Tag Archives: NSA

NSA Mind Control and Psyops-Read Carefully Please

 

The following was sent to me by Will Filer <Esur4@aol.com> on July 27, 1999. It offers a new explanation for government mind control. Will has stated to me that he is a former consultant to the U.S. National Security Agency and asked me to post this information immediately. He also believes he is in immediate danger because of this information.

If you have comments on this document, feel free to post them to the MINDCONTROL-L list.

– Wes Thomas, moderator, MINDCONTROL-L list

Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency.

1. INTRODUCTION:

1. The following information is an overview of one area of NSA Intelligence Technology and Applications. A Technology Title, Applications, Technology Description, case history summaries and the NSA’s Behavioral Modification Procedure Outline documented for the non-technical person.

2. TECHNOLOGY TITLE:

1. Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency. “Computer Simulated Subconscious Speech Language”.

3. APPLICATIONS:

1. Intelligence:

1. Used on foreign and domestic diplomats, spies, and citizens to gather intelligence, steal advanced technology for US Defense applications. Surveys of citizen’s opinions to government events and propaganda. Heavy survey use during times of war, economic strife and political elections. War against drugs. Used to identify investments that have high yield to support clandestine operations. Used to direct field agents without the agents having to carry communications hardware and encryption devices.

2. Counterintelligence:

1. Used on foreign and domestic diplomats, spies, and citizens to identify intelligence operations; scope, participants, communication methods, and weaknesses in individuals, systems, equipment, or signals that can be exploited. Additional applications include misinformation dissemination, confusing and confounding leaders during critical decision moments, distorting significance of various facts to sway decisions and actions in US favor, behavioral modification of foreign spies to betray their loyalties, self initiated executions (suicides).

3. Behavior Modification and Accelerated Resocialization:

1. This technology is used to develop and control spies, political candidates, and other public figures through psychological intimidation, fear and extortion.

2. The NSA uses this technology to resocialize (brainwash) the US civilian voting population into “Giving their lives to Christ” (giving up their personal will and civil rights to the NSA). Each subject is required to maintain a “Personal Relationship with Jesus Christ” (following the precepts of the Bible and doing what is ordered by the NSA). The technology is also used to monitor and optimize NSA employee performance and loyalty.

4. DEFINITIONS AND ACRONYMS:

1. Age Regression: The act of bringing back past memories in a subject though the use of hypnosis. The memories can be very vivid and real in the mind of the subject.

2. Hypnoamnesia: Temporary loss of memory due to a posthypnotic suggestion.

3. NSA: United States National Security Agency, Fort Mead, Maryland.

4. ODO: On-Duty Officer, or officer-on-duty.

5. Posthypnotic Command: Same as Posthypnotic Suggestion. This term “Command” is more commonly used when the hypnosis is forcibly given to the subject and when the subject’s will has been broken down though the use of REM Sleep Deprivation and Suggestibility Index
increasing drugs like CNS and Cardiovascular Stimulants. The exposure to extreme REM deprivation and select chemical stimulants cause the subject to have no ability to resist the “Suggestion” any longer thereby making it a “Command”.

6. Posthypnotic Suggestion: A subconscious suggestion or command resident and potentially active in the subject following a hypnotic trance or period of direct access to the subconscious mind.

7. Posthypnotic Suggestibility Index: An index or rating of a subject’s susceptibility and sensitivity to hypnosis.

8. REM DEP: Abbreviation for REM Sleep Deprivation or REM Deprivation. A subject deprived from REM Sleep has multiple symptoms i.e. reduced protein synthesis, black circles around eyes, loss of short term memory, confusion, impulsiveness, anger, frustration, diminished self-esteem, increased suggestibility, reduced productivity, apathy, and depression. Long term REM Deprivation results in death.

9. Script: A carefully constructed series of words arranged in the form of a posthypnotic suggestion. The script will generally consist of four separate parts;

(1) an identifier (subject’s name, description, or other identifying factor),
(2) trigger activation condition or conditions (when, what or how the suggestion will trigger),
(3) the content (what the trigger will precipitate in the perception of the subject),
(4) and a duration (when or under what conditions will it stop or finish). Additional reinforcing scripts are usually added to “strengthen” or reinforce the central posthypnotic command.

10. Somnambulatory State: An abnormal condition of sleep in which motor acts (like walking, running) are performed. This state is typically achieved and a prerequisite to traditional hypnosis.

11. Subliminal Implant: A posthypnotic suggestion successfully delivered to the subject’s subconscious mind.

12. Transceivers (NSA): Nearly microscopic electronic surveillance devices that collect and transmit encrypted audio, color video, and location coordinates collected at the subject site to NSA Satellites that in turn forward it to NSA central intelligence operations. The devices also receive encrypted audio scripts from NSA central intelligence operations through the satellites and deliver it to the subject’s site in the form of a subliminal posthypnotic suggestion. These devices are approximately the size of the head of a straight pin and can be concealed in houses, offices, automobiles, planes, and street corners.

5. TECHNOLOGY OVERVIEW:

1. In addition to the ability to see and hear what is going on inside people’s homes, vehicles, and businesses through the use of nearly microscopic digital surveillance technology, the NSA is able to interrogate and influence a person subconsciously without the knowledge or consent of the subject.

2. Thought Labels (Response Labels):

1. Have you ever watched a baseball game? Did you see the catcher and pitcher communicate using a series of itches, baseball cap rearrangement, and clothing tugs? An elaboration of this communication technique is used by the NSA to detect a fleeting thought in a subject or “read minds” so to speak.

2. Lets discuss how an itch, clothing tug or even an innocent sneeze can be used to label a thought. For simplicity, we will call itches, clothing tugs, sneezes, coughs, or involuntary muscle spasms that are performed during subconscious interrogation “thought labels”.

3. Post-Hypnotic Delivery Method:

1. The NSA combines hypnosis and thought labels to interrogate people without the subject being aware of it. “How can hypnosis be used?” you might ask. The subconscious mind operates at a speed of about 1200 to 1400 words per minute. This is many times faster than the conscious mind that operates at 250 to 450 WPM (words per minute). The posthypnotic script can be spoken at fast conversational speed approximately 250 WPM and a recorder or a computer speeds up the message up to approximately 1200 to 1400 WPM. Remember what happens when you play a 33 rpm record at 78 rpm? The resulting voice sound like the old American cartoon characters the Chipmunks. This is only slightly past doubling (2X) the delivery speed. At speeds as high as 1400 WPM, the voices would sound like a high pitched chattering whine. Remember when the words “Drink Coca Cola” were written on one frame of a movie in a theatre back in the 1960s? The frame rate in movies is played at 30 frames/second. At 1/30th of a second the conscious mind could not recognize the message but the subconscious mind could read it clearly. The audience increased their Coca-Cola consumption by 65% that night resulting in the Federal Government prohibiting subliminal advertising. The following probable reasons for not achieving a higher percentage of subliminal delivery effectiveness (> 65%) are described as follows. In that 1/30th of a second some people were blinking, some people were looking around the theatre, looking at spouses, children, candy, popcorn, etc. or they had sufficiently poor eyesight that they could watch the movie but could not distinguish the small writing clearly.

2. In the early years of this technology, the NSA originally recorded a spoken posthypnotic suggestion message into a tape deck and sped it up by speeding up the tape. This process was labor intensive, required each officer to have excellent diction and mastery of the language and dialect required, and was of poor quality due to background noise and the delay in timing during recording and processing. It also required extensive training to assure that each officer spoke at the same rate of speed so that the resulting “sped-up” script was delivered at the correct speed. Now computers are used to append digitized samples of optimized, ideal phonemes together to form words and the words are sped-up to the correct delivery speed.
Where dialects are present, a different set of base phonemes is used.

3. Currently, to optimize efficiency and accommodate the variety of languages on the planet, phonetic elements from each language and distinct dialect are sampled, digitally edited to optimize them, and appended during delivery to form words and words arranged to make sentences in the from of scripts that resemble hypnotic suggestions.

The empty space between words is minimized and pitch rise is compressed and filtered. Repetitive sine waves are also removed from the phonetic element’s acoustic wave train thus reducing the actual number of sine waves making up a word by 50% or more. This reduces the actual length of the time it takes the phoneme to be delivered prior to accelerating (speeding-up) the delivery (like fast forward). This helps the message to be played at higher speeds and reduces the subject’s ability to recognize it as accelerated speech. The technique of using optimized digitally sampled and edited phonemes appended together to for words and then sentences structured as hypnotic suggestions can be termed “computer simulated subconscious speech language”.

4. The subconscious mind is also very sensitive. It can hear things that the conscious mind ignores. If you have watched television, you have probably noticed that there are many “subliminal tapes” on the market to program your subconscious mind. These tapes have their “messages” recorded/hidden in the sounds of ocean waves, music, or other sounds but they are not sped-up to subconscious delivery speeds and are therefore not very effective. The subconscious mind can hear and discern the message even when there is background noise like waves, cars, planes, or even when someone else is speaking to you in normal conversation. Your conscious mind won’t hear anything unless it is very quite in the house. If you are very attentive you may hear what sounds like a low-pitched tape on fast forward, and played at low volume. This is the sound of the NSA’s high-speed audio subliminal message.

5. This modification of the phonetic elements, played at low volume, combined with the environmental background noise makes it very difficult for a subject to record the NSA message. Even if the subject were to effectively record the message, it is very difficult to filter (separate) the NSA’s message from background noise. Then, reconstructing the missing sine waves from the acoustic wave train and slowing the message down to discern the actual content of the “posthypnotic” script with the conscious mind would be nearly impossible for the average citizen. To briefly summarize, the subject would have no chance in analyzing a NSA message without the following items:

1. Professional state-of-the-art technology recording equipment.
2. Digital acoustic wave editing equipment.
3. Advanced engineering knowledge of acoustic wave science.
4. Phonetics and linguistics expertise.
5. Hypnosis theory and scripting.
6. Ideal environmental conditions for recording.
7. NSA ignorance of the subject’s intent and ability to capture a message.

6. This technology is the perfect intelligence tool. It is nearly impossible to detect or measure, difficult to trace back to the NSA. The symptoms that the NSA can “program” or inflict into the subject can cause fear that they might be thought to be insane if they were to report the NSA activities. The subject does not know the source of the technology or the technology itself, the subject has no proof or evidence, only their perception, suffering, and isolation. Additionally, potential recourses that are available to the subject can be interrogated out and preventative actions taken by the NSA to further isolate or disable the subject.

4. Using the Post-Hypnotic Delivery Method with Thought Labels:

1. The NSA technique is simple; they transmit their human programming message through the audio-visual electronic surveillance equipment installed in your home, car, or office to you. The subliminal message delivered to you could be “Mr. Jones, imagine that the IRS were auditing your taxes. Think back to a time you have cheated on your taxes and that you are worried that the IRS might find out in an audit. If you have never cheated on your taxes and have nothing to fear you will feel an itch on your right-hand ear lobe that will go away when you scratch it. If you can be caught by an IRS audit, you will feel an itch in the left nostril of your nose that will disappear after you itch it twice.” From your perspective, you have just had a fleeting thought about your past tax returns and had an innocent itch (thought label). To the NSA Officer On Duty (ODO), you have just communicated to him whether you have ever:

1) cheated on your taxes, and:
2) If the IRS could catch you in an audit.

2. This is a very oversimplified example of a typical NSA interrogation. Actual interrogation messages may consist of several hundred words and be very complex and sophisticated. Most messages consist of several dozen words. Yes indeed, the NSA has exceeded the wildest expectations of the book “1984”. As you can imagine, the spy world has reached a new plateau that directly affects every person in the USA and abroad. This electronic surveillance system extends down through Mexico, Central America, and deep into populated regions of South America. It also has been installed in Australia, Africa, and the free-world countries in Europe.

3. The NSA’s goal is to have the whole world under its electronic eye by the year 2000. They are almost there now, but are having difficulties with high-tech countries that have the counterintelligence resources to identify the high frequency bursts of microwave transmission from the transceivers. The system also has the ability to take a “voice print” from any person and place it on file. This file can be used to locate the subject later by comparing it to real-time surveillance audio samples received from the field as long as the subject is speaking in close proximity to a transceiver.

If the person is aware that the NSA has this capability and remains silent, the NSA can transmit a periodic worldwide subliminal message that addresses the person by name and causes them to dream and talk in their sleep. After the person talks, the voiceprint would be eventually identified and the person’s location can be identified nearly anywhere in the world. Yes, it is a small world, and getting smaller all the time.

4. This technology was originally conceived under CIA studies and fascination with the power of hypnosis in the late 1950’s and perfected by very early 1960s and implemented with unlimited resources to all areas of vital national security interest first.

Originally, after noting the behavioral effects in visual subliminal effects like the highly publicized event where stating “Drink Coca Cola” on a single movie frame “delivered a higher rates of speed than normal movie viewing raised the obvious question, “Does the human hearing work as good as eyesight accepting subliminal messages?”

Preliminary theory work was transferred to Fort Mead NSA who had expertise in characterizing language in analog domains where a sampled phoneme could be edited (shortened by removing excess sine waveforms from the “acoustic wavetrain”) and electronically reconstructed back into shortened words of language.

Some of the early experiments included “Remote Viewing at NSA where the Viewer would relax, open their mind and explain the clarity of images that were described by the NSA using this technology. These early experiments allowed the NSA to refine the specifications of the “Computer Simulated Subconscious Speech Language” and the scripting formats to maximize the ability to deliver an accurate “vision or picture” into the subject. Pictures already seen by the subject could simply be recalled using “Age regression” script variations.

6. OTHER REFERENCE MATERIAL:

1. Please refer to the book “Inside America’s Most Secret Agency, The Puzzle Palace” by James Bamford, Published by Houghton Mifflin Company, 1982. This book contains extensive information and references on the NSA’s history and the NSA’s first surveillance system that originally only eavesdropped on telephones and is now expanded to audio-visual.

7. NSA CASE HISTORY EXAMPLE SUMMARIES:

NSA Self-Initiated Execution (Suicide):

1. Bamford’s “The Puzzle Palace” references one of the NSA’s first self-initiated execution (suicide) with this “Thought Control” technology they developed. The NSA employee reportedly ran off NSA property saying demons were in his mind and he killed himself.

2. NSA Initiated Execution to Cover-up in the News:

1. A University of California at Berkley student that went into a bar on or around November 27, 1990 took hostages and insisted to the police that the CIA Director talk with him so that he could get relief from the suffering. The young man had sent letters to the president and the CIA but the requests had fallen on deaf ears. After the young man panicked and shot a customer in the bar, a SWAT team fatally shot him, the San Jose police found copies of the letters written to the President referring to people that could “read minds” and that he had learned how they do it. The NSA had been unsuccessfully brainwashing him and had no alternative but to terminate him to assure their security. It is interesting that what was originally broadcast on the news “The gunman was demanding to talk with the Director of the CIA” etc. disappeared quickly (suppressed?) from later news accounts.

3. NSA Initiated Execution to Cover-up in Music:

1. Curt Cobain of the musical group “Nirvana” was another victim of NSA brainwashing and was terminated by NSA. Cobain had started writing clues to the NSA activities into his music to communicate it to his music followers. He referred in music to the NSA as the “Friends inside his head”. Once the NSA puts on the highest level of brainwashing pain, the subject expires quickly. Cobain used heroin to numb and otherwise slow the effect of the brainwashing.

4. NSA Initiated Executions in Overseas Defense Project:

1. Some years back several employees of the United Kingdom’s Government working on a top secret Radar Project committed suicide with no apparent penetration by a hostile government, drug abuse or any other commonality other than working in a secured government project. They were not “Staged” suicides (murders) because some of them happened behind doors that could not be opened from the outside. These men were subjected to the same technology and processes that the U.C. Berkley student, the NSA officer, Curt Cobain, and thousands of others have experienced.

5. Musical references of NSA Technology:

1. Talking Heads; a music group popular in the eighties, wrote a song explaining the scientific process of the NSA’s brainwashing technology in a song called “Wild Wild Life”. The song gave an example of what the audible transmission sounded like at the end of the song (like a tape on fast forward). They mentioned in the song that “They (NSA) talk so fastà” and that the musical group had spent “All their time and money” unsuccessfully trying to find a place that the NSA would not be able to harass them. The Talking Heads exposed the technology, gave an example of what it sounds like, scenarios of how the NSA might select you or the brainwashing, and the scope of the electronic surveillance system.

6. NSA Counterintelligence Experiments:

1. Many experiments were performed by the NSA to determine the conditions and procedures that would be required to turn spies that were trusted by US enemies into assassins that we could invisibly manage. In early experiments, the resulting NSA experimental subjects would get extensive attention in the news because of the horror and unusual nature of the atrocity.

2. One example that comes to mind happened several years ago and created much news. A man became obsessed with his son, poured gasoline on him and ignited it. He had planned to do the same to himself but his desire for survival overpowered the NSA’s behavioral conditioning. After he was imprisoned, he spoke about how all of a sudden his mind became clear and he couldn’t figure out how he could do this crime. The hypnosis was simply removed and the subject was allowed to sleep so that experts studying the file would not find out anything if the subject would have been subjected to traditional hypnotherapy or other psychoanalytical techniques. Another successful counterintelligence experiment completed with no liability or traceability to the NSA.

3. Perhaps ten years ago I read of several elderly people died of sleep deprivation in Florida. The doctors tried everything they could do but could not stop the sleep deprivation that resulted in a 100% effective termination yield. The NSA had developed the right combination of delivered anxiety scripts combined with muscular tension and delivery schedules optimized according to decreasing post hypnotic durability over time as the subject’s health degraded.

4. David Koresh of the Branch Davidians spent many hours talking with FBI negotiators about God and the Bible and finally waited for “God” to tell him what to do in the final hours of the siege. The compound probably had numbers of Personal Journals (required for subjects by the NSA during brainwashing) that could lead to questions about how this cult came to this level. Additionally, just like other loose ends the NSA had to secure, “God spoke to them and said to commit suicide” and they did securing another one of the NSA’s great experiments in mind control and social pathology.

5. A friend of mine, David Sautter and I worked at Singer, Kearfott Division, producing government weapons where we worked under a multitier security system; Company Security, FBI, DIA, and at the top of the ladder watching the watchers; the NSA. I discussed the NSA’s technology with Dave and a few months later, I heard he had committed suicide inside of a locked room. This theme should familiar by now and the details of the case will be destroyed or rewritten by NSA influences to preserve national security.

7. The cases of NSA activities go on and on. With access to the FBI’s Crime Information Center (CIC), we could find several thousand files having the characteristic patterns where the NSA had experimented on the individuals with their “Thought Control” technology.

8. Currently, the NSA has many subjects in the field (our society) that need only a series of “triggers” (carefully constructed posthypnotic scripts) to send them over the edge and on a mission to kill. The NSA calls them “Shooters on a Shelf”. A recent example was Russell Eugene Weston, Jr. that went on a shooting spree at the Capitol around July 26, 1998. He was diagnosed with schizophrenia, had delusions that he had an affiliation with the CIA or FBI and thought a radio-tracking device was planted in his tooth. He was a product of NSA brainwashing. He did not have the ability to recognize the advanced technology even though he knew that “someone” (CIA, FBI, etc.) was communicating with him and that this communication ability spanned across the USA leading him to believe that he had a tracking device planted on him. Because of the real effects of the NSA hypnosis treatments, he therefore reasoned that the schizophrenia medication would not help and so he quit taking it. This was a man desperately trying to alleviate the suffering the NSA inflicted on him.

9. Through the years, I have met thousands of people that have been brainwashed into Christianity to a level where God tells them what to do in their minds (described as a gentle voice by victims) and they mindlessly obey. Yes, they have “Friends inside their heads” also. It appears the Biblical Anti-Christ in the Book of Revelations has arrived and is convincing many subjects that Jesus is back on earth and directing them.

8. NSA BEHAVIORAL MODIFICATION PROCEDURE:

1. The following procedural outline documents typical techniques, processes, explanations, and definitions of the National Security Agency’s Behavioral Modification Procedure using Subliminal Implanted Posthypnotic Suggestions through acoustically delivered phonetically edited language elements combined into scripts without somnambulistic preparation in the subject.

2. In simpler terms, the subject is unknowingly given hypnosis while the subject is completely awake and is tortured and punished with this hypnosis into a predetermined behavior by the National Security Agency. The behavior is usually extremely religious, is called “reborn” by the church, with the subject’s life-long goal of “a personal relationship with Jesus Christ”.

1. ABSTRACT, Behavioral Modification:

1. The NSA’s behavioral modification process starts with identification and qualification of the subject. The NSA used to choose subjects based on the subject’s net present value to the agency in public visibility, financial resources, political clout, or other intelligence and counter-intelligence reasons. Additional considerations are given to minimizing security risks of exposure, the subject’s posthypnotic suggestibility index, the subject’s intelligence and reasoning ability, moral and superstitious beliefs, and the subject’s social status and the weakness of the subject’s primary support groups (family). Now a recent report referenced in the March 26th Business section of the Orange County Register from the National Sleep Foundation reports that 40% of Americans are experiencing sleeping problems. This news could indicate that the NSA is broadening its influence to the greater public. As explained below in this document, the NSA always starts its behavioral modification process with REM Deprivation.

2. After selection, the subject is subjected to long periods of REM Sleep Deprivation and reinforced torturing posthypnotic suggestions that will breakdown the subject’s will, confidence, self-reliance, and moral values. Meanwhile, the subject is increasingly isolated from their familiar and trusted peer groups causing the subject to experience depression, apathy, and ultimately social and financial failure.

3. Typical post-hypnotic induced delusions reported by subjects are tingling in various areas of the body, which are thought to be resulting from microwave beams. Hearing ticks thumps or cracks from walls, ceilings, clocks, lights, etc. Beliefs that the subject’s neighbors are conspiring against them, or that the subject is being followed. Sometimes subjects believe that the various perceptions, feelings and experiences are the result of “Implants” in their body.

It is important for the subjects to understand that the NSA controls this technology from nuclear hardened underground shelters and the neighbors next door have nothing to do with the subject’s experiences. Nobody has the time or inclination to follow a subject around with a microwave gun to tickle various parts of the body. We are saturated with microwaves all the time from television stations, communication satellites, etc and yet we do not have any symptoms because microwaves do not have the ability to trigger localized synaptic responses in our brains. Furthermore, when the subject is in a room surrounded by several people, and the subject is the only one experiencing the “thoughts”, tingling feelings, etc., then obviously a delivery method is being employed that affects only the subject; high-speed acoustic delivered hypnosis.

4. After a while, the subject has an emotional breakdown and a new support group is built around the subject. The new support group is typically a church with doctrines centered in the Bible but the NSA also uses cults and other social groups. The NSA prefers Christian churches because the doctrines allow “God or Jesus to speak directly to the subject” and the negative reinforcement can be attributed with Satan and the positive rewards can be considered to be blessings from God thereby masking the NSA’s technology and processes. When the NSA uses other relationships without in which the subject experiences a religious awakening and “Gives their Life to Christ” and the NSA achieves total control of the subject.

5. The subject is slowly released from the damaging uncomfortable hypnosis and it is replaced with positive rewarding hypnosis as “God and Jesus works in their life”. Soon, the subject has complete loyalty to Jesus (AKA: NSA) and will do anything on command from Jesus (NSA).

6. The subject is required to give daily status reports in the form of prayers in the privacy of their home, office, or car where the NSA’s electronic surveillance system captures and sorts the prayers by “Keywords”. The NSA then delivers additional hypnosis in the form of punishments or rewards or directs the subject accordingly to “God’s will”. If the subject resist’s the NSA’s instructions, additional punishments are inflicted on the subject.

7. The subject is institutionalized in this system where any nonconformances committed by the subject are watched, critiqued, and reported on through prayer by other “Christians” to the NSA. Thus, the new church peer group acts as a behavioral reinforcing mechanism that will bring any of the subject’s problems to the NSA as they have been trained themselves (this is similar to the Nazi Gestapo of World War 2 and other communist approaches).

8. A subject that has successfully completed the NSA’s behavioral modification program lives out the rest of their mediocre life in service to Jesus (NSA) and never causes any waves in the church or news media for fear of reprisal from the NSA. The subject’s lives are relatively unproductive because their focus is on their “Life after death” and not what they accomplish while they are alive. They avoid “worldly activities”, and usually are confused and disjointed in rational thoughts and concepts. For instance, they don’t believe in anything that is not in the Bible, i.e. dinosaurs, evolution, space travel, even though they ride on airplanes and watch television both of which are not referenced in the Bible.

3. BEHAVIORAL MODIFICATION PROCESS:

1. Triggering Techniques:

1. The NSA minimizes security subject might recognize when the NSA was not actively watching causing a security concern and it would be cost prohibitive to baby-sit the subject 24 hours a day.

2. Behavioral modification generally occurs fastest when using negative reinforcement continuously. It is not practical or economical to watch a subject continuously to apply real time deliveries. Additionally, using all three script delivery patterns confuses the subject, causes the subject to believe they are always being watched, and maximizes behavioral change over time though continuous pressure.

2. Real-Time Subconscious Implant Delivery:

1. Real-time means that the NSA ODO is transmitting the posthypnotic command script to the subject and observing the subject’s response. This technique is required for subliminal interrogations. All NSA standard posthypnotic command scripts can be delivered real-time. This form of delivery can precipitate the perception of a “voice” heard in the mind of a subject to give them information (true or false) or orders depending on the purpose of the NSA’s activities.

3. Prescheduled Subconscious Implant Delivery:

The NSA central switching computer can transmit a script to a specified subject at a pre-specified time. The transmitted script’s transmission range can be limited to a single building, a city, or a large geographical area (i.e. North America or Europe). By having prescheduled scripts, the subject has seemingly randomly occurring thoughts and feelings that can’t be associated with a commonly recurring situation like event-triggered scripts precipitate.

4. Event-Triggered (conditional) Implant Delivery:

1. Posthypnotic subconscious implants that are triggered (activated) with an event, thought, or code word (event-triggered or conditional) are strongly experienced by the subject and are powerful tools for reinforcing a predetermined desired behavior and inflicting delusions.

2. This type of posthypnotic commands are the ones most commonly used by hypnotherapists to help people quit smoking, study better, or in general, change behavior (behavioral modification). There is extensive information on the Internet and college libraries about this form of posthypnotic command delivery and how to “script” and use them.

3. The NSA can reinforce a predetermined desired behavior by associating a subconscious implant (negative or positive reinforcement) with an event. An example is that when the NSA want’s to isolate the subject from the company of a specific person place or thing, the subject will be implanted with a feeling of increased anxiety, hostility, tension, simple discomfort, or a feeling of a lack of peace. When the subject leaves the person, place, or thing, another posthypnotic implant is triggered that rewards the subject’s behavior with a feeling of relief from the anxiety, hostility, tension, discomfort, and peace is restored in the subject’s mind.

Example: This script will always cause a girl or boy not to sleep with the opposite sex: “You will feel very tense and not be able to relax if you kiss, sleep with, or stay long at your (boy or girl) friend’s house and you will feel a deep peace when you leave their house to go back home”. These types of scripts left unmanaged and not removed can cause great harm as the subject develops and social conditions and behaviors change over time.

4. It should be noted that the NSA precisely tailors the type of negative and/or positive reinforcement, the degree of the reinforcement, the duration of the reinforcing effect and the conditions of the trigger. This posthypnotic event-triggered reinforcement can be initiated gradually and can remain so subtle that the subject believes that the discomfort is naturally occurring and that it is the subject’s decision uninfluenced by anyone else that the subject should avoid the person, place or thing.

5. This subconscious implant can be combined with other implants like a posthypnotic-triggered thought to enhance the subject’s decision toward the situation. For example the subject can be subconsciously implanted with a command to be very sensitive to the changes in their feelings and to feel great about making strong decisions to take charge of their lives. This can be reinforced with another posthypnotic suggestion to avoid all the situations that cause the subject discomfort and that each time the subject commits himself/herself to removing a situation of this kind in their lives, they will feel an increasing control over their lives. Note that as the subject perceives an increasing control over their lives they are actually losing control to the NSA proportionately. Numerous other examples exist and it is beyond the scope of this document to document every possibility.

5. Stage 1 (Prescreen Evaluation):

1. The subject’s Posthypnotic Suggestibility Index is determined by a series of simple tests. Hypnoamnesia is applied to the subject for the name of an object or individual and the subject’s speed is timed to determine how quickly they can overcome or not overcome the posthypnotic suggestion “You will not be able to remember the name of “____” no matter how hard you try. Other posthypnotic suggestions can be used to create fear or discomfort in the subject that can be remedied by flight or movement. The subject must overcome a posthypnotic suggestion that they cannot move no matter how hard they try. In summary, a posthypnotic suggestion is given to the subject and the subject’s ability to overcome it is evaluated.

2. A full study of the subject’s religious, superstitions, fears, and insecurities is made through standard subliminal interrogation techniques and behavioral observation.

3. Interrogation scenarios are presented to the subject using standard subliminal interrogation techniques and somnambulistic interrogation techniques. The standard two types of scenarios are “Open-ended Questions” (similar to multiple choice with response labels pre-assigned to each choice) or “Reject if Disagreeable” (negative response label if the subject disagrees). More advanced techniques of interrogation scenarios are used as required or as determined by the experience of the ODO.

4. Real-time observation, standard subliminal interrogation techniques and somnambulistic interrogation techniques are used to determine the subject’s overall social status, abilities, attitudes, and communication skills with primary support groups and friends.

5. Scientific understanding and practical applications experience in the fields of psychology, hypnosis, and problem analysis are considered risks in the subject that may complicate or inhibit subsequent behavioral modification processes. Once the subject identifies the technology used it is nearly impossible to contain the potential security breach without terminating the subject. Most NSA initiated executions (suicides) are the result of the subject identifying the technology used or carelessness on the part of the ODO managing the file.

6. The NSA technology affords powerful control over the subject, the subject’s environment, and the subject’s ability to plan and implement a disclosure to appropriate Government Agencies. When the subject finally does achieve a disclosure, the subject’s physical and mental condition is depleted. The subject’s ability to communicate concisely has been arrested, and the subject has already been set up and dishonored in the sight of local and federal law enforcement agencies to assure the subject’s testimony is questionable and unsubstantiated. Where the NSA feels that these steps cannot be achieved in medium risk subjects, the NSA will not recruit the subject into the behavioral modification process.

6. Stage 2 (Standard Process):

1. This stage is where most subjects are behaviorally modified to serve and follow “God” (AKA NSA management of the subject’s civil rights). If the subject accepts religion and direction at this stage the NSA reinforces the subject’s relationship with Jesus and closes the file. This shortened program receives the maximum return for the NSA for the least investment and minimizes the security risk. It also causes the least amount of damage and institutionalization in the subject.

2. Coincidence:

1. Coincidence is used to create the perception in the subject that supernatural events are beginning in the subject’s life. A combination of posthypnotic commands and pre-information awarded to the subject prior to an upcoming experience that the NSA intelligence system has discovered gives the subject a feeling that “God” or some other supernatural being is taken interest in their life.

2. The following is one typical technique used by the NSA. NSA Intelligence gathers information regarding the topic of the sermon in the subject’s church. This information is gathered through electronic surveillance equipment installed in the church. The NSA then implants a posthypnotic command that triggers the subject’s mind into concern and contemplation about the sermon’s topic prior to going to church. When the subject hears the sermon, the sermon seems to be speaking directly to the subject that adds to God’s mysterious and unexplainable ability to address the innermost concerns of the subject, especially when the subject has not shared those concerns with any other human being.

3. Another typical method used by NSA concerns tragic events occurring to loved ones. NSA Intelligence receives a local broadcast or preliminary information through electronic surveillance that a subject’s relative has been injured or killed. The subject is given a posthypnotic suggestion that a feeling of dread or loss is welling up inside them and they are directed to think of that particular loved one. When they are finally notified through official channels, the subject believes that they have special powers, insights, or communications from God, aliens, or other entities.

3. REM Sleep Deprivation:

1. The Rapid Eye Movement (REM) stage of sleep is controlled and usually limited to one to two cycles per night resulting in micro-sleeps during the day. REM deprivation inhibits short-term memory, concentration, tactile abilities, verbal articulation, reasoning, and self will. Protein synthesis is inhibited and thereby reduces the subject’s ability to heal after physical damage or after periods of extensive exercise. The result is that the subject’s general health degrades as does social bonds and work/school performance.

2. The NSA performs control of REM Sleep through various methods. Posthypnotic implants can be implanted that place a subject in a light sleep (posthypnotic trance) with various combinations of muscular tension and computer cycling implant deliveries (to be
discussed later).

3. Subjects typically complain of no sleep, restless sleep, waking up every hour on the hour, staying awake until the hour they have to get up, waking up an hour after they retire and not returning to sleep, and typically cannot recall any dreams. Additionally, they will complain of repeating torturing thoughts, racing thoughts, and facial itching and numbness. Daily fatigue, poor recall of names, and caffeine consumption is typical.

4. Dark rings’ surrounding the eyes is evident and the darkened area around the eyes can be reported as sore or tender by the subject. The subtle perceptual impairing effects of REM deprivation make it more difficult for the subject to identify the REM Deprivation problem. When the REM depravation onslaught is gradual and accompanied by a posthypnotic command that the subject “will feel energetic and rested”, the subject will not recognize the REM Deprivation. Additional posthypnotic commands can be implanted that will make it difficult for the subject to “see or perceive” the rings surrounding their eyes. I have seen many subjects with very dark eye rings and the subjects could not recognize them at all.

4. Shame Factor Enhancement:

1. Various posthypnotic suggestions are implanted in the subject after a week or so long period of REM deprivation. The content of the posthypnotic scripts is constructed to cause the subject to perform embarrassing and otherwise shameful acts (usually sexual but always anti-social). These shameful behaviors are used by the NSA later to shame the person into a lower self esteem, reduced confidence in their own self discipline, a need for forgiveness from God. These embarrassments provide a means to Blackmail or discredit the subject if the NSA is detected and otherwise threatened by the subject.

2. The NSA will always use another law enforcement agency to document the behavioral discrepancy to retain anonymity. The NSA has been known to help subjects avoid prosecution to gain loyalty or create an adversarial relationship between the acting agency and the subject (another intimidation factor) even though the NSA was responsible for creating the behavioral problem in the subject’s life.

5. Religious Relevance and Convictions:

1. The NSA typically implants posthypnotic suggestions that are clearly referenced in the Bible. The subject may be punished (through negative reinforcement) by anything that is referenced in the Bible to substantiate the validity of the “Word of God”. When the NSA does not follow the standard Biblical references, most subjects fail to recognize the contradictions out of ignorance or an inability to rationalize, or, they find other ways to justify the events to receive peace from God (NSA). This component of the NSA process is to provide the subject with an increased sense of fear and intimidation resulting from God’s presence and force. “Thou shall not disobey God”.

6. Paranoia:

1. Paranoia is a powerful tool used by the NSA. It provides a means to develop the subject’s distrust of other people including the subject’s primary group that could provide positive support during this time of distress in the subject’s life. Paranoia is often recognized and discounted as a character fault by most peoples in American society and therefore discredits the subject’s testimony even further. Uninformed, but well wishing people including friends, may recommend to the subject to pursue counseling. This negative feedback can make the subject fear that people will believe the subject is crazy.

2. When the subject seeks professional counseling, the result will be a misdiagnosis with an expensive, inappropriate and ineffective treatment. The observed symptoms result from simply hypnosis, not biological, chemical, or environmental stresses. A misdiagnosis strongly motivates the subject not to communicate their experiences to others to avoid social disgrace of a “schizophrenia” label and additional financial burden. This isolation of the subject and their reluctance to communicate their experience to others reduces NSA security risk. The NSA cannot allow the subject to share information with other subjects that have already experienced the program and thereby starting a pool of information that could be compiled and used to expose the NSA system.

3. The subject is led to believe that the subject’s neighbors, work associates and/or family are conspiring against the subject through a number of scripts delivered to the subject by the NSA. The NSA can further complicate the conspiracy delusion by using the same technology to have a work associate ask the subject a question or to make a comment that can be used by the NSA to confirm the subjects fears. This technique further isolates the subject from trusting their peer groups, causes additional emotional distress and hostility toward these people. The subject sometimes resorts to violent behavior, which is viewed by observers as irrational, unprovoked behavior that may be treated as criminal behavior by law enforcement
personnel.

7. Stage 3 (Extreme Process):

1. This method is very severe and usually results in a two to five year program. Because of the severity of the suffering, the subject is usually permanently impaired for integration into normal mainstream life and is essentially institutionalized. The result is that the subject must reside in a less competitive environment like a church group. Subjects that receive this program tend to be highly superstitious, are agitated easily when objective evidence that contradicts their belief system is presented. They tend to believe in the spiritual world (demons, ghosts, god, spiritual entities, etc) and consider the spiritual world to be more powerful and important than the material or real world. This program basically follows the following steps; REM deprivation, breakdown of self esteem and confidence, intense suffering, exaggerated conscience, spiritual contact, reborn in Jesus Christ, Spiritual battle, release (saved by the Savior), and recovering (blessed by Jesus Christ). Whenever possible the NSA will skip or reduce these steps to minimize security risk and financial cost.

2. Increasing Dependence on Drugs and Alcohol:

1. As the REM Deprivation increases the subject must depend on Central Nervous System (CNS) Stimulants to compensate for degradation of productivity at work, school, and in interpersonal relationships. This serves the NSA in several ways. Use of drugs (especially CNS stimulants) increases the subject’s index of suggestibility. Or in other words, the post hypnotic commands are more effective and the subject has greater difficulty resisting the impulses generated by the commands. In addition, the increased stress of coping with the drugs in conjunction with the resisting the newly introduced posthypnotic commands serves to push the subject closer to an emotional breakdown. If the subject uses illegal drugs, the NSA tries to set the subject up for a conviction to get assure that the subject looses credibility. Who would believe a drug user that claimed that he/she was being harassed by a government agency that was tormenting them with hypnosis? It also serves the NSA in the program by documenting something that the subject will be ashamed of when the program reaches the exaggerated conscience stage.

2. Alcohol, sleeping pills and other medications also inhibit REM Stage sleep and increase irritability over time thereby further degrading and isolating the subject.

3. In summary, the NSA benefits from the subject responding to the REM Deprivation assault with self-medication. This response discredits the subject by labeling them in society as a drug user, it enhances the effect of the implanted posthypnotic commands and it gives the subject a reason for shame that will be used against the subject later to justify the punishment from “God”. It should be noted that the subject is not really guilty of anything, except being a victim that was manipulated in a carefully controlled scientific behavior modification process.

3. Poor Nutrition:

1. The poor nutrition reduces the energy the subject has and serves later as another justification of God’s punishment. The subject will be taught later that “the body is the temple” and that to abuse it is to violate God’s will.

4. Apathy:

1. After the subject’s self-esteem is broken down and continuing failure and persistent suffering start to dominate every day, the individual becomes apathetic as a defense mechanism. At this stage the subject has committed another sin of “not persevering through faith” which is later used on the subject later to increase a feeling of guilt.

5. Depression:

1. Depression precipitates as a result of chronic REM Sleep Deprivation, social isolation and a feeling of helplessness in the subject. Commonly, when the subject seeks professional counseling, they are misdiagnosed and treated for depression with medications but the root cause of the problem (negative reinforcing posthypnotic suggestions inflicted over long periods of time) is not treated or corrected.

6. Insecurity:

1. The subject starts to experience severe insecurity in this stage. The NSA uses this insecurity against the subject in several ways. Because of the impaired reasoning ability and emotional isolation, the subject is susceptible to the approaches of insincere people, which are used by the NSA to emotionally hurt the subject more. This allows the NSA to convince the subject that people can’t be trusted and that only the NSA (Jesus) can be trusted. This serves to isolate the subject from supportive peer groups and makes the subject emotionally dependent on the NSA resulting in the NSA gaining more power in the subject’s life.

7. Journals and Diaries:

1. Most of the subjects are directed to keep a “Journal” or diary by the NSA so that the subject can record and review feelings, events, observations, and “God’s directions” that normally would be unavailable due to short term memory loss during extended periods of REM Deprivation. The NSA uses the Subject’s Journals in a variety of ways.

8. Degrading Spelling and Grammatical Performance:

1. Subjects in these prolonged stages of REM deprivation, confusion, and emotional distress, have very poor grammar, spelling, and short attention spans.

9. Slowed Speech:

1. Subjects experience slower speech and have a greater time articulating concise points as a result of the REM Deprivation and other performance degrading posthypnotic commands. Very slight alcohol consumption can exasperate the damage of REM Deprivation and precipitate slurred speech.

10. Confusion:

1. Confusion results from three primary sources; REM Deprivation, specific posthypnotic commands to reinforce the confusion, and the emotional damage and stress that is being inflicted. The confusion allows the NSA to continuously inflict damage to the subject’s life without real-time observation. A confused person generally is not as productive as an organized clear thinker is and has a greater potential to offend people by what they say or do and is less likely to recognize when they have made mistakes. All of these symptoms assist the NSA’s objectives in this stage and subsequent stages. In addition, the confusion restricts the individual from analyzing the source of their suffering and taking corrective actions, and therefore reduces the NSA’s security risk.

11. Poor Concentration:

1. Difficulty concentrating impairs the subject’s productivity and restrains the subject from making self-improvements and corrections in behavior. It makes it very difficult for the subject to do any research or reading to evaluate his/her condition. This paves the way for the NSA to demonstrate that the subject cannot do anything on their own without “God”, thereby increasing the frustration and anxiety of the subject (inducing emotional breakdown) and ultimately making the subject totally dependant on the will of God.

12. Loose Association and Personality Disorders:

1. The subject experiences disjointed thought at this stage (Loose Association) that appears to observers as a strange sense of humor or inappropriate responses when engaging in conversations. Ongoing sarcasm and other negative attitudes and undesirable personality traits can be present.

13. Anger:

1. The way that the subject experiences anger is of profound importance. If the subject allows the NSA to redirect the increasing anger and hostilities toward the NSA to another person in the form of violence (misplaced aggression), the NSA will reinforce the violent behavior with posthypnotic commands. The result is a person that can achieve national acclaim as a murderer that heard voices of Satan directing him/her. Typically, the Subject is encouraged to commit acts of violence with spouses, friends, or employers resulting in further social isolation and increased shame. Some examples of NSA directed victims of misplaced aggression include recent US Postal Workers whom work within the Postal Service. This is one of the vial “communication intercept” channels the NSA is directed to monitor. The routes of suspect mail and the postal worker processing it are continuously monitored by NSA. Sometimes the NSA ODO takes issue with a Postal Worker and harasses them or subjects the postal worker to behavioral modification.

14. Delusions:

1. Delusions are used to discredit the witness and also provide an additional source for fear, intimidation and confusion. Delusions can be but are not limited to the Subject developing conspiracy theories of fellow employees and friends, beliefs that Angels or Demons are communicating or visiting them, tingling sensations from microwave guns or implants, beliefs in supernatural events, etc.

15. Audio Hallucinations:

1. Subjects often report hearing walls clicking, footsteps in the house, the sound of someone trying to open the door, drilling at the door, etc.

2. These audio hallucinations are also used to discredit the witness and also provide an additional source for paranoia, fear, and negative reinforcement.

16. Voices in the Subject’s Mind:

1. The voices in the subject’s mind are achieved in a variety of ways using real-time and prescheduled posthypnotic suggestion deliveries, and Noun Substitution implant techniques.

2. Noun Substitution Posthypnotic Implant:

1. The subject can have a posthypnotic suggestion implanted that changes the form of pronouns in the subject’s internal thinking. The result is the subject perceives that someone is telling him/her to do something with nearly every thought. An example is; the subject thinks, “I should go to church today”. With the noun substitution posthypnotic suggestion the subject experiences the following internal thought, “You should go to church today!”

Notice that by implanting the posthypnotic command into the subject’s subconscious mind to think the pronoun “You” instead of “I” the subject will perceive that they are being directed by a voice even though the majority of the internal thought content is their own naturally occurring thought. This subconscious implant can be used in combination with other implants to increase the subject’s perception of threat, fear, and therefore paranoia. It can be used with other posthypnotic suggestion implants that will give the subject the perception of either a “good” or “evil” voice or spirit is directing him/her.

This implant is powerful because it gives the subject the perception that the spirit, angel, God or Holy Spirit knows and directs the subject’s every thought. It provides a convincing proof that “God knows every thought of his children”. Subjects that don’t have a superstitious frame of reference and seek professional help are usually misdiagnosed as schizophrenic.

17. Tinnitus (Ear Ringing):

1. Tinnitus is commonly reported by subjects harassed by the NSA and typically has no pharmacological or biochemical basis and is produced by a posthypnotic suggestion. It is often misdiagnosed as ringing caused by excessive aspirin use and is actually an audio hallucination triggered by hypnosis.

18. Complete Quiet Silence:

1. Used by the NSA as a positive reinforcement for two general reasons; the subject has the tinnitus removed to indicate that the subject has “The Lord’s Peace Restored”, and secondly, the subject has achieved a milestone toward being released by God (the NSA).

19. Quiet Wind:

1. The audio hallucination of a quiet wind is used to convince the subject that the Holy Spirit is visiting him/her. An excellent example of this hallucination combined with the fear that accompanies it is contained in Phil Collin’s lyrics of a song that has the chorus “I can get so scared, Listen to the wind”.

20. Visual Hallucinations:

1. Visual hallucinations are usually implanted in the waking moments when a subject is coming out of or is in a somnambulatory state (light sleep) preferably in a darkened room. The hallucinations are fleeting, usually lasting less than one minute and are not durable. Typical hallucinations reported by subjects are Angels, large spiders, and movement of various shadowy objects across the ceiling, bright spot of light ahead of the subject, etc.

2. The television show “Sightings” has had numerous reports of people seeing “Aliens” at waking moments. These types of news accounts create confusion in US society and serve to keep people searching for the wrong phenomenon thus keeping the NSA’s technology secure (disinformation).

21. Tactile, Olfactory hallucinations and Muscle Spasms:

1. Tactile hallucinations can be more durable and are used to communicate a desired direction to the subject typically after a real-time interrogation. Typical behavioral cues issued by the NSA are manifested in the form of:

1. Temporary sensation of pressure to the tip of the right index finger (symbolizing Faith or have Faith).

2. Temporary sensation of pressure to the tip of the left index finger (symbolizing no Faith or “deception of Satan”).

3. Temporary sensation of pressure to the center of the right palm (symbolizing Jesus “Sitting at the right-hand of God”).

4. Temporary sensation of pressure to the ball of the right foot (symbolizing “Get on the Ball” or “hurry-up”).

5. Temporary sensation of pressure to the tip of the right foot big toe (symbolizing “Right Direction”).

6. Temporary sensation of pressure to the tip of the right foot center toe (symbolizing “Fucking-up Direction”).

7. Temporary sensation of pressure to the tip of the left foot big toe (symbolizing “Wrong Direction”).

8. Temporary sensation of pressure to the buttocks (symbolizing “Bad Attitude” or “subject is acting like an ass”).

9. Temporary sensation of pressure on tip of penis or clitoris (symbolizes immoral thoughts like subject is thinking/acting with his penis or her clitoris).

10. Temporary sensation of pressure to the left ear drum (symbolizing “do not listen”).

11. Temporary sensation of pressure to the right ear drum (symbolizing “listen”).

12. An involuntary blink of the right or left eye (symbolizing: right eye = God’s agreement or left eye = Satan’s agreement).

13. Temporary tingling sensation on the Testicles (symbolizing insufficient male confidence or “Having no balls or strength”).

14. Temporary tingling on other areas of the body to imply that something invisible and/or supernatural is touching the subject. May be perceived as threatening or reassuring to the subject. Can be used to intimidate and confuse the subject often times combined with additional posthypnotic implants to inflict delusions like “being attacked with microwaves” or being caressed by Angels.

15. Muscular spasm or perceived pressures near the jugular vein on
right side of neck (symbolizing Satan having subject by Jugular or
throat). This is used to inflict fear and doubt.

16. Muscular spasms are sometimes used to inflict severe pain on the subject by causing extreme involuntary contraction of the sphincterin the anal region or other lower back or leg muscles.

17. Perceived odor sensation of a thick, sweet smell (symbolizing Satan’s sweet victory over the subject’s soul).

9. This section is written in an attempt to provide interested individuals with some of the considerations and precautions when seeking to demonstrate the NSA’s civil rights abuses by demonstrating the effectiveness and concepts of subliminal access using Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject.

1. Reverse engineering of the NSA’s technology to prove it’s abuses against the American people is quite difficult. Consider the following.

2. If the scientists and technicians perform their research in a facility that the NSA has the standard transceivers installed, and therefore the NSA can influence the direction of research or the data by effecting perceptual effects in the researchers.

These perceptual effects can be confusion, lack of attention to important details, oversights, bad assumptions, incorrect interpretation of the test data. These same misperceptions will also be incorporated into the research test subjects. The technology cannot be developed and optimized if the NSA has any access to the test subjects. The test scripts given to the test subject delivered from the researcher can be neutralized by the NSA delivering a canceling script immediately after the researcher’s script. The NSA’s test script can also include a hypnoamnesia script at the end to cancel any residual perception in the subject so that the test subject would report no effects and the researcher would conclude the test script had no effect.

3. The research must be carried out in a facility secured from all NSA electronic intrusion. All equipment in the facility must be TEMPEST protected and electrically isolated from the outside world.

The research personnel and their subjects must never leave the secured area of the facility so that they cannot be subliminally interrogated by the NSA. The NSA would take this opportunity to deliver disinformation scripts to the subject or researcher. Foodstuffs and supplies would be the logical choice of NSA intrusion if all other security measures were effective against the NSA.

4. The NSA will exploit all opportunities to introduce microscopic transceivers into the facility of it’s surrounding grounds. The minimal requirements for the NSA to take control of the research are:

1. NSA audio delivery (a micro receiver with a micro speaker)

2. Visibility of the targets (researcher or test subject) to capture response labels during subliminal interrogations. This can be through normal illumination or infrared to see through window, or millimeter wave or other technologies that can see through barriers like walls and ceilings.

3. Audible response labels can be used if the NSA has a micro receiver with a micro speaker inside but cannot get a transmitter in and operating without detection. Sneezes, coughs, clearing of throat that can be picked up by laser microphones, audible amplification microphones, etc. can also be used as response labels.

5. The NSA currently has satellites with millimeter wave technology that will allow visible intrusion into most facilities. The test facilities should be deep underground, AKA 1000 feet with no adjacent access from other facilities, sewer lines, water lines or power conduits etc.

6. Any facilities existing will have to be debugged before habitation and research begins.

7. Subjects must be able to be subjected to traditional hypnosis after facility habitation as a test prior to research to assure that the NSA has minimal scripts already implanted.

8. This technology is the highest level of intelligence gathering for the USA. The abuses resulting from mismanagement of this area of the NSA’s intelligence system must force Congress to legislate additional laws to protect the citizens. The NSA must regulate this system better. The NSA will take all necessary steps without limit to assure that this technology is preserved and autonomously under their control.

10. Conclusion: America’s greatest and highest level intelligence asset is being mismanaged and the mismanagement must be corrected before all the Enemies of our great country acquire it. Imagine if China had this technology to use on their defenseless population?

11. May God help us all in protecting the American public and preserving and managing this vital technology’s vital potential to serve America’s National Security.

http://www.topica.com/lists/EDD/read/message.html?mid=1601892956

=============================================================================================

From Newshawk:

Mass Mind Control in the Present-Day U.S. — The big picture

There are a number of interlocking systems, technologies and techniques
which are currently being deployed against the citizens of the United
States of America by certain segments of our national government.

First, there are literally COUNTLESS mind-control projects and
sub-projects in operation at this time which target SPECIFIC
subjects/victims in a variety of ways; using one or more of a number of
technologies such as drugs, (ritual) psycho-sexual abuse, a vast panoply
of different EM/RF mind control technologies, repetitive conditioning,
hypnotic trance induction, and so on and on and on.

Reliable reports from MANY different sources indicate that as many as
TEN MILLION individuals many be ACTIVE subjects/victims of these kinds
of mind control activities, and huge quantities of hard documentation on
a great many of these projects DOES exist.

However, in addition to these kinds of mind control operations, there are
ALSO mind control and mind manipulation activities that target MASSES
of people in large geographical regions at the same time. Indeed, there
is VERY strong evidence that the operators of HAARP for example, have
ever since HAARP’s earliest days intended that it be used for, among many
other things, GLOBAL mind control.

There is in FACT much evidence to show that HAARP is NOW being used for
just such utterly evil purposes by the United States federal government.

Of course, there are many other EM/RF technologies and systems which
are, or may be, applied to mass-scale mind, mood, thought and
consciousness control/manipulation operations: such as the nationwide
“GWEN” (Ground Wave Emergency Network) system, certain ELF and ULF
transmitter systems, and so on (such as your TV set, even IF it’s turned
OFF!)

Another way to manipulate and “regulate” the minds and consciousness of
a mass of people at a VERY basic, fundamental level is to CONTROL the
population’s PRIMARY sources of INFORMATION. This is one of the MOST
powerful ways shape the collective consciousness of the public, and it is
CLEAR that many mass media outlets in the United States are both
willingly and un-wittingly aiding and abetting the manipulation of
our minds by the government, and are assisting the FedGov in carrying out
many social-engineering agendas.

The mass media’s treatment of school shooting incidents, for instance,
plays DIRECTLY and TOTALLY into the schemes of those who deployed the
mind-controlled killers to carry out these shootings, in a grand plan to
shut down our Constitution’s 2nd Amendment, among other things.

Moreover, very carefully designed CONDITIONING programs and tactics have
been brought to bear against nearly EVERY segment of society;
disseminated throughout the nation and the world by mass media and
entertainment industries and corporations; and imbedded in ALL forms of
so-called entertainment at this point, such as movies, TV shows, video
and computer games ESPECIALLY, some pop music, and so on.

This condition of constant, relentless bombardment with grotesquely violent
imagery, which the general population, ESPECIALLY its younger members, is
inundated with by nearly ALL forms of popular contemporary entertainment
and sources of “information”, is indeed directly derived from those
mind-conditioning programs and systems developed at Fort Detrick (and
other similar locations). San Diego shooter Charles Williams’ father
worked at the Army’s Fort Detrick facility for THIRTEEN YEARS.

Specifically, indoctrination/conditioning programs were developed at
Fort Detrick in which subjects were repeatedly, continually and
continuously immersed in virtual reality-type video/computer “games”
of extreme and GRAPHIC brutality, for long stretches of time and
over an extended time frame.

This kind of psychological assault proved very effective in rapidly
obliterating subjects’ ethical and moral values and cultural norms with
regard to violence, brutality, killing and so on.

These systems were perfected, applied to the brainwashing and
conditioning of members of the U.S. military and also turned over to
the intelligence sectors for other applications. The intelligence sector,
in turn, DELIBERATELY and successfully undertook to have this same kind
of HIGHLY negative, destructive and effective conditioning applied to
SOCIETY AS A WHOLE, via mass conditioning of our consciousness through
the entertainment and information industries, as noted.

One OTHER method of mass mind control/manipulation/conditioning which is
NOW being utilized MORE and MORE — ESPECIALLY against the most
vulnerable members of our society, our CHILDREN — is the
highly-reprehensible/questionable and increasingly common MANDATED
DRUGGING of ever-growing numbers of children through hugely intrusive,
invasive, ill-advised, psychologically unpredictable and often
destructive programs mandated, usually for young males, by psychiatrists
and social workers. More and more of our children are being dosed on a
long-term basis with any of a number of psychotropic/psychiatric drugs
like Prozac, Ritalin, Luvox, and so on.

These drugs not ONLY are PROVEN to induce SEVERE and often VERY VIOLENT
psychotic reactions among a significant percentage of subjects, but ALSO
clearly and provably create a stupefied, dumbed-down, zombified mental
state in targeted subjects which is a PERFECT “ground state” for the
carrying out of yet OTHER mind control/manipulation/conditioning activities
on these very same subjects. In general, this kind of psych-drugging makes
the job of further mind control programming MUCH easier. And this kind of
drugging is being done to ever-increasing numbers of our children, down to
toddlers as young as TWO and THREE YEARS OLD!!

Now, there is ANOTHER way in which our present-day society is being
literally and effectively mind-controlled en masse.

Most all of the individually-targeted mind control programs we noted
above use one or more methods to induce a PSYCHOTIC BREAK or SPLIT
PERSONALITY in the victim/subject. In fact, one or more of these
deliberately-induced split personalities formed as a result of
psycho-sexual abuse or other conditioning are those facets of the
subject’s psyche which ARE actually “programmed”; to kill, or whatever
else. It’s been shown that forcing victims/subjects to witness, experience
or participate in just about any highly-traumatic and shocking events on a
repeated basis will induce the kind of psychotic break(down) that is a
necessary prerequisite for intensive mind control programming/conditioning.

SO: WHEN our society as a whole is FORCED to confront and WITNESS over
and over and over again something as FUNDAMENTALLY shocking as having
our young people perpetrating inconceivably horrific mass murders of
peers and others on A REGULAR BASIS, as is NOW THE CASE in the
present-day United States, then the population as a whole AND on an
individual basis to some extent develops an analogous, similar
psychological break, and in FACT to some extent develops split
personality/multiple personality disorder conditions… READY FOR
FURTHER MIND CONTROL PROGRAMMING.

THUS: such extraordinarily disturbing events which impact society AS A
WHOLE, such as these school shootings by young people that have just
occurred, ALSO serve the malignant, demonic agendas of the FedGov/NWO
social controllers who set these terrible mass killings off; and the
incidents themselves serve to further condition, manipulate and “mind
control” the population of the United States in the year 2001.
http://www.topica.com/lists/Slick-D/read/message.html?mid=1601615926

 


YOU Judge if It Is Just a Theory or Our Future: Psychotronic Torture

 

SOSBEE’S NOTE: See the symptoms that I have documented at:

http://www.sosbeevfbi.com/part19-updatefor.html

sosbee veteran:

http://www.sosbeevfbi.com/geralsosbeearmyf.html

——————————————————————————–

Pervert FBI and NSA psychopaths are secretly and illegally conducting non-consensual, sadistic, synthetic telepathy experiments and psychotronic weapon attacks on hundreds of thousands of innocent citizens in the United States and elsewhere.

Email this to all your friends and peers and spread the knowledge, so all Americans and other citizens elsewhere educate themselves about the latest horrifying and disgusting secret technologies being used by FBI and NSA on hundreds of thousands of innocent citizens worldwide.

It would be great if somebody blogs this post and spread the word on internet for the benefit of all freedom loving Americans and all the innocent citizens of the world.
Majority of these innocent people do not even know they are torture-victims and are being used as guinea-pigs by these FBI and NSA perverts, torturers and psychopaths.

The Pentagon and the U.S. intelligence agencies called the N.S.A. [ National Security Agency ], C.S.S. [ Central Security Service ], D.I.A. [ Defence Intelligence Agency ], D.A.R.P.A. [ Defense Advanced Reserch Projects Agency ], C.I.A. [ Central Intelligence Agency ], the D.H.S. [ Department of Homeland Security ], and the F.B.I. [ Federal Bureau of Investigation ], Cointelpro or Counter Intelligence Program unit has extremely top secret technology that can pick up the private thoughts given by individuals in the vibrations produced by the brains electrical impulses, and that these thoughts can be broadcast by means of microwave tranceivers, infrasound and ultrasound tranceivers, satellites, and any other form of technology which uses electromagnetic transfer, i.e. television, radio, the internet, and the telephone. The Pentagon calls this mind reading technology SYNTHETIC TELEPATHY, although there is nothing paranormal about it at all. The N.S.A. or National Security Agency is a part of the U.S. Department of Defense, and a very secretive part at that. The N.S.A. has a black budget, and is always headed by a flag officer from one of the branches of the U.S. military. The top secret technologies available to the U.S. military is usually thirty years or may be even more ahead of the technology which is available to the U.S. civilian economy. Who is to know among the general U.S. public what the level of technological development is within the secret laboratories of the N.S.A. and D.A.R.P.A. [ Defense Advanced Reserch Projects Agency ]. The headquarters of the National Security Agency is located at Fort George Meade in the U.S. state of Maryland.

Today, there are microscopic computer chips based on nanotechnology whichcan be inserted into a person by means of an injection,
capsule, or tooth filling, with or without the knowledge of a doctor or a pharmacist, and these computer chips can track the implanted person by radio or microwaves.
These microscopic computer chips can also be made invisible to detection by means of C.A.T. [ Computerized Axial Tomography ], M.R.I. [ Magnetic Resonance Imaging ], and P.E.T. [ Positron Emission Tomography ] scans, by some means of electromagnetic degaussing.

With the latest top secret, and rapid technological advancements available to the U.S. military intelligence agencies, the need for microscopic computer implants in conducting synthetic telepathy against targeted persons is obsolete by now.
Rather, a system of subliminal, subconscious, wireless microwave remote control is used today against targeted individuals suffering from synthetic telepathy harrassment. Synthetic Telepathy is used for conducting torture training and/or experimentation against people as red herring “good cop/bad cop” or tough love acting, diversions, feints, decoys, and smokescreens, as smear campaigns by association, as openly secret intimidation campaigns against targeted dissidents, and as a means of espionage. Once it was believed that claims about C.I.A. agents secretly dumping radioactive material in the slums of U.S. cities during the 1950′s as part of a research program were simply mass conspiracy theories, until the U.S. federal government in the 1990′s publicly admitted that the allegation was true.

FBI and NSA agents who are part of a secret US society are genetically inclined sociopaths and psychopaths who work as hit men,
torturers, sexual abusers, stalkers, slanderers, and agent provocateurs involved in murders and torture of hundreds of thousands of innocent US citizens for years and years. At the last count there are 50,000 NSA spies who are businessmen, priests, community leaders and in all walks of life who are SPYING and keeping tabs on pretty much all Americans.

The synthetic telepathy espionage trainees, sociopaths, sadomasochistic torturers, slanderers, experimenters, and spies, in order to avoid developing any sympathy for their targeted victims, deliberately avoid actually feeling the emotions of their victims by following the squiggly EEG or Electroencephalograph lines on computer monitor screens, as well as the silent words thought by their victims which also appear on the computer monitor screens. Then again, who can feel all of the emotions and thoughts which any given person has undergone every second of their entire lifetime.
The emotions and silent words of the victims of synthetic telepathy operators can be broadcast against their will to anyone the
synthetic telepathy torturers choose to broadcast to, and they also have the power to block or censor any emotions and words of their victims which they do not want to be broadcast. The synthetic telepathy spies can also place their own criminal or antisocial, negative emotions and words into their victims by means of subliminal, subconscious, remote control microwave brainwashing technology, and they can change the voice behind their words so as to make it appear that it is the targeted victim and not themselves who
are communicating by means of synthetic telepathy. They can also store emotions and silently thought words onto a supercomputer memory bank which they can rebroadcast at a later time. I believe that the synthetic telepathy operators, although having high I.Q.’s, are predisposed towards sociopathic behaviour because of a genetic defect or combination of genetic defects, and that the only way they can sustain enthusiasm in their lives is by engaging in an addictive pattern of sadomasochistic activities and fantasies.

If you do not believe that synthetic telepathy exists, then you should lookat these following web sites which reveal that part of
electromagnetic psychological warfare and mind control which today is declassified:

I urge the readers to print/save this column as well as the following link where the NSA and their PSYCHOTRONIC WEAPON ATTACKS and SADISTIC TORTURE of hundreds of thousands of innocent American and worldwide citizens (guinea pigs and victims) are explained in detail with diagrams and technology.

“Covert Operations of the U.S. National Security Agency” (link unknown).

Readers are advised to print the document in the link above and study the pictures and technology.

Important things from the above link for Americans and other people to educate and protect themselves and their loved ones from these secret, non-consensual and illegal psychopathic experiments, attacks and tortures by these 100,000 FBI and NSA secret psychopaths and spies.
1) The NSA has records on all US citizens. The NSA gathers information on US citizens with over 50,000 NSA agents and spies
(HUMINT).
2) NSA personnel in the community usually have cover identities such as social workers, priests, church leaders, lawyers and business owners.
3) NSA personnel can control the lives of hundreds of thousands of individuals in the US by using the NSA’s domestic intelligence network and cover businesses.
4) This network (DOMINT) covers the entire US, involves tens of thousands of NSA personnel, and tracks millions of persons
simultaneously .
5) NSA DOMINT has the ability to assassinate US citizens covertly or run covert psychological control operations to cause subjects to
be diagnosed with ill mental health.
6) At the present time the NSA has nanotechnology computers that are fifteen years ahead of present computer technology.
7) SYNTHETIC TELEPATHY and other psycho-electronic weapon chips can be inserted into the victims’ bodies painlessly without their knowledge in a matter of minutes by FBI and NSA spies.
08) NSA computer generated brain mapping can continuously monitor all of the electrical activity in the brain continuously.
9) For electronic surveillance purposes, electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts.
10) NSA operatives can use this covertly to debilitate subjects by simulating auditory hallucinations, characteristic of
paranoid schizophrenia.
11) Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a
subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing.
12) Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves. NSA operatives can use this surreptitiously to put images into a surveillance subject’s brain while they are in REM sleep for brain-programming purposes.
13) The NSA, Ft Meade has in place a vast two-way wireless RNM system which is used to track subjects and noninvasively monitor audio-visual information in their brains. This is all done with no physical contact with the subject.
RNM is the ultimate method of surveillance and domestic intelligence.
14) Speech, 3D sound and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears), and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods and motor control. RNM can alter a subject’s perceptions, moods and motor control.
15) The NSA’s Signals Intelligence has the proprietary ability to monitor remotely and non-invasively information in the human brain
by digitally decoding the evoked potentials in the 30-50 Hz, 5 milliwatt electromagnetic emissions from the brain.
16) Remote monitoring/tracking of individuals in any location, inside any building, continuously, anywhere in the country. RNM can electronically identify individuals and track them anywhere in the US.
17) Tens of thousands of persons in each area working as spotters and neighbourhood/business place spies (sometimes unwittingly) following and checking on subjects who have been identified for covert control by NSA personnel.

HOW FBI/NSA disables, cripples and murders its own innocent American citizens.
God only knows how many of the unsolved murders and diseases are actually committed and spread by these 100,000 FBI and NSA agents and spies.
18) Chemicals and Drugs into Residential Buildings with Hidden NSA Installed and Maintained Plastic Plumbing lines. The NSA has kits for running lines into residential tap water and air ducts of subjects for the delivery of drugs (such as sleeping gas or brainwashing-aiding drugs). This is an outgrowth of CIA pharmapsychology (psychopharmacology).
19) Victims experience daily break-ins in their homes by FBI and NSA secret society spies. Victims of this endless torture has no way to prove the break-ins and poisoning of food since FBI and NSA spies have technology that can easily disable the video surveillance systems, phone lines and security alarm systems of the torture victims.
20) FBI and NSA spies threaten hundreds of thousands of these innocent torture victims in America with accidents, bio-terrorism attacks in the form of measles, chicken pox, small pox and other forms of viruses, life threatening diseases AIDS, debilitating diseases cystic fibrosis, alzheimers etc. FBI and NSA spies post these threatening messages on internet only the mind control victims can understand and knew those threats were meant for the victims. In some cases, unfortunately these torture victims do not even know they are torture victims.

PSYCHOPATHIC TORTURE EXPERIMENTS.

Reading and broadcasting private thoughts.
Frequent break-ins and poisoning of food.
Frequent break-ins and enters at home and at work with clothing, furniture, business papers, computer files sabotaged, modified or stolen.
Frequent break-ins and movement of items from their original places, lights, tv and other electronic appliances turned on or off.
Controlled dreams.
Forced waking visions some synchronised with body motion.
Microwave hearing.
Transparent Eyelids.
Artificial Tinnitus.
Forced movement of Jaw and clacking of teeth.
Forced precision.
Manipulation of hands.
Forced memory blanking and induced erroneous actions.
Induced changes to hearing – both apparent direction and volume and sometimes even content.
Sudden violent itching inside eyelids.
Forced manipulation of airways, including externally controlled forced speech.
Wildly racing heart without cause.
Remotely induced violent no-rash itching often during delicate or messy work.
Forced nudging of arm during delicate or messy work causing spills or injury.
Intense general pain or hot needles pushed deep into flesh sensations.
Wild flailing sometimes followed by short periods of “rigor mortis”.
Sudden overheating, all body pain, sleep prevention.
Forced drop-in-your-tracks sleep inducement.
Irresistible “go here, go there” commands.
Microwave burns, electric shocks.

TORTURE VICTIMS.

Impotency caused by secret poisoning of the food by FBI and NSA secret spies.
Usually alone in his/her torture.
Constant mental rape, insults and humiliation.
Has no privacy even for his/her private thoughts.
Cannot plan secretly nor hold trade secrets or intellectual property.
Is subject to vicious physical and psychological attacks.
Does not know how harassment is happening or by whom.
Does not know why harassment is happening.
May be accused of mentall illness, called delusional.
Cannot get away, no matter where he/she goes.
Mind raped thought streams.
Bugged conversations.
Gossip, Rumours, Social and Job connections broken.
Microwave voices, clicks, pops, brain zapping, direct harassment.
Death and disease threats via internet messages from undercover FBI and NSA spies.

Mind control means influencing the behaviour of an individual. And to creating or remolding victims personality towards desired state. The desired model human for the elite of the world, or, “the Illuminati” is: Easily steerable mass-human without personal characteristics. A stupefied, dumbed down person. This secures the interests of the elite of the world. So they can lead our lives through changing times the way they want.

Apparently growing out of earlier government mind control research programs such as MKULTRA, and government suppression of dissent programs such as COINTELPRO, today’s mind control is covert, finely crafted, around the clock harassment perpetrated against citizens living in their homes and communities.

Destruction of family and other relationships by way of lies, bribes, and threats is a goal of the phase of today’s mind control. The current day mind control program has been carefully engineered so that if the target complains, their own words will instantly cause them to be labeled as mentally ill.

The mind/body symptoms of current day mind control include: excruciating pain.
Exceptionally frequent blanking of recent memories, and truncation of new ideas.

– Impotency caused by secret poisoning of the food by FBI and NSA secret spies.
– Very unnatural inability to sleep, as if large amounts of caffeine have been consumed.
– Sudden forced awakening at precisely the same time in the middle of the night, continuing for at least months, and
right on a clock time such as 4 am, zero minutes, zero seconds.
– Sudden clumsiness, which can result in spills, spoilage of precise work, or injury .
– Attacks of extreme fatigue, sometimes almost to the point of paralysis, when there is no reason for such attacks.
– Frequent powerful itching without rash, and which may start as a small electric shock.
– Artificial “bee stings”, especially while trying to get to sleep.
– Wildly racing heart without any cause.
– Sudden overheating, without any cause.
– Frequent flailing of arms and legs as you try to sleep.
– Fake sounds such as alarm clock going off when it shouldn’t, telephone ringing when there is no incoming call, knocking on the door but no one is there.
– Voices, either very insulting, or telling you things that indicate you are under surveillance.
– Vibration of body parts when trying to sleep.
– High pitched tone in ears, which may change when switching electronic equipment on or off In some cases, statements by strangers indicating they know what you had for supper.

– In some cases, statements by strangers indicating they can read your thoughts.
– Artificial and powerful sexual stimulation.
– Artificial and powerful prevention of sexual stimulation.

FBI and NSA spies post messages anonymously on usenet to indicate to the torture victims how they made the victims impotent. Ignore the title in the thread and read the subtle threatening text from FBI and NSA spies.

One can imagine how many of the hundreds of thousands of innocent Americans are made impotent by these disgusting, horrifying and sadistic FBI and NSA psychopaths.

This is the exterior of mind control. The non-noticeable mind control is more dangerous one. That is the manipulation of our thoughts and emotions without our notice of things.

We think we lead our lives but we do not. We have to wake up to take notice on the situation. And try to change the course of history.

FBI and NSA secret society imposes us the New world order using mindcontrol. And we can`t shield ourselves from it, which makes us as puppets on strings.

“Electromagnetic Weapons and Mind Control”:
from CNN’s Special Assignment, about 1985, at http://www.mindcontrolforums.com/cnn-mc.htm , by Chuck De Caro, CNN Special Assignments, and “List of mind control symptoms, in “2005 update:
The convergence of the cold war history of mind control and electromagnetic weapons with new post cold war government neuroscience reserch programs,” by Cheryl Welsh, Director, Mind Justice, 2005, at http://www.mindjustice.org/2005update.htm and http://www.mindjustice.org/symptoms.htm

Also, there is an interesting article called “Brain wave technology could change lives: Imagine controlling a computer using only your thoughts.”
This technology already exists in the civilian economy as a means of playing video games, for example. See this link:
http://www.msnbc.msn.com/id/6661974/
The article was written by Robert Bazell, correspondent for NBC News, and was updated at 7:31p.m., December 6, 2004. Another web site concerned with gaining information on the electrical activity of brainwaves, and by means of wireless technology, can be found in
the Sunday, 17 November, 2002, 00:41 GMT BBC NEWS World Edition article called “Remote control brain sensor”, at
http://news.bbc.co.uk/2/hi/health/2361987.stm

MANCHURIAN CANDIDATES.
“4 Elite Airborne commandos Return from a Special Operation in Afghanistan and suddenly torture and murder their wives”.

Friday, July 26, 2002 1:33 p.m. EDT FORT BRAGG, N.C. (Reuters)
– Four U.S. soldiers stationed at Fort Bragg, including three special operations servicemen who returned home this year after tours
of duty in Afghanistan, allegedly killed their wives recently, military officials said on Friday. In two of the cases, the soldiers killed themselves after shooting their spouses, officials said. In the other two, the servicemen have been arrested and are facing charges.
“There has been a recent series of instances where soldiers have either committed murder or murder-suicide against their wives,”
said Maj. Gary Kolb, a spokesman for the Army Special Operations Command.

I wonder how many of the murders and suicides in America were actually remotely manipulated, induced and orchestrated by these FBI and NSA secret mind control and mind manipulation experiments.

http://www.projectfreedom.cng1.com/esp.html

STARGATE
is one of the many names given to the Army’s classified clan of remote viewers. This project was hidden deeply within the government for close to two decades. The work of Harold Puthoff Ph.D., at SRI international …joined with the work of others at the Cognitive Science Laboratory … helped to supply the CIA with the framework of what was then known as Project GRILLFRAME. By 1978 America’s first remote viewers were at work. It is rumored the cold war was responsible for the government’s interest in remote viewing, because Russia had spies not dissimilar to our remote viewers.

Psychic Dictatorship in the U.S.A.
Alex Constantine
(1995) Another bombshell from the fecund furnace of Feral House Press.
Constantine, a political researcher in the mold of Mae Brussell, has gathered together a well-documented survey. “Bombing minds rather than bodies is the warfare of the new millennium… Funded under the euphemism of Non-Lethal Technology, the Pentagon has developed the ability to transmit voices, and inflict pain, madness, even death, with the push of a button. Hard to believe? Believe it!
Official sources have publicly admitted to the existence of such technology.”
Topics covered: Telemetric mind control, hearing voices, false memory hoax, E. Howard Hunt’s Death Squads, The GOP’s Pink Triangle & the CIA, Johnny Carson and the S&L crisis, and let’s not forget the chapter on NutraSweet as crowd control.
221 pages,
PB
PDU
$12.95.

The term “mind control” comes from former CIA director Allen Dulles.
In 1953, Dulles, speaking before a national meeting of Princeton alumni, distinguished two fronts in the then-current “battle for
men’s minds”: a “first front” of mass indoctrination through censorship and propaganda, and a “second front” of individual “brainwashing” and “brain changing.” Before an audience of fellow Ivy Leaguers, Dulles skipped the usual pieties about democracy. The same year, Dulles approved the CIA’s notorious MKULTRA project, and exempted it from normal CIA financial controls.

A partial list of aggressive promoters of this new technology includes Oak Ridge National Lab, Sandia National Laboratories, Science
Applications International Corporation, MITRE Corporation, Lawrence Livermore National Lab, and Los Alamos National Laboratory.

In 1996, the US Air Force Scientific Advisory Board published a 14-volume study of future developments in weapons called New World Vistas. Tucked away on page 89 of an ancillary 15th volume are some hair-raising insights into the future ‘coupling’ of man and machine in a section dealing with ‘Biological Process Control’. The author refers to an ‘explosion’ of knowledge in the field of neuroscience, adding, ominously:

One can envision the development of electromagnetic energy sources, the output of which can be pulsed, shaped, and focused, that can couple with the human body in a fashion that will allow one to prevent voluntary muscular movements, control emotions (and thus actions), produce sleep, transmit suggestions, interfere with both short-term and long-term memory, produce an experience set, and delete an experience set.

Translating the words ‘experience set’ from military jargon into plain English, this means, simply, that they envisage the ability to erase your life’s memories and substitute a new, fictitious set.

By projecting such developments into the future, the authors of New Vistas are camouflaging present day capabilities. A similar futuristic scenario with many references to mind manipulation is described in The Revolution in Military Affairs and Conflict Short of War (US Army War College, 1994). Authors Steven Metz and James Kievit declare:
“Behaviour modification is a key component of peace enforcement” and “The advantage of [using] directed energy systems is deniability.” The authors ask: “Against whom is such deniability aimed?” The direct answer is “the American people”.

Edward Tilton, President of Silent Sounds Inc., says this about S-quad in a letter dated 13 December, 1996:

All schematics, however, have been classified by the US Government and we are not allowed to reveal the exact details. We make tapes and CDs for the German Government, even the former Soviet Union countries! All with the permission of the US State Department, of course. The system was used throughout Operation Desert Storm (Iraq) quite successfully.

By using these computer-enhanced EEGs, scientists can identify and isolate the brain’s low-amplitude “emotion signature clusters”, synthesize them and store them on another computer.
In other words, by studying the subtle characteristic brainwave patterns that occur when a subject experiences a particular emotion, scientists have been able to identify the concomitant brainwave pattern and can now duplicate it. “These clusters are then placed on the Silent Sound carrier frequencies and will silently trigger the occurrence of the same basic emotion in another human being!”

Microwaves can also alter the permeability of the body’s blood-brain barrier,14 which can synergistically increase the effects of drugs, as the military is well aware. “Using relatively low-level RFR, it may be possible to sensitise large military groups to extremely dispersed amounts of biological or chemical agents to which the unirradiated population would be immune.”15

Sound can be transmitted even easier through the use of implants -cochlear implants, implants that send electrical signals into the fluid of the inner ear, or implants that transmit sound vibrations via bone conduction, such as the cases of dental fillings picking up audible radio signals.

The stimoceiver, invented by Dr. Jose Delgado, consists of wires running from strategic points in the brain to a radio receiver/transmitter located entirely under the skin. Through this device, Delgado was able to stimulate raw emotions such as arousal, anxiety, and aggression with the turn of a knob.
Of course, secret research by the US Government into microwaves and synthetic telepathy has moved on considerably since the end of the Cold War … secret microwave radiation can be used to induce in unsuspecting victims: “Headache, fatigue, perspiring,dizziness, menstrual disorders, irritability, agitation, tension, drowsiness, sleeplessness, depression, anxiety, forgetfulness, and the lack of concentration.”

Naval Research Lab Attempts To Meld Neurons And Chips: Studies May Produce Army of ‘Zombies.’

Future battles could be waged with genetically engineered organisms, such as rodents, whose minds are controlled by computer chips engineered with living brain cells…. The research, called Hippo-campal Neuron Patterning, grows live neurons on computer chips.
“This technology that alters neurons could potentially be used on people to create zombie armies,” Lawrence Korb, a senior fellow at the Brookings Institution, said.

See also “National Security Agency” in
http://en.wikipedia.org/wiki/National_Security_Agency

“Central Security Service” in
http://en.wikipedia.org/wiki/Central_Security_Service

“ECHELON” in http://en.wikipedia.org/wiki/ECHELON

“Defense Intelligence Agency” in
http://en.wikipedia.org/wiki/Defense…ligence_Agency

and “Defense Advanced Research Projects Agency” in
http://en.wikipedia.org/wiki/Defense…rojects_Agency

The following links explain secret MKULTRA and COINTELPRO programs of FBI, CIA and NSA agencies.

http://thirdworldtraveler.com/FBI/FBI_watch.html

http://thirdworldtraveler.com/NSA/NSA_page.html

http://thirdworldtraveler.com/CIA/CIA_ThirdWorld.html

Posted via a free Usenet account from http://www.teranews.com

 


Governmental Surveillance Agencies

 
Russia
Russia has at least two official surveillance agencies. One agency, the Federal Security Service (Federal’naya sluzhba bezopasnosti, or FSB) not only possesses investigatory powers, but even has its own troops. FSB also is authorized to conduct intelligence operations inside and outside Russia to enhance “the economic, scientific-technical and defense potential” of Russia. Thanks to regulations such as SORM (System for Ensuring Investigated Activity), FSB essentially has the power to monitor Internet transmissions coming in and out of Russia.

In addition, the Federal Agency for Government Communications and Information (Federal’noye agentstvo paravitel’stvennykh svyazi i informatsii, or FAPSI) apparently has unlimited technical capabilities for monitoring communications and gathering intelligence, including monitoring of private networks. It too has its own troops (estimated at 54,000).

People’s Republic of China
The People’s Republic of China (PRC) created a Ministry of State Security in 1983. Not surprisingly, one of its chief tasks is to stop “enemy agents, spies and counterrevolutionary activities designed to … overthrow China’s socialist system.” As a part of this effort, a special Internet police agency was started in 1998, which has launched several cybersurveillance initiatives to track dissidents as well as conduct espionage on foreigners. In addition, Chinese authorities are planning to build more advanced Internet monitoring systems that rival those of the West, including the United States’ Carnivore.

Germany
Germany’s Bundesnachrichtendienst (BND) has been engaged in intelligence gathering for nearly fifty years. Their official website is in German. Their official website is in German (Deutsch).

Israel
Israel actually has at least three official intelligence-gathering organizations, commonly known as Mossad, Shin Bet, and Aman. Mossad handles surveillance outside of Israel, while Shin Bet conducts surveillance inside the country. Aman is charged with military intelligence. Israel receives its information from a variety of sources, including a growing spy satellite program.

France
Reports indicate that 2 subdivisions of France’s SGDN (Secretariat General de la Defense Nationale), the DRM (Direction du Renseignement Militaire) and the DGSE (Direction Generale de la Securite Exterieure), have created a French equivalent of ECHELON, or “Frenchelon.” Some observers have charged that this system not only conducts surveillance, but also passes pertinent information along to French private companies. These allegations are documented in an article from ZDNet France. Further information in French (Francais) is available in an article from Le nouvel observateur.

India
India’s Central Bureau of Investigation (CBI) is tasked with “preservation of values in public life” as well as “ensuring the health of the national economy”. Besides national security matters, CBI also coordinates investigations with Infopol.

Echelon Participants/Constituents
United States – National Security Agency (NSA)
United Kingdom – Government Communications Headquarters (GCHQ)
Canada – Communications Security Establishment (CSE)
Australia – Defense Signals Directorate (DSD)
New Zealand – Government Communications Security Bureau

Other Surveillance Systems
United States – Total Informational Awareness
A project of the United States Department of Defense, Total Informational Awareness (TIA) is designed to gather personal data on a grand scale, including emails, phone calls, financial records, transportation habits, and medical information. Its proponents believe that by scanning and analyzing this massive pile of data, government agents will be able to predict and prevent crime. Many specifics concerning this plan have yet to be determined, including methods to protect the security of the warehoused information and other prevent unauthorized access. It is known, however, that the U.S. government is already funding projects to develop tools that could be used as part of this system, including software to predict an individual’s behavior based on what that person does online. Reports indicate the state of Florida (with Federal support) is developing a system (called the MATRIX) that is broadly similar to TIA.

United States – Carnivore
This Internet surveillance program, which is currently being used by the United States government, is somewhat similar to ECHELON. Contrary to prior assertions, a subsequent government-commissioned review panel found that Carnivore is indeed capable of collecting all communications over the segment of the network being surveilled: “The results show that all TCP communications on the network segment being sniffed were captured by Carnivore.” Moreover, the default configuration is to do just that: “When turning on TCP full mode collection and not selecting any port, the default is to collect traffic from all TCP ports.” Carnivore is now being replaced by an even more powerful system, known as DCS 1000 or Enhanced Carnivore, which reportedly has higher capacity in order to deal with speedier broadband networks. The United States government also has issued a controversial field guidance memorandum regarding the installation and operation for this family of surveillance tools.

United States – Oasis & Fluent
United States intelligence officials have developed two programs which many experts believe may be used to enhance ECHELON’s capabilities. One of these programs, Oasis, automatically creates machine-readable transcripts from television and audio broadcasts. Reports indicate that Oasis can also distinguish individual speakers and detect personal characteristics (such as gender) then denote these characteristics in the transcripts it creates. The other program, FLUENT, allows English-language keyword searches of non-English materials. This data mining tool not only finds pertinent documents, but also translates them, although the number of languages that can currently be translated is apparently limited (Russian, Chinese, Portuguese, Serbo-Croatian, Korean and Ukrainian). In addition, FLUENT displays the frequency with which a given word is used in a document and can handle alternate search term spellings.

European Union – Enfopol
Enfopol is a special document created with the blessing of a special European Union council. It lists various “technical requirements” that essentially would make it easier for law enforcement officials to wiretap European communications networks. Efforts are now underway to implement these standards in the telecommunications systems of EU member countries.

United States – CALEA
The Communications Assistance for Law Enforcement Act (CALEA) generally requires telecommunications carriers both to modify their existing networks and to design and deploy new generations of equipment (including software), all to ensure that carriers can meet certain specified “capability” and “capacity” requirements related to the ability of authorized government agencies to engage in wiretapping.

United States – TEMPEST
Reports have indicated the existence of another NSA project that is designed to capture computer signals (such as keystrokes or monitor images) through walls or from other buildings, even if the computers are not linked to a network. Details about this project, which is apparently codenamed TEMPEST, are only just becoming available. One NSA document, entitled “Compromising Emanations Laboratory Test Requirements, Electromagnetics”, was prepared by the NSA’s Telecommunications and Information Systems Security group. It describes test procedures for measuring the radiation emitted from a computer — both through radio waves and through telephone, serial, network, or power cables attached to it. A second document the NSA released describes the agency’s “Technical Security Program,” which is responsible for assessing electronic security and providing “technical security facility countermeasures.” Two subsequent research articles how the blinking patterns of LEDs and changes in the light intensity of cathode-ray tube displays, even from a distance, can allow someone to eavesdrop on the data passing through a given computer.
Source

 


Illegal eavesdropping on American citizens by the NSA: An Old Story

The recent revelations about illegal eavesdropping on American citizens by the U.S. National Security Agency have raised many questions about just what the agency is doing. Although the facts are just beginning to emerge, information that has come to light about the NSA’s activities and capabilities over the years, as well as the recent reporting by the New York Times and others, allows us to discern the outlines of what they are likely doing and how they are doing it.

The NSA is not only the world’s largest spy agency (far larger than the CIA, for example), but it possesses the most advanced technology for intercepting communications. We know it has long had the ability to focus powerful surveillance capabilities on particular individuals or communications. But the current scandal has indicated two new and significant elements of the agency’s eavesdropping:

The NSA has gained direct access to the telecommunications infrastructure through some of America’s largest companies
The agency appears to be not only targeting individuals, but also using broad “data mining” systems that allow them to intercept and evaluate the communications of millions of people within the United States.

The ACLU has prepared a map (see below) illustrating how all this is believed to work. It shows how the military spying agency has extended its tentacles into much of the U.S. civilian communications infrastructure, including, it appears, the “switches” through which international and some domestic communications are routed, Internet exchange points, individual telephone company central facilities, and ISPs. While we cannot be certain about these secretive links, this chart shows a representation of what is, according to recent reports, the most likely picture of what is going on.
Corporate Bedfellows

One major new element of the NSA’s spying machinery is its ability to tap directly into the major communications switches, routing stations, or access points of the telecommunications system. For example, according to the New York Times , the NSA has worked with “the leading companies” in the telecommunications industry to collect communications patterns, and has gained access “to switches that act as gateways” at “some of the main arteries for moving voice and some Internet traffic into and out of the United States.

 

 

This new level of direct access apparently includes both some of the gateways through which phone calls are routed, as well as other key nodes through which a large proportion of Internet traffic passes. This new program also recognizes that today’s voice and Internet communications systems are increasingly converging, with a rising proportion of even voice phone calls moving to the Internet via VOIP, and parts of the old telephone transmission system being converted to fiber optic cable and used for both data and voice communications. While data and voice sometimes travel together and sometimes do not, and we do not know exactly which “switches” and other access points the NSA has tapped, what appears certain is that the NSA is looking at both.

And most significantly, access to these “switches” and other network hubs give the agency access to a direct feed of all the communications that pass through them, and the ability to filter, sift through, analyze, read, or share those communications as it sees fit.
Data Mining

The other major novelty in the NSA’s activities appears to be the exploitation of a new concept in surveillance that has attracted a lot of attention in the past few years: what is commonly called “data mining.” Unlike the agency’s longstanding practice of spying on specific individuals and communications based upon some source of suspicion, data mining involves formula-based searches through mountains of data for individuals whose behavior or profile is in some way suspiciously different from the norm.

Data mining is a broad dragnet. Instead of targeting you because you once received a telephone call from a person who received a telephone call from a person who is a suspected terrorist, you might be targeted because the NSA’s computers have analyzed your communications and have determined that they contain certain words or word combinations, addressing information, or other factors with a frequency that deviates from the average, and which they have decided might be an indication of suspiciousness. The NSA has no prior reason to suspect you, and you are in no way tied to any other suspicious individuals — you have just been plucked out of the crowd by a computer algorithm’s analysis of your behavior.

Use of these statistical fishing expeditions has been made possible by the access to communications streams granted by key corporations. The NSA may also be engaging in “geographic targeting,” in which they listen in on communications between the United States and a particular foreign country or region. More broadly, data mining has been greatly facilitated by underlying changes in technology that have taken place in the past few years (see below).

This dragnet approach is not only bad for civil liberties — it is also a bad use of our scarce security and law enforcement resources. In fact, the creation of large numbers of wasteful and distracting leads is one of the primary reasons that many security experts say data mining and other dragnet strategies are a poor way of preventing crime and terrorism. The New York Times confirmed that point, with its report that the NSA has sent the FBI a “flood” of tips generated by mass domestic eavesdropping and data mining, virtually all of which led to dead ends that wasted the FBI’s resources. “We’d chase a number, find it’s a schoolteacher with no indication they’ve ever been involved in international terrorism,” one former FBI agent told the Times . “After you get a thousand numbers and not one is turning up anything, you get some frustration.”
Combining Telecommunications and Other Private Data?

The NSA has historically been in the business of intercepting and analyzing communications data. One question is whether or not this communications data is being combined with other intimate details about our lives. A few years ago, the Pentagon began work on an breathtaking data mining program called Total Information Awareness, which envisioned programming computers to trawl through an extensive list of information on Americans (including, according to the program’s own materials, “Financial, Education, Travel, Medical, Veterinary, Country Entry, Place/Event Entry, Transportation, Housing, Critical Resources, Government, Communications”) in the hunt for “suspicious” patterns of activity. Congress decisively rejected this approach, voting to shut down the program, at least for domestic use — but we know Congress allowed elements of the program to be moved undercover, into the bowels of the Pentagon, while supposedly being restricted to non-Americans. We also know that the NSA is sharing its information with other security services. What we do not know is whether any of information from TIA-like enterprises is being combined with the NSA’s communications intercepts.
How the NSA searches for targets

There are a range of techniques that are probably used by the NSA to sift through the sea of communications it steals from the world’s cables and airwaves:

Keywords. In this longstanding technique, the agency maintains a watch list or “dictionary” of key words, individuals, telephone numbers and presumably now computer IP addresses. It uses that list to pick out potentially relevant communications from all the data that it gathers. These keywords are often provided to the NSA by other security agencies, and the NSA passes the resulting intelligence “take” back to the other agencies or officials. According to the law, the NSA must strip out the names and other identifying information of Americans captured inadvertently, a process called “minimization.” (According to published reports, those minimization procedures are not being properly observed.) In the 1990s, it was revealed that the NSA had used the word “Greenpeace” and “Amnesty” (as in the human rights group Amnesty International) as keywords as part of its “Echelon” program (see below).
Link analysis. It is believed that another manner in which individuals are now being added to the watch lists is through a process often called “link analysis.” Link analysis can work like this: the CIA captures a terrorist’s computer on the battlefield and finds a list of phone numbers, including some U.S. numbers. The NSA puts those numbers on their watch list. They add the people that are called from those numbers to their list. They could then in turn add the people called from those numbers to their list. How far they carry that process and what standards if any govern the process is unknown.
Other screening techniques. There may be other techniques that the NSA could be using to pluck out potential targets. One example is voice pattern analysis, in which computers listen for the sound of, say, Osama Bin Laden’s voice. No one knows how accurate the NSA’s computers may be at such tasks, but if commercial attempts at analogous activities such as face recognition are any guide, they would also be likely to generate enormous numbers of false hits.

A three-stage process

So how are all these new techniques and capabilities being put into practice? Presumably, “The Program” (as insiders reportedly refer to the illegal practices) continues to employ watch lists and dictionaries. We do not know how the newer and more sophisticated link analysis and statistical data mining techniques are being used.

But, a good guess is that the NSA is following a three-stage process for the broadest portion of its sweep through the communications infrastructure:

The Dragnet: a search for targets. In this stage, the NSA sifts through the data coursing through the arteries of our telecom systems, making use of such factors as keyword searches, telephone number and IP address targeting, and techniques such as link analysis, and “data mining.” At this stage, the communications of millions of people may be scrutinized.
Human review: making the target list. Communications and individuals that are flagged by the system for one reason or another are presumably then subject to human review. An analyst looks at the origin, destination and content of the communication and makes a determination as to whether further eavesdropping or investigation is desired. We have absolutely no idea what kind of numbers are involved at this stage.
The Microscope: targeting listed individuals. Finally, individuals determined to be suspicious in phase two are presumably placed on a target list so that they are placed under the full scrutiny of the NSA’s giant surveillance microscope, with all their communications captured and analyzed.

Expanding surveillance as technology changes

Today’s NSA spying is a response to, and has been made possible by, some of the fundamental technological changes that have taken place in recent years. Around the end of 1990s, the NSA began to complain privately — and occasionally publicly — that they were being overrun by technology as communications increasingly went digital. One change in particular was especially significant: electronic communications ranging from email to voice conversations were increasingly using the new and different protocols of the Internet.

The consequence of this change was that the NSA felt it was forced to change the points in the communications infrastructure that it targeted — but having done that, it gained the ability to analyze vastly more and richer communications.

The Internet and technologies that rely upon it (such as electronic mail, web surfing and Internet-based telephones known as Voice over IP or VOIP) works by breaking information into small “packets.” Each packet is then routed across the network of computers that make up the Internet according to the most efficient path at that moment, like a driver trying to avoid traffic jams as he makes his way across a city. Once all the packets — which are labeled with their origin, destination and other “header” information — have arrived, they are then reassembled.

An important result of this technology is that on the Internet, there is no longer a meaningful distinction between “domestic” and “international” routes of a communication. It was once relatively easy for the NSA, which by law is limited to “foreign intelligence,” to aim its interception technologies at purely “foreign” communications. But now, an e-mail sent from London to Paris, for example, might well be routed through the west coast of the United States (when, for example, it is a busy mid-morning in Europe but the middle of the night in California) along the same path traveled by mail between Los Angeles and San Francisco.

That system makes the NSA all the more eager to get access to centralized Internet exchange points operated by a few telecommunications giants. But because of the way this technology works, eavesdropping on an IP communication is a completely different ballgame from using an old-fashioned “wiretap” on a single line. The packets of interest to the eavesdropper are mixed in with all the other traffic that crosses through that pathway — domestic and international.
Echelon

Much of what we know about the NSA’s spying prior to the recent revelations comes from the late 1990s, when a fair amount of information emerged about a system popularly referred to by the name “Echelon” — a codename the NSA had used at least at one time (although their continued use of the term, if at all, is unknown). Echelon was a system for mass eavesdropping on communications around the world by the NSA and its allies among the intelligence agencies of other nations. The best source of information on Echelon was two reports commissioned by the European Parliament (in part due to suspicions among Europeans that the NSA was carrying out economic espionage on behalf of American corporations). Other bits of information were gleaned from documents obtained through the U.S. Freedom of Information Act, as well as statements by foreign governments that were partners in the program (the UK, Australia, Canada, and New Zealand).

As of the late 1990s/early 2000s, Echelon swept up global communications using two primary methods:

The interception of satellite and microwave signals. One way that telephone calls and other communications are sent from the United States to Europe and other destinations is via satellite and microwave transmissions. ECHELON was known to use numerous satellite receivers (“dishes”) — located on the east and west coasts of the United States, in England, Australia, Germany, and elsewhere around the globe — to vacuum up the “spillover” broadcasts from these satellite transmissions.
Transoceanic cable tapping. ECHELON’s other primary eavesdropping method was to tap into the transoceanic cables that also carry phone calls across the seas. According to published reports, American divers were able to install surveillance devices onto these cables. One of these taps was discovered in 1982, but other devices apparently continued to function undetected. It is more difficult to tap into fiber-optic cables (which unlike other cables do not “leak” radio signals that can be picked up by a device attached to the outside of the cable), but there is no reason to believe that that problem remained unsolved by the agency.

We do not know the extent to which these sources of data continue to be significant for the NSA, or the extent to which they have been superseded by the agency’s new direct access to the infrastructure, including the Internet itself, over which both voice and data communications travel.
Unanswered questions

The bottom line is that the NSA appears to be capable not only of intercepting the international communications of a relatively small number of targeted Americans, but also of intercepting a sweeping amount of U.S. communications (through corporate-granted access to communications “pipes” and “boxes”), and of performing mass analysis on those communications (through data mining and other techniques).

Despite the fuzzy picture of “The Program” that we now possess, the current spying scandal has highlighted many unanswered questions about the NSA’s current activities. They include:

Just what kinds of communications arteries has the NSA tapped into?
What kinds of filters or analysis is the NSA applying to the data that flows through those arteries? How are data mining and other new techniques are being used?
Which telecom providers are cooperating with the NSA?
How are subjects selected for targeted intercepts?
What kinds of information exchange are taking place between the NSA and other security agencies? We know they probably turn over to other agencies any data turned up by watch list entries submitted by those other agencies, and they are also apparently passing along data mining-generated “cold hits” to the FBI and perhaps other security agencies for further investigation. Does information flow the other way as well — are other agencies giving data to the NSA for help in that second phase of deciding who gets put under the microscope?
Is data that NSA collects, under whatever rubric, being merged with other data, either by NSA or another agency? Is communications data being merged with other transactional information, such as credit card, travel, and financial data, in the fashion of the infamous “Total Information Awareness” data mining program? (TIA, while prohibited by Congress from engaging in “domestic” activities, still exists within the Pentagon — and can be used for “foreign intelligence purposes.)
Just how many schoolteachers and other innocent Americans have been investigated as a result of “The Program”? And just how much privacy invasion are they subject to before the FBI can conclude they are not “involved in international terrorism”?

Rarely if ever in American history has a government agency possessed so much power subject to so little oversight. Given that situation, abuses were inevitable — and any limits to those abuses a matter of mere good fortune. If our generation of leaders and citizens does not rise to the occasion, we will prove ourselves to be unworthy of the heritage that we have been so fortunate to inherit from our Founders.

Eric Lichtblau and James Risen, “Spy Agency Mined Vast Data Trove, Officials Report,” New York Times , December 24, 2005; http://select.nytimes.com/search/restricted/article?res=FA0714F63E540C778EDDAB0994DD404482

Lowell Bergman, Eric Lichtblau, Scott Shane and Don Van Natta Jr., “Spy Agency Data After Sept. 11 Led F.B.I. to Dead Ends,” New York Times , January 17, 2006; http://www.nytimes.com/2006/01/17/politics/17spy.html


NSA Insider: You Are the Target: “They’re Pulling Together the Data About Virtually Every U.S. Citizen ”

 

Few Americans would believe that the government has the technological capability and wherewithal to monitor, track, log, and analyze the everyday activities of American citizens. The idea that the National Security Agency, an organization responsible the collection and analysis of foreign communications and foreign signals intelligenc, would operate on US soil to turn the surveillance apparatus on the people they are tasked with protecting has up until now been reserved for conspiracy theorists and Hollywood movies.

It turns out that it’s not a conspiracy, and not only does the NSA operate within the borders of the United States, they are assembling detailed dossiers on every single one of us. William Binney, an NSA whistleblower who recently resigned his post at the NSA over its illegal domestic surveillance programs, notes that the agency is engaged in implementing a total surveillance net over America with the help of private businesses like internet and telecom companies – and their target is YOU.

Domestically, they’re pulling together all the data about virtually every U.S. citizen in the country and assembling that information, building communities that you have relationships with, and knowledge about you; what your activities are; what you’re doing.

So the government is accumulating that kind of information about every individual person and it’s a very dangerous process.

…from one company alone… they were sending, according to my estimate… I reckon there were between 10 and 12 [companies] that were participating… that one company was providing 320 million average logs per day since 2001.

As we’ve noted previously Everything You Do Is Monitored. The NSA’s technological capabilities far surpass anything that has ever existed. Not only is the NSA nowbuilding a massive surveillance facility in Utah capable of monitoring and logging multiple yottabytes (1 Trillion Terabytes of information) of data like emails, cell phone communications, text messages, shopping records and social network interactions, there are over fifty fusion centers across the United States where data is processed on a local or regional level:

All of this information will eventually be fused into one large database. In fact, the government has already setup well over fifty fusion centers around the nation. What goes on in these centers is kept strictly confidential, and there doesn’t seem to be any agency in charge of them, but we know they exist, and we know that their purpose is to acquire, aggregate and act on whatever information they have available to them. These are fairly new, appearing just over the last several years. But be assured that as processing power and software technology improves, so too will the surveillance capabilities of fusion like facilities, whether they belong to government, private industry or criminal industry.

Of course the NSA denies the existence of a spy center designed to monitor US-based communications and activity, but we already know from past experience that government denying something exists doesn’t necessarily mean it’s not real.

They are watching everything we do. For what reason? We can’t say for certain, but history tells us any time government(s) start making lists and collecting data it often turns into a mechanism of intimidation, control and a culling of those who are perceived to be acting against the state.

Our Republic is on very dangerous ground.

From SHTF Plan

 


The Echelon USA Surveillance Programme: the documentation

 

In the greatest surveillance effort ever established, the US
National Security Agency
(
NSA
) has createda global spy system, codename
ECHELON
, which captures and analyzes virtually every phone call, fax,email and telex message sent anywhere in the world.

ECHELON is controlled by the NSA and is operated in conjunction with the
Government Communications Head Quarters
(
GCHQ
) of England, the
Communications Security Establishment
(
CSE
)of Canada, the
Australian Defense Security Directorate
(
DSD
), and the
General CommunicationsSecurity Bureau
(
GCSB
) of New Zealand.

These organizations are bound together under a secret 1948 agreement,
UKUSA
, whose terms and textremain under wraps even today.The
ECHELON system
is fairly simple in design: position intercept stations all over the world to captureall satellite, microwave, cellular and fiber-optic communications traffic, and then process this informationthrough the massive computer capabilities of the
NSA
, including advanced voice recognition and
optical character recognition
(
OCR
) programs, and look for code words or phrases (known as the
ECHELON

Dictionary
”) that will prompt the computers to flag the message for recording and transcribing for futureanalysis.

Intelligence analysts at each of the respective “listening stations” maintain separate keyword lists for them to analyze any conversation or document flagged by the system, which is then forwarded to therespective intelligence agency headquarters that requested the intercept.But apart from directing their ears towards terrorists and rogue states,
ECHELON
is also being used for purposes well outside its original mission. The regular discovery of domestic surveillance targeted atAmerican civilians for reasons of “unpopular” political affiliation or for no probable cause at all in violationof the First, Fourth and Fifth Amendments of the
Constitution
– are consistently impeded by veryelaborate and complex legal arguments and privilege claims by the intelligence agencies and the USgovernment.

The guardians and caretakers of our liberties, our duly elected political representatives, give scarceattention to these activities, let alone the abuses that occur under their watch.

Among the activities that the
ECHELON
targets are:
Political spying:
Since the close of World War II, the US intelligence agencies have developed aconsistent record of trampling the rights and liberties of the American people.

Even after the investigations into the domestic and political surveillance activities of theagencies that followed in the wake of the
Watergate fiasco
, the
NSA
continues to target

 


Covert Empire: The NSA is Lying – US Government Has Copies of Most of Your Emails

http://www.democracynow.org/embed/story/2012/4/20/whistleblower_the_nsa_is_lying_us

William Binney served in the NSA for over 30 years, including a time as director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the NSA’s data-mining program has become so vast that it could “create an Orwellian state.”

Jacob Appelbaum, a computer security researcher who has volunteered with WikiLeaks. He is a developer and advocate for the Tor Project, a network enabling its users to communicate anonymously on the internet.

Laura Poitras, an award-winning documentary filmmaker and producer. She is working on the third part of a trilogy of films about America post-9/11. The first film was My Country, My Country,” and the second was The Oath.

National Security Agency whistleblower William Binney reveals he believes domestic surveillance has become more expansive under President Obama than President George W. Bush. He estimates the NSA has assembled 20 trillion “transactions” — phone calls, emails and other forms of data — from Americans. This likely includes copies of almost all of the emails sent and received from most people living in the United States. Binney talks about Section 215 of the USA PATRIOT Act and challenges NSA Director Keith Alexander’s assertion that the NSA is not intercepting information about U.S. citizens. This interview is part of a 4-part special. Click here to see segment 12, and 3.

Transcript

JUAN GONZALEZ: Well, I wanted to ask William Binney about this issue. When it comes to snail mail, the old postal system, it’s very tough for the government to intercept mail, except in times of war, particular situations. When it comes to phone conversations, land phone conversations, you need a warrant to be able to intercept phone conversations. But what about email, and what about the communication now that is really the dominant form that not only Americans, but many people around the world communicate? What are the restrictions on the government in terms of email?

WILLIAM BINNEY: Well, after some of the laws they passed, like the PATRIOT Act and their secret interpretation of Section 215, which is—my view, of course, is same as Tom Drake’s, is that that gives them license to take all the commercially held data about us, which is exceedingly dangerous, because if you take that and put it into forms of graphing, which is building relationships or social networks for everybody, and then you watch it over time, you can build up knowledge about everyone in the country. And having that knowledge then allows them the ability to concoct all kinds of charges, if they want to target you. Like in my case, they fabricated several charges and attempted to indict us on them. Fortunately, we were able to produce evidence that would make them look very silly in court, so they didn’t do it. In fact, it was—I was basically assembling evidence of malicious prosecution, which was a countercharge to them. So…

AMY GOODMAN: Do you believe all emails, the government has copies of, in the United States?

WILLIAM BINNEY: I would think—I believe they have most of them, yes.

AMY GOODMAN: And you’re speaking from a position where you would know, considering your position in the National Security Agency.

WILLIAM BINNEY: Right. All they would have to do is put various Narus devices at various points along the network, at choke points or convergent points, where the network converges, and they could basically take down and have copies of most everything on the network.

AMY GOODMAN: Jacob, your email?

JACOB APPELBAUM: Well, I selectively chose to use certain public services, like Sonic.net and Gmail, and I specifically did that so as to serve as a warning to other people. I didn’t use it for anything interesting, never once emailed Julian, for example, from those accounts. But the U.S. government again asserted in those cases, according to the Wall Street Journal, which is one way to find out about what’s going on with you—they asserted that they have the right to all that metadata. And it is possible—on Monday, I had a little interaction with the FBI, where they sort of hinted that maybe there might be a national security letter for one of my email accounts, which is also hosted by Google, specifically because I want to serve as a canary in a coal mine for other people.

AMY GOODMAN: A national security letter—it’s believed the government has given out hundreds of thousands of those.

JACOB APPELBAUM: Yeah.

AMY GOODMAN: I have also written about NSLs. But if you get one, you are not allowed to talk about it, on pain of something like up to five years in prison, even to mention that you were handed a national security letter that said turn something over.

JACOB APPELBAUM: Yeah. That was the case of Nick Merrill, for example, who’s a brave American, who essentially fought and won the NSL that was handed down to him.

AMY GOODMAN: And the librarians of Connecticut—

JACOB APPELBAUM: Yes.

AMY GOODMAN: —who were taking on the USA PATRIOT Act and didn’t want to give information over about patrons in the library that the FBI wanted to get information on.

JACOB APPELBAUM: Right, absolutely. So, an NSL, what’s specifically scary about it is that all that is required is for an FBI agent to assert that they need one, and that’s it. And you don’t have a chance to have judicial review, because you aren’t the one served. Your service provider will be served. And they can’t tell you, so you don’t get your day in court.

AMY GOODMAN: Laura, can you set up this clip that we have?

LAURA POITRAS: Yes, actually, this is what Jake was alluding to. On Monday, there was a panel at the Open Society Institute. And Jake—and there was a deputy general counsel of the FBI who was present, and Jake had the opportunity to question her about national security letters.

JACOB APPELBAUM: Are you including national security letters in your comment about believing that there is judicial oversight with the FBI’s actions?

FBI DEPUTY GENERAL COUNSEL: National security letters and administrative subpoenas have the ability to have judicial oversight, yes.

JACOB APPELBAUM: How many of those actually do have judicial oversight, in percentage?

FBI DEPUTY GENERAL COUNSEL: What do you mean by that? How many have—

JACOB APPELBAUM: I mean, every time you get a national security letter, you have to go to a judge? Or—

FBI DEPUTY GENERAL COUNSEL: No, as you well know, national security letters, just like administrative subpoenas, you don’t have to go to a judge. The statute does allow for the person on whom those are served to seek judicial review. And people have done so.

JACOB APPELBAUM: And in the case of the third parties, such as, say, the 2703(d) orders that were served on my — according to the Wall Street Journal — my Gmail account, my Twitter account, and my internet service provider account, the third parties were prohibited from telling me about it, so how am I supposed to go to a judge, if the third party is gagged from telling me that I’m targeted by you?

FBI DEPUTY GENERAL COUNSEL: There are times when we have to have those things in place. So, at some point, obviously, you became aware. So at some point, the person does become aware. But yes, the statute does allow us to do that. The statute allows us.

AMY GOODMAN: Now, Jacob, explain who she was again.

JACOB APPELBAUM: So, my understanding is that she’s the deputy general counsel of the FBI.

AMY GOODMAN: And the significance of what she has just said?

JACOB APPELBAUM: Essentially, what she says is, “We are just and righteous because you get judicial review. But there are some cases where you don’t, and we are still just and righteous. And you should trust us, because COINTELPRO will never happen again.” That’s what I heard from that. And, in fact, later, someone asked about COINTELPRO and said, “How can we” —

AMY GOODMAN: The counterintelligence program that targeted so many dissidents in the 1970s.

JACOB APPELBAUM: Yeah. Tried to get Martin Luther King Jr. to kill himself, for example. The FBI wrote him a letter and encouraged him to commit suicide. So for her to suggest that it is just and right and that we should always trust them sort of overlooks the historical problems with doing exactly that for any people in a position of power, with no judicial oversight.

JUAN GONZALEZ: William Binney, what about the companies that are approached by the government to participate or facilitate the surveillance? Your sense of the degree of opposition that they’re mounting, if at all? And also, has there been any kind of qualitative change since the Obama administration came in versus what the Bush administration was practicing?

WILLIAM BINNEY: Well, first of all, I don’t think any of them opposed it in any way. I mean, they were approached to saying, “You’ll be patriotic if you support us.” So I think they saluted and said, “Yes, sir,” and supported them, because they were told it was legal, too. And then, of course, they had to be given retroactive immunity for the crimes they were committing. So—

JUAN GONZALEZ: Approved by President Obama.

WILLIAM BINNEY: And President Bush, yeah. It started with Bush, yeah.

JUAN GONZALEZ: And the differences in the administrations?

WILLIAM BINNEY: Actually, I think the surveillance has increased. In fact, I would suggest that they’ve assembled on the order of 20 trillion transactions about U.S. citizens with other U.S. citizens.

AMY GOODMAN: How many?

WILLIAM BINNEY: Twenty trillion.

AMY GOODMAN: And you’re saying that this surveillance has increased? Not only the—

WILLIAM BINNEY: Yes.

AMY GOODMAN: —targeting of whistleblowers, like your colleagues, like people like Tom Drake, who are actually indicted under the Obama administration—

WILLIAM BINNEY: Right.

AMY GOODMAN: —more times—the number of people who have been indicted are more than all presidents combined in the past.

WILLIAM BINNEY: Right. And I think it’s to silence what’s going on. But the point is, the data that’s being assembled is about everybody. And from that data, then they can target anyone they want.

AMY GOODMAN: Bill Binney, talk about Bluffdale, Utah. What is being built there?

WILLIAM BINNEY: Well, a very large storage device, basically, for remote interrogation and remote processing. That’s the way I view that. Because there’s not enough people there to actually work the data there, so it’s being worked somewhere else.

AMY GOODMAN: Where do you get the number 20 trillion?

WILLIAM BINNEY: Just by the numbers of telecoms, it appears to me, from the questions that CNET posed to them in 2006, and they published the names and how—what the responses were. I looked at that and said that anybody that equivocated was participating, and then estimated from that the numbers of transactions. That, by the way, estimate only was involving phone calls and emails. It didn’t involve any queries on the net or any assembles—other—any financial transactions or credit card stuff, if they’re assembling that. I do not know that, OK.

JUAN GONZALEZ: And the original—the original allegations that you made, in terms of the crimes being committed under the Bush administration in terms of the rights of American citizens, could you detail those?

WILLIAM BINNEY: Well, I made that—I reported the crime when I was raided in 2007. And it was that Bush and Cheney and Hayden and Tenet conspired to subvert the Constitution and violate various laws of the—that exist in the statute at the time, and here’s how they did it. And I was reporting this to the FBI on my back porch during the raid. And I went through Stellar Wind and told them what it did and what the information it was using and how they were spying on—or assembling data to be able to spy on any American.

AMY GOODMAN: I want to go to a clip of Congress Member Hank Johnson—he’s the Georgia Democrat—questioning National Security Administration director, General Keith Alexander, last month, asking him whether the NSA spies on U.S. citizens.

REP. HANK JOHNSON: Does the NSA routinely intercept American citizens’ emails?

GEN. KEITH ALEXANDER: No.

REP. HANK JOHNSON: Does the NSA intercept Americans’ cell phone conversations?

GEN. KEITH ALEXANDER: No.

REP. HANK JOHNSON: Google searches?

GEN. KEITH ALEXANDER: No.

REP. HANK JOHNSON: Text messages?

GEN. KEITH ALEXANDER: No.

REP. HANK JOHNSON: Amazon.com orders?

GEN. KEITH ALEXANDER: No.

REP. HANK JOHNSON: Bank records?

GEN. KEITH ALEXANDER: No.

REP. HANK JOHNSON: What judicial consent is required for NSA to intercept communications and information involving American citizens?

GEN. KEITH ALEXANDER: Within the United States, that would be the FBI lead. If it was a foreign actor in the United States, the FBI would still have the lead and could work that with NSA or other intelligence agencies, as authorized. But to conduct that kind of collection in the United States, it would have to go through a court order, and the court would have to authorize it. We are not authorized to do it, nor do we do it.

AMY GOODMAN: That was General Keith Alexander, the NSA director, being questioned by Democratic Congress Member Hank Johnson. Bill Binney, he’s the head of your agency, of the NSA. Explain what he’s saying—what he’s not saying, as well.

WILLIAM BINNEY: Well, I think it’s—part of it is a term, how you use the term “intercept,” as to whether or not what they’re saying is, “We aren’t actually looking at it, but we have it,” you know, or whether or not they’re actually collecting it and storing it somewhere.

JUAN GONZALEZ: So the mistake of the congressman was not to ask, “Are you collecting information?”

WILLIAM BINNEY: Well, he also said things like, “We don’t collect” — or, “We don’t collect against U.S. citizens unless we have a warrant.” And then, at the same time, he said that we don’t—at the same interview, he said, “We don’t have the capability to collect inside this country.” Well, those are kind of contradictory.

AMY GOODMAN: Is he lying? Is General Keith Alexander lying?

WILLIAM BINNEY: I wouldn’t—you know, the point is how you split the words. I wouldn’t say “lying.” It’s a kind of avoiding the issue.

AMY GOODMAN: Jacob Appelbaum, how does this relate to you? And how powerful is General Keith Alexander?

JACOB APPELBAUM: I was saying to Bill that I think he’s probably the most powerful person in the world, in the sense that—

AMY GOODMAN: More powerful than President Obama?

JACOB APPELBAUM: Well, sure. I mean, if he controls the information that arrives on Obama’s desk, and Obama makes decisions based on the things on his desk, what decisions can he make, if—except the decisions presented to him by the people he trusts? And when the people he trusts are the military, the military makes the decisions, then the civilian government is not actually in power.

AMY GOODMAN: Bill Binney, you’re nodding your head.

WILLIAM BINNEY: Yes. I mean, well, for example, their responsibility is to interpret what they have and report up echelon. So, I mean, that’s the responsibility of all the intelligence agencies. So, they basically filter the information to what they believe is important, which is what they should do, because, you know, they’re occupying—it takes time for leaders to review material to make decisions. So they have to boil it down as best they can. So it’s a function of their processing, but it is important that they do it correctly to make sure the information that gets there is correct and complete as it can.

AMY GOODMAN: Is General Alexander more powerful than President Obama?

WILLIAM BINNEY: In the sense of making—of presenting information for decision making, sure.

JUAN GONZALEZ: And Laura, the impact on journalists, who have to go through what you go—you’ve gone through the last few years, just to be able to report what’s going on with our government? The chilling effect that this has on—maybe not on you, but on many other journalists?

LAURA POITRAS: Sure. I mean, I feel like I can’t talk about the work that I do in my home, in my place of work, on my telephone, and sometimes in my country. So the chilling effect is huge. It’s enormous.

AMY GOODMAN: You keep your computers and telephones away from conversations you’re having in a room?

LAURA POITRAS: Yeah. When we had a meeting with you, remember, we told you—we kicked all your cell phones and all your computers out of the room.

AMY GOODMAN: You un—the wired phone, you unwired.

LAURA POITRAS: Yeah.

AMY GOODMAN: My cell phone, you didn’t allow me to have it in the room. And you made sure there were no computers in the room.

LAURA POITRAS: Right.

AMY GOODMAN: Why?

LAURA POITRAS: Because we wanted—well, we wanted to talk about—because we were bringing—we were bringing William to New York. And—

AMY GOODMAN: We have to leave it there, but we’re going to go online right now at democracynow.org. We’re going to continue this conversation with Bill Binney of the NSA, formerly with NSA; Laura Poitras and Jacob Appelbaum.

Links


Autism & Oughtisms

Dealing with the endless "oughts" of parenting and autism.

Well Balanced Blog

Take Control of Your Own Health!

Έγκλημα και Τιμωρία/Crime and Punishment/Crime et Châtiment/Delitto e castigo/Преступление и наказание

CRIME DOES NOT PAY... PLUS, THE BUTLER DID IT! AND REMEMBER: WHAT DOESN'T KILL YOU, WILL -MOST LIKELY- TRY AGAIN... AND DON'T FORGET: TODAY IS A GOOD DAY FOR SOMEONE ELSE TO DIE.

BanTheBBC Blog

A constant reminder that life would be so much better without the BBC's TV Licence Gestapo

Healthy At Any Age

Welcome to June Rousso's Blog !

iGlinavos

Thoughts of a recovering leftist

Scottish Gaelic

Word a Day

NEO INKA - ΣΕ ΠΡΟΣΤΑΤΕΥΕΙ, ΔΥΝΑΜΩΣΕ ΤΟ!!!

ΓΙΝΕ Ο ΕΠΟΜΕΝΟΣ ΚΡΙΚΟΣ ΣΤΟ ΔΙΚΤΥΟ.

Talk of the Tail

"Tails" from pets searching for their forever home.

ultimatemindsettoday

A great WordPress.com site

Are You Finished Yet?

Alea Jacta Est

Watts Up With That?

The world's most viewed site on global warming and climate change

Levi Quackenboss

Putting the boss in quack.

I shouldn't have left Wonderland

Ir's diary of deficient years

Unstrange Mind

Remapping My World

psychinfo.gr

ΛΙΝΑ ΨΟΥΝΗ • psouni@gmail.com • www.psychinfo.gr

Wee Ginger Dug

Biting the hand of Project Fear

QUITTRAIN®

Quit Smoking & Take Your Freedom Back!

%d bloggers like this: