIA) in 1947. Reinhard Gehlen also had profound influence in helping to create the National Security Council, from which the National Security Act of 1947 was derived. This particular piece of legislation was implemented to protect an unconscionable number of illegal government activities, including clandestine mind control programs.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>The Evolution of Project MKULTRA</strong> - With the CIA and National Security Council firmly established, the first in a series of covert brain-washing programs was initiated by the Navy in the fall of 1947. Project CHATTER was developed in response to the Soviet's "successes" through the use of "truth drugs." This rationale, however was simply a cover story if the program were to be exposed. The research focused on the identification and testing of such drugs for use in interrogations and the recruitment of agents [5]. The project was officially terminated in 1953.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">The CIA decided to expand their efforts in the area of behavior modification, with the advent of Project BLUEBIRD, approved by director Allen Dulles in 1950. Its objectives were to;<br />
(1) discover a means of conditioning personnel to prevent unauthorized extraction of information from them by known means,<br />
(2) investigate the possibility of control of an individual by application of special interrogation techniques,<br />
(3) investigate memory enhancement and <br />
(4) establish defensive means for preventing hostile control of agency personnel.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">In August 1951, Project BLUE BIRD was renamed Project ARTICHOKE, which evaluated offensive uses of interrogation techniques, including hypnosis and drugs. The program ceased in 1956. Three years prior to the halt of Project ARTICHOKE, Project MKULTRA came into existence on April 13, 1953 along the lines proposed by Richard Helms, Deputy Director of Central Intelligence (DDCI) with the rationale of establishing a "special funding mechanism of extreme sensitivity" [6]. The hypothetical etymology of "MK" may possibly stand for "Mind Kontrolle." The obvious translation of the German word "Kontrolle" into English is "control" [7]. A host of German doctors, procured from the post war Nazi talent pool, were an invaluable asset toward the development of MKULTRA. The correlation between the concentration camp experiments and the numerous sub-projects of MKULTRA are clearly evident. The various avenues used to control human behavior under MKULTRA included radiation, electroshock, psychology, psychiatry, sociology, anthropology, graphology, harassment substances and paramilitary devices and materials "LSD" being the most widely dispensed "material." A special procedure, designated MKDELTA, was established to govern the use of MKULTRA abroad. MKULTRA/DELTA materials were used for harassment, discrediting or disabling purposes [8]. Of the 149 subprojects under the umbrella of MKULTRA having been identified, Project MONARCH, officially begun by the U.S. Army in the early 1960's (although unofficially implemented much earlier) appears to be the most prominent and is still classified as TOP SECRET for "National Security" reasons [9]. MONARCH may have culminated from MKSEARCH subprojects, such as operation SPELLBINDER, which was set up to create "sleeper" assassins (i e. "Manchurian candidates") who could be activated upon receiving a key word or phrase while in a post-hypnotic trance. Operation OFTEN, a study which attempted to harness the power of occultic forces was possibly one of several cover programs to hide the insidious reality of Project MONARCH.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Definition and Description</strong> - The name <strong>MONARCH</strong> is not necessarily defined within the context of royal nobility, but rather refers to the monarch butterfly. When a person is undergoing trauma induced by electroshock, a feeling of light-headedness is evidenced; as if one is floating or fluttering like a butterfly. There is also a symbolic representation pertaining to the transformation or metamorphosis of this beautiful insect: from a caterpillar to a cocoon (dormancy, inactivity ), to a butterfly (new creation) which will return to its point of origin. Such is the migratory pattern that makes this species unique. Occultic symbolism may give additional insight into the true meaning.<br />
<div style="text-align: justify;"><strong>Psyche</strong> is the word for both "soul" and "butterfly" coming from the belief that human souls become butterflies while searching for a new reincarnation [10]. Some ancient mystical groups, such as the Gnostics, saw the butterfly as a symbol of corrupt flesh. The "Angel of Death" (remember Mengele?) in Gnostic art works was portrayed crushing the butterfly [11]. A marionette is a puppet that is attached to strings and is controlled by the puppet master, hence MONARCH programming is also referred to as the "Marionette Syndrome."</div></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>"Imperial Conditioning"</strong> is another term used, while some mental health therapists know it as "Conditioned Stimulus Response Sequences." Project MONARCH could be best described as a form of structured dissociation and occultic integration, in order to compartmentalize the mind into multiple personalities within a systematic framework. During this process, a Satanic ritual, usually including Cabalistic mysticism, is performed with the purpose of attaching a particular demon or group of demons to the corresponding alter(s). Of course, most skeptics would view this as simply a means to enhance trauma within the victim. negating any irrational belief that demonic possession actually occurs.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Alters and Triggers</strong> - Another way of examining this convoluted victimization of body and soul is by looking at it as a complex computer program: A file (alter) is created through trauma, repetition and reinforcement. In order to activate (trigger) the file, a specific access code or password (cue or command) is required. The victim/survivor is called a "slave" by the programmer/handler, who in turn is perceived as "master" or "god." About 75% are female, since they possess a higher tolerance for pain and tend to dissociate easier than males. Subjects are used mainly for cover operations, prostitution and pornography; involvement in the entertainment industry is notable. A former military officer connected to the DIA, told this writer, "In the "big picture" these people [MONARCH victims] are in all walks of life, from the bum on the street to the white-collar guy". In corroboration, a retired CIA agent vaguely discussed the use of such personnel to be used as "plants" or "chameleons" for the purpose of infiltrating a designated group, gathering information and/or injecting an ulterior agenda. There are an inordinate amount of alters in the victim/survivor with numerous back-up programs, mirrors and shadows. A division of light-side (good) and dark-side (bad) alters are interwoven in the mind and rotate on an axis. One of the main internal structures, (of which their are many) within the system is shaped like a double-helix, consisting of seven levels. Each system has an internal programmer which oversees the "gatekeeper" (demons?) who grant or deny entry into the different rooms. A few of the internal images predominately seen by victims/survivors are trees, the Cabalistic "Tree of Life," with adjoining root systems, infinity loops, ancient symbols and letters, spider webs, mirrors or glass shattering, masks, castles, mazes, demons/monsters/aliens, sea shells, butterflies, snakes, ribbons, bows, flowers, hour glasses, clocks, robots, chain-of-command diagrams and/or schematics of computer circuitry boards.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Bloodlines and Twinning</strong> - A majority of the victims/survivors come from multi-generational Satanic families (bloodlines) and are ostensibly programmed "to fill their destiny as the chosen ones or chosen generations" (a term coined by Mengele at Auschwitz). Some are adopted out to families of similar origin. Others used in this neurological nightmare are deemed as the "expendable ones" (non-bloodliners), usually coming from orphanages, foster care homes, or incestuous families with a long history of pedophilia. There also appears to be a pattern of family members affiliated with government or military intelligence agencies. Many of the abused come from families who use Catholicism, Mormonism, or charismatic Christianity as a "front" for their abominable activities (though members of other religious groups are also involved.) Victims/survivors generally respond more readily to a rigid religious (dogmatic, legalistic) hierarchical structure because it parallels their base programming. Authority usually goes unchallenged, as their will has been usurped through subjective and command-oriented conditioning.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Physical identification characteristics on victims/survivors often include multiple electrical prod scars and/or resultant moles on their skin. A few may have had various parts of their bodies mutilated by knives, branding irons, or needles, Butterfly or occult tattoos are also common. Generally, bloodliners are less likely to have the subsequent markings, as their skin is to "remain pure and unblemished." The ultimate purpose of the sophisticated manipulation of these individuals may sound unrealistic, depending upon our interpretive understanding of the physical and spiritual realms. The deepest and darkest alters within bloodliners are purported to be dormant until the "Anti-Christ" is revealed. These "New World Order" alters supposedly contain call-back orders and instructions to train and/or initiate a large influx of people (possibly clones or "soulless ones"), thereby stimulating social control programs into the new millennium. Non-biological "twinning" is yet another bizarre feature observed within MONARCH programming. For instance, two young non related children would be ceremoniously initiated in a magical "soul-bonding" ritual so they might be "inseparably paired for eternity" (possibly another Mengele connection?). They essentially share two halves of the programmed information, making them interdependent upon one another. Paranormal phenomenon such as astral projection, telepathy, ESP, etc. appear to be more pronounced between those who have undergone this process.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Levels of MONARCH Programming</strong> [12] - <strong>ALPHA.</strong> - Regarded as "general" or regular programming within the base control personality; characterized by extremely pronounced memory retention, along with substantially increased physical strength and visual acuity. Alpha programming is accomplished through deliberately subdividing the victims personality which, in essence, causes a left brain-right brain division, allowing for a programmed union of L and R through neuron pathway stimulation.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>BETA.</strong> - Referred to as "sexual" programming. This programming eliminates all learned moral convictions and stimulates the primitive sexual instinct, devoid of inhibitions. "cat" alters may come out at this level.<br />
<div style="text-align: justify;"><strong>DELTA.</strong> - This is known as "killer" programming, originally developed for training special agents or elite soldiers (i.e. Delta Force, First Earth Battalion, Mossad, etc.) in covert operations. Optimal adrenal output and controlled aggression is evident. Subjects are devoid of fear; very systematic in carrying out their assignment. Self-destruct or suicide instructions are layered in at this level.</div></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>THETA</strong> considered to the "psychic" programming. Bloodliners (those coming from multi-generational Satanic families) were determined to exhibit a greater propensity for having telepathic abilities than did non-bloodliners. Due to its evident limitations, however, various forms of electronic mind control systems were developed and introduced, namely, bio-medical human telemetry devices (brain implants), directed-energy lasers using microwaves and/or electromagnetics. It is reported these are used in conjunction with highly-advanced computers and sophisticated satellite tracking systems.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>OMEGA.</strong> - A "self-destruct" form of programming, also known as "Code Green." The corresponding behaviors include suicidal tendencies and/or self-mutilation. This program is generally activated when the victim/survivor begins therapy or interrogation and too much memory is being recovered.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>GAMMA.</strong> - Another form of system protection is through "deception" programming, which elicits misinformation and misdirection. This level is intertwined with demonology and tends to regenerate itself at a later time if inappropriately deactivated.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Method and Components</strong> - The initial process begins with creating dissociation within the subject, usually occurring from the time of birth to about six years. This is primarily achieved through the use of electroshock (ECT) and is at times performed even when the child is in the mother's womb. Due to the severe trauma induced through ECT, sexual abuse and other methods, the mind splits off into alternate personalities from the core. Formerly referred to as Multiple Personality Disorder, it is presently recognized as Dissociative Identity Disorder and is the basis for MONARCH programming. Further conditioning of the victim's mind is enhanced through hypnotism, double-bind coercion, pleasure-pain reversals, food, water, sleep and sensory deprivation, along with various drugs which alter certain cerebral functions. The next stage is to embed and compress detailed commands or messages within the specified alter. This is achieved through the use of hi-tech headsets, in conjunction with computer-driven generators which emit inaudible sound waves or harmonics that affect the RNA covering of neuron pathways to the subconscious and unconscious mind. "Virtual Reality" optical devices are sometimes used simultaneously with the harmonic generators projecting pulsating colored lights, subliminals and split-screen visuals. High voltage electroshock is then used for memory dissolution.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Programming is updated periodically and reinforced through visual, auditory and written mediums. Some of the first programming themes included the Wizard of Oz and Alice and Wonderland, both heavily saturated with occultic symbolism. Many of the recent Disney movies and cartoons are used in a two-fold manner: desensitizing the majority of the population, using subliminals and neuro-linguistic programming, and deliberately constructing specific triggers and keys for base programming of highly-impressionable MONARCH children. A prime example of how subliminal programming works is by looking at the recent Disney cinematic sensation Pochahontas, curiously billed as their "33rd" (highest degree in Scottish Rite Freemasonry) animated movie. In the movie, Grandmother Willow is a mystical 400 year old tree who counsels the motherless Pochahontas to listen to her heart and help her realize all the answers lie within. Grandmother Willow is constantly talking in "double-speak" and using "reversals" (i.e. "Sometimes the right path is not the easiest one"; the esoteric derivative being: the left path [the path that leads to destruction] is the easiest one. In Illuminati Structured MPD Systems, the willow tree represents the occultic powers of Druidism. The intrinsic imagery of the tree's branches, leaves and root systems are very significant, as some of the dark spiritual proper ties associated with the Willow Tree Programming are: (I) The branches are used to whip victims in rituals for "cleansing" purposes, (2) A willow tree can endure severe weather disturbances (i.e. storms) and is known for it's pliability or flexibility. Victims/Survivors of the programming describe the willow's branches wrapping around them, with no hope of escape, (3) The deep root system of the willow tree makes the victim/survivor feel as if they are falling deeper and deeper into an abyss while in a hypnotic trance.<br />
<div style="text-align: justify;">Music plays an instrumental role in programming, through combinations of variable tones, rhythms and words. Frightmeister Stephen King's numerous novels and subsequent movies, are purported by credible sources to be used for such villainous purposes. One of his latest books, Insomnia, features a picture of King with the trigger phrase "WE NEVER SLEEP," (indicative of someone with MPD/ DID) below an all-seeing eye. A partial list of other mediums used to reinforce base programming are: Pinnochio, Sleeping Beauty, Snow White, Beauty and the Beast, Aladdin, The Little Mermaid, The Lion King, E. T., Star Wars, Ghost Busters, Trancers II, Batman, Bewitched, Fantasy Island, Reboot, Tiny Toons, Duck Tails, The Dead Sea Scrolls and The Tall Book of Make Believe. A few movies which depict or portray some aspect of MONARCH programming are Hell raiser 3, Raising Cain, Labyrinth, Telefon, Johnny Mneumonic, Point of No Return, The Lawnmower Man and Closet Land.</div></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Programmers and Places</strong> - It's difficult to figure out who the original programmer of this satanic project was, due to the substantial amount of disinformation and cross-contamination propagated by the "powers that be." The two that went by the color-coded name of Dr. Green are a Jewish doctor named Dr. Gruenbaum, who supposedly collaborated with the Nazis during WWII, and Dr. Josef Mengele, whose trademark of cold blooded and calculating brutality has not only scarred the souls of survivors from Auschwitz, but also a countless number of victims throughout the world. Mengele's direct involvement at the infamous Auschwitz concentration camp was suspiciously downplayed during the Nuremberg Trials, and consequently no intensified effort by the U.S. and it's allies was directed toward his capture [13]. As a means to confuse serious investigators as to his whereabouts, U.S. officials would report Mengele being a non-threatening, recluse in Paraguay or Brazil, or that he was simply dead (the "Angel of Death" miraculously must have come back to life at least five different times).</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">His unprecedented research, at the expense of thousands of lives, undoubtedly was a significant bonus to U.S. interests, Besides using the pseudonym of Dr. Green, survivors knew him as Vaterchen (daddy), Schoner Josef (beautiful Joseph), David and Fairchild. A gracefully handsome man of slight stature, Mengele would disarm people with his gentle demeanor, while at other times, he would explode into violent rages [14]. Other characteristics remembered by survivors were the cadence of his shiny black boots as he paced back and forth and his "I-love-you/l-love-you-not" daisy game. When he pulled off the last daisy petal, he would maliciously torture and kill a small child in front of the other child he was programming. Distraught survivors also recalled being thrown naked into cages with monkeys, who were trained to viciously abuse them. Evidently, Mengele enjoyed reducing people to the level of animals. He also would purposely restrain his victims from crying, screaming, or showing any excessive emotion.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Dr. D. Ewen Cameron</strong>, also known as Dr. White, was the former head of the Canadian, American and World Psychiatric Associations. Because of Cameron's extensive experience and credentials, the ClA's Allen Dulles funneled millions of dollars throughout organizations like the society for the Investigation of Human Ecology, which Cameron ruthlessly presided over. Experimentations were conducted at several locations in Montreal, mostly at McGill University, St Mary's Hospital and Allan Memorial Institute. Besides the conventional methods of psychiatric tyranny, such as electroshock drug injections and lobotomies, Cameron conceived the technique of "psychic driving," wherein unsuspecting patients were kept in a drug induced coma for several weeks and administered a regimen of electroshocks, while electronic helmets were strapped to their heads and repetitive auditory messages were transmitted at variable speeds. Many of those exploited were abused children which had been run through the Roman Catholic orphanage system. Not surprisingly, Dr Cameron has been conveniently left out of most psychiatric journals. This may have been, in fact, largely due to Project MKULTRA being publicly exposed in 1970, through lawsuits filed by Canadian survivors and their families. The CIA and Canadian government settled out of court so as not to be required to officially admit to any wrongdoing.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">A former U.S. Army Lt. Col. in the DIA's Psychological Warfare Division, Michael Aquino, is the latest in a line of alleged government-sponsored sadists. Aquino, an eccentric genius, founded the Temple of Set, an offshoot of Anton LaVey's Church of Satan. His obsession with Nazi pagan rituals and his hypnotic manipulation of people made him an ideal candidate for the position of "Master Programmer." Aquino was connected with the Presidio Army Base day care scandal, in which he was accused child molestation. Much to the dismay of the young victims' parents, all charges were dismissed. Code-named "Malcolm", Aquino developed training tapes on how to create a MONARCH slave and worked as a liaison between Government/Military Intelligence and various criminal organizations and occult groups in the distribution of MONARCH slaves [16]. Heinrich Mueller was another important programmer who went under the code names "Dr. Blue" or "Gog." He apparently has two sons who have carried on the trade. The original "Dr. Black" was apparently Leo Wheeler, the nephew of deceased General Ear1e G. Wheeler, who was the commander of the Joint Chiefs of Staffs during the Vietnam War. Wheeler's protege, E. Hummel is active in the Northwest, along with W. Bowers (from the Rothschild bloodline). Other alleged master mind manipulators, past and present, are: Dr. Sydney Gottleib, Lt. Col John Alexander, Richard Dabney Anderson (USN), Dr. James Monroe, Dr. John Lilly, Lt. Comdr. Thomas Narut, Dr William Jennings Bryan, Dr. Bernard L. Diamond, Dr. Martin T. Orne, Dr. Louis J. West, Dr Robert J. Lifton, Dr. Harris Isbel and Col. Wilson Green.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">In order to keep MKULTRA from being easily detected, the CIA segmented its subprojects into specialized fields of research and development at universities, prisons, private laboratories and hospitals. Of course, they were rewarded generously with government grants and miscellaneous funding. The names and locations of some of the major institutions involved in MONARCH programming experimentation were/are: Cornell, Duke, Princeton, UCLA, University of Rochester, MIT, Georgetown University Hospital, Maimonides Medical Center, St. Elizabeth's Hospital (Washington D.C.), Bell Laboratories, Stanford Research Institute, Westinghouse Friendship Laboratories, General Electric, ARCO and Manking Research Unlimited. The "final product" was/is usually created on military installations and bases, where maximum security is required. Referred to as (re) programming centers or near-death trauma centers, the most heavily identified are: China Lake Naval Weapons Center, The Presidio, Ft. Dietrick, Ft. Campbell, Ft. Lewis, Ft. Hood, Redstone Arsenal, Offutt AFB, Patrick AFB, McClellan AFB, MacGill AFB, Kirkland AFB, Nellis AFB, Homestead AFB, Grissom AFB, Maxwell AFB and Tinker AFB. Other places recognized as major programming sites are Langley Research Center, Los Alamos National Laboratories, Tavistock Institute and areas in or by Mt. Shasta, CA, Lampe, MO and Las Vegas, NV.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Notable Names</strong> - One of the first documented cases of a MONARCH secret agent was that of the voluptuous 1940âs model, Candy Jones. The book, The Control of Candy Jones, (Playboy Press) portrays her 12 years of intrigue and suspense as a spy for the CIA. Jones, whose birth name is Jessica Wilcox, apparently fit the physiological profile as to be one of the initial experiments or human guinea pigs under the government's "scientific" project, MKULTRA.<br />
<div style="text-align: justify;">The most publicized case of MONARCH monomania has surfaced through the book TRANCE Formation of America: The True Life Story of a ClA Slave by Cathy O'Brien. On the back cover it emphatically states, "Cathy OâBrien is the only vocal and recovered survivor of the Central Intelligence Agency's MKULTRA Project Monarch mind control operation" This documented autobiography contains compelling accounts of O'Brien's years of unrelenting incest and eventual introduction into Project MONARCH by her perverted father. Along with co-author Mark PhiIlips, her rescuer and deprogrammer, Cathy covers an almost unbelievable array of conspiratorial crime: forced prostitution (white slavery) with those in the upper echelons of world politics, covert assignments as a "drug mule" and courier, and the country-western music industry's relationship with illegal CIA activities.</div></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Paul Bonaci</strong> - a courageous survivor who endured almost two decades of degradation under Project MONARCH, has disclosed strong corroborating evidence of widescale crimes and corruption from the municipal/state level all the way up to the White House [17]. He has testified about sexually-abused males selected from Boy's Town in Nebraska and taken to nearby Offut AFB, where he says they were subjected to intense MONARCH programming, directed mainly by Commander Bill Plemmons and former Lt. Col. Michael Aquino [18]. After thoroughly tormenting the young boys into mindless oblivion, they were used (along with girls) for pornography and prostitution with several of the nation's political and economic power brokers. Bonnaci recalled being transported from the Air Force base via cargo planes to McClelland AFB in California. Along with other unfortunate adolescents and teenagers, he was driven to the elite retreat, Bohemian Grove. The perpetrators took full advantage of these innocent victims, committing unthinkable perversions in order to satisfy their deviant lusts. Some victims were apparently murdered, further traumatizing already terrified and broken children. An insuitable actress of marginal talent (now deceased), a morally-corrupt T.V. evangelist, a heralded former Green Beret officer and a popular country-western singer are a few others likely having succumbed to MONARCH madness.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Lee Harvey Oswald, Sirhan-Sirhan, Charlie Manson, John Hinckley Jr., Mark Chapman, David Koresh, Tim McVeigh and John Salvi</strong> are some notable names of infamy, strongly suspected of being pawns who were spawned by MKULTRA.<br />
<div style="text-align: justify;"><strong>Deprogrammers and Exposers</strong> - Dr. Corydon Hammond, a Psychologist from the University of Utah, delivered a stunning lecture entitled "Hypnosis in MPD: Ritual Abuse" at the Fourth Annual Eastern Regional Conference on Abuse and Multiple Personality, June 25, 1992 in Alexandria, Virginia. He essentially confirmed the suspicions of the attentive crowd of mental health professionals, wherein a certain percentage of their clients had undergone mind control programming in an intensively systematic manner. Hammond alluded to the Nazi connection, military and CIA mind control research, Greek letter and color programming and specifically mentioned the Monarch Project in relation to a form of operative conditioning. Shortly after his ground breaking speech, he received death threats. Not wanting to jeopardize the safety of his family, Dr. Hammond stopped disseminating any follow-up information, until recently. Mark Phillips, a former electronics subcontractor for the Department of Defense, was privy to some of the top secret mind control activities perpetrated by the U.S. government. His inquisitive demeanor, strong conscience and heart-felt concern for Cathy O'Brien, a "Presidential Model" under Project MONARCH, prompted him to reveal the inner-workings of this grand deception beginning about 1991. As the story goes, he helped Ms. O'Brien escape from her captors and was able to deprogram her in about a years time in Alaska. The controversial Phillips has his share of critics who are skeptical of the veracity of his claims. New Orleans therapist Valerie Wolf introduced two of her patients before the President's Committee on Human Radiation Experiments on March 15, 1995 in Washington D.C.</div></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">The astonishing testimony made by these two brave women included accounts of German doctors, torture, drugs, electroshock, hypnosis and rape, besides being exposed to an undetermined amount of radiation. Both Wolf and her patients stated they recovered the memories of this CIA program without regression or hypnosis techniques [19]. Wolf presently devotes much of her time to counseling such survivors. A former labor attorney for Atlantic Richfield Co., David E. Rosenbaum, conducted a nine year investigation (1983-1992) concerning allegations of physical torture and coercive conditioning of numerous employees at an ARCO plant in Monaca, PA.[20] His clients, Jerry L. Dotey and Ann White, were victims of apparent radiation exposure; but as Mr. Rosenbaum probed deeper in the subsequent interview sessions, a "Pandora's Box" was unveiled. His most astonishing conclusion was that Jerry Dotey and Ann White were likely the off-spring of Adolf Hitler, based in part on the uncanny resemblance from photos (facial features; bone structure and size were taken into consideration). Rosenbaum also states, "They both exhibit feelings and experiences that indicate they are twins." Dotey and White were allegedly subjected to torture of many kinds while under drug induced hypnosis, with each one undergoing at least three training techniques by plant physicians. Each victim was trained to enter into a hypnotic state upon the occurrence of specific stimuli, usually involving a "cue" word or phrase and trained to "remember to forget" what transpired in the hypnotic state. They were repeatedly subjected to identical stimulus-response sequence, to produce nearly automatic reactions to the particular status. MKULTRA veteran, Dr. Bernard Diamond, Dr. Martin Orne and Dr. Josef Mengele regularly visited the ARCO plant, according to Rosenbaum. The special conditioning of Dotey and White was intended for the artificial creation of dual German personalities. Rosenbaum, who is Jewish, has maintained a deep friendship with the two, despite the seemingly precarious circumstances. Other renowned therapists involved in deprogramming are Cynthia Byrtus, Pamela Monday, Steve Ogilvie, Bennett Braun, Jerry Mungadze and Colin Ross. Some Christian counselors have been able to eliminate parts of the programming with limited success.<br />
<div style="text-align: justify;">Journalists who have recently expounded on the subject matter in exemplary fashion are <strong>Walter Bowart</strong>, Operation Mind Control, <strong>Jon Rappoport</strong>, U.S. Government Mind-Control Experiments on Children and <strong>Alex Constantine</strong>, Psychic Dictatorship In The USA.</div></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Conclusion</strong> - The most incriminating statement to date made by a government official as to the possible existence of Project MONARCH was extracted by <strong>Anton Chaitkin</strong>, a writer for the publication, The New Federalist. When former CIA Director William Colby was asked directly, "What about monarch?" he replied angrily and ambiguously, "We stopped that between the late 1960's and the early 1970's." Suffice to say that society, in its apparent state of cognitive dissonance, is generally in denial of the over whelming evidence of this multifarious conspiracy. Numerous victims/survivors of Project MONARCH are in desperate need of help. However, the great majority of people are too preoccupied with themselves to show any genuine compassion toward these severely wounded individuals. Apathy has taken over the minds of the masses, who choose to exist within the comforts of this world. Reality has thus become obscured by relativism and selfishness. Although there has been some progress in deprogramming and reintegrating therapies, a much greater problem needs to be rectified. The Holy Bible addresses this problem as the fragmentation of the soul (Ezekiel 13:20). A spiritual restoration is what is truly needed (Psalm 23:3) but can only take place by completely trusting in Jesus Christ as the way to salvation (John 3:16; I Peter 3:18) and deliverance from demonic oppression and/or possession (Mark 16:17). The true humility of Christ and the love of God effectively counters the pride and hatred of Satan. Statistically, the road to recovery for these survivors of unimaginable depravity is a long and tedious one, but God is the ultimate healer and only within his time, through His strength and by His grace, can the captives be set free (Isaiah 61:1) (<strong>Source:</strong> <a href="http://www.archive.org/details/CIAandProjectMonarchFullHistoryRonPatton" target="_blank">CIA and Project Monarch by Ron Patton</a>).</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Endnotes</strong><br />
1. David L. Carrico, The Egyptian Masonic Satanic Connection, 1992 <br />
2. Walter H. Bowart, Operation Mind Control, Flatland Editions, 1994, p. 216 <br />
3. Martin Cannon, Mind Control and the American Government, Prevailing Winds Research, 1994, p. 19 <br />
4. Linda Hunt, Secret Agenda, St. Martin's Press, 1991 <br />
5. Final Report of the Select Committee to Study Governmental Operations, U.S. Senate, April 1976, p. 337 <br />
6. Ibid, p. 390 <br />
7. John Marks, The Search For The Manchurian Candidate, Times Books, 1979, pp 60-61 <br />
8. Final Report of the Select Committee to Study Governmental Operations, U.S. Senate, April 1976, p. 391 <br />
9. Mark Phillips and Cathy OâBrien, Project Monarch, 1993 <br />
10. Barbara G. Walker, The Womanâs Dictionary of Symbols and Sacred Objects, Harper Collins, 1988 <br />
11. Marshall Cavendish, Man, Myth and Magic, 1995 <br />
12. Dr. Corydon Hammond, The Greenbaum Speech, 1992; Mark Phillips and Cathy OâBrien, Project Monarch Programming Definitions, 1993 <br />
13. Gerald L. Posner, Mengele: The Complete Story, McGraw-Hill, 1986 <br />
14. Lucette Matalon Lagnado, Dr. Josef Mengele and the Untold Story of the Twins of Auschwitz, Morrow, 1991 <br />
15. Gordon Thomas, Journey into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, Bantam Books, 1989 <br />
16. Cathy OâBrien and Mark Phillips, Trance Formation of America, 1995 <br />
17. John DeCamp, The Franklin Cover-Up, Child Abuse, Satanism and Murder in Nebraska, AWT Inc, 1992 <br />
18. Anton Chaitkin, "Franklin Witnesses Implicate FBI and U.S. Elites in Torture and Murder of Children", The New Federalist, 1993 <br />
19. Jon Rappoport, "CIA Experiments with Mind Control on Children", Perceptions Magazine, September/October 1995, p. 56 <br />
20. David E. Rosenbaum, Esq., First Draft Overview of Investigation of the Group, 1983-1993 <br />
Reprinted with permission from PARANOIA: The Conspiracy Reader. 1 year (4 issues) for $20 ($30 Intâl Airmail). Paranoia, PO Box 1041, Providence, RI 02901-1041. A compilation, "The Conspiracy Reader" (Citadel Press, 1999), is available from any bookstore</div></div>TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-22421825736179035832012-12-04T00:00:00.040-05:002012-12-04T00:00:02.444-05:00Voices in Head<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEganAGrtpVm70gJ1vXXEm1EUsfprHl276hyELubyRZaI35BiAaCU_MB-0rLwQ4PxlHnltvs4o33P7BZVqHidt7kgmaPX7-2pbOikoSr5ppV-g_jEDxoYmkJtognRTyhXDDz2UcXQwIBYbPX/s1600/Lynne+Moss-Sharman+01.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" dda="true" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEganAGrtpVm70gJ1vXXEm1EUsfprHl276hyELubyRZaI35BiAaCU_MB-0rLwQ4PxlHnltvs4o33P7BZVqHidt7kgmaPX7-2pbOikoSr5ppV-g_jEDxoYmkJtognRTyhXDDz2UcXQwIBYbPX/s400/Lynne+Moss-Sharman+01.JPG" width="500" /></a></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">My name is Lynne Moss-Sharman (born 1947)...survivors of ritual abuse; masonic abuse; military/brainwashing experimentation 1950's, 1960's, 1970's (Canada)...The Stone Angels just got a donation to e-mail and access internet and a survivor in California forwarded me two of your articles. I was especially interested in the one on inducing voices in the head. I believe I was taken to the U.S. in the 1950's (although living in Hamilton, Ontario and remembering most abuses in Canada) -- taken to Colgate College, Hamilton, N.Y. (south of Syracuse) where Dr. Estabrooks was conducting his "research". Dr. Ewen Cameron was one of my abusers in the 1950's and I am in contact with survivors across Canada who describe brainwashing experiments at various military bases in this country during the 50's, 60's, 70's. I don't have a scanner so cannot transmit drawings I have done of devices used by Cameron et al (I can remember a Dr. Hindrichs/Hendricks) but so far can only physically describe other "doctors" ... cannot name.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Some of the devices included helmets; rounded frames that were placed on child and adult victims/subjects' heads; a body contraption that included metal "bangles" around the neck, arms, torso and legs of children attached and suspended by wires -- the child or adult was "directed" by somebody pressing buttons on something from across the room; there was a big chair and your wrists were strapped down - there were foot pedals, and the chair could be raised and lowered, or spun around; there were different sized containers for sensory deprivation and torture(?) because they would roll you up like a ball of string and put you in a box -- another box had sides that compressed while you were inside; I was drugged from the neck down (so conscious) and electricity was applied to make my arms and legs move like a robot; all the children and adults had shaved heads and some were so thin they shouldn't have been alive -- they were almost translucent they were so skinny; there was one place (I believe it was Colgate College) that had different laboratory rooms -- one was a funny colour of blue -- the lighting -- it always makes me think of dioramas at museums somehow; there was one man chained in place who had hands instead of feet, he was really skinny, and he was "frogman"; there was a boy who had monkey legs and feet - I call him monkey boy; over the years in therapy I have broken through layers of programming and told my therapist (when she quietly asked who was doing a certain technique to me) "for our navy, for our navy" -- that was all I could say. I am now willing to talk to people about the alien involvement as well -- there is so much it is very overwhelming.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">If you would send me your mailing address, I will send you copies of my drawings -- they speak louder than words, and in some cases, are the only way parts of me can "tell" what I saw, what was done to me. There was also a bed-like container that was partially filled with water -- they would pass electricity through it. I think some of the things I have described are known to U.S. survivors and I am desperate to hear from other survivors who may have been taken to Colgate College in Hamilton, N.Y. (south of Syracuse, near Auburn, not far from the Pennsylvania border) (<a href="http://web.archive.org/web/20000908074111/http://www.netti.fi/~makako/mind/cameron.txt" target="_blank">Voices in Head by Lynne Moss-Sharman Story</a>).</div><div style="text-align: justify;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/4IzHp1rM-Qo?feature=player_embedded' frameborder='0'></iframe></div><div style="text-align: justify;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/S051A8doXP0?feature=player_embedded' frameborder='0'></iframe></div><div style="text-align: justify;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/5kidaUuSt3w?feature=player_embedded' frameborder='0'></iframe></div><div style="text-align: justify;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/1q-7-MiAau4?feature=player_embedded' frameborder='0'></iframe></div><div style="text-align: justify;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='500' height='300' src='https://www.youtube.com/embed/MjlPJxfmmAU?feature=player_embedded' frameborder='0'></iframe></div><div style="text-align: justify;"><br />
</div><div style="text-align: center;"><strong>RELATED READING:</strong></div><div style="text-align: center;"><a href="http://hrvcanada.blogspot.com/2011/06/lynne-moss-sharman.html" target="_blank">Lynne Moss-Sharman</a></div><div style="text-align: center;"><a href="http://web.archive.org/web/200101161400/http://www.azstarnet.com/~freetht/wod.htm" target="_blank">Government Madness Proof</a></div><div style="text-align: center;"><a href="http://web.archive.org/web/20001016204750/http://es.epa.gov/ncerqa_abstracts/sbir/other/monana/kohn.html" target="_blank">Communicating Via the Microwave Auditory Effect</a></div><div style="text-align: center;"><a href="http://web.archive.org/web/20001001132852/http://www.netti.fi/~makako/mind/d_bader.txt" target="_blank">Modern Human Experimentation / Torture</a></div><div style="text-align: center;"><a href="http://web.archive.org/web/20000817053618/http://www.netti.fi/~makako/mind/yu.txt" target="_blank">Alan Yu Story (Revision-10-22-95)</a></div><div style="text-align: center;"><a href="http://www.mindcontrol.se/?page_id=1900" target="_blank">Mind Control N.S.A WE Have No Secrets (Anymore)</a></div><div style="text-align: center;"><a href="http://www.democraticfundamentalism.org/2005/psychotronics/government/1991militarysaudisilentsound.htm" target="_blank">High Tech Psychological Warfare Arrives in the Middle East</a></div><div style="text-align: center;"><a href="http://www.mindjustice.org/symptoms.htm" target="_blank">List of mind control symptoms</a></div><div style="text-align: center;"><a href="http://www.democraticfundamentalism.org/2005/psychotronics/professionals/listofsymptoms.htm" target="_blank">List of Symptoms of Psychotronic and Directed Energy Device Abuse</a></div><div style="text-align: center;"><a href="http://gramercyimages.com/blog1/2011/05/02/the-strange-world-of-nsa-mind-control/" target="_blank">The Strange World of NSA Mind Control (Videos)</a></div><div style="text-align: center;"><a href="http://www.wanttoknow.info/voicesinheadelectronicharassment" target="_blank">Voices in the Head</a></div><div style="text-align: center;"><a href="http://www.rense.com/general20/voicesAL.htm" target="_blank">The Voices In Your Head May Be Real</a></div><div style="text-align: center;"><a href="http://targetedindividualscanada.wordpress.com/2011/05/12/next-time-you-hear-voices-in-your-head/" target="_blank">Next Time You Hear Voices In Your Head</a></div><div style="text-align: center;"><a href="http://www.raven1.net/mn145.htm" target="_blank">Directed-Energy Harassment Defense</a></div><div style="text-align: center;"><a href="http://www.who.int/mediacentre/factsheets/fs296/en/index.html" target="_blank">Electromagnetic fields and public health</a></div><div style="text-align: center;"><a href="http://targetedindividualscanada.wordpress.com/2011/03/30/direct-energy-weapons-2/" target="_blank">Direct Energy Weapons</a></div><div style="text-align: center;"><a href="http://www.youtube.com/watch?v=aAnrmJ3un1g" target="_blank">Microwave radiation dangers in your home (Video)</a></div><div style="text-align: center;"><a href="http://targetedindividualscanada.files.wordpress.com/2011/01/a-practical-survival-guide-to-oseh.pdf" target="_blank">A Practical Survival Guide To OSEH</a></div><div style="text-align: center;"><a href="http://www.youtube.com/watch?v=Ww3GkNGUC70" target="_blank">CIA Brain Experiments on Veterans (Video)</a></div><div align="center" style="text-align: justify;"><br />
</div><iframe align="left" frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=hr0a-20&o=1&p=8&l=bpl&asins=B003UESN2A&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;"></iframe><iframe align="left" frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=hr0a-20&o=1&p=8&l=bpl&asins=0195107926&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;"></iframe><iframe align="left" frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=hr0a-20&o=1&p=8&l=bpl&asins=1883536227&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;"></iframe><iframe align="left" frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=hr0a-20&o=1&p=8&l=bpl&asins=1606110489&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;"></iframe></div>TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.comtag:blogger.com,1999:blog-2719540816032796398.post-8294054115399122732012-12-01T00:00:00.012-05:002012-12-01T00:00:10.646-05:00Remote Control Electronic Brain Punishment? by David James Fratus<div dir="ltr" style="text-align: left;" trbidi="on"><div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: justify;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-2czbFJxO-t7OWy1Ewk_5FWKCliBfRvMFqNHUMKomtmrxpytuAnievidmUJ_foh1zB9QQugSQzUMaKqidvjv17INYIBkSlIiWTA8v0asbLzAbciFBq02Ojnu-ghO36cVtLXYZNxxutt2L/s1600/brain-inplants.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" dda="true" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-2czbFJxO-t7OWy1Ewk_5FWKCliBfRvMFqNHUMKomtmrxpytuAnievidmUJ_foh1zB9QQugSQzUMaKqidvjv17INYIBkSlIiWTA8v0asbLzAbciFBq02Ojnu-ghO36cVtLXYZNxxutt2L/s400/brain-inplants.jpg" width="500" /></a></div><strong>David James Fratus:</strong> October 18, 1988 - I am currently involved in a crisis of a bizarre nature which I'm sure will be of utmost interest, providing you can find credence in what I relate and not summarily dismiss me as being a fantasy-stricken space case. I'm being subjected to some type of remote control electronic brain punishment, in severity nothing less than outright torture, and the technology being utilized to execute this questionable action is not only highly specialized and sophisticated, but causes me to wonder whether knowledgeable authorities are even aware that a device of this nature exists. The credentials I can offer as to the veracity of these allegations are slim and none. I'm standing in a bad light to begin with, as I am a 38 year old inmate serving a 1 to 15 year sentence for 2nd degree burglary at the Utah State Prison, and the information contained within is in regard to my substantial problems with prison officials who would gladly have it believed that my word merits no credibility whatsoever. They have, in fact, gone to extreme lengths to insure that such is the case, and you will presently understand why. I have never been afflicted with psychological disorders of any kind, and am not given to fabricating stories with which to bother busy people or cause unnecessary commotion. I'm a convicted thief, not a liar. It is a difficult story to tell--and though a bit long winded as presented, I feel it important to explain these events in their entirety so as to give the reader a proper picture. Although not well educated, I am reasonably intelligent and able to recount the sequences and details to incidents with a great deal of accuracy, and I swear to you that what is written on these pages is unembellished and 100% true. I ask you to please read and evaluate my letter and hope you will see fit to assist me with any pertinent information you might possess.</div><div style="text-align: justify;"><br />
</div><div align="justify" style="text-align: justify;">Should it prove to be that you cannot offer an explanation as to what is happening here, then I'm afraid there is much more amiss than what I had suspected and would make my position appear most precarious. Eleven months ago I unfortunately ran afoul of prison officials as a result of a minor altercation with other inmates and what was then deemed to be a poor attitude on my part. It has since been a battle of wills, and what they have done to me for my failure kow tow to them is incomprehensible. The hostilities commenced with guards being ordered to launch an intensive campaign of harassments against me. Day after day they tampered with my food, smashing and removing items from my tray, and threatened to poison me with carcinogens and diseases. My mail received similar treatment, I was constantly verbally badgered as well as physically assaulted, and was told my parents would be murdered should I fail to maintain silence. These methods were employed to provoke me into losing my temper and acting out, giving them sufficient cause to impose disciplinary measures and isolate me in the maximum security unit where I could be dealt with without their having to be concerned about witnesses. I have since discovered that these set-up tactics are standard operating procedure at this prison, and believe me, no one could undergo the systematic and intense harassment routine I was subjected to and not lose their temper. Once isolated, some extremely peculiar things began to occur. I became disoriented to the extent that my cell and surrounding area would take on a surrealistic appearance as though I were under the influence of a hallucinogenic drug, and I was plagued by severe headaches and insomnia for weeks at a time.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">I had absolutely no inkling of what was happening, and after a couple months of having some fantastically cruel games played with my mind ultimately reducing me to a state of anxiety, the psychiatric squad was called in to play their roles in this colossal "set up" and I was declared to be suffering from a mental illness after undergoing a farcical and cursory interview in duration of no more than 15 minutes. Delusional persecution and paranoia was, I believe, how they so conveniently labeled me. It was obviously a deliberate and prearranged plan, and throughout these actions the staff would make malicious comments as to, "How are you enjoying your headaches?" Need some aspirin?" and "Are you sleeping well, Mr. Fratus?" The use of this fraudulent and adverse psychiatric classification was just one more nail in my coffin, and intended as a means to cast suspicion on my credibility, as well as further enable them to keep me isolated. Now that the frame-up prerequisites were satisfactorily out of the way, they were able to proceed with their campaign of mental terrorism. I began to receive, or hear, high frequency tones in my ears. Like the test pattern on a TV set. The volume or intensity of these frequencies is adjustable and some are so high and piercing that they've literally had me climbing the walls. When I plug my ears with cotton or fingertips, the tones are still inside and become amplified. It's as if they had become electrified echo chambers with the sounds coming from the inside out. When I complained or acted out, I was beaten and thrown into a strip cell with no clothes, mattress, toilet paper or drinking water. Nothing--and the intensity of these frequency transmissions would be crescendoed to maddening levels. Much mental distress! This is still being done to me three shifts, 24 hours a day, and the combination of these demoralizing mental torments and sleep deprivation for weeks on end has exacted a heavy toll on me.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">I began to write letters of complaint and question to various medical and legal associations after the first four months. It proved futile to complain to prison and state officials, as they are aware of, and sanctioning this treatment, and did nothing but use my complaints as a vehicle to further ridicule and aggravate me. It required upwards of 50 letters before I finally acquired information which gave me a clue as to just what kind of a predicament I was in. Most people, it seems, are understandably reluctant to offer assistance to a convicted person no matter how serious the situation, and the majority of my letters went unanswered. No telling if these letters were actually mailed, however, as prison officials are notorious for misplacing inmate mail, and these people are definitely trying to hinder my quest for information and support in this matter. I subscribe to "U.S. News and World Report" which recently printed an article concerning the workings of the human mind. I did not receive this particular issue and became suspicious after hearing guards make comments like, "I'll be damned if I'll give it to him," so I had my father, who resides in New Hampshire, mail me the article which contained the names of several brain research scientists and their respective universities. The administration obviously doesn't want me advising research people of my situation here--and so that is just what I intend to do. Getting back to the letters I had written requesting information, I was fortunate in that the folks at the "Coalition for Prisoners' Rights Newsletter" located in Santa Fe, New Mexico, were concerned enough by word of my plight to conduct a little research which resulted in their sending me reprints of three articles dealing with: Electromagnetic, and Non-Ionizing Electromagnetic Radiation, and Radio Frequency Weapons--which were published by "U.S. News," "The Nation" and "The Atlantic" back in March 1987.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">I received this information September 22, 1988, and thanks to those kind and conscientious people, I now have some idea of how such things are being done to me, and most importantly that such technology does exist. These articles cover most of the mental and physical maladies I've been experiencing for the past eleven months, with one major exception, and I'll hopefully be able to use this information to gain further insight as to what is going on, and to alleviate the hostilities being waged against me. You cannot imagine what it has been like confined to a cell 24 hours a day for almost a rear now, being brain blasted by high frequency impulses--no respite, no place to hide, and having not the lightest notion what was going on. All three of these articles, "U.S. News" in particular, describe dire consequences as a result of over exposure to various radiation and frequency hazards, and I'm now most apprehensive as to how eleven months of constant application, by whichever of these means it is being done, might be affecting my cell chemistry and vital organs. I'm sure you'll agree that I've stumbled headlong into the proverbial hornets nest, but what I have told you thus far is only the lull before the storm and is quite unremarkable in comparison to what comes next. What they proceeded to do to me from approximately the fifth month on is the exception I spoke of--and is so unimaginable and seemingly preposterous that its very ludicrousness is obviously one of their primary defense assets. Even though I have been living with this incredible phenomenon for months on end and have grown somewhat accustomed to what is being done, as well as having resigned myself to the inevitability that I have no escape from this torment as long as they choose to inflict it, I still find great difficulty in believing this can be reality. Getting an outsider to accept my allegations is going to be something else altogether, and that's just what prison officials are counting on.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">For the climax in this series of weird events, I began to hear voices in my ears. Voices that change pitch and timbre in contrast from being a cartoonish high and squeaky, descending through the octaves, including everything from sinister Darth Vadorish to basically normal characteristics. The reception of these voices into my inner ears is as vivid as though I were listening to a set of stereo headphones, and they are able to mix, match, and blend them in conjunction with the frequency tones creating a raucous cacophony of audio discord that disheartens the soul. Now for the clincher. The various effects of this device have been progressively increased throughout this eleven-month onslaught, finally arriving at full potential with the end result being that I am now having my brain monitored by an omnipotent computerized mind reading or scanning machine of some sort. No hoax, no illusion to what I'm experiencing. These people have devised or acquired a specialized unit that reads absolutely everything--physical as well as mental functions, and are able to cause severe impairments and dysfunctions via this remote-control scanning device. I have no memory of having had anything of a physical nature done to me, but it has somehow been contrived to "wire" me up to where they have access to instant, and unerringly accurate comprehension of even my most fragmented and fleeting thoughts. They are attempting radical behavior modification and thought control by means of an incessant, round the clock monitoring of my brain--imposing the various punishments when my thinking or physical actions fail to conform to what they are demanding of me. Interesting concept, isn't it? "Big Brother" and the "Thought Police" have most assuredly become reality.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">This scheme of sleep deprivation, headaches, and audio torments is relentless and being used to break down my resistance and wear me to a mental frazzle, permitting no mental privacy, berating and picking my thoughts apart, and attacking my mind with an insidious tirade of sickening innuendo and threats. They are going into my subconscious, or memory bank, bringing forth unpleasant memories long ago forgotten, and I am being punished for past as well as present indiscretions. I can think of anything from the past--a friend or situation from 30 years ago for instance, and the voices will provide names and particulars. I have repeatedly tested and attempted to trick them on this. No way. They have better access to what's in my head with this nefarious invention than I do. I can converse with my antagonists merely by thinking what I wish to say.... and I welcome you to the Twilight Zone!! How the hell is this being done?? They are using those frequency impulses to perpetrate some very vicious maltreatment on me. With the apparent ease of manipulating a keyboard, they can, with a flick of the switch, strip me of all energy and motivation to where I'm forced to lie on my bunk and stare at the wall like a-zombie. I've been left in this state for weeks at a time--literally chained to my bed without the actual use of physical restraints, having not the energy to walk back and forth in my cell even a few times. For almost the entire eleven months I have continuously been made to feel low down and chronically depressed. The effects of this device have been cancelled on several occasions, instantly returning me to my normal self, only to have the voices laugh and taunt, then reducing me to the former state of despondent misery and confusion after an all too brief reprieve.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">The most powerful of these frequency impulses is jokingly referred to as the "Death Ray" by guards, and is so potent it causes an intense physical sensation of having an electrical, or magnetic force field combined with a vibrating tuning fork in my head. Different parts of my brain are targeted by this thing, causing a variety of mental and physical reactions. Sometimes I can feel it at the base of my brain where it joins the spinal cord, other times up in the frontal lobes, and it is in fact comparable to a lobotomy, as it causes my brain to lock up and malfunction to where I cannot concentrate or spell simple words. It actually blurs my eyesight and fouls the air I expel from my lungs, giving it a metallic sulfurish taste and odor. It's a God-awful feeling, I can tell you. They have, at times, assailed me with this "Death Ray" in bursts ranging from seconds to minutes, causing me to psychologically bounce up and down like a human yo-yo. Lobotomies may have been outlawed in the U.S.A., but they've sure found the perfect replacement, and I don't see how this treatment can possibly be construed as anything other than torture. It is inconceivable to me that the technology of this awesome device can be unique and possessed solely by the State of Utah, but I may very well be wrong. When I first entered the prison in May, 1986, one of the psychologists who conducted my initial classification interview inquired as to whether I had ever heard "voices." That seems to be the key word around here. This question was posed almost a year before the "U.S. News" and other articles were published, which seems unlikely, as the proficiency of the apparatus I'm dealing with is sophisticated far beyond anything scientists had apparently imagined in use at that time.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">I, of course, didn't attach any significance to the question of voices back then, but remember it well, and have since heard many references made to people hearing "voices" by both inmates and staff, which would indicate that these people were in possession of, and employing this technology at least that far back. This is what prompts me to wonder how they could have had such an innovative piece of equipment in use, operating with apparent perfection of technique, without the scientific and medical community in general being aware of it. Quite a puzzle. In defense of both my sanity and the veracity of my allegations, I now relate part of a conversation I recently had with a prison paid, but supposedly independent and neutral paralegal advisor. He stated that he has received similar complaints from other inmates, but that nothing can be done for lack of evidence. He said that one inmate in particular has been placed on forced medication (Prolixin) because of his hearing "voices," and unless I'm greatly mistaken, I believe his words carried an unofficial warning for me. At least two inmates that I know of have been badgered to the point of having attempted suicide as a result of this mental torment, and something stinks to the high heavens here! All of the staff, as well as a number of inmates, are aware of what is happening, so I can't fathom how it can remain, or even at this time, be a kept and closed secret human nature being what it is. For the most part, I believe the other knowledgeable inmates are intimidated and cowed for fear of retaliation in the form of a mental torture routine such as I'm being subjected to should they complain. Threats of additional time being imposed by the Parole Board are also being used to coerce silence. Tough odds to buck.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Prison officials deny that they are perpetrating any such activities in response to formal inquiry but will grin and smugly indicate full awareness when no witnesses are present. "Yes, we are doing this to you, but no one will believe it, and you can do nothing to deter us." This is the attitude they project, and they are engaging in a conspiracy of inmate experimentation and exploitation that defies description. The outside authorities who even made a pretense of investigating my allegations were told I'm a habitual trouble maker with a history of psychological problems, and that effectively frustrates my attempts to have this situation looked into right there. Who is to dispute the word of my law-abiding and honorable keepers? How to verify and impress upon investigators the honesty of my accusations? What concrete evidence do I have? Even a group of inmates alleging corresponding facts are subject to skepticism as prison officials will simply accuse them of collusion. I'm being deliberately isolated from the inmates who would collaborate my story, by the way--and legal organizations such as the A.C.L.U., due to lack of substantiated proof and the absurdity of this horror show, are hesitant to invest the time and effort necessary to determine what is actually taking place at the hands of these pious Mormon inquisitioners. I've seen them in action and they are possessed of exceptional finesse in their ability to conceal the true nature of matters and mislead outsiders with their upright and holier than thou pretentiousness. It has been eleven months of deception by prison officials, of nonstop elaborate harassments and vicious mind games, and I would surely like to know just what provocation I gave to warrant the infliction of such insane mistreatment. No rhyme or reason--nor justification--either legal or moral, to any of this.</div><div align="justify" style="text-align: justify;"><br />
</div><div style="text-align: justify;">They are so very smug and secure in the belief that they cannot be brought to account for these blatantly illegal acts due to their well rehearsed methods of official denial, isolation, and absence of witnesses, bogus psychiatric evaluations, and of course, the fact that this mental torment is being accomplished by a faceless machine, operated by anonymous antagonists from an unknown location and distance. I overheard one guard boast that the tactics they've employed have been so extensive that no one would believe me anyway. I was an Air Force brat, born in New Foundland and stubborn as a Missouri mule. I suppose I could capitulate and eventually get these people to cease and desist in this mental warfare, but I vehemently resent and object to this flagrant invasion of the sanctity of my mind and will be damned if I'll just sit here and allow them to go unchallenged in this attempted programming and manipulation of my brain and personality as though I were an experimental laboratory animal. The judge sentenced me to serve an atonemental amount of time for my crime and said nothing of corporal punishments or mental torment and abuse when he passed judgment. It is plain enough why they went to such extremes to set me up for isolation and discredit my word. I have to shake my head in incredulous dismay when I picture the outrageousness of the circumstances I've been maneuvered into. I recently signed a release form and obtained, acting through the paralegal I previously mentioned, partial copies of both my administrative and medical prison files. I was denied access to all of this material and told to get a court order if I wished to see what was withheld. What I did see, however, was enough to convince me that I'm dealing with some highly unscrupulous people who will stop at nothing to protect their conspiracy.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">The chronological notes contained in these files bore a contrived and twisted mass of outright lies pertaining to alleged conversations between myself and both psychological and correctional staff. This deceit was expressly woven in harmony by the various contributors to detract from my credibility and make me appear unstable. There was, in fact, mention of obtaining a court order to force treatment on me (Prolixin?), and I find it very sad, and hard to believe, that this type of atrocious inhumanity is being practiced in this country in this day and age. Equally hard to understand is the fact that the state officials I have advised of this situation, including the Governor, Attorney General, State Senate, County Attorney, and Department of Corrections Personnel, all choose to ignore and make light of these allegations, even though there is strong indication of foul play due to the numerous individual complaints made by inmates at this institution. I even went so far as to challenge Warden Gerald Cook, and Gary Deland, who is the Executive Director of the Department of Corrections, to a $1500.00 wager as to the outcome of a polygraph test between myself and prison officials to determine who is speaking the truth. They have declined my invitation, of course, and I was threatened with the possibility of disciplinary action for my proposal of illicit gambling. This is a Mormon state, and there is a deep-rooted conspiracy going on which apparently encompasses most, if not all of the governmental structure. Can nothing be done?</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">It may very well prove impossible to bring legal action against these people for what they're doing to me, but I fully intend to continue my pursuit of the answers--and shall endeavor to expose this malignant corruption for what it is. I firmly believe the truth must eventually surface. Any consideration you can give this matter--either assisting me with information, suggesting responsible authorities from whom I might elicit assistance, or possibly forwarding this letter to someone who could cause investigation, and perhaps act to prevent further retaliation by these people, would be ever so greatly appreciated. This letter has been written in good faith, and I sincerely hope you will treat it as such. If nothing else, I ask that you at least accord me the courtesy of acknowledging receipt (<a href="http://web.archive.org/web/20000711155517/http://www.netti.fi/~makako/mind/d_fratus.htm" target="_blank">Remote Control Electronic Brain Punishment?</a>).</div><br />
<div style="text-align: justify;"><strong>Modern Human Experimentation / Torture</strong> - I have been the unwitting subject of a painful and inhumane mind manipulation project for nearly three years now without a clue how to combat it because it is invisible and for the first year, beyond my comprehension. After applying for a security clearance for my job as a LAN administrator for a D.O.D. contractor in California (Titan Research and Technology), I was mentally invaded by unknown to me forces of this government. I have no Idea what the goal of this torture treatment is, it makes no sense at all other than to drive me crazy and lose all faith in my fellow man and our so called Democratic society. What I do know is that it has completely ruined my life, health and career which is an understatement. What I'm about to say will classify me as a schizophrenic paranoid by traditional doctors, which is a perfect cover for the party(s) responsible for my condition. I have no history of mental illness and The maddening part is that apparently only I am at the receiving end with no-one to witness it. I ask that you hear me out with an open mind and take into account my research which proves that what I am claiming has already been exposed to some extent. All of my research started in March 1994 when after a long year of torture I decided I had to search for the truth because the truth was not going to find me. Through a long list of calls I found a person (Cheryl Welsh) that was researching the same thing and sent me a large amount of information on the subject of remote mind control / manipulation technology. This documentation enlightened me and scarred the hell out of me because I was reading it and knowing absolutely the truths it revealed due to personal experience.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">My real life nightmare began in mid January 1993 about 6 months after applying for a security clearance for my job at a Defense contractor in Northridge California and less than a month after a major dental procedure by a dentist referred to me by the company (Dr. Pasternak). One day in January 1993 I began hearing voices talking to me in my mind (although I was not aware where they originated from at first) and a high pitched tone in my ears like a very high frequency radio wave that pulses. I cannot remember the exact date and time because it was the most traumatic experience I've had in my life, and my concern was not to document times and dates at the moment. The voices were at a high enough volume to sound like it were a person in the room with me. At first I believed someone had tampered with my stereo equipment or put speakers in my walls. This was proven false when I went for a walk to escape and I continued to hear the voices. I proved this by plugging my ears, the sound comes from the center of my head. Learning this took me from fright to near psychosis because of their constant attack and my mind not accepting an unacceptable truth. I still played with the idea that the sounds were external to me because the truth was unacceptable to my belief system at the time.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">What I have gone through cannot be put into words well. I feel that someone reading this could not perceive the maddening anguish of realizing with concrete evidence that his/her mind was no longer their own and subject to torment by unseen criminals at their whim with no way to protect oneself and no legal recourse against “them”. It might be easier for a religious person to handle, He could blame it on evil spirits or something and have hope that his god will save him and if it did stop, he would be no more the wiser. Being a realist to my demise I know that I am dealing with human corruption and as history shows I may have a long time until justice is served (after 50 years we are finally hearing about how our government used unwitting human guinea pigs for radiation experimentation, will I have to wait until 2043 for someone to expose remote mind (nervous system) access technology on unwilling victims?).</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">I have been mentally tortured for so long now that it is like life as normal (over 950 days of constant verbal and other attack). My mind had to adapt to the fact that it was no longer alone? It’s not like having company over, it’s like having a rabid dog loose and your trapped in a room with no doors, you retreat to the corner and try to block yourself from being bitten but your defenseless. You can plead for him to stop tearing you to pieces but animals don’t bargain. You can pass out but when you awake he’s there snarling at you waiting for you to wake up completely so he can continue the attack. I have been driven to the brink of suicide so many times that it is just an amusing thought now. I have cried for mercy to deaf ears so long that there isn’t a tear left in my body, just the stare of a dead spirit. I had no-one to turn to because I knew that what I would say would sound insane. My only hope was that this was some sick joke and it would end soon and someone would exp lain why they did it and how. I had no such luck and it continues to this day with varying levels of severity.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">As the days/weeks/months/years went by at an accelerated rate due to the traumatic stress, I did seek an answer by getting an x-ray of my head (I suspected some kind of device had been implanted in me because I had been to a dentist for an extraction just prior to the invasion). Also the night prior I was driving back from Van Nuys (being severely tortured by the voices) when I stopped for a light, I looked at the car next to me and the man had his head tilted up and was pointing to a spot in his neck which latter turned out to be the exact location of the object, who this was I’ll never know. I got the x-ray from a general practice doctor claiming that I felt pain in my throat and wanted to see if everything was OK. The x-ray showed a small metal object below my jaw directly under where my tooth was extracted. I asked the doctor if it could have accidentally fallen there due to the procedure, he replied that it was nearly impossible because it was located below the jaw in the soft tissue of my neck and it would require drilling through the jaw bone. I then spilled the beans and told him the truth, thinking stupidly that he would understand and be on my side with the evidence we just found. I asked him to refer me to someone who could remove it and I made an appointment for an ear/nose/throat doctor (the first ear/nose/ throat I have seen), but the GP strongly suggested that I see a psychiatrist first. I assured him that I knew the correct course of action to solve my problem. I went to the ENT doctor and he gave me a bullshit examination then he asked what I wanted. I said that I wanted the metal object that showed on the x-rays removed. He said that it was like searching for a needle in a haystack and that it should not be removed. I protested and said I would sign a waver. He said that he wouldn’t do it without a clearance from a psychiatrist (obviously the two doctors had spoke).</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">I went to a psychiatrist and told him my situation, he responded as expected, he told me that I was suffering from a mental illness and could offer me his costly time and drugs but wouldn’t sign anything related to removal of my foreign object. I went to another ear/nose/throat doctor and got more x-rays showing the same thing, but this time I didn’t mention anything about my situation and stuck to the story about pain in my throat. He sent me to get a cat scan, I did so and his final judgment was “it would be like searching for a needle in a haystack” and didn't want to do it. Since then I moved to Washington and changed jobs (tying to escape). I have been to two more doctors and got the same results.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">The voices started mildly like they were announcing their presence (on a Friday I think). They spoke to me like they were friends but would evade all questions as to who they were and how they were doing it. This was maddening, but at the time I couldn’t imagine it lasting more than a few days as some kind of sick joke. Monday came after a weekend that could fill a book (they played up every fear I could come up with to explain their existence, like a torture chamber where your worst nightmares come true). At this time I was speaking to them verbally as I expected they were talking to me by some means (maybe having everywhere I go bugged and speakered. Which was much more acceptable to my mind than the fact that my own mind was bugged). One day a couple of weeks into my forced nightmare I decided to stay at a motel of my choice and escape them, so I thought/hoped. I drove around watching bypassers and knowing I couldn’t escape. One memorable person driving a jeep looked directly at me intensely then turned his head to the side of the road, then turned his head back at me with a weird expression like he was saying “keep fighting and we will turn our heads to your suffering”. Weren’t they already doing this? (I don’t know if these people are accomplices to the crime or dupes or ?) I ended up at my grandma’s, mom’s, uncles place and asked to stay the night. I did and somewhat explained my situation to my uncle (comfortably reading a book). He acted like “wow, that’s interesting, but I couldn’t help you” (Since then I have written off my family as dupes. It was hard to do this but it was proven to me by logic. (Many comments were made that had to have knowledge but denied it), But there is the possibility that my controllers fed thier comments that led me to issolation, But thats leading to wider conspiracy that i’m not ready to deal with, More likely they were fed lies that they gladly gobbled down.).</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">About this time a girl drove by and screamed something from the street (a girl in her car at the post office looked at me and put her fingers to her head then drew them away into space apparently saying “Your thoughts are being heard” no shit, why won’t you really talk to me? I tried to sleep on the floor with a cat howling below me and voices screaming from above me. Sleep obviously didn’t work so I sat by the back door and smoked. It was at this time that I discovered or they revealed that I did not have to speak to be heard by “them”. I started conversing with “them” (“What do you want”) by mental verbalization (meaning, thinking in words). This opened a bigger door to madness. I constantly thought about a way out while being ridiculed about my mental attempt. You could not imagine the frustration in your wildest nightmare. I went to work a mental mess and tried to survive the day because I still had a worthless common sense that I had to work to survive This went on day after day with non-stop attack from the chanting idiotic voices (My tax dollars at work). The most notable effect on my life was that they turned me into an alcoholic to cope with the psychological pain and to get to sleep (they did not stop when I decided I should sleep, nor did they stop while I was sleeping for that matter). They woke me up at two hour intervals making real sleep impossible. This sleep depravation left me in a zombie like state and less able to handle their audio attacks. Also I had lost all faith in people and government because of the obvious signs that my situation was known to some extent or some lie. A notable fact is that my abuse started just after Bush left office and just after the plastic man entered,</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">This made the whole thing that much more sickening and unbearable yet I had to, there was no escape. After a few weeks they became violent, meaning “they” didn’t pretend they were my friends and used the pitch and volume of their usually synthesized voices as a weapon. I woke up to a screeching psychopathic woman’s voice uttering high pitched nonsense. Background noise severely worsens the effects of their electronic/verbal attack, for instance being near machinery that whines or hums makes their voices unbearable. On the other hand being in complete silence is just as bad because the voices have a sickening electronic sound that you are completely aware is coming from between your ears. Basically every waking moment is a painful thing that is to be coped with in one way or another, it is an amazing thing what the human mind can deal with without collapsing (completely). During the most violent period the voices were synthesized to sound like<br />
"monsters" low and ultra high pitched that made my ear drums pulse. What they said was either painful nonsense (repetition of words or sentences ("I'm in your mind, I'm in your mind, I'm in your mind, A synthesized male voice that went in circles like a tape in an endless loop). The goal seemed to be to weaken me mentally, which worked but also drove me into furious rage with no one to confront. Can you imagine how maddening it is to be mentally tortured with no way to fight back? Its like being on a chain, inches out of reach of your tormentor that is whipping you and laughing about it with sickening confidence that he won’t be caught.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">During this period (about April 1993) my brother came to visit from Nebraska. He stayed at my house the first week and I took that week off from work. I had a gravely mistaken hope that my tormentors might give me a break during his visit (they give me just enough mercy to keep me alive). We planned to go for a long drive to Santa Cruz, Ca and stay a couple of nights. The night before we left I had it in with my head people. I demanded them to stop in the name of whatever I could think of. Of course they said "Fuck you," live with it (by not stopping their painful jabber). I was so frustrated I tried to crush my ear drums to stop them, it hurt but they didn’t stop. One memorable female voice (not synthesized) said “I not going to let you ruin this”, sounding like I was the one being unreasonable? This continued most of the night and I didn’t get much sleep. They got me back though. It’s fitting that they can inflict vengeance on me for not gladly accepting my new found fame as a mental tormentee, while I the abused get laughed at for every attempt I make to expose them. After about 2 hours of sleep I got woken up by the day shift lady (a screaming bitch). She gave me a wakeup call that I think I’ll remember several lives from now. It was a screeching high pitched synthesized female demon’s voice coming from above me in a tone that descended like falling into a bottomless pit. The devil would have been proud of her if one existed, sorry folks, we’ve just got people to deal with, GOD save us...</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">I got up and drove into Pasadena to find a map (what I really had in mind was to drive into a wall at 90 MPH. I drove fast but couldn’t turn the wheel into a wall). I found a map, plotted our drive and woke up my brother to go. I had a hopeful thought that maybe I could drive out of range of my tormentors radio broadcast (not thinking about satellites at this time). I asked him to drive and we left. What followed was the worst 2 days of my entire three years as Mr. Bill (you know, the clay guy on Saturday night live that got squashed, decapitated, etc. And you all laughed). During the entire drive I was severely tormented with high volume voices spouting nonsense and playing with my fears. At this point I was tiered of fighting (no sleep and hope for a vacation) I just laid back in my seat and dealt with it. After awhile we were at a place that my brother wanted to stop at to take pictures. There was a old church in town that we went into, I sat down and prayed for someone to ake the assholes leave my mind. Of course it did not work, in fact they said “we thought you’d try that”. We continued to Santa Cruz and my head got more swollen with abuse. We arrived at about 7:00pm and looked for a motel. As we arrived the voices said something like “you have to have a good time tonight” like they were commanding me to do so after 24 hours of sheer terror. I wanted to but didn’t see it as possible with people in my head so to speak. After renting a room we went into town (a college town) stopped at a couple of pub’s and went back to the motel. I didn’t get much sleep due to the voices and woke up a mess (48 hours with about 4 hours sleep). I woke up or was woke up first again and went out driving (maybe find someone to help me, ha). At a 7-11 I flirted with the girl working there (I felt a woman would help my situation somehow). As I walked to my car I noticed a guy sitting in his car in a daze. I had a feeling I should talk to him like he was another victim, but I didn’t.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">I went back to the motel and woke up my brother and asked if he wanted to go for breakfast. We went and I forced down some food. As we left I walked out first, there was a lady with a superior smirk on her face standing there. She said “had enough yet” without greeting me. So I have proof that not only am I being tormented to the brink of suicide but average dipshits on the street are aware of it to some extent and think it’s amusing to harass me with their comments. We drove around town and I was a complete basket case. We drove by the beach and a girl standing on the sidewalk yelled at us “hey, those people are real you know”. At this point I had enough and went back to the room. I told my brother I wasn’t well and to go see the sights. He did and got my brains blown out by the voices. At this time there were many different voices and most of them synthesized to sound un-natural. 3 or 4 were their best attempt at monsters. One in particular, a low grumbling synthetic voice was very disturbing, and they knew it and used it often. Then there was the screaming she-bitch from hell, a ultra high pitched woman’s voice that snapped out commands with authority (as described 48 hours ago). There was no trying to ignore them as I try to do now (12/95). These voices were physically painful to the ears/head. About two hours into this I retreated to the restroom to try and find a razor to end it. I didn’t find one. My Brother came back and I told him what was going on. He sounded sympathetic but with no knowledge to offer. I suffered all night and finally drove to the store late to get out of there for a minute. A car with kids in it was parked there, one of them said “he’s going to get it tonight”. I did, I laid in bed all night while they gave me what they called the monster review. Sounds real stupid but it was horrible and painful. I was/am a man fighting for his own mind and being tortured relentlessly.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">At this point I was in such a state of sleeplessness, frustration and torment that I considered myself dead already. They lead an allnight routine between my ears with Ms. High pitch as narrator. She wailed out that it was over now but I had to get the review treatment. This consisted of hearing all the most horrible voices they had used on me and after each one the she-devil would claim that that voice would be gone as long as I didn’t think about it (remember it). If I did it would return. In the morning I woke up my brother and told him we should leave and he should drive, please. We left and I laid in my seat with my eyes closed hearing them chant something over and over and over. As time went by it seemed to get lesser and lesser in volume leading me to believe it really was over. We stopped at a denny’s near the end of the trip and I saw an older man sitting in his car and looking at me. I walked over to him and said “What’s going on”. He said “Well its kind of like having a bees hive in your ear and it will last for a long time.” I didn’t know what to say so I went back to my brother and forced down some more food. Of course it didn’t end and was back up to full severity the next day.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">This “treatment” continued through Jan, FEB, March and April of 1993 which flew by but seems like an eternity like a never ending nightmare,. One of the memorable things “they” chanted at this time was the names of my girl friends over and over like I was supposed to be with one of them (at least this was what I deducted in my tortured mind). I invited one over and she spent the night. They laid off me that night and I got a real nights sleep. So like a tortured animal I deducted that being with her is what they wanted. My reasoning didn’t go very far at that time, there was either severe pain or little pain, little pain was the right road instinctively. I was/am in a cage without bars being played with and tormented and my only real thought left was how to get out. I asked her to move in not revealing the selfish reason I had. She said she wanted to get married and I was in no position to object. We did and of course they didn’t leave me alone, but at least I had a caring person to talk to. Soon after, their attack was up to the level when I was alone, which drove me into rage that I often took out on her verbally (never physically because that is not possible for me) which ruined our marriage that should have never been by 12/93.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Voices are not the extent of my torture, In the second year of my electronic harassment I have been electrically shocked, had involuntary limb movement (the mussels in my left arm convulse), and very painful pressure in my head, not like a headache but a feeling like your head is about to explode. As well as a tickling sensation in my ears, usually while trying to fall asleep or at key moments. Their techniques and timing are not known to me, the pressure in my head was almost always while driving (seeming to be at key moments) and the shocks were usually while trying to relax or sleep or while thinking about their presence, they like me to ignore them and punish me when I don’t. A normal day for me consists of waking up to their presence (not giving me more than a second before they remind me I’m mentally fucked). This starts with slow chanting of bullshit with no meaning. By the time I get in the shower (a dreaded place because the sound of the water amplifies their voices in a sickening way) my mind still half asleep sometimes mimics them causing me to mumble what they are saying. Now it is less severe in the morning, unlike the morning terror they put me through the first year, making me think some kind of restraints have been put on them, or maybe they just don’t want me to die of a heart attack just yet (last time tested 160 over 120). I drive to work and they torment my mind more and more as the day progresses. When I am alone I am more susceptible to mumbling their bullshit uncontrollably, sometimes heard by others which probably makes them think I’m nuts. It gets worse after work when I try to relax they speak more rapidly sometimes driving me into a frenzy.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Often while diverting my attention watching TV or something I will say a complete or partial sentence that obviously didn’t originate from me telling me that they can manipulate the speech related part of my brain (I say something that is another person talking to me, using my mouth, you couldn’t comprehend this (yes I’m crazy, that’s easier to believe)). I lay in bed for an hour or two or three depending on the severity, fall asleep (which is the hardest task of the day, you have to somehow forget that your mind has been invaded, ignore the rambling voices and relax enough to fall asleep), have several nightmares, wake up and do it again. What kind of sick twisted fucks would even think it would be amusing to do this to someone and who would follow them? Let alone the suffering I have gone through with the above conditions, I am "Paranoid" about the possibilities of permanent damage that has been done to my brain and body by concentrated electromagnetic waves (or ?) on my person. I worry that my unknown amount of years in direct exposure to these frequencies may have caused physical as well as mental damage.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">My motive in writing this is to hopefully expose my tormentors and gain my freedom which I was supposedly born with. I wish to live the rest of my life in freedom of mind which the lack of is probably beyond “your” comprehension. Also I want to end “their rein” by whatever means necessary to prevent others from a fate worse than death! I know allot of the above sounds completely paranoid (you would have to be there). In fact this is the barest glimpse into my life for the last two and a half years. Some things I felt would not be at all believable so I left them out. I swear to whatever god you believe in that I am telling the truth here. I don’t believe in a god. I believe in common sense (you would have to be there). This is a plea for help from a tortured man. If anyone can help me find the answer to my suffering by information on those responsible or any means to evade their attack (everything I have tried has failed), I don’t know very much about electronics or radio waves but I know that this can be blocked and someone knows how to do it. Also I need to find A way to prove my claim, meaning I need to record their voice assault. I feel a pulsing in my ears when they speak. I need to find a way to record this. Please contact me. I need a doctor not afraid to remove the object in my neck, Can send copies of x-rays.</div><div style="text-align: justify;"><br />
</div><div style="text-align: center;"><strong>Memorable statements by “them”</strong><br />
“Find some help for your mind...While we fuck it up."<br />
“There’s a wire in your retina”<br />
“The truth is unbelievable, I’m a stooge myself.”<br />
“Do your homework”<br />
"This?"<br />
“It’s not what you think David”<br />
“Your a bastard”<br />
“Be a man”<br />
“Fuck you David”<br />
“The government lied David”<br />
“Your mind is mine David”<br />
“I maimed you David”</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><div style="text-align: center;"><strong>Definitions</strong></div><br />
<strong>“Them”</strong> - Something that I learned early in life to mean “Blaming an unknown it, in ignorance of facts”. But now I find “them” to be fitting in my situation.<br />
<strong>dupe (d¡p, dy¡p)</strong> - noun (1) An easily deceived person. (2) A person who functions as the tool of another person or power.<br />
<strong>Lieing sack of shit</strong> - self explanitory</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Research: </strong>Such Things Are Known by Dorthy Burdick Copyright 1982 - Excerpts: Page 106. "In a footnote I first read of a machine that could read minds from a distance by deciphering the brain's magnetic waves; that actually was going on at Walter Reed Army Institute of Research, funded by the Advanced Research Project Agency of the Defense Department in the spring of 1973." Page 140: "Attempts have been made to present human experiments in a favorable light." Page 134: "Since 1973, the Advanced Research Project Agency of the Defense Department has utilized the combined efforts of the Massachusetts Institute of Technology, New York University, the University of California at Los Angeles and the National Aeronautics and Space Administrations' Ames Research Center at Moffett Field in California to read minds from a distance by deciphering the brain's magnetic waves. The Pentagon denied the project was secret although a reporter was ousted from a meeting on the subject by someone identified as a member of the CIA"</div><ul style="text-align: justify;">Mind Control and Mental Telepathy by Patrick A. Warden 1993 - Excerpt: "The human mind emits electromagnetic waves, known to biofeedback researchers as alpha, beta and delta waves. These fall into the frequency range of from about 10 to 15 Hz."</ul><ul style="text-align: justify;">Prevailing Winds Research by Martin Cannon - Excerpts: "Substantial evidence exists linking members of this country's intelligence community (including the Central Intelligence Agency, the Defense Advanced Research Projects Agency, and the Office of Naval Intelligence) with the esoteric technology of MIND CONTROL. For decades, "spy-chiatrists" working behind the scenes on college campuses, in CIA-sponsored institutes, and (most heinously) in prisons have experimented with the erasure of memory, hypnotic resistance to torture, truth serums, post hypnotic suggestion, rapid induction of hypnosis, electronic stimulation of the brain, non-ionizing radiation, microwave induction of intracerebral "voices", and a host of even more disturbing technologies. Some of the projects exploring these areas were ARTICHOKE, BLUEBIRD, PANDORA, MKSEARCH and the infamous MKULTRA....As CIA veteran Miles Copeland once admitted to a reporter, "The congressional subcommittee which went into this sort of thing got only the barest glimpse."</ul><ul style="text-align: justify;">U.S., Russia Hope To Safeguard Mind-Control Techniques, Defense News January 11-17, 1993 P 29 - Excerpt: "The Russian authors note that "World opinion is not ready for dealing appropriately with the problems coming from the possibility of direct access to the human mind." Therefore, the Russian authors have proposed a bilateral Center for Psycho-technologies where U.S. and Russian authorities could monitor and restrict the emerging capabilities."</ul><div style="text-align: justify;"><br />
</div><div style="text-align: center;"><strong>Articles</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>EYE Fall 1993</strong> - Excerpts: Dr. Carl Sanders is especially concerned about the Big Brother implications of the microchip. Sanders is an electronics engineer, inventor, author and consultant to various government organizations, as well as IBM, General Electronic, Honeywell and Teledyne. He also has extensive background in designing surveillance equipment for the CIA, FBI and the customs Department in Atlanta, Ga. Although he worked on designing the microchip years ago, he is now concerned that it will be misused. On a tape he produced to explain his views on the microchip, Sanders says: "Thirty-two years of my life was spent in design engineering with a Ph.D. in engineering, and electronic-designing microchips in the Bio-Med field. Working on the microchip, we had no idea about it ever being an identification chip. We looked at it as being a very humanitarian thing to do." The chip Sanders worked on was only used in medical applications at first. Sanders explains that as the chip began to evolve, there came a time in the project when the team of people out of Motorola, General Electric, and the Boston Medical Center said that the financial return on by-passing severed spines was not extremely lucrative. "We noticed that the frequency of the chip had a great effect upon behavior modification.. the project almost turned into electronic acupuncture because what they ended up with was embedding a microchip to put out a signal which affected certain areas. They were able to determine that you could cause a behavioral change." He says that microchips can be used for migraine headaches, behavior modification, uppers or downers, and sexual stimulants or depressants.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Sanders feels that this chip may eventually be used for life-long identification, possibly against people's will. This could be done through the "Immigration Control Act of 1986." Section 100 gives President Clinton the authority to implant whatever type of identification is necessary to control the population. Sanders fears that a SmartCard, invisible tattoo, or electronic microchip under the skin may be used to enforce immigration laws. Currently there are several measures pending before Congress calling for a social security card for immigrant identification with a photo, fingerprint digitization, or bar code. When viewing microchip technology as a whole, it is interesting to note the profluence of acronyms and shortened phrases associated with it -- such as AVID and KIDSCAN. It is reminiscent of what George Orwell, in his book 1984, referred to as "Newspeak" -- modified terms concealing their true meaning. The name KIDSCAN seems especially misleading since it psychologically conjures up the positive idea of "kids can" while fogging the realistic image of a toddler being injected with a foreign implant. The New World Order and the implantable microchip. It may be many years before the public is faced with undergoing a microchip injection, but if they are the chip will likely be publicized with a list of miracles attached to it. Whatever the microchip may be capable of doing, there are several factors to keep in mind: a microchip can link a person to a computer where personal data can be revealed; a microchip implantation is usually completely irreversible; and it is possible for an individual's location to be known continually if a microchip is tracked with the satellite system.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Spy Government</strong> by Omar V. Garrison, New York 1967 - Excerpts: In the totally controlled society of George Orwell's nightmarish novel '1984' the individual had one retreat that Big Brother could not penetrate: "Nothing was your own except a few cubic centimeters inside your skull." But in America today, even those "few centimeters" of cranial refuge are under siege. With the support and participation of the federal and state governments, a multitude of subliminal snoopers calling themselves behavioral scientists are assaulting the national psyche. Their instruments include: Brain manipulation procedures that seek to control human behavior by such means as drugs, chemicals and tiny electrodes implanted in the brain *(and teeth). Some of these secret research projects are being carried out by the U.S. military services. The over-all program, still in its infancy, is already so widespread and so alarming in its possibilities that it has inspired growing public debate, and has touched off a full-scale investigation by Congress. The legion of psycho-spies who are prying into people's minds now holds dominant positions in schools, hospitals, armed services, police courts, the U.S. Civil Service Commission, the Peace Corps, U.S. Office of Education, about one-half of the nation's major corporations and a constellation of federal agencies, most of which have nothing to do with security. The American people have never been consulted about the claims of the behavior pundits that they are entitled to subject everyone to a mental third degree in the name of science. Yet the lives of many citizens in this country-job, schooling, marriage, reputation are already being charted by their secret reports. Thousands of unwary school children have been subjected to the same unsettling intrusion into their emotional lives, under research projects financed by the U.S. Office of Education and, although the massive testing program was paid for with tax money, parental consent was neither sought nor given. (* "and teeth" are the editor's emphasis).</div><div style="text-align: justify;"><br />
</div><div style="text-align: center;"><strong>Victims of Electronic Assault Working to Ban Sound Wave Technology</strong> <br />
PO BOX 67174, Cuyahoga Falls, Ohio 44222 Spring 1991</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">The enclosed information relates to ongoing behavioral research. It is conducted without the knowledge or consent of the targeted individual. Various governments around the world today are engaged in the manipulation and control of electromagnetic fields emanating from living beings. This is accomplished via a long-distance radar type transmission. Concerning human beings, a brain-jar technique is employed to engage the frequency following response of brain wave patterns. A constant barrage of sounds and time-reversed waves are then linked into the biomagnetic aspects of the targeted individual. This tactic forces the nucleus to give up information as to its contents. It forces an individual to give up the contents of their actions: their thoughts. The focus of our group is to gain the release of all citizens being victimized by the U.S. electromagnetic arsenal. The weaponry used is classified. The affects of the weaponry are classified. The action is camouflaged by the Pentagon's duplicity of national security. The technology is undetectable. This is possible through advances in physics: virtual state technology. Simply put, the transmission occurs in hyper space, a mode unassescible to common science or medicine.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Four years ago I was informed by three different sources, two doctors and a party loosely associated with an international human rights organization, that the device is used for torture. It drives people crazy and it elicits forced confessions. Among a long list of other things, I was also told nobody wants to talk about it, and that the medical community would be the last to cooperate in an investigation. I have found these, and other statements, to be true. The victims are forced to function under extreme neurological stress, most of them not even aware that their own brain has been cut by the government's sound wave weapons. The doctors responsible are paid well and undoubtedly promised a secure and private future by men such as George bush. As a society, we need open information on this technology. We need to hear voices that stand out from the cumulative corruption that is inherent in this crime.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>ENCLOSURES:</strong> History - behavioral research has been of utmost interest to the U.S. Intelligence since the 1940's. The focus gradually shifted from biological experimentation to radio and microwaves. Program Names - various programs have surfaced concerning control of the individual via radio waves. It is possible for a targeted individual to register SOUNDS, THOUGHTS, and WORDS via focused radio/microwaves. Chapters not included: The Brain - control of the limbic system and endocrine systems; Entrainment - cueing the brains rhythms; Mind - Wire System - symptoms of the attack; Injection of Human Beings - large scale entrainment; Solutions - assescible laws and the politics of science.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Cellular Disruptions</strong> - EMF's (Electromagnetic Fields) cause the following interrelated cellular changes and disruptions: (1) The ability to take in, use and release vital minerals (ex:sodium, potassium, magnesium, calcium, iron, zinc, manganese and nickel); (2) RNA production increases - sometimes by a factor of 10 or more. Cell growth and function become confused and disorganized; (3) Mutations and cancers; (4) carbohydrates-energy and nucleic acid metabolism particularly in the nerve, heart and skeletal muscle tissue; (5) Interactions with transient free radicals; (6) Diffusion across cell membranes; (7) Vital bond angles affecting fits between enzymes and substrates; (8) Rotational polarization of molecules with specific reactive sites; (9) Rate of quantum proton tunneling in DNA, affecting genetic code; (10) Segration of paramagnetic and diamagnetic substances in gradient magnetic fields; (11) Induced electrical inter - and intra- cellular currents.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">We are victims of government sanctioned experimental neuroscience. Included because many of the below techniques have been used on me. Showing the corrupt roots of this technology.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>CIA Memorandum For The Honorable J. Edgar Hoover, Director, Federal Bureau of Investigation</strong> Subject: Brainwashing, 25 April 1956 - The attached study on brainwashing was prepared by my staff in response to the increasing acute interest in the subject throughout the intelligence and security components of the Government. I feel you will find it well worth your personal attention. It represents the thinking of leading psy-chologists, psychiatrists and intelligence specialists, based in turn on interviews with many individuals who have had personal experience with Communist brainwashing, and on extensive research and testing. While individuals specialists hold divergent views on various aspects of this most complex subject, I believe the study reflects a synthesis of majority expert opinion. I will, of course, appreciate any comments on it that you or your staff may have. (signed) <strong>Allen W. Dulles</strong>, Director. <strong>Enclosure</strong> - (OA 53-37) The report that follows is a condensation of a study by training experts of the important classified and unclassified information available on this subject.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Background:</strong> Brainwashing, as a technique, has been used for centuries and is no mystery to psychologists. In this sense, brainwashing means involuntary re-education of basic beliefs and values. All people are being re-educated continually. New information changes one's beliefs. Everyone has experienced to some degree the conflict that ensues when new information is not consistent with prior belief. The experience of the brainwashed individual differs in that the inconsistent information is forced upon the individual under controlled conditions after the possibility of critical judgment has been removed by a variety of methods. There is no question that an individual can be broken psychologically by captors with knowledge and willingness to persist in techniques aimed at deliberately destroying the integration of a personality. Although it is probable that everyone reduced to such a confused, disoriented state will respond to the introduction of new beliefs, this cannot be stated dogmatically.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Principles of Human Control and Reaction to Control</strong> - There are progressive steps in exercising control over an individual and changing his behavior and personality integration. The following five steps are typical of behavior changes in any controlled individual: (1). Making the individual aware of control is the first stage in changing his behavior. A small child is made aware of the physical and psychological control of his parents and quickly recognizes that an overwhelming force must be reckoned with. So, a controlled adult comes to recognize the overwhelming powers of the state and the impersonal, "incarcerative" machinery in which he is enmeshed. The individual recognizes that definite limits have been put upon the ways he can respond (Approved for Release - 62-80750-2712X, Date: 8 FEB 1984, OA 53-37). (2). Realization of his complete dependence upon the controlling system is a major factor in the controlling of his behavior.The controlled adult is forced to accept the fact that food, tobacco, praise, and the only social contact that he will get come from the very interrogator who exercises control over him. (3). The awareness of control and recognition of dependence result in causing internal conflict and breakdown of previous patterns of behavior. Although this transition can be relatively mild in the case of a child, it is almost invariably severe for the adult undergoing brainwashing. Only an individual who holds his values lightly can change them easily. Since the brainwasher-interrogators aim to have the individuals undergo profound emotional change, they force their victims to seek out painfully what is desired by the controlling individual. During this period the victim is likely to have a mental breakdown characterized by delusions and hallucinations.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">(4). Discovery that there is an acceptable solution to his problem is the first stage of reducing the individual's conflict. It is characteristically reported by victims of brainwashing that this discovery led to an overwhelming feeling of relief that the horror of internal conflict would cease and that perhaps they would not, after all, be driven insane. It is at this point that they are prepared to make major changes in their value-system. This is an automatic rather than voluntary choice. They have lost their ability to be critical. (5). Reintegration of values and identification with the controlling system is the final stage in changing the behavior of the controlled individual. A child who has learned a new, socially desirable behavior demonstrates its importance by attempting to adapt the new behavior to a variety of other situations. Similar states in the brainwashed adult are (SECTION DELETED BY CIA, 2 - OA 53-37).</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>Remote Mind Control Technology by Anna Keeler</strong> - Excerpts: Scientist Allen Frey of Randomline Inc. Was always more interested in low intensity microwave hazards: thermal effects were known. During Project Pandora, the Navy funded such projects of his, as how to use low average power intensities, to: induce heart seizures; create leaks in the blood brain barrier, which would allow neurotoxins in the blood to cross and cause neurological damage or behavioral disorders; and how to produce auditory hallucinations or microwave hearing, during which the person can hear tones that seem to be coming from within the head or directly behind it. Dr. R.O. Becker, twice nominated for the Nobel prize for his health work in bio-electromagnetism, was more explicit in his concern over illicit government activity. He wrote of “obvious applications in covert operations designed to drive a target crazy with “voices.” What is frightening is that words, transmitted via low density microwaves or radio frequencies, or by other covert methods, might be used to create influence.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><strong>My Conclusions:</strong> - I have no idea as to the extent of the knowledge and or acceptance of the extremes of my situation, It makes me sick to think about it. Regardless of me personally, I ask you to consider the information presented here. Maybe I am one of the few that knows it is absolute fact from personal experience, but I also know how hard it is to convince an unknowing person of an unbelievable fact. Especially when faced with misinformation. This technology is real, and we have allot to worry about and allot to do to correct it. With this technology it is possible for unknowing citizens to be subjected to laboratory rat like experimentation, as in my case. But more importantly it can be used to ultimately control civilization, by mental eavesdropping or manipulation for political, business, or other reasons. What it boils down to is the complete loss of human rights and privacy. George Orwell had a pretty good vision of the future in “1984”. He was lacking in the technology, but right on about Big Brother. If a small voice speaks out about corruption it is stamped out or made a fool of. Even more horrifying than telescreens, is direct access to the human mind by a race of people that are still producing nuclear weapons and lying about crimes a half century old. Please don't let it continue! <strong>(Dave Bader)</strong> <strong>Source:</strong> <a href="http://web.archive.org/web/20001001132852/http://www.netti.fi/~makako/mind/d_bader.txt" target="_blank">Modern Human Experimentation / Torture</a></div><div style="text-align: justify;"><br />
</div><div style="text-align: center;"><strong>Black Sabbath - Sabbath Bloody Sabbath</strong></div><div style="text-align: justify;"><br />
</div><div style="text-align: center;">You see right through their dirty lies<br />
You know you have to learn, the execution of your mind, you really have to turn<br />
The race is run, The book is read, The end begins to show<br />
The truth is out, The lies are old, But you don’t want to know</div><div style="text-align: justify;"><br />
</div><div style="text-align: center;">Nobody will ever let you know, When you ask the reasons why<br />
They just tell you that your on your own, Fill your head all full of lies</div><div style="text-align: justify;"><br />
</div><div style="text-align: center;">The people that have crippled you, You want to see them burn<br />
The gates of life have closed on you, And there’s just no return<br />
They take your mind away, And you don’t care if you don’t see<br />
Again the light of day</div><div style="text-align: justify;"><br />
</div><div style="text-align: center;">Where did you run to, What more can you do<br />
No more tomorrow, Life is killing you<br />
Dreams turn to nightmares, Heaven turns to hell<br />
Burnt out confusion, Nothing more to tell</div><div style="text-align: justify;"><br />
</div><div style="text-align: center;">Everything around you, What’s it coming to<br />
Good knows as your god knows, God blast all of you<br />
Living just for dying, Dying just for you</div><div style="text-align: justify;"><br />
</div><div style="text-align: center;">You Bastards!<br />
1973</div><div style="text-align: justify;"><br />
</div></div><iframe align="left" frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=hr0a-20&o=1&p=8&l=bpl&asins=B003UESN2A&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;"></iframe><iframe align="left" frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=hr0a-20&o=1&p=8&l=bpl&asins=0195107926&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;"></iframe><iframe align="left" frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=hr0a-20&o=1&p=8&l=bpl&asins=1883536227&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;"></iframe><iframe align="left" frameborder="0" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=hr0a-20&o=1&p=8&l=bpl&asins=1606110489&fc1=000000&IS2=1&lt1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr" style="align: left; height: 245px; padding-right: 10px; padding-top: 5px; width: 131px;"></iframe></div>TIS CANADAhttp://www.blogger.com/profile/08144524522627829246noreply@blogger.com