From the tales of electromagnetic destruction comes this beauty. If this list is true, and I have yet to determine that, then the military industrial complex is indeed guilty of the orgy of weaponry and research that many report. Hey, you could be paying for your own subjugation, and good luck finding the weapon or filing an abuse report….
Please, can someone verify this list? … I’d love if you could discredit it … I don’t want to believe that the human race is so vulnerable … yes, please discredit it … put my soul at ease ….
But really, feel free to leave a comment .. going up against the deep state and the military industrial complex is one hell of a retirement plan, but then again I’m already targeted so I have total freedom … to my deep state adversaries … what on earth are you doing with our planet?
“O, what a tangled web we weave when first we practise to deceive!”
Love from an old apple orchard in Northern California …
Stay strong people!!!
As you read this list, keep in mind that thousands, if not millions of people are saying that they are experiencing these symptoms … the world calls them targeted individuals … many of them are ex-military or ex-intelligence whistle blowers … many are doctors or journalists … the list is growing daily …
Found on FaceBook – 5/4/2022
Microwave Pulse Weapons: Head & Body Pulse Shots, Low-Intensity to High-Intensity, productive of instant migraines, running noses, stuffed noses, inability to breathe, extreme heat
Sonic & Acoustic Radar Weapons–Ultrasonic (Bone Conductance), Infrasonic, ELF (Extremely Low Frequency): Projected Sound, Silent Sound, Tinnitus/High Tone, Remote Cavitation of Organs for Tracking—Stomach, Throat, Mouth, Intestine, Rectum.
Vibration Weapons: Vibrations of couch, bed, seat, externally induced; Vibrations at spine of body (induced presumably by implants at spine); see Conducted Electrical Weapons & Microchip Weapons below; ELF vibrations from large engines, HAARP wind weapons acting like ELF vibrations to aid in tracking/honing/guiding Pencil Microwave Weapons at Rectum, Vibrations transmitted through Water Pipes underfoot in flooring
BCI/EEG/TMS/Sonic/Other Neuroweapons:Neuro Injections – V2K (Voice to Skull), Synthetic Telepathy, Forced Speech, Synthetic Images & Film, Sounds, Sensations, Smells, Electronic Dreams; Neuro Communications/Modifications/Interventions – BCI (Brain Computer Interface) Tech inducive of Hive-Mind Communications, Brain to Brain communications, BCI-CBI Communications; Removal of Memories; Insertion of Memories; Removal of Words, Language Skills, Musical skills, Computer skills; Neuro Takeover – EEG Heterodyning and EEG Cloning, Bio-Robotizing inducing effect of Brain Clone invading brain and imposing external will/external force in thought, speech, bodily movements
Bio-Resonance Frequency Weapons/DEW: Forced Sleep, Forced Emotions: Induced Rage, Fear, Fatigue, Depression, Paralysis, Confusion; Bodily Organ Attack via Organ-Specific Bio-Resonance Weapons, experienced as pulse shots, pain
Conducted Electrical Weapons: Remote electro-shock/vibration/spasm weapons, producing violent to mild shocks and spasms of different parts of body or whole body—perhaps to mimic clinical seizures; violent to mild vibrations at spine; Remote sexual stimulation/orgasm-inducing weapons, perhaps to create involuntary sexual stimulation, now classified a “disorder”; Remote electromagnetic rape weapons (Precision tracking radar)
Tracking Radar Weapons: Nerve-flicker weapons, Breath-and-heartbeat-tracking weapons (Through-wall-surveillance radar, Earthquake radar), Muscle-flicker weapons—all used as Biometric Surveillance devices, to establish occupancy or presence, to establish bodily position, azimuth.
Brain Entrainment Frequency Weapons: Radio Hypnosis/Brain Programming Weapons, often at night, inducive of externally-imposed urgency-of-action-without-personal-will (Manchurian-action), causing people to engage in compulsive, unexplainable behavior and speech
EEG Weapons: Painful EEG scans at scalp, done remotely
EMF Wave Weapons: Painful pressurizing constrictions, wave-like, intense, unshieldable by simple metal, at brain and body: the forced movement of high EMF fields through the body & brain
Laser/Maser Weapons: Sharp precision hits at skull, eyes; evidence of cigarette-mark-style burns on body
Bio-Resonance Nerve-Activation Weapons: Painful activation of vagus, other nerves, remotely; fibromyalgia-style-inducing spot-hits on subdural nerves on face and body
Microchip Weapons: RFIDs, Bio-MEMs, BCI (brain) chips, WBANs (Wireless Body Area Networks), Pattern of Clandestinely-placed Implants at Spine, Implants Surgically Inserted inside Organs, activated from outside for Torture and Organ Damage.
Nanoweapons: Nanotech MEMS, Nanobots, Nanobiosensors in fingertips, tongue, Sprayed thin-film nanotech on back, used with microwave pulse weapons to induce extreme, subdural heating effects, basically Torture; sprayed/injected nanotech filler-synthetic-tissue to disfigure and mutilate faces and bodies; nanotech attacks to create burns, lesions, swellings, discoloration; nanotech clustering at feet, to permit remote electrical vibration
Active Denial/5G/Millimeter Wave Weapons: Skin-burn weapons, producing burns, blisters, lesions
Plasma Weapons: Pulsed Energy Projectiles, Localized Heat-bombs, inducing extreme heat on body and surroundings; Localized Heat-Sinks, ionizing/cooling-down of temperatures around body
Chemical Weapons: Chemicals and gases, vented into homes/cars, targeted aerosols/chem trails, dropped from aerial vehicles,
On Thursday, February 10th, 2022 non consensual test subjects who have been painfully targeted with covert military weaponry finally got the recognition and compassion that they have been seeking. I was on this Webinar as an independent journalist and so this report is a first hand account of the proceedings. As a participant I was allowed to submit a preliminary question. I asked if the panel knew that hundreds of civilians had reported symptoms of Havana Syndrome to the State Department and that two of these civilians had actually been tested for the after effects of such an attack with positive results. I asked them to confirm that civilians were indeed being targeted with invisible weaponry and, to my astonishment, they did.
Here is some information about the Webinar …
This was a very long and scientifically detailed presentation. I waited patiently for James Giordano to speak because I knew that if anyone on the panel knew about the civilian victims then it would be him. He did not disappoint me. Here is the video of his presentation.
But the real knowledge of the situation came out in a panel discussion after each speaker had spoken individually … Here are the quotes from that discussion which revealed the truth of the terrible situation that non consensual test subjects find themselves in. I am one of these test subjects and my life has been completely destroyed and I spend every day and every night in pain and/or discomfort and I am not alone … thousands around the world endure the same predicament. Thank you Dr. James Giordano for your courage, intelligence and honesty …
“The overall intention of utilizing these most sophisticated devices I think harkens back to a very very literal definition of a weapon … in other words it’s a means of contending against others in ways which are disruptive .. it doesn’t seem to be destructive but disruptive … disruption can occur on a variety of levels … physical disruption, social disruption, psychological disruption, economic disruption … and essentially what that does is to create a rippling effect so it becomes important to think what are valuable targets? … there’s the need for increased vigilance, preparedness and understanding that a variety of tools, techniques, technologies and science could be rendered more generally against the public inclusive of those we hold near and dear, children inclusive, to have disruptive effects … we need to be aware of what’s quote “out there” … of what the science and technology can do … how it can be misused in ways which are nefarious” – Dr. James Giordano
and thank you to Dr. Munro Cullum for asking this question …
“Has anyone tried to study civilians who feel that they may be suffering from similar symptoms or exposed to such conditions”? – Dr. Munro Cullum
“Yeah, there’s evidence coming from some of the international literature for individuals that have been exposed to various forms of rangeable and unrangeable acoustic stimuli both those in the auditory range and ultrasonic range … Certainly we know that’s there’s been a lot of work done on the Frei effect and there is a body of literature both international and some of it domestic with regards to the effects of scalable pulsable microwaves which exist below the thermal artifacts” – Dr James Giordano
Since the General talked about a terrorist threat and a proliferation threat, the JEC has continued to investigate these potential threats. I am pleased to welcome to the Committee an extremely knowledgeable group of panelists. Let me introduce them.
Dr. Alan Kehs is with U.S. Army Laboratories and will discuss the overall RF threat. Dr. Kehs has a BS and a MS in Electrical Engineering, and a MS and a PhD in Physics from the University of Maryland. He is a recognized expert on the generation and use of intense relativistic electron beams for the production of high-power microwave radiation. Recent assignments include Chief of the Source Physics Branch and Chief of the Nuclear and High Power Microwave Technology Office. Dr. Kehs chaired the 8th national conference on HPM in April 1997 and currently chairs the tri-service HPM technology coordinating committee.
Mr. James O’Bryon is the Deputy Director of Operational Testing and the Director of Live Fire Testing with the Office of the Secretary of Defense at the Pentagon. He has received a BS in Mathematics, and he also has graduate degrees from George Washington University in Operations Research/Management Science and from MIT through the Electrical Engineering Department. The Director will discuss the role of Live Fire Testing and how it may play a role in testing our military equipment with RF weapons.
Mr. David Schriner is the Principal Engineer directed energy studies with Electronic Warfare Associates and a recently retired engineer with the naval weapons testing facility at China Lake. He has numerous patents, has received superior service awards, and given technical presentations over 42 years of civil and military service. He will discuss the difficulty in building a RF weapon and the terrorist threat.
Dr. Ira Merritt is with the Missile Defense Space Technology Center in Huntsville, Alabama. He has more than 25 years of experience in developing advanced technologies, systems requirements, system designs, and test capabilities for ballistic missile defense systems. He has a Bachelor of Science in Chemical Engineering and advanced degrees in Nuclear Engineering. Dr. Merritt will discuss the proliferation of RF weapons primarily from the former Soviet Union.
I look forward to the enlightening testimony from our panelists.
Statement of Mr. James F. O’Bryon Deputy Director, Operational Test and Evaluation Live Fire Testing Office of the Secretary of Defense before the Joint Economic Committee United States Congress Wednesday, February 25, 1998
Mr. Chairman and other distinguished members of the Committee, it’s an honor for me to appear before the Joint Economic Committee today to discuss the role and mission of Live Fire Testing, and specifically as it relates to the ballistic threat, the threats posed by radio frequency and electro-magnetic pulse and other threats. As your letter of invitation states, these issues “are of great importance to our nation as well as the world.”
Let me begin by acknowledging the fact that the Congress recognized, starting about a decade ago, that there was a significant and growing need to realistically test our major weapons and weapons platforms to assure that they would withstand the rigors of combat and to inflict the maximum effect on the enemy when used. The Live Fire Test legislation, first authored in Fiscal Year 1986 and strengthened several times since then, including most recently, the Federal Acquisition Streamlining Act (FASA), signed into law by the President in October 1994, requires that this realistic testing be conducted against realistic threats and that an independent report on the test results be prepared and delivered from the Secretary of Defense to the defense committees of both houses of the Congress prior to making any decision to enter full-rate production on each designated system. These systems have included armor systems, missiles, projectiles, aircraft and others. To date, literally thousands of Live Fire Tests have been conducted and evaluated and more than two dozen Live Fire Test and Evaluation reports on both weapons and platforms have been forwarded to the House and Senate in compliance with statute, prior to the decisions to enter full-rate production.
Live Fire Testing has revealed design flaws which, had they not been found in testing and corrected, would most likely have resulted in the loss of valuable equipment, and more importantly, loss of life of our combat forces. The kind of realistic testing that we require provides the opportunity to learn what otherwise would only be discovered in the first days of actual combat, and that is certainly not the time for surprises.
Since this is the Joint Economic Committee, I’m confident that your focus would be on how much this testing has cost the American taxpayer and in turn how much has been returned on these investments. I’m happy to report to you that, over the past decade since the inception of this program, although significant improvements have been made to our weapons systems as the result of this testing, not one test program has exceeded 1/3 of one percent of the program’s cost. This small investment has paid significant dividends in not only military equipment saved but also savings in lives from improved combat survivability.
From its beginning, the LFT&E program has required that not only design threats be tested against our systems but that also emerging threats be tested as well since we need to anticipate what we’ll face at the end of the acquisition cycle and beyond. The System Threat Assessment Reports, or STARs, as they’re known, are prepared by the Service proponents and approved by the Defense Intelligence Agency (DIA). These documents, by DoD regulation, are the primary source document used to establish what these emerging threats will be.
The threats tend to fall into three categories: classical conventional, emerging conventional threats and unconventional threats. The legislation forming the basis for LFT&E calls for testing against expected conventional threats. The Pentagon’s JCS Publication 1-02 defines a conventional weapon as one which is neither nuclear, biological or chemical. Hence, testing of our chemical, biological and nuclear weapons is not under the aegis of Live Fire Testing. However, LFT&E does include other threats including directed energy threats. The focus of the STARs over the years has been on, what I term, “classical conventional threats.” They have formed the basis of the DIA threat documents outlining projected threats over the years. These traditional threats are certainly the most familiar and they include such things as rockets, bullets, missiles, mines, torpedoes, grenades, shaped charges, kinetic energy penetrators, high explosives and other similar weapons which damage by depositing either kinetic energy, explosive energy or both. We have done significant testing of these threats and these threats will, most likely continue to face us well into the next century.
There is a second category of threats which, in my opinion, are of increasing importance, the directed energy threats. This category of threats includes low, medium, and high-energy lasers and high powered microwave radio frequency threats. I would like to focus the remainder of my opening statement on them.
These directed energy threats are included within the official definition of conventional threats, and hence, within the LFT&E mandate for oversight, are receiving increasing attention from the Services.
Recent defense guidance has made clear that other nations may very well choose to fight the U.S. asymmetrically, thereby avoiding a frontal assault on our forces in the more traditional war of engagement and attrition. Rather, they very well might choose to select a specific area of our potential vulnerability, for example communications, or information warfare, or other selective threat to attack us more effectively and efficiently. Recognizing that our nation, both militarily and commercially, is heavily dependent upon electronically produced, processed and transmitted information, it makes good sense to assume that rogue nations could easily try to exploit this potential niche warfare area to not only disrupt military command, control and communications but also to attempt to defeat our highly sophisticated military systems which rely increasingly on computers and their related software.
Drawing much of their technology from the commercial world, our military systems, whether they be tanks, ships or aircraft are heavily dependent upon computers or computer components. They use computers to navigate, to communicate and to acquire and home on targets. In fact, some of our new fighter aircraft literally cannot fly without their computer controls. Destroying, disrupting, corrupting or interrupting computer components could be very serious. As our computers become more and more miniaturized, faster and more proliferated, it may become feasible to attack these platforms through their potentially soft electronic components. As Mark Twain once said, “If you put all of your eggs in one basket, you’d better watch that basket.”
Other technologies, such as the introduction of nonmetallic composite skins for our aircraft and armor, may, while minimizing weight, inadvertently increase vulnerabilities by eliminating the “Faraday cage” which has traditionally provided a degree of protection from external electronic disruption.
We recently initiated a series of Joint Live Fire Tests (JLF) with the three Military Departments to assess the effects of potential radio frequency weapons against our platforms. While there has been some testing of RF weapons over the years, these JLF tests were particularly interesting for several reasons: First, we were examining the survivability of our systems to such weapons. In contrast to this, most tests done previously had been to asses our lethality against potential adversaries. Second, the source was a transient electro-magnetic broadband threat, making potentially susceptible a much wider range of equipment than the more traditionally tested narrow band systems. Third, the tests were conducted outside, rather than the vast majority of other testing which has been done at short range inside enclosures. Just as one’s voice sounds differently in the shower than it does outside, so does the performance of an RF weapon in the open. Fourth, the tests were done against a fully operational target, not simply a component or series of components as is often done. Just as the human body behaves as a total system, weapons platforms perform differently when tested as a complete operating system. We selected the Army’s Huey Cobra Gunship as the candidate platform to gain insights into not only what the first order effects might be but also to gain insights into how to even test such systems to these threats. Our intent in testing such an older and less sophisticated platform than we are currently developing was that it would not only be less costly and more available for destructive testing but also might indicate that if such an unsophisticated platform were to be vulnerable to such threats, then our newer, more computer dependent platforms could also be. We also were able to place other devices of interest in the path of the threat with significant results.
Just three weeks ago, I and some 200 others attended a meeting in the Russell Building sponsored by the National Defense Industrial Association, at which time the issues of information security and warfare were discussed. The act that some of our military communications are conducted over commercial lines was noted. Hence, what might first appear to be a civilian problem could also be a military problem.
Because of the rate of change of technology, in communications, computers and sensors as well as in lasers and radio frequency technology, the complexities of the issues are fast-moving.
I’m not here to imply that the sky is falling, or that our weapons don’t work. What I am trying to say is that the world is changing, the potential threat is changing, and our approach to designing and testing in this emerging world must change to meet it. We must realistically Live Fire Test to these emerging threats to our military platforms and weapons. It will be a savings not only in real dollars and equipment, but in lives as well.
Thank you for your invitation to appear here this morning. I’ll be happy to answer any questions you may have at this time.
Statement of Mr. David Schriner before the Joint Economic Committee United States Congress Wednesday, February 25, 1998
“The Design and Fabrication of a Damage Inflicting RF Weapon by ‘Back Yard’ Methods”
Note, this paper reflects the personal views and opinion of the author. The material in this paper has been deemed unclassified by those who hold his security clearances but it does not specifically represent their views. This paper is a very brief statement on the subject and it is written from a non-technical point of view to provide an easy look at the subject manner by non-professional people or groups. Further elaboration on any point can be requested in either a technical format or at a classified level with the proper security restrictions in place.
For many years research activities in different countries have focused on the use of radio frequency (RF) waves as a weapon. Most of this work has been titled or described under the title of High Powered Microwave (HPM). Worldwide, large amounts of money have been invested in this technology to support both the military interests but also the industrial heating needs. Like most technologies, with maturity the applications increase and the costs to use it become lower. One primary point of this paper is that as these technologies mature they also become affordable and usable by criminals and terrorists. Most military programs are classified and the general public knows little concerning their nature but as the technology becomes available to criminals and terrorists, it may be directly applied to the infrastructure elements of our society. This paper addresses the question concerning the possibility of certain types of this technology being used against the society.
The primary focus of this paper will be on a different and new form of HPM called Transient Electromagnetic Devices (TED) that could, in the hands of enemies, criminals, pranksters, or terrorists pose a significant threat to much of the United States infrastructure components that are based on micro-circuits and computer or micro-processor control. This includes financial institutions, aircraft, security, medical, automotive, and other critical equipment used everyday in our society. The systems necessary for the production of this form of energy are much easier to construct and use than the earlier and more well known conventional HPM narrow-band systems that are currently in development for military use. Millions of dollars have been spent on the conventional HPM, systems and it is the type that DOD managers and their funding offices are well acquainted with. This paper will briefly speak to these but the main focus of it will be on the very different type, the TED systems, which is less well known and may be the RF weapon of choice to the modern cyber or infrastructure RF warrior.
Conventional HPM systems generate RF wavessimilar to those used for many different purposes including communications, heating, and radio location purposes. We are all very familiar with the term frequency as expressed in mega-hertz (MHz) when we tune our FM radios over the FM band from 88 to 108 MHz. Likewise with the AM radio band from .55 to 1.5 MHz. These expressions of frequency describe how many complete RF cycles occur each second from the radio transmitters that generate them. Radar systems also generate RF signals but these are in thousands of MHz each second (the term Giga-Hertz or GHz applies). This is the type of signal that conventional HPM systems generate or radiate, a sine wave. TED systems do not generate a sine wave and operate entirely differently than narrow-band systems.
Narrow band HPM systems are similar to microwave ovens in that they use high powered sine waves to cause material placed in their field to generate heat. This is exactly what narrow band HPM systems do, they attempt to use extremely high powered RF sine waves to cause a target system to burn out. Other types of HPM use high powered, but conventional wave-like signals to enter a target system and cause some of the conventional effects that a jammer or countermeasure system might. All of these narrow band HPM systems employ sine waves that are very different than the signals generated and radiated and employed by the TED systems.
RF power is expressed in Watts and one million Watts is expressed as “megaWatts” or MW. A kitchen microwave oven, for example, uses a magnetron tube to produce a continuous wave (CW) .5 to 1 MW RF signal to provide energy to heat the material placed in its presence. In a simple way of describing the heating, the powerful microwave signals cause the molecules of the material to rub together at the frequency generated by the magnetron and heat results in the material exposed to the field. Materials such as meat, many materials containing carbon molecules, and even water heat well when placed in such a field. Many industrial heating applications require considerably larger power levels than the home microwave oven but the basic principles are the same.
It is with this view of microwave heating that we have the first notion of the use of microwaves as a weapon. One assumes that if a microwave signal of extremely high power level is aimed at a distant target of some type, then heating and perhaps burnout of some part of the target would occur. If the signal was tuned to the operating frequency of a targeted radio receiver, for example, one would assume that if enough power was provided in the radiated beam directed at the target’s radio antenna, that the radio’s “front-end”, that part directly connected to the antenna, could be heated sufficiently to burn it out. The key here is whether there is an entry point for the high powered signal to enter the targeted system and whether there is enough power to cause burnout.
The community involved with HPM systems generally describes a “front-door” and a “back-door” entry point. A front-door point might be, as in the above example, an antenna normally used by the target platform, such as an aircraft or a tank, for some RF function such as communication or radar. Here the RF weapon designer would attempt to radiate an RF signal into the target platform’s antenna and cause either a burnout or a disruption effect. A back-door entry point might be an unshielded wire at some point on the targeted platform that would allow the RF weapon signal to enter some part of the platform’s electronic systems and, as before, cause a burnout or disruption of some sort. The weapon designer would like to have a priori knowledge of the target so as to select the right frequency and use the right modulations to accomplish the desired result.
Since this extremely high-powered RF generation technology also fills the needs of industrial heating applications, essentially very high powered microwave ovens, there is a universal worldwide need for the technology and export controls are confused when it comes to the possible use of this technology as a weapon.
The New Kid on the block, the Transient Electromagnetic Device (TED):
There is a new type of source technology currently under development in our country and, very likely, other countries as well. This type of directed RF energy is quite different than the narrow-band systems previously described. This type of directed energy is called transient electromagnetic radiation. Instead of generating a train of smooth sine-waves, as the conventional narrow-band systems do, it generates a single spike-like form of energy. This spike-like burst of potential does not have “cycles” or waves and it may be only one or two hundred pico-seconds (psec) in length. 100 psec is the time that it takes light to travel 1.2 inches and often these short time duration puoses are described in “light-inches”.
It is very similar to the type of signal that occurs when you rub your feet on the carpet on a dry day and then touch your computer keyboard. An electrostatic discharge (ESD) occurs when you do this. The electrostatic charge on your body discharges onto and into the computer and a very brief amount of very high current flows quickly from your finger into the computer circuits causing a momentary break in the normal flow of signals and bits of information. Because of this momentary break in the “bit-flow” the ESD may cause the computer to crash and in some cases it may cause sensitive electronic circuits to be actually damaged to the point where they are non-functional and must be replaced. This vulnerable item may be just a single semiconductor diode in a single integrated chip in a circuit on the motherboard, and there are hundreds or thousands of these in a desk-top computer. It is often economical to simply replace a whole circuit board of components rather than trying to find the one specific circuit and replacing just it. This type of new weapon source, a transient electromagnetic device (TED), is actually a system that radiates an ESD-like signal that is intended to cause a similar responses, as just described, to the targeted system.
Let us look at the differences between narrow-band (NB) and TED HPM systems. The NB systems generate sine waves, the TEDs don’t. The NB systems are very costly and go to great lengths to generate very high average powers, the TEDs don’t, the NB systems are very complex systems, the TEDs are not, the NB systems generate very high average powers (microwave heating), the TEDs generate very high peak powers (and are poor RF heaters). They both use an antenna and the larger it is, the more power they can radiate, in a narrow focused beam, at the target.
In a narrow-band HPM device, high technology vacuum tubes are used that are, in some ways, very similar to those used in our highest-powered TV or FM stations and radar systems. They are very delicate devices, are complex, and very expensive. They require large amounts of primary power and generally require some type of cooling system, either air blowers or liquid types. All of this complexity requires complex engineering and development, and the manufacturing time is great and costly. Not for the amateur or a low-cost, start-up operation. Generally a highly skilled team of various technical experts of numerous engineering specialties is required to manage the development and operation of such devices.
TEDs, on the other hand, are relatively simple devices that generally use simple spark-gap switches, either in oil or in pressurized gas pulse storage lines. The power supplies are relatively small in size and much lower in average power and cost than for the NB systems. The engineering and mechanical issues are small in comparison to the narrow-band devices. The technology is well described in the various professional Pulse Power references found in good technical libraries. The significant development, engineering, and manufacturing costs are small in comparison to narrow band. Most of the technology required is available and is an outcrop of the various nuclear and flash x-ray work done in the past.
NB systems operate at some given frequency with a small bandwidth, and you will find them at one spot on the radio dial. The TEDs do not even have a definable frequency but instead, because of their short time duration, they occupy a very large spectrum space, and you will find it everywhere on every radio dial. When a TED pulse is generated it will have the ability to excite responses in systems designed to receive at any frequency from as low as 100 MHz up to several GHz, from the FM band up to the lower microwave bands. A NB system would excite only those systems that were operating at its frequency, say 2.345 GHz, so a narrow band system must be “tuned” to a given target’s known soft spot but a TED system would go after any soft spot of the target platform, back-door or front door.
So what is the bottom line of this discussion?
Because of the simplicity of TED systems and the suspicion that they may cause disruptive effects to electronic systems that they are aimed at, they make an attractive approach for RF terrorists to use for various purposes. We see hints of this vulnerability in the many warnings that we get each month about locations where we should not use radios and electronic devices for fear that we will do some damage to something. They make passengers on aircraft, during take off and landing, turn off radios, games, and other electronic devices. Hospitals regularly place signs that electronic devices are not allowed. Many people do not want you using your cellular telephones near their computer. Many repair shops require that wrist-bands attached to ground be used when opening electronic equipment for repair. We have a lot of things out there in the world that either have known or suspected vulnerabilities to RF fields or electrostatic discharge. A TED system provides both of these conditions, an RF electrostatic discharge nature and its output (the number of pulses per second) can be adjusted for maximum disruptive effect. Its peak power output can be made much higher than those fields ordinarily found in everyday systems like cellular radios, radar systems, TV and FM stations, and simple ESD effects.
It clearly appears, based on testing that has been done as well the information presented at unclassified technical papers and conferences, that the TED would make a good terrorist RF weapon and that, with the proliferation of high technology infrastructure systems that are integral to everyday life in our country, we would be very vulnerable to such systems. It is also clear, because of the extreme cost of repairing all of the vulnerable systems, that until this vulnerability was shown, no one would have much concern or interest in it.
Considerable discussion and innuendo has recently been made concerning the possibility of building a TED source using “back-yard” methods, a Radio Shack Terrorist RF weapon. Such a system would have to have sufficient power to, with some degree of probability, cause detrimental effects to common infrastructure items such as those found in; financial institutions (banks, ATMs, and stores), medical facilities, airport facilities, general transportation items (auto engine controls, ABS, air-bags, etc.), utility facilities (telephone exchanges, power grid controllers), and other infrastructure entities. This type of source is imagined to be what a criminal, terrorist, or prankster could develop or build in a reasonable time, with reasonable tools and materials and with open literature or reference material.
The accomplishment of such an effort would require that either some sort of estimate of what power level would be necessary to accomplish a given objective or to simply make all of the power that could be made, and then go out and test the weapon against various target items under either controlled conditions or actual attempts against a family of established targets. Since it is an extremely complex process to even come close to some predicted level of vulnerability, using even the most advanced modeling and analysis techniques, the obvious approach would be to “go for the maximum power and then test” approach. Normal testing would be done under strict safety and security conditions but a terrorist would not have such limitations. Normal tests would be conducted at a test location but a terrorist would simply drive around the block or building until something happened.
An important criteria for an RF terrorist would be that any of the parts and materials used would have to be those that could be easily found in any city and were not traceable by conventional counter-terrorist agencies such as the local police, insurance investigators, and FBI.
It is clear that there are four basic configurations that could be used, one the size of a briefcase that could be placed very close to a target system (like a computer at a desk or counter), one that could be mounted into a small van and disguised to appear as ordinary, one that was dedicated to be set up at a remote target location and used for some purpose where appearance was not of any concern, and finally, a system that could be located in one’s back yard such that it could be aimed at over flying aircraft.
The systems would likely have much in common and the builder would employ a learning curve to go to the next more advanced system. The results or vulnerabilities found with any system could be factored into the use of the next system. This learn-as-you-go process would be a natural approach for such an amateur effort.
The means of manufacturing the system includes parts and tools that one could purchase at a hardware store or those found in an average garage shop. Tools such as a small lathe with an integral milling machine (available via mail-order at a cost about $2,000), drill press, and general garage tools should be all that were needed, nothing exotic.
The effort would likely be started with the small briefcase-sized unit. It could use automobile ignition parts and a camcorder ni-cad battery for the power supply. It might use a small dish antenna bought mail-order and some parts picked up at a surplus store. The total cost of such a unit would be about $300 and it could be built in about one week. The development behind its design could be accomplished by doing some basic experiments with stun-guns or other high voltage components found in surplus stores, automotive shops, and parts from a “well equipped electronics junk box”. The unit could easily be tested at close range to the type of computers and hardware found in any home office and if it caused some ill effect, then the terrorist would have proven the effectiveness of the system. Success with step 1.
The next step would be to refine the technology and increase the voltage and the repetition frequency. An advanced design might use a 6-foot TV dish antenna that could be bought mail-order (for $200) and it might use a more advanced spark-gap unit than was used in the earlier model. Such learn-as-you-go is a natural process in the design of spark-gaps.
Such a unit using a larger antenna (a mail-order 12-foot TV dish), when finished would look like a simple TV dish system and it (or many like it) could be mounted such that it could easily be pointed at over-flying aircraft.
In support of the information presented in this testimony and taking advantage of the winter’s need to work indoors, a unit that uses oil spark-gaps was designed, built, and tested. The materials for it were mail-ordered at a cost of about $500 and about one week was needed to fabricate the mechanical hardware. It use two ignition coils and a battery for power, an automobile fuel pump and filter for the oil circulation, and commonly available transformer oil. An additional week was required to work out all of the electrical wiring, the oil lines, and the general finishing details. This unit was ready for testing in two weeks after starting the effort.
The signal radiated from the unit was measured and found to be a very significant power level that can be compared against available vulnerability and susceptibility levels of military equipment. When the weather permits, this unit will be tested against a set of infrastructure targets at an official test range. From the measurements and known signal levels, this unit is expected to be consistently deadly to many types of infrastructure items at ranges suitable for terrorist usage.
This quickly-developed low-cost system could easily be placed in a small van and used in a parking lot or directed at buildings that the van was driven past. It is highly likely that this type of device would be a very effective terrorist system and the findings of its design could be factored into another either a larger, higher powered device, or a more advanced design each with significantly greater effectiveness.
The net result of all of this design, experimentation, fabrication and measurement proves that such a weapon system could be made by anyone with an engineering degree or even a bright technician with good hardware experience. The technical information required can be found in open sources, if not just from good common engineering sense. The materials needed are nothing special and if the effort is made, advanced concepts can be made using everyday hardware such as automotive ignition systems. The testing to date has been very limited but the results of this testing have provided considerable insight to just what is vulnerable in infrastructure systems. This insight and work leads to a firm opinion that a terrorist would have little trouble developing such technology and that he would have a high probability of success in the use as an RF weapon against our infrastructure elements found in any city or near facilities around the country.
This work has been done within the proper security guidelines since:
The models made in my home laboratory/workshop used off-the-shelf materials and open-source references.
The laboratory tests of this hardware were made in a controlled environment with the proper security in place.
The results of these tests, the data capabilities, and the target set identities are kept in a facility cleared for classified storage.
The development of any of this hardware is reported on a regular basis to those with whom I relate at a classified level to assure that they are informed of the work and are able to apply this to their interests and efforts if necessary. Any of this hardware can be used by them for any determination of utility to military interests.
Work in this area will be continued and an aggressive test and evaluation of these “back yard” techniques and methods will be accomplished. This process will be done in cooperation, and if requested, under the direction of agencies with an interest in this non-military weapon related process. The author of this report will, if requested, provide to the Committee further details at a classified level in the proper security environment.
Statement of Dr. Ira W. Merritt Chief, Concepts Identification and Applications Analysis Division Advanced Technology Directorate, Missile Defense and Space Technology Center U. S. Army Space and Missile Defense Command before the Joint Economic Committee United States Congress Wednesday, February 25, 1998
“Proliferation and Significance of Radio Frequency Weapons Technology”
Thank you for your invitation and for this opportunity to offer testimony to the Joint Economic Committee regarding the proliferation of radio frequency (RF) weapons technology and its significance to the operability of our high value assets. I am employed by the U.S. Army Space and Missile Defense Command, but some of the opinions and conclusions expressed are based upon my own past experiences and observations and are not necessarily those of the Army.
I am from the Advanced Technology Directorate (ATD) of the Missile Defense and Space Technology Center, U.S. Army Space and Missile Defense Command. One of our principal responsibilities is to develop innovative and advanced technologies for application to Army projects, joint missile defense projects and other programs of national importance. In particular, ATD evaluates the capabilities of technologies, including radio frequency weapon technologies, to establish their significance to the operability of our sophisticated electronics. Our interest in RF weapon technologies has increased in the last several years as a result of:
Rapid advances in RF sources and antennas
Increased interest by other countries, and groups, in RF weapons and RF mitigation
Increased susceptibility to microwaves of miniature solid state electronics
Insights from our travel to Russia and from ongoing technical exchanges with Former Soviet Union scientists and co-workers in United Kingdom, Sweden, and Australia.
Our work with Russian scientists has been particularly useful in confirming that their approaches to technical problems are often very different from ours. Over the past several years we have visited laboratories developing directed energy weapon technologies, pulsed power systems, high power microwave technologies, high power lasers, and space-based neutral particle beams. In 1992, we visited the Moscow Radio Technical Institute, which was developing high-power microwave (HPM) sources and which had a large test facility for performing susceptibility and effects measurements. In 1994, we visited the Kharkov Physico-Technical Institute in Ukraine, where they were developing: high power microwave sources, such as the magnetically insulated linear oscillator (MILO); neutral particle beam sources; prime power systems; and where they were also performing susceptibility and effects tests. The MILO was invented in the U.S., but we discontinued work on it in the late 1980s. The Soviet Union (SU) picked up the technology and successfully continued its development. Russia also exploited the magnetocumulative generator (MCG) as an explosively driven power supply. The MCG was developed by Dr. Andrei Sakharov in the SU and the Russians have used MCG power supplies extensively to drive ultra wideband (UWB) and HPM sources, lasers, and railguns. In 1995 we visited: the Kurchatov Institute to discuss laser and high current problems, the All-Russian Electrotechnical Institute to discuss high voltage technology, Ioffe Physico-Technical Institute in St. Petersburg to discuss ultra fast switches, and the Institute of Problems of Electrophysics, also in St. Petersburg, to discuss pulse power and plasma technologies. My comments in the rest of this testimony are based upon the results of visits to Russian laboratories, visits to other countries, continued scientific contacts, research reports from contracts, some test results and open source literature.
History: It has long been a concern in the scientific community that Soviet scientists led the world in development of RF weapon technologies. This concern was heightened in 1994 when Gen. Loborev, Director of the Central Institute of Physics and Technology in Moscow, distributed a landmark paper at the EUROEM Conference in Bordeaux, France. In this paper Dr. A. B. Prishchepenko, the Russian inventor of a family of compact explosive driven RF munitions, described how RF munitions might be used against a variety of targets including land mines, sea skimming missiles, and communications systems1, 2, 3. He further popularized these munitions with articles in Russian naval journals and in other professional journals and magazines4.
The Soviet Union had a large and diverse RF weapons program and remnants of this work continue today within FSU countries. The scope and results of the Soviet program are poorly understood, but ATD personnel have been at the forefront of efforts to gather information and to understand it5 and its accomplishments through Windows on Science and contracts for R&D effort. Our principal objective is to understand requirements and to identify technologies applicable for RF mitigation. Nevertheless, large uncertainties still exist concerning the status of RF weapon development and associated efforts to mitigate their effects on electronics. In spite of these uncertainties, it is clear that many nations continue to aggressively pursue the development of RF weapons and techniques to mitigate their effects6.
Proliferation: Worldwide interest in RF weapons has increased dramatically in the last several years. The collapse of the Soviet Union is probably the most significant factor contributing to this increase in attention and concern about proliferation. A recent study of open source literature dealing with RF weapons6 clearly documented the worldwide interest in RF weapon technologies and my testimony is offered in the context of these conclusions. A few of the report’s key judgments were that:
“…construction of effective explosively-driven Flux Compression Generator devices is entirely feasible for established military powers such as Russia, China, France, Germany, et cetera,…”
“There is no confirmed evidence of employment of such a device to date … available in open sources”.
“Modern Metal Oxide Semiconductor technology, on which most of our critical national infrastructures depend, unless deliberately protected or “hardened”, is extremely vulnerable to even low–power electromagnetic pulses…”
“…it is well understood that the US is disproportionately more vulnerable to RF attack than are less developed nations.”
Specific examples of interest in RF weapons and the proliferation of this technology follow. The French Gramat Research Center has dedicated significant assets to study the effects of electromagnetic energy on electronics and in 1989 Thompson CSF published brochures in which they stated that they were developing RF weapons7. A 21 January, 1998 newspaper article in the Swedish newspaper SVESNSKA DAGBLADET8 reported that the Swedish National Defense Research Institute purchased a Russian “suitcase bomb” that uses high power microwaves to “knock out” computers and destroy all electronics within the radius of its “detonation”. The article also reported that this device is being sold commercially and that it has been sold to the Australian military. The price was reported to be several hundred thousand Kroner, or about $100,000. Mr. Carlo Kopp, an Australian professor, who claims to have had a relationship with their military, has his own web site (http://www.cs.monash.edu.au/~carlo) and has provided detailed papers on the alleged effects of RF weapons and sketches of design concepts9. A simple search on the Internet recently identified 95 websites that referenced Mr. Kopp’s work. These included 16 sites in the U.S. and 18 sites in other countries, not including Australia. The Internet is becoming a significant factor in enhancing the interest in RF weapons.
Waveforms and Susceptibility: State of the art semiconductors are becoming more vulnerable to the effects of radio frequency energy as semiconductor features become smaller and smaller10, 11, 12. Commercial microelectronics make heavy use of metal oxide semiconductor devices which fail when subjected to voltages that exceed the dielectric strength of the component or when the device melts as a result of heating from currents induced by the RF pulse.
High-power microwave and ultra wideband signals differ in their pulse length and frequency content (Figure 1). HPM sources produce short, very high power, narrowband pulses, often billions of watts (gigawatts) in billionths of a second (nanoseconds). If HPM waveforms are in-band, they can efficiently couple energy into the target and energy is available to disrupt or to cause damage to sensitive “front door” components that are connected to antennas. However if the HPM frequency is not in-band, the energy must enter through a “back door” and coupling to the target is generally poor. In this case, much less energy enters the target to disrupt or to cause damage. UWB sources generate a much wider band of frequencies than do HPM sources, and thus ensure that some energy is at a frequency to efficiently couple to the target. However, since the energy is spread across a wider band, the power spectral density is lower and the amount of energy available in a waveband is also much lower. As a result, an UWB device is more likely to disrupt than to destroy a target, except at very close range. Many UWB sources can be repetitively pulsed and therefore can continue to disrupt the target as long as the source is functioning and within effective range. Many systems tend to be susceptible to disruption or damage at specific, sometimes unpredictable, frequencies. As a result, UWB weapons are well suited to exploit these susceptibilities, since they produce significant energy over a wide range of frequencies. This area has been aggressively researched by the Soviet Union, Russia, and others.
Extensive work has been conducted to understand the effects of high-altitude nuclear EMP (HEMP) on systems and components, but these data are mostly for frequencies less than 1 GHz and for pulse widths in the range from 50 nsec to 1usec. The shorter pulses characteristic of HPM and UWB waveforms are significant because current methods for protecting electronics from HEMP, and other anticipated sources of disruption, will not be effective against pulses from RF weapons. High-altitude nuclear EMP does not have significant energy above a few tens of megahertz, whereas HPM spectra are typically in the few gigahertz to tens of gigahertz range and UWB spectra may contain energy in the frequency range from hundreds of megahertz to a few gigahertz. There is extensive information on the effects of lightning and nuclear EMP on electronic devices, but these pulses are significantly longer than the pulses from HPM and UWB sources. Since HPM and UWB pulses tend to be shorter than the response times of most limiters, their RF energy can pass largely unattenuated into the target and cause upset or damage before the limiter can turn on. Tests over the last 10 years have produced data on component responses to pulse widths in the range from 1 to 50 nsec. However little information is available that describes electronic responses for incident pulses having sub-nanosecond pulsewidths. Testing is needed to establish effects of the following general waveforms: very short (nanosecond and sub-nanosecond) single pulses, multiple closely-spaced very-short pulses, and long (millisecond) pulses.
Much of the existing effects data is from direct drive tests. Such tests produce the most repeatable indication of whether or not the pulse in question will upset or damage the device being tested. However these tests do not help clarify the issue of whether or not the RF waveform in question will actually couple through the walls, openings, filters, cables, and wires that separate components at risk from the external environment. This uncertainty creates a situation in which even the best analysis must be based upon significant assumptions. As a result, our commercial and military systems may be much more, or much less, susceptible to upset or damage than we now assume. As a result, characterization of representative components and circuits and the effects of physical configurations are badly needed for very short pulses.
A 1996 paper by Bludov, et al12 from the Kharkov Physico-Technical Institute, Ukraine described HPM and UWB testing on electronic components and biological systems. The paper identified three levels of damage: temporary upset, permanent upset, and burnout. It appears that Ukraine has a systematic program to characterize the effects of HPM and UWB waveforms on electronic components.
Example Weapon Related Technologies
RF weapon-related sources can be classified in several ways, including: HPM or UWB, pulsed or continuous, single shot or repetitively pulsed, and very short pulse (nanosecond) or long pulse (microsecond to millisecond). In addition, the electrical or explosive power source has a significant effect on the output characteristics of the device. For example, the explosive driven munitions described by Mr. Carlo Kopp and the RF munitions described by Dr. Prishchepenko are single shot devices that convert the chemical energy of high explosives first into magnetic energy, then into electrical energy and finally into microwave energy. This multi-step conversion of energy is inherently inefficient, but explosives are very compact sources of energy, modern electronics are not very robust to external sources of energy, and the intent is to place the source/weapon as close to the target as possible. Electrically driven devices have fewer energy conversion steps, but typically they are larger and produce less power per pulse.
Electrically Driven Devices: The electrically driven (non-explosive) devices require an external power supply and energy storage system, which often leads to larger and less self-contained systems than can be produced by explosive-driven approaches. However, two recent technologies that minimize this limitation are the solid state pulsers developed at Ioffe Physico-Technical Institute in St. Petersburg and the RADAN system. These devices are quite compact and can be powered by small hand-carried energy sources.
Pulsers developed at Ioffe Physico-Technical Institute are based upon very fast (nanosecond and picosecond) solid state “on” and “off” switches developed by Prof. Igor Grekhov and Dr. Alexi Kardo-Syssoev. These switches have recently been used to generate 10 nanosecond, 10 KHz pulses for a prototype ground penetrating sensor that is now being used commercially in St. Petersburg (Figure 2). This 10 kg portable sensor is said to be used routinely to image to depths of 200 meters with an accuracy of 1% of the depth and it is claimed to be able to image down to 1000 meters with slightly lower resolution13. Jammers based upon these switches can be made small enough to fit into a briefcase. A recent version is said to weigh 6.5 kg and to deliver fields of 30 kV per meter at 5 meters. This is comparable to high-altitude EMP (HEMP) field strength. An optimized version is said to deliver 100 kV per meter at 5 meters14, 15 and the pulse width and repetition rate can be tuned to have the maximum effect on the intended target.
RADAN16 (Figure 3) is a compact high-current electron accelerator that is a little smaller than an attaché case and weighs about 8 kg with its rechargeable 12 volt battery power supply, but not including its antenna. RADAN can be used to stimulate several outputs including lasers, x-rays, wide band RF and high power microwaves that allow RADAN to be used as a jammer. RADAN output parameters are: total output power > 5 MW; repetition rate up to 1 kilohertz; pulse width about 2 nanoseconds; and output pulse bandwidth from 1 MHz to 5 GHz. A directional antenna has been developed and the developer has proposed that RADAN could be used to stop car engines and to destroy the electronic arming and firing circuits of bombs. Limited testing of RADAN has been conducted in the U.S. and it was found to affect calculators and electronic watches.
The Russian built NAGIRA radar produces short powerful pulses with the following characteristics17: 10 GHz fixed frequency, 5 nanosecond pulse length, 300 MW peak power, 2 Joules per pulse, 150 Hz pulse repetition rate. NAGIRA was purchased by the UK Ministry of Defence and was delivered to Defence Research and Evaluation Agency (DERA) Frazer, near Portsmouth, in November 1995. Indications are that the UK will use NAGIRA to investigate detection of fast moving targets in sea clutter, to study electromagnetic–pulse penetration into equipment and to measure the effectiveness of front-end protection devices. During initial field trials near Nizhny Novgorod, Russia (Figure 4), NAGIRA was able to track a helicopter at more than 150 km range and at altitudes as low as 50 meters. We understand that because of electromagnetic interference (EMI) concerns, Russian helicopters were not allowed to operate within several miles of the radar when it was operating at full power.
Explosively Driven Devices: Compact explosive-driven radio frequency munitions (Figure 5) being developed by Russia have recently received a great deal of attention. These munitions are claimed to range in size from a hand grenade to a 155-mm artillery shell18 and the output may be either a HPM or an UWB pulse. Since these warheads are part of a projectile, they are intended to detonate very near their target, so fratricide is not a problem as it would be with HEMP.
In June 1997, a U.S. measurements team led by the Advanced Technology Directorate participated in a joint series of measurements on radio frequency munitions (RFM) at a site near Nalchik, Russia5. The purpose of these tests was to verify Russian claims about the output of Dr. Prishchepenko’s compact explosively-driven RFM. The test results left Russian claims unconfirmed, since most U.S. measurement equipment was not allowed by Russian authorities to reach the test site and since Dr. Prishchepenko’s team claimed that the RFM that were tested radiated in a band that could not be measured with equipment at the site.
ATD engineers continue to evaluate RF weapon technologies, to work closely with other countries, and to identify technologies that can be adopted for military applications and commercialization. We maintain relationships with other scientists through direct personal contact at conferences and site visits, through small research contracts, in collaboration with the U.S. Department of State on International Science and Technology Center (ISTC) and Science and Technology Center of the Ukraine (STCU) projects, and through the U.S. Air Force’s Windows on Science Program. ATD has been extremely effective in identifying and executing joint projects, such as the joint radio frequency munitions test in Russia and briefings on the solid state pulsers developed at the Ioffe Institute in St. Petersburg. We are now working to bring the underground imaging sensor and its developers to the U.S. to test its ability to detect land mines. Solid state switches developed by the Ioffe Institute are now imported by a U.S. company that produces water purification equipment using Russian pulse power hardware. ATD has cooperated in hosting many scientists under the Windows on Science Program, including a scientist from Loughborough University in England, the only university that designs, tests, produces and markets inexpensive MCGs.
Many source and antenna technologies can be used to produce devices with very different output characteristics. For example, Russia reports that its cylindrical shock wave source generates a single gigawatt pulse about a nanosecond long. However, susceptibility tests in the FSU and U.S. suggest that irradiating a target with a train of nanosecond pulses is more damaging than a single pulse, since multiple pulses lower the damage threshold of the target12. As a result, Russian emphasis has been on devices that produce a train of pulses. Some designs are said to generate 50 to 100 pulses, each about a nanosecond long, in a burst of pulses about 10 microseconds long18.
The implications of this summary are that there is an increasing variety of equipment capable of generating very short RF pulses that are capable of disrupting sophisticated electronics. These pulses are not addressed by current design standards and will challenge existing front-end RF protection and other forms of EMI protection. New capabilities are needed to reject high-power, very-fast RF pulses and to minimize their effects on systems.
We believe that common EMI and EMP mitigation techniques will not provide adequate protection against nanosecond and sub-nanosecond pulses from future radio frequency weapons, since active mitigation device response times are typically several nanoseconds to microseconds. Faster solid-state devices do not now have the high power capability needed to protect systems from RFW pulses.
RF RISK MANAGEMENT
Several fundamental questions must be answered before we can adequately understand the potential risk that radio frequency weapons pose to our military forces and civilian infrastructure. These questions are:
“What are the current and expected capabilities of RF weapon technologies?” “What are the effects of these weapons on potential targets?” and “What is the likelihood that our systems will be exposed to RF weapons as a result of terrorism, conventional conflict, etc.?”
As I have stated, Advanced Technology Directorate has initiated high payoff research and development efforts to understand RF weapons technologies and we have also begun to develop broadly applicable RF mitigation techniques that can ensure the operability of our high-value assets in the presence of stressing electronic warfare environments. Our emphasis is on development of near-term, low-cost capabilities that are applicable to a broad range of military and commercial-off-the-shelf (COTS) electronics and that are relatively insensitive to the details of RF weapon output. We are achieving success in this effort and believe that superior results can be obtained by selectively involving a relatively small number of highly innovative and skilled researchers and that this can be done without a great commitment of funds. For example, one of our recent $100,000 research efforts provided test results that demonstrated the ability of a low-temperature sinterable liquid to reduce external RF fields by many orders of magnitude over a frequency range from a few megahertz to a few gigahertz. This low-cost material has broad military and commercial applications. It will greatly enhance our ability to use COTS electronics on the digital battlefield and to protect key elements of the national infrastructure.
In my opinion, a more comprehensive risk mitigation effort should include the following tasks:
Characterize expected electromagnetic environments by analyzing and understanding rapidly advancing RF source and antenna technologies. A variety of RF sources have been identified that could be used in RF weapons and that produce environments that can challenge the operability of our systems. We should evaluate these technologies, assess their potential for weaponization, and provide information to guide hardening measures required to mitigate their effects. The results of this task should be:
credible information on the output of electrically-driven and explosively-driven RF sources;
much better understanding of the capability of the rest of the world to threaten the performance of our sophisticated electronic systems,
much stronger technical basis on which to develop broadly effective and low-cost RF countermeasures.
Conduct tests to determine the effects of short pulse RF waveforms on representative electronic components, subsystems and systems. This task should establish the effects of anticipated radio frequency weapon waveforms on representative circuits to provide a basis for development of mitigation techniques for COTS and military electronics. It should test representative electronic circuits to RF weapon-like waveforms in a laboratory environment to better predict the coupling of RF energy into targets and to measure the effects on targets. The targets characterized should consist of representative classes of COTS and military electronics, i.e. commercial Global Positioning System (GPS) receivers, radios, computers, satellite communication systems, components from tactical operations centers (TOCs), etc. This effort should leverage ongoing Defense Special Weapons Agency (DSWA) EMP and HPM mitigation activities, which address a part of this problem, and should jointly select synergistic items for testing. This will permit unique insights into the robustness of representative electronics to all types of RF disturbances. The target electronics should be tested in anechoic chambers available at several service facilities and should use appropriate RF sources to ensure repeatable waveforms at the appropriate power levels and with appropriate frequency content. The target electronics should be instrumented so that both the effects of the radiation and the method of coupling can be determined. These results will permit quantification of the specific performance/capability needed for each mitigation technique.
Use the results of effects tests to develop front-end limiters and electromagnetic interference (EMI) shields. This task should develop and quantify mitigation capabilities and implementation guidelines for low-cost, low insertion loss, miniature plasma limiters and low-cost, very light-weight films, filters, and software algorithms to reduce internal and external electromagnetic interference produced by either local/friendly emissions or high power hostile emissions. Since RF warfare and EMI spectra cover such a broad range of frequencies and power levels, several mitigation techniques will be required.
Traditional methods of EMI isolation often use metal enclosures to prevent unwanted radiation from entering the circuit. These shields provides effective protection, but they add weight and are not applicable to some newer systems that may use COTS with lightweight, nonmetallic enclosures that provide little or no EMI protection. Low-cost, light-weight RF isolation techniques are needed that can be cheaply applied to COTS and military equipment to significantly increase their ability to continuously operate on the electronic battlefield.
Analyses are now being performed on miniature plasma limiter front-end protection devices that are compatible with solid state manufacturing processes. Analysis will confirm the feasibility of a low-loss miniature plasma limiter and its essential parameters such as threshold electric fields, gas breakdown and recombination times. This device is intended to be installed in front of sensitive antenna and receiver elements to protect them from damage or disruption by incident high power RF signals.
We cannot now precisely quantify the risk presented by radio frequency weapons, but we know that the risk is growing. I believe that we can respond to this risk by developing near-term, low-cost, broadly-applicable mitigation techniques. These techniques can greatly reduce our susceptibility to radio frequency weapon environments and thereby reduce the risk to our technological superiority that is essential to our military and economic preeminence.
I again thank the Committee for the opportunity to appear and to comment on the proliferation of radio frequency weapons and their significance to our critical infrastructures.
Statement of Dr. R. Alan Kehs Army Research Lab before the Joint Economic Committee United States Congress Wednesday, February 25, 1998
“The Radio Frequency Weapons Threat and Proliferation of Radio Frequency Weapons”
Mr. Chairman and Members of the Committee, I thank you for the opportunity to help shed some light on the widely ignored topics that you have chosen for these hearings. I have spent most of the last twenty years working on various radio frequency weapons technologies and I am currently serving as chair of the tri-service High Power Microwave (HPM) technology coordination panel.
In general, our security classification guide prevents us from discussing anything but the most generic concepts and severely limits the depth of discussion if we remain at the unclassified, full public release level. It is not deemed to be in our best interests to provide details on our programs or roadmaps to weapons development that might assist rogue states, terrorists and others who would eventually wish to use these weapons against us.
However, one does not need to rely on classified reports in order to appreciate the potential impact of radio frequency weapons (RFW) or as they are frequently called, HPM weapons. Everyone in this room has undoubtedly experienced Electromagnetic Interference (EMI) to some piece of household electronics. Some common examples are the effects of lightning strikes or automotive ignition noise on radio transmission, placing two computers too close to one another on a bench, driving under power lines while trying to listen to the radio, and so forth.
A step up from these minor inconveniences is the warning that we hear each time we take off or land in an airplane. We all wonder “can a Gameboy or calculator really cause serious problems to the airplane electronics?” The answer, of course, is that a Gameboy, calculator or cellular telephone is not usually sufficient to disrupt airplane electronics, but it can happen. As a result, we adopt a policy of “better safe than sorry” and shut down electronics during the more critical take off and landing segments of commercial air flights. We have now asked the question “How much power does it take to create problems?” Realistically, these questions cannot be answered at the unclassified, full public release level. More subtly, the question becomes “At what point do common civilian electronic devices become weapons?”
Let us shift now from the low power levels (microwatts and milliwatts) of gameboys and cellular telephones to the very high power levels (megawatts) of commercially available radar systems, TV transmitters, and particle accelerator tubes. This is the platform from which HPM weapons programs would be based.
Conceptually, an HPM weapon looks like a radio transmitter. There is a power source, a tube to generate RF energy, and an antenna to radiate the energy appropriately. The key technologies and final products have been under development for the greater part of this century and are readily available on a broad range of markets. In the Army, we make extensive use of surplus radar and radio equipment.
Military electronics generally contain some electromagnetic shielding and protection devices — even if they are not specifically designed to withstand an HPM attack. Commercial designers are generally concerned only with FCC limits on EMI and no one knows how susceptible commercial electronic systems might be to a concerted electronic attack. These commercial systems include our banking and telecommunications systems as well as oil and gas distribution and transportation systems, among others. Although these systems are designed to withstand the loss of a critical node, a concerted attack would cause unknown effects.
HPM technologies appear on the critical technologies list. However, the required special approvals have not slowed the transfer of increasingly powerful and sophisticated HPM technologies to overseas buyers.
The intelligence community will have to address the threat issues but I believe that they will find existing technology is more than sufficient to support several potential applications and threat scenarios.
The growing US dependence on sophisticated electronics for warfighting and domestic infrastructure makes us potentially vulnerable to electronic attack. By its nature, the Defense Department is compelled to confront such threats, however, the full range of our technological society is also at risk and much less aware of potential threats. I pray that congress will help all of its agencies and departments to appreciate the increasing seriousness of the questions raised here today and take appropriate actions to evaluate threats and construct appropriate defensive measures.
Statement by Lieutenant General Robert L. Schweitzer U.S. Army (Retired) before the Joint Economic Committee United States Congress June 17, 1997
Radio Frequency Weapons and the Infrastructure
I have been asked to talk to the overall subject of your hearing from a somewhat different perspective. Initially, it was to be from the one of what technology transfer means to a soldier. That part would have been fairly simple to address. Field soldiers are too busy to think much, if at all, about such transfers. That is, until they run across them on a battlefield where U.S. technology or materiel is being used against them. That happened in World War II when the residue of simpler technologies in the form of scrap metal was employed against us in the Pacific. It happened in Vietnam when some of our weaponry was obtained by our adversary. It happened again in Desert Storm when we ran across containers of U.S. materiel in the hands of Saddam Hussein’s soldiers, materiel which had been channeled through Jordan. Then the fleeting reaction is one of anger and “why?” But soldiers–placed as they are since the time of the Roman legions in the sand, mud, rain and snow to fight decisive battles–are really too busy to brood much about such things. They are, however, grateful when Congress acts ahead of time to bar technology transfers, not only the simple ones of which I speak but the more serious, albeit subtle ones, which can affect the outcome of battles and wars.
Today there is a new class of radically new and important radio frequency weapons (RFW) which merits your attention as it emerges. And in this case, the horse is out of the barn. Transfers have occurred and are occurring. Equally true, however, is the fact that there are things that can be done to protect our nation, which is the underlying objective of today’s hearing. Certainly one of these things is to recognize that export control documents, particularly the Militarily Critical Technologies List, needs to be reviewed to determine if radio frequency technologies should be considered in the same careful way we do nuclear technologies. I respectfully suggest that this is the case; stronger controls are needed. One example is Reltron tubes which went to a friendly nation, one who sells products widely–sometimes to nations who do not like us. These tubes, which can be small or large, generate intense radio frequency pulses and can be used as RF weapons.
Before we go further I wish to state clearly for you and for the public record that I do not speak for the Department of Defense, for any military service or any government agency. I come before you only as one who has researched this area for the past year and is writing a White Paper on the subject, one which will be offered to DoD for their use and disposition.
Some of you may know about radio frequency weapons, where they came from, what they can do and what the implications are.
Although there are a number of groups and individuals concerned with this subject, I have found that somewhat paradoxically the word has not really gotten out in Washington itself. Despite the existence of a Presidential commission, an Infrastructure Protection Task Force, a Critical Infrastructure Working Group, an Information Warfare School at the National Defense University, and other working groups, to include divisions on the Joint Staff in the Pentagon, as well as a few very dedicated and brilliant mid-level people in DoD, a general understanding is lacking. This is true not only of RFW, but of their immediate threat to our DoD and national infrastructure. Indeed the term “infrastructure” is so amorphous that it lacks impact if not meaning. One of our first tasks will be to define what is the military and economic infrastructure and what in it is susceptible and vulnerable to RF weapons.
Some 90 to 100 references in 26 pages of the 70-page Quadrennial Defense Review speak to this new threat, but only to a discerning reader; the name for the class is not used. On the other hand, a recent search of the Internet found 2,400 to 2,800 references, while yet another, more thorough search found many tens of thousands of documents where the key words “radio frequency weapons” appear. Some very good people have written books and articles on the subject, the first revealing article known to me appeared in 1987 in the Atlantic Monthly, but for many reasons the knowledge is diffused. In the public sector the subject has yet to draw any real attention or concerted action.
To help set the stage, recognize with experts like a former NSA Director that we are the most vulnerable nation on earth to electronic warfare. This thought is echoed by a former CIA Deputy Director, and a former Deputy Attorney General who forecast that we will have an electronic Pearl Harbor if we do not accept a wake up call. Our vulnerability arises from the fact that we are the most advanced nation electronically and the greatest user of electricity in the world.
On the military side, as in the civilian sector, our current superiority is based on microelectronics. To prevail against us, an adversary must cripple, destroy or deny access to those same microelectronics. Can an adversary do so? Very likely, as this hearing will bring out. All of our military doctrine assumes extensive use of sophisticated electronics and communication systems to ensure information dominance and overwhelming battlefield success. As is the case with our civilian infrastructure and economy, our current dependence is large and will continue to grow. Because our battlefield success and the well being of our civilian economy–with which this committee is especially charged–-are so dependent upon the effectiveness of our microelectronic-based systems, we should fully understand any technology that might be used to defeat our systems. This is particularly true of the newly emerging threat of radio frequency weapons. And even more importantly, we must develop countermeasures before such weapons are used against us.
Before going further, let me explain what these weapons are, where the Russian work has gone since 1949 and the applications of these weapons. If you are interested–as I believe you will be–you may wish to bring before you successive panels of our own leading scientists and experts. I have talked to many of them, heard them make presentations at conferences, and read their articles and books. I will be pleased to provide your staff with names of those who could provide this or other committees with a better understanding. I am also willing to assist in any way that might be helpful.
First of all, an RF weapon is one that uses intense pulses of RF energy to destroy (“burnout”) or degrade (“upset”) the electronics in a target. These weapons can be employed on a narrow beam over a long distance to a point target. They are also able to cover broad targets. They are categorized as high power microwave (HPM) weapons and ultra wide band (UWB) weapons.
The phrase non-nuclear electromagnetic pulse is sometimes used, because these weapons, which are indeed non-nuclear, project the same type of pulse we first learned of in conjunction with nuclear weapons. As a practical matter, a piece of electronic gear on the ground, in a vehicle, ship or plane does not really care whether it is hit by a nuclear magnetic pulse or a non-nuclear one. The effect is the same. It burns out the electronics. The same is true of the computers in this Senate office building, in industry, or on Wall Street.
There is another way these weapons can be delivered to a target, military or civilian. Here the term RF munitions, or RFM is used. Yet these too are properly called RF weapons. These small munitions contain high explosives that produce radio frequency energy as their primary kill mechanism. In the hands of the skilled Russian scientists, these munitions come as hand grenades, mortar rounds, or large artillery shells or missiles. Generally, they produce a short but very intense pulse. While not yet fully understood and with some uncertainties argued as to their capabilities, many scientists are convinced the weapons actually exist. Without making any claims as to what they can do, I offer the following list from open source FSU literature of some nine smaller RF munitions or weapons:
Magnetohydrodynamic Generator Frequency (MHDGF)
Explosive Magnetic Generator of Frequency (EMGF)
Implosive Magnetic Generator of Frequency (IMGF)
Cylindrical Shock Wave Source (CSWS)
Spherical Shock Wave Source (SSWS)
Ferromagnetic Generator of Frequency (FMGF)
Superconductive Former of Magnetic Field Shock Wave (SFMFSW)
Piezoelectric Generator of Frequency (PEGF)
Superconducting Ring Burst Generator (SCRBG)
Some of these weapons are said by the Russians to be now available as a hand grenade, a briefcase-like object, a mortar or artillery round.
Applications or potential targets (like those of the larger High Power Microwave weapons) would include all military computers, circuit boards, or chips, of any description, and include the following key components of our military and national infrastructure. They would have equal impact on civilian targets with the advantage less power would be required. Recall that the term “infrastructure” lacks clear meaning, but would include things like:
The national telecommunications systems
The national power grid
The national transportation system, to include especially the FAA but also such simple things as our traffic lights (with consequent gridlock)
The mass media
Oil and gas control and refining
Manufacturing processing, inventory control, shipment and tracking
Civil emergency service
Finance and banking systems (to include bank’s ability to dispense cash)
This list of potentially vulnerable targets could and should be extended to include airplanes, ships, vehicles and the like. Of interest is the fact that we are doubly vulnerable because we are, and will remain, in an era of dual use of military and civilian systems. For example, 90% of our military communications now passes over public networks. If an electromagnetic pulse takes out the telephone systems, we are in deep double trouble because our military and non-military nets are virtually inseparable. It is almost equally impossible to distinguish between the U.S. national telecommunications network and the global one. What this means is that it is finally becoming possible to do what Sun Tzu wrote about 2000 years ago: to conquer an enemy without fighting. The paradigm of war may well be changing. If you can take out the civilian economic infrastructure of a nation, then that nation in addition to not being able to function internally cannot deploy its military by air or sea, or supply them with any real effectiveness–if at all.
Since 1949, the intense interest of the former Soviet Union in developing these weapons appears to have resulted from their recognition that they could not match the capability of Western electronics, and their belief that RFW have the potential to be effective against our sophisticated electronics. It is far less clear to me and to others why they are willing to transfer and proliferate the RF technologies they have developed so carefully and so well, but that they are clearly doing so. Should you wish, a future hearing by this or another committee could go into more detail.
President Yeltsin proposed to President Clinton a joint program for a “plasmoid defense” against ICBM’s. While it is unclear to many scientists what President Yeltsin meant, such a defense, if attainable, might presumably set up a shield which would ionize the atmosphere and cause missiles to fail. Official Russian journals and publications show keen interest and provide many details about these weapons. A great amount of information is flowing continuously from three former Soviet Republics on their past and current programs.
We do know that the reduction in military spending by the FSU and many Western nations is prompting the defense industries of many countries to offer advanced weaponry to foreign customers to further their own research, development and industrial capabilities. This trend is almost certain to grow over the next 10 years.
From unclassified sources, we know that Russia, Ukraine, the United Kingdom, China, Australia and France are well ahead in this field, while Germany, Sweden, South Korea, Taiwan and Israel are emerging and have ample details of the Russian work and of the proceedings of more than 20 years of international conferences. Without going into any classified matters one may reasonably infer that the pariah nations have similar interests and some certainly have the financial resources to develop or procure RF weapons.
Russian and FSU information on RFW has been moving across borders for many years. International conferences beginning in 1949 have been a principal source of technology transfer. Scientists here and abroad have long exchanged papers, letters and, with increasing frequency, telephone calls.
The first Megagaussing Conference on the generation of high power electromagnetic pulses took place in 1949 in Frascati, Italy. Russian scientists were key players in what has become a long series of presentations on the generation of electromagnetic power. Present at this and many subsequent conferences was the U.S. inventor of RF weapons, Dr. Max Fowler. His picture was placed over the center of the Moscow desk of one of his Russian counterparts who is a leader in the Russian development of the smaller version of these weapons. The latter is a key figure in the offer to sell RFW and RFM or their technologies to others.
EUROEM Conferences have been meeting (with name changes) for perhaps some 20 years at about two-year intervals. At the 1994 conference which was held in Bordeaux, France, the Russians made public many details of their long work in these weapons. Some of their papers deal with the strategy, tactics and techniques for the use of offensive RF weapons. Among nations participating were Iran and Iraq. At this conference the Russians talked about selling their technology and weapons to prospective buyers. I am told that subsequently a large number of nations have engaged them in some form of negotiations. Some of these “buyers” raise legitimate concerns.
The BEAMS conference (with name changes) has been meeting about every two years since 1975.
The EUROEM Conference met in Albuquerque in 1996; the BEAMS Conference met that same year, I believe in Prague. Attendance was open to all nations.
The next EUROEM and BEAMS conferences will meet in 1998 in the Middle East, two weeks apart in Tel Aviv and Haifa, respectively.
An International Pulse Power Conference held their tenth conference under that name in 1995, but has existed under other names for a longer period of time.
The International Particle Accelerator Conference has also met for more than 20 years.
The American Physical Society has a Plasma Physics Division which hosted (for more than 20 years) many conferences. Usually each one has several sessions on microwave generation.
And there are more. . .
Understanding the number, frequency and long standing nature of these conferences, you can perhaps better appreciate why I earlier said that the horse is out of the barn. Of interest, too, is the role of the United States in these conferences. Indisputably, the U.S. is the scientific powerhouse of the world. We have initiated and hosted a number of these conferences, funded many of them to a significant degree, and played a prominent role at all. While we gain some information, our scientists will readily acknowledge the net advantage is always to other attendees.
Put another way, from a narrow technology transfer standpoint we have thus far lost more than we gained. However, even prior to the Internet no one could control the flow of ideas, especially among scientists. They like to talk especially about what they have achieved, and how they solve theoretical and practical problems. For decades our scientists have found their Russian counterparts to be brilliant, dedicated and creative. Personal relations are important and some have developed, but they are exceptional. For the most part the Russians have been ambiguous about their great work and often are mistrustful of Americans. We should move to change that by closer and warmer contacts as well as by efforts to enter into joint ventures–with all the travails that accompany such efforts. The Russians are intensely interested in our comments and some professional appreciation by their scientific peers of their decades of work on the offensive use of RF weapons. In my humble opinion they would prefer to work with our own distinguished scientists rather than others, but will sell their technology and products to others. I believe there is a real potential for joint ventures which could serve to constrain to some degree the proliferation of these weapons, especially to those who would do us harm.
To return to the earlier point about the need for better controls of technology transfer, consider these two counterpoints which illustrate the problem:
First: Although RF weapon components are on the Critical Technologies List, there are no up to date DoD guidelines or directives on this subject. An attempt to do so was made two years ago when little was known about the subject. As a consequence, decisions within the U.S. scientific community are becoming harder and dicier to make. There is a lack of clear policy guidance and direction.
Second: The first point is illustrated by the transfer of the Reltron microwave tubes. These tubes, which generate radio frequency power, cost a great deal of money to produce and test. The U.S. is the leader in high-power tubes and their associated power systems, but the market is really thin. Our tube industry has no current buyers here in the U.S. Without major contracts from foreign countries (France, the United Kingdom, Germany and Israel, among others), our tube industry will die. We will lose contact with real customers and become dependent on foreign hardware for our systems. Ultimately we will increase the difficulties that must be overcome to develop HPM applications for any future DoD use. Almost certainly we would know less–almost nothing–about what was going on in this area. For their part the Europeans and others would not cease to procure; they would simply undertake their own development. So our high power microwave scientific community told the State Department on balance to approve the transfer, which State did. Inevitably one consequence will be to advance the work of others and ultimately the production of RF devices to be used wherever and however by whomever. Note well, however: there is no guarantee that friendly countries will not sell the devices they produce to unfriendly, even hateful people.
It would also appear that there are other proliferation and transfer concerns of interest to this committee, simply because there is so much accurate how-to-do information in the open literature and on the Internet. Several countries have RFW programs and Russia says it has sold some technologies to these countries. At least one of these countries has acknowledged such a transfer. The crux of the difficulty in controlling these transfers is best illustrated by the fact that High Power Microwave weapons look like ordinary radars. With a dish or horn antenna, and a van with a power source, an RFW would look like a new, used or renovated radar. Used ones are offered for sale today in military surplus and commercial catalogs. Other catalogs offer for sale the components to put together lower power, but also very low cost items, that once assembled could be used effectively against the infrastructure.
Users of the new weapons can be criminals, individuals or organized gangs of narco or domestic terrorists–or a determined, organized, well-funded foreign adversary, either a group or nation who hates us.
The Russians, as noted, led with this work starting in 1949 with theory. By 1961, they were doing research, as documented in their numerous unclassified scientific articles. Experiments began in the seventies and proceeded to testing as described in their publications. Many of these weapons appeared in written descriptions, some photographs and diagrams in the nineties. Strategy, doctrine, tactics and techniques are all laid out in rather clear form. Please note all of this is unclassified information.
There is a legitimate question about the intelligence aspect of all of this. Our intelligence community largely proceeds on the operating principle followed in the Cold War: A threat is not validated until it is fielded. Well and good; hard evidence is essential.
But the question may fairly be asked: does that principle serve us well in the present day? Suppose we were to take a Russian or FSU-designed weapon, fabricate it in the U.S. and test it here. If the results were to meet the standards of performance and capabilities now claimed by the Russians, would we then have a validated threat? The answer to the capabilities may be forthcoming this month because at an unclassified level one of our national labs is doing just that. Another lab has purchased cheap, off the shelf components and will test its lower power device this month. Their engineers and I believe it will indeed work against infrastructure and light military targets.
There is a great deal of other corroborating evidence which at least argues for the existence–which is still disputed in some quarters–of these weapons: one minor one is an International Institute for the Prevention of Offensive RF Weapons, located in Philadelphia. Why such an institute if there are no such things? Evidence as to the capabilities of the weapons may be found in such recent statements as China’s declared intention to purchase three RF weapons derived from the Russian technology. Another is the series of reliably reported discussions within the IRA of their intention to seek RF weapons for use against the London financial system in lieu of bombs and explosives. Consider, too, the recent statement by Sweden they have used these devices in experiments to stop cars at 100 yards, as well as their reported claim that RF weapons have been used against their financial institutions. A similar but much disputed statement has been reported by the London Times concerning British financial and banking institutions. The Los Angeles Police Department had done some successful work with vehicles in the interests of public safety and to halt fleeing suspects. Advantages of the larger high power microwave RF weapons include:
Low cost per engagement
Instantaneous engagement times
Simplified pointing and tracking
Possible to engage multiple targets
Deep magazines–simplified logistics (can “fire” or pulse as long as there is power in the generator)
Non-lethal to humans when properly adjusted
Well suited to covert operations because of lack of signature; deniability
Not able to detect attacks; silent when used without explosive devices
The RFM offer many of the same advantages, offset only by the sound of the explosion that detonates them and produces the rise in pulse energy.
Unless we choose to be, we are not without courses of action. Some of these could be explored at a future hearing. Some preliminary thoughts are offered today:
We either fully understand nor control this technology.
We have not begun to work on defenses , especially for our vulnerable infrastructure.
We need to first scope the problem, determine susceptibilities and vulnerabilities, then test.
All of this, to include any appropriate hardening of existing components, will take many years.
There are other courses of corrective action, but all will take time to acquire and apply.
The first step might well be to bring forward our real RF experts in DoD and the scientific community who know what needs to be done.
We need to go at this problem with a step-by-step sensible approach. No budget buster is proposed. Even if Congress had ready funds, a grandiose national solution is not the way to go.
We can start by scoping the problem and then by applying some of the same low-cost components that are now used in the ever expanding information technologies. Examples are surge-like protectors, plasma limiters, diodes, and metal covers. Parallel or redundant systems are another technique.
We are good at managing risks. We should no longer hesitate to reduce the impact of the threat, or to give our intelligence community the guidance to open up (some would say revise) their approach to this problem. Clearly the United States Congress will play a key role in whatever we do, or choose not to do, and our top leadership should focus on the longer term. But we should begin now in a sensible, modest way.
Three things we want to keep foremost in mind:
Do not throw a lot of money at this problem. Funds don’t exist; the best solutions will have to be devised.
Do not tell DoD or the Services to take this out of their budgets. They are over stretched now and it would be wrong to tell them to pay for protection of the civilian infrastructure.
Do not continue to do what we have been doing and ignore the problem.
When I describe the following I want you to think of not only nonconsensual experimentation but also of training exercises, because frankly nothing else makes sense. Who was I? A nobody. Why would anyone want to do this to me? Perhaps there was the angle of silencing an old MKUltra victim, perhaps the lords of England didn’t like me involved with their architectural heritage, perhaps I had witnessed too many strange deaths, perhaps I had business dealings with organized crime and didn’t even know it, perhaps someone didn’t like my nationality, or my religion, or my politics, perhaps someone wanted to sleep with me and I refused, perhaps my devotion to animal rescue made me suspicious, perhaps it was just simple depopulation and enforced communism .. I will never know the answer to this question …
When everybody in the town thought that I was crazy, a criminal or both the real fun began. I was hit by something that felt electrical, as if I was being shocked. It was very painful and caused me to overheat. My whole body felt burnt but especially my face and feet. It was during one of these events that I went to an emergency room. My face was beet red and it had been raining for weeks so it was not a sunburn. I thought that some kind of chemical was being thrown at me and I said so. They refused to give me a simple blood test to determine that. Instead they took my blood pressure and it was through the roof, in fact they wouldn’t let me leave until they brought it down. Now, I was not only on thyroid medication for life, a symptom that many targeted individuals share, but I would be taking blood pressure medication for life as well. Was someone like Big Pharma making money from engineered misery?
Another time I felt suddenly dizzy while driving my car. I pulled off into a parking lot and passed out cold. Two hours later I woke up and went to an emergency room. My blood pressure was so low that I was setting off alarms. It was gradually normalized without explanation. Someone explain this to me. I could have been killed. Another time, the whole inside of my mouth was burnt. This is on record at my doctor’s office. She was so concerned that she sent me to a specialist but there was never a real diagnosis made, as I remember. Another mystery. I have photos of me waking up with a black eye, I have photos of holes burnt into my skin and bruises that I sustained in the middle of the night. I woke up one day feeling that I had been drugged and I found a scar on my right hand between the forefinger and thumb. That’s where authorities put tracking chips.
I had an MRI brain scan at one point in hopes of explaining the loud tinnitus in one ear. I was also getting headaches in the left temple area which seemed to precipitate an attack. I was also experiencing left eye drop and I actually saw a Facebook posting about it. There was a photo circulating of politicians and celebrities and they all had left eye drop like me. Oh my God. The MRI showed abnormalities when compared with normal MRIs online but no one said anything. I also got a report saying that I had unspecified metal fragments in my brain.
I was in between roommates waiting for the next person to move in and I was alone. I was viciously attacked with directed energy of some kind, and there was a pattern to it. Attacks to my heart would occur every night when I went to bed, attacks to my hearing would occur every day when I woke up … I was burnt on the chest every morning to awaken me … It was like clockwork and very precise. This would later be called Satanic Ritual Abuse, and according to my research, it’s a component of trauma based mind control. Also, my teeth were being removed one by one. I would feel energy and pain on the side of my face and in the morning the tooth would be loose. This would happen until it fell out. Almost all of my top teeth were removed in this way. Many other victims have reported the same thing. Then I started noticing that the activists around me all had missing teeth. Oh my God. At this time I was waking up to the problem. It wasn’t just me going through this, it was hundreds and hundreds of people all across the country going through this. What on earth was going on?
I was doing a computer search one night using the term “chemical assault” and I tripped across the targeted individual community. There were thousands of videos and websites online from people who were being attacked just like me. It’s as if there was a script. Precision destruction. It just had to be military. There were conference calls with these people every night of the week and so I got on them. After a few false starts (this world is highly infiltrated) I met some truly great people. My own theories centered on Agenda 21 and the push for a global government.
I became a researcher at this time because I couldn’t believe what was happening to me and so I read about all of the conspiracy possibilities. The conspiracy theories that I focused in on were the documented ones and I began to investigate how targeting could tie in with global agendas. Taking down America is paramount for any global government and I was surely being taken down. Not only did the whole community think that I was either crazy or a criminal of some kind, but my close personal friends started to drop off one by one.
My life had been infiltrated by a new “best friend” who played a role in this. She continued the “crazy” narrative to most of my friends. She did really really bad things but looking back I could see that she was targeted also and trying to save her family. At home things were awful. I had one pet stolen and the others were being affected by something that was making them pull out their hair and fight. I finally gave them away to save them and never saw them again. All pets gone.
Mr.C tried to save me by having me move in with him but it was disastrous. I didn’t realize it at the time but he might have been affected by frequencies as well. He could not understand his own behavior at one point, because most of the time he was angry and did not want me there. He was quick to argue and demanding. Not like my friend at all. While I was on his roof deck in the middle of San Francisco, a big black helicopter sat stationary over my head for at least twenty minutes. Thirty or Forty feet above me. I was amazed. If I went out of his apartment I was followed. I was beginning to realize that I was in huge trouble. These were not irate neighbors doing this, as many think, … this was massive and well funded. This felt like our military but why were they attacking their own people? Were they using me for training exercises? Possibly because of remote influencing technologies, Mr. C and I just could not tolerate being together and I left his apartment within a week. He later sent me a text message to say that he could no longer stand the sound of my voice. All friends gone.
Isolation is a well-known component of torture. The torture at this time was continuous. I had a strong taste of salt in my mouth, my skin was drying up, my muscles were misbehaving and it was difficult to get things done, but I persisted. There were sexual attacks, muscular attacks, sneezing attacks, coughing attacks, pain and burning to my feet, breasts, vagina, face, head, hands, legs … my body was swollen and burnt. My pubic hair had been burnt off, my toenails had been disfigured, lots of wrinkles added to my face, I had put on weight, my top teeth had fallen out, I had developed brown spots all over my body, and I was now ugly. Good job boys! I had to wonder if this was done for perverse reasons or to keep me from finding a mate … Either way it was cruel, and obviously these were tailored attacks against women, … not much had changed since my mother had faced the same thing.
I tried to construct a shelter out of old card tables and shielding material but the perpetrators got right through it. I finally ripped off some sheet metal from the washing machine and that seemed to shield me from direct attacks to my organs. I slept with my grandfather’s old stew pot over my head stuffed with Mylar and cotton and I bought a 400 lb. neodymium magnet. Everything helped a bit but there was no stopping the torture.
I once heard scientists talking about me for about 15 seconds and then that feed went dead. I also heard a large “Meow” as I was trying to sleep. My cats were with me then and they jumped to the ceiling. This was projected sound.
Driving had suddenly become a disaster. After forty years of a perfect driving record I had two minor accidents and I was stopped by the Highway Patrol three times. At the same time my nice car was being destroyed. Every day there was more vandalism to it. One day the back window flew out as I was going down the freeway. Another time the brake lines had been cut. Another time all of the oil had been drained from the car. Another time a tire had been shot out prompting my tire guys to send me to the police. Some kind of chemical had been thrown at the car which disintegrated the clear coat. The side mirror had been knocked off. The trunk lock had been broken. It went on and on until the car just stopped working one day. My mechanic said that it looked like a lightning bolt had hit the distributor. I gave up and I was without a car.
Agenda 21. Seriously, that’s my guess…. and I’m furious. Without a vehicle I lost the ability to work, to exercise, to shop, to visit friends and I became completely dependent on everyone around me. No independence. None. But it worked out well for the control freaks who were doing this because they didn’t want me living in a location where I would need a car. Agenda 21. Research Rosa Koire and listen carefully to every word that she says. I am but a lab rat for this Agenda and I can tell you that it is pure fascism disguised as concern for the environment.
At this time I also lost computers. They were all hacked and destroyed. Four of them. Windows was useless against this so I went to Linux, very stable, and then the screen blew out and the keys started malfunctioning. I finally gave up and bought a smart phone.
This is from a current notebook that I keep. It’s an abuse log. It was written on 4/16/2020.
“Abuse Log – Current Hostile takeover of my home
Destruction of smart phone by destroying battery
Rash all over body upon awakening… Black eye, or bruised eye upon awakening
Wound on ankle upon awakening
Repeated jamming of phone signal
Burning of inside of mouth
Massive tinnitus in one ear
Difficulty walking, pain in legs, difficulty maintaining balance
Shooting pains throughout body
Difficulty breathing at times
Abuse Log – Past
• Destruction of four computers
• Destruction of two cars
• Destruction of multiple phones
• Repeated tickets by highway patrol
• Staged accidents
• Attempts to run me off the road
• Multi perpetrators practicing on foot surveillance – suspect C.O.P.S.
• Police surveillance
• Destruction of most personal property
• In home infiltration and use of property for nonconsensual experimentation on victims of remote influencing technologies
• Torture and theft of pets to induce trauma
• Sabotage and destruction of businesses to increase dependency on government funding
• Slander and lies to husband and community for discrediting purposes
• Theft of two pieces of private property
Remote Influencing Technologies ( Neuroscience ) Applied to Produce the Following Symptoms:
• Immediate and unexpected sleep
• Immediate and unexpected anger
• Immediate and unexpected sorrow
• Immediate and unexpected anxiety
• Vivid nightmares
• Pain in all parts of the body
• Heart attack symptoms
• Stomach aches, nausea and indigestion, inability to digest, lack of appetite
• Extreme tinnitus in one ear
• Sudden and unexpected coughing
• Difficulty breathing
• Sudden back ache, knee ache, shoulder ache, ankle ache
• Attacks on Achilles Tendon
• Sudden constant sneezing
• Destruction of thyroid functioning
• High blood pressure
• Visual disturbances
• Fabricated smells
• Fabricated sounds, including words ( military term – V2k, Voice to Skull )
• Fabricated sights
• Gassing – chemical experimentation
• Sudden dizziness
• Sudden memory loss, searching for words, confusion
• Sudden edema in legs and feet
• Burning of feet and toes
• Burning of face, creation of wrinkles
• Burning of chest, breast and vagina
• Sudden nasal congestion
• Knee malfunction
• Internal bleeding
• Sudden infections
• Dentistry problems, tooth loss
• Sudden weight loss or gain
• Sudden heating up of body
• Sudden chills
• Strange courage in the face of danger
• Sudden incontinence, loss of urination or defecation control
• Sudden severe migraines
• Sinus pain
• Sudden pain pricks in eyes and other parts of the body
• Loss of balance
• Sudden severe muscle cramps
• Sudden severe heart pain
• Skin abnormalities, rashes, bites, etc.
• Sudden vertigo
• Itching eyes
• Blurry vision
• Mind control, performing actions that you have no control over like looking at your watch at the exact same time every day.
Other affects surrounding the target:
• Changes in animal behavior, increased aggression in all species, barking and attacking dogs, migration of unwanted pests into the home, wildlife that seems confused, pets that are acting abnormally, pets in pain, pets in distress, pets developing diseases, pets dying, pets disappearing without a trace.
• Landscaping changes, plant death, tree death, proliferation of unwanted species ( weeds ), holes punched in soil, water rerouted through soils leading to flooding, increase of silt in soil leading to inability to sustain life, increase of molds in soil, reduction of insect life, all done remotely.
Damage to home, damage to roof, damage to fencing, damage to appliances, damage to woodwork, damage to electrical system, damage to fireplace, damage to plumbing, damage to water system … all done remotely.
• Biological Teleportation … yes, I’m serious… look it up …
That’s quite a long list, isn’t it? And I’m sure that I’m leaving many things out. Can you see how this technology might affect big Pharma profits? Or privately owned psychological institutions? Or privately owned jails? Or economics? Or relationships? Or housing?
Those calling themselves targeted individuals are tortured 24/7 for years. All that I have claimed here is now being verified by some very important people. The tide appears to be turning just a bit. Brave people are starting to help ….
I was honored to be a participant at the above conference. Below you will find a transcript of the speech that I gave along with references to the information that I provided. Following each individual presentation there was an open discussion which was very valuable. I will be posting the video of the entire conference as soon as it is released.
As promised here is the video of the entire conference …
My name is Rosanne Schneider and I am the author of two books “Surveillance, Torture and Control in the Modern World”1 and “Notes from an Engineered Life”2. Both of these books document my painful journey from a free and loving human being to the horror and pain of a military industrial complex non-consensual test subject.
In 2011 my life was stolen. I went from a business woman, a Home Hospice volunteer, an animal rescuer and an artist to a crime victim. My businesses were sabotaged, my animal rescue activities turned ugly, my computer was hacked, my relationships were destroyed, my home was broken into, my vehicle was vandalized, all of my electronics started to fail, my possessions were destroyed or stolen, and I was followed around town by police and on foot surveillance like a criminal. This unwanted attention included the infiltration of aggressive and uncooperative people into my home life and social circles. I do not have and have never had a criminal record.
At the time, when I thought that things could not be worse, I began experiencing what some might know as Havana Syndrome symptoms. I began to experience dizziness, loss of balance, vertigo, difficulty sleeping, difficulty concentrating and a constant burning sensation throughout my body. But it was about to get much worse … Symptoms gradually progressed until every bodily function was involved. I couldn’t see properly, or breathe properly, or digest properly, or walk properly and there was unexplained pain that would come and go in every part of my body. At the same time my cognitive abilities began to decline and my behavior began to change. I was no longer a free person and I was being manipulated politically. It felt as if some evil entity had control of my body and my mind, and actually that’s exactly what was happening.
This was a time of terror for me as I watched my natural abilities disintegrate and all of my assets disappear. I now spent my days in the emergency rooms of local hospitals or unconscious or in extreme despair.
I contacted the police, the FBI, and my county supervisors and in the end I was called delusional, which was a lie, and told to keep my mouth shut about all of this or risk a forced hold in a psychiatric hospital.
Eventually, as I did research using my symptoms and experiences, I came across thousands of people experiencing the same things. They called themselves “targeted individuals”. My activism began.
I began to do research about microwave weaponry because I could think of no other reason for the burning of my body and I soon realized that this technology had been around for a long time. The Moscow Signal was a reported microwave transmission varying between 2.5 and 4 gigahertz directed at the Embassy of the United States in Moscow from 1953 to 1976 resulting in an international incident.3 It is said that America allowed these attacks to continue so that they could discover the effects of such weaponry. The development of this invisible stealth technology never ended.
From the article “How Far in the Future is the Ban of Psychotronic Weapons” by Mojmir Babacek4
“In March 2012 Russia’s defense minister Anatoli Serdjukov said, at a meeting with Prime Minister Vladmir Putin “The development of weaponry based on new physics principles, directed energy weapons, geophysical weapons, wave energy weapons, genetic weapons, psychotronic weapons, is part of the state arms procurement program for 2011 – 2020.”
The UK based newspaper, Daily Mail, wrote that research in electro-magnetic weapons had been secretly carried out in the United States and Russia since the 1950s and that low-frequency waves or beams can affect brain cells, alter psychological states and make it possible to transmit suggestions and commands directly into someone’s thought processes. High doses of microwaves can damage the functioning of internal organs, control behavior or even drive victims to suicide.”
That article was written in 2013 – Let’s fast forward to an article that was published on October 8th, 2021 entitled “Behind NATO’s cognitive warfare; Battle for Your Brain waged by Western Militaries” by Ben Norton.5
“Western governments in the NATO military alliance are developing tactics of “cognitive warfare”, using the supposed threats of China and Russia to justify waging a battle for your brain in the human domain to make everyone a weapon.
The US – led NATO military cartel has tested novel modes of hybrid warfare against its self-declared adversaries, including economic warfare, cyber warfare, information warfare, and psychological warfare.
Now, NATO is spinning out an entirely new kind of combat … it has branded cognitive warfare. Described as the weaponization of brain sciences, the new method involves hacking the individual by exploiting the vulnerabilities of the human brain in order to implement more sophisticated social engineering.
A 2020 NATO sponsored study of this new form of warfare clearly explained “Cognitive warfare’s objective is to make everyone a weapon”. “The brain will be the battlefield of the 21st Century” the report stressed.
In a chilling disclosure, the report said explicitly that “the objective of Cognitive Warfare is to harm societies and not only the military”. The study described this phenomenon as “the militarization of brain science”. But it appears clear that NATO’s development of cognitive warfare will lead to a militarization of all aspects of human society and psychology, from the most intimate of social relationships to the mind itself.
The study makes it clear that those competitors purportedly exploiting the consciousness of Western dissidents are China and Russia.
The Pentagon is among the primary institutions advancing this novel research, as the report highlighted … “Although a number of nations have pursued, and are currently pursuing neuroscientific research and development for military purposes, perhaps the most proactive efforts in this regard have been conducted by the US Department of Defense, with most notable and rapidly maturing research and development by the Defense Advanced Research Projects Agency ( DARPA ) and Intelligence Advanced Research Projects Activity ( IARPA ).
The study indicated that the direct weaponisation of neuroscience and neurotechnology can and will be fatal. The research can “be utilized to mitigate aggression and foster cognitions and emotions of affiliation of passivity; induce morbidity, disability or suffering; and neutralize potential opponents or incur mortality” … in other words, to maim and kill people.
The report nears it’s conclusion with an eerie quote; “Today’s progresses in nanotechnology, biotechnology, information technology and cognitive science boosted by the seemingly unstoppable march of Artificial Intelligence, have created a much more ominous prospect where everyone, unbeknownst to him or her, is behaving according to plans”
So now we have the suspected criminals that stole my precious life from me … How did they pull this off legally I wonder? And is any one safe? I got a clue from an ex – police chief that I know who used his security clearance to help one of the victims. He found her listed on the Terrorist Watch List as “Dangerous”. She is a housewife without a criminal record. I hear that once one is listed as a terrorist, one loses all of one’s human rights … Well that would work now, wouldn’t it? Haven’t many of our dissidents who oppose our fascist regime been thrown on the terrorist watch list by Fushion Centers?
But why were all of my assets stolen I wonder? Oh wait a minute, hasn’t Klaus Schwab, the founder and executive chairman of the World Economic Forum stated publicly “You’ll own nothing and be happy about it?”6
The war of words rages on about Havana Syndrome, or the deliberate attack on human beings by unseen and undetected frequencies … it’s Russia, it’s China, it’s a mystery they say, what could it be they say … really? Our government is stumped by these attacks?, then how do we explain the patents displayed at the bottom of this page? How do we explain the fact that our own defense manufacturers describe flashy new electronic weaponry on their websites as countermeasures to the existing threat of electromagnetic warfare? Perhaps the Havana Syndrome reporting has been a little “funny” … eh?
Imagine, if you would, these systems falling into the wrong hands … they could destroy automobiles, electrical systems, consumer technologies, computerized machinery, and the list goes on … Oh, and they can also destroy people … I forgot to mention that …
I am greatly alarmed by this and you should be too … These are technologies of war … I understand the fascination … these are stealth weapons and they’re very difficult to trace … if you can remotely destroy property, electronics, and vehicles without a trace, how might that impact We the People if this technology should fall into the wrong hands? …. Is this the kind of future we can expect?, … being covertly zapped into oblivion? … being covertly “modified”?…. Might these weapons support fascism? … well yeah, of course …
I can hear the arguments now … but if you can remotely subdue the enemy’s mind then you don’t need to kill them, right? … true, their bodies are intact but are their souls? If you can modulate behavior with frequencies, and all the experts who actually worked on this technology for governments say that you can, … and our modern world is absolutely bathed in frequencies, …. then what hope is there that this network will not be abused? … Does anyone know of a government anywhere that would not like control of their population? …. Anyone?
Speaking of technological abuse, … there’s a very large and very potent movement towards truth and exposure going on by innocent people who claim that they are indeed being abused by these technologies. Before you make yourself feel better by assuming that these people are internet tin-foil-hat conspiracy nuts, please realize that these people have very impressive credentials. Many of them are from our military, many of them are highly educated scientists, many of them are government whistleblowers, many of them went up against corruption and paid the price, and there’s proof of all of this … are these the kind of people who would come together in great numbers to weave a fictional account of covert attacks? … I don’t think so … Here’s an example of the people in our country who claim that they are being targeted with this technology … before you read the article read the signatures …
Here’s a sampling of the global population who claim that they are being abused by this technology … make sure that you watch it from the beginning … do you really think that they would organize in great numbers and put their faces on camera for the world to see to spread lies or delusions ? You can believe that if it makes you feel better, but I’m one of these people and that’s NOT what’s happening …
So what is happening to these people? They hold conference calls every day of the week aimed at identifying the perpetrators and bringing their slavery to an end … By the way, it IS slavery … if someone aims a neuroweapon at your brain and incapacitates you in any way then you are being controlled by an outside force and that is slavery …
So what is happening to these people? What is the purpose of all of this? This is what I have observed in my life and the lives of others …
They are being asset stripped and impoverished .. to date I have lost 2 pieces of real estate, 2 automobiles, 3 businesses, 4 computers, and thousands of dollars worth of personal property … Most notably all electronics and electrical systems were destroyed by interference of some kind … sound systems, computers, digital cameras, cell phones, security cameras, security alarms, electric fans, the programmable thermostat for my home heating system, and let’s not forget electrical outlets throughout my home …. and let’s not forget the electrical components that control ignition under the hood of my automobiles … according to my mechanic my distributor looked like lightening hit it … his exact words …
They are being slandered, thrown into legal battles which they did not initiate and do not wish to participate in, they are losing their friends and family …
They are being coerced into adopting a “collective” mentality to protect themselves and others. Don’t get me wrong, I’ve always been a person who has willingly shared my resources with others who were less fortunate, but I did this out of the goodness of my heart and because I was taught to behave this way by a family with very high moral standards. I don’t want to be forced into this behavior for my very survival and if I am then there is something tragically wrong with our country, a known refuge for self determination …
Are you having trouble believing all of this? ( I know that I did at one time ) … do a search for “TI” or “Targeted Individual” in FaceBook groups …
Here I did it for you because I want to illustrate a point … so what’s going on here? …
I Support TI Awareness – Public group · 140 members–This page is dedicated to The efforts of raising awareness about citizens being used as targets in a Military Directed Energy Weaponry non consensual human experimentation program. We are all aware of the changes that have been unfolding before our eyes. We have all looked for the answers to the questions at hand.
TI’S READY TO DO SOMETHING ABOUT THEIR TARGETING – Private group · 6.7K members
West Coast States/California TI’s/victims – Private group · 202 members – A Coalition of COINTELPRO victims often called TI’s (Targeted Individuals). Inclusive of the West Coast States .. Anyone is welcomed accept for Anti-TI’s and Infiltrators set to disrupt or destroy group activity and Civil Liberty Processes.
European TI-groupPublic group · 797 membersThis is a group for only European TIs. The intention with the group is to gather all TIs in Europe in order to discuss and to eventually plan some huge meeting, huge demonstration and collaboration between TIs. Invite all TIs from Europe. http://www.targeted-individuals-europe.com
TI THINK TANKPublic group · 415 membersVÄLKOMMEN TILL DETTA GRUPP, HÄR SKA VI FÖRSÖKA KOMMA PÅ NYA OCH DJUPA IDÉER FÖR ATT HJÄLPA ALLA TI (targeted individual) att överleva alla trakaserier, gangstalking, strålning attack, och också att försvara sig på ett lagligt sätt genom att studera lagarna, vår bibel ska bli den stora boken om lagar.
Targeted Individuals SoCal (TI)Private group · 346 members
Georgia TI’s Activist NetworkPrivate group · 15 members– Facebook group for TI’s in the state of Georgia for support, activist efforts, and networking. Anyone in the Georgia area is encouraged to join.
Devoted to TI HealthPublic group · 379 members
Glenn Greenwald Support Group for TI of NSA Inquisition Worldwide – Public group · 326 members
IN THE MEDIA: IS THIS PERSON A TI? – Public group · 213 members – Please add any stories from the media where you suspect the person is being targeted. Whether or not the person knows they are being targeted, we may be their only voice as they are certainly being isolated by everyone around them. If the suspected target committed an act of violence we are not condoning it, just posing theories as to why they did it. Story can be old or new. Goals are to build public awareness and dialogue about targeting. God bless and thanks for supporting my new group page.
Patty’s thoughts and experiences about being a TI Private group · 134 members
I started this group because I haven’t been well and I want to have some documentation of what has been happening to me. I wanted to document the severe torture and other attacks on my life. My health has been on a decline and I want to be sure that it is well documented that I was torture severely.
Civil case for targeted individuals …or the ‘LAST STAND OF THE TI COMMUNITYPublic group · 1.1K memberssteve ahmann, here. I created this group back in 2010 in an effort to get a class action lawsuit going. At that time, there was not much interest, and complaints about me and my credibility. There appears to be renewed interest. I have written a new revision of the suit that you can read under ‘files’. Look for Revision 15 (or later).
TIs Legal Taskforce – Public group · 694 members – This Group’s Mission is to Find Legal Remedies & Redress for the Targeted Individuals.
TIs Action NetworkPublic group · 1K membersThis Group is a “Working Group” for Digital Grassroots Activism & a Hub for Targeted Individuals Action Plans. Our Current Projects are: Petition Drives, Document Database (see the Files), & Social Media Networking. Of course, new projects are welcomed & encouraged by any member. Thank you.
Targeted Individuals InternationalPrivate group ·10K membersThis is an international group for Targeted Individuals all over the world.
TARGETED INDIVIDUALS – OFFICIAL SUPPORT GROUP ™️Public group · 2.4K membersThis is a Facebook Page devoted to the Targeted Individuals Cause; where TIs can offer support, advice and post relevant and non-fiction information. We Will Be Free..
Targeted Individuals PUBLICPublic group · 8K members – This public group addresses the worldwide reality of voice to skull technology and other forms currently in use by governments and corporations to control human beings and slowly over time the entire population. We present facts through evidence gathering and statistically impossible abnormalities through victim population recognition.
Solutions for Targeted Individuals: A Group Effort!!!Private group · 2.6K members – This is a group to work together to find a solution. Let’s put our heads together because two heads are better than one. It is up to us to help each other and get off this slow kill black list.
Targeted Individuals – Presented by the DadBod Society – Public group · 2.4K members – This is a group to protect our most vulnerable members of society from opportunistic libtards and scamers.
List of targeted Individuals – Private group · 1.1K members – Creating a TI data base
Targeted Individual – Evidence Collection – Private group · 933 members – LET’S PUT IT ALL IN ONE PLACE! Share any medical or other evidence, testimony, support from a politician or other goverment authority, activism, photos, books about remote political control technology and methods, interviews of the targeted,… etc.- whatever your heart desires. At this point, we are trying to build to hard evidence
US Targeted Individuals / victimsPublic group · 458 members This is an effort to organize by country here on fb for our viral activism. We will focus on US matters here.
Targeted Individuals Association – Private group · 5.5K members – The TIA is a Pressure Group Against Covert Harassment, Ring Fencing, Gang Stalking, Voice to Skull, V2K, Direct Energy Weapons, DEW & RFID Implants. We are lobbying and suing every government in the world to ban this suppression
Smart Targeted Individuals – Private group · 790 members – This group is for those who are determined to find the truth and solutions and realize how targeters are playing us all.
Targeted Individual Tips, Advice, and Help – Public group · 1.4K members
Targeted Individuals SoCal (TI) – Private group · 346 members – This is a group devoted to the Targeted Individual… Their struggles, triumphs, and general thoughts in regards to everything from group stalking to electronic harassment. This group is specifically designed for those in Southern California, but is open to any and all! Let us share our experiences, our hopes, the evidence we collect and hopefully we will one day be able to file a court case against these criminals!
Targeted Individuals Sacramento – Private group · 424 members –This group is for individuals in or near Sacramento, California or those concerned about the government’s use of workplace mobbing/gang stalking (Cointelpro-like operations), electronic harassment, mind control, and implanting of mind-control devices into human subjects without their knowledge. We are not anti-government. We love our country but we think we can do better! Human rights, civil rights, and dignity belong to everyone and no one has the right to take them away.
TARGETED INDIVIDUALS!!! – Private group · 374 members – TO MAKE THIS THE LARGEST TARGETED INDIVIDUAL GROUP ON THE INTERNET!!! TO SHED LIGHT!!!
Targeted Individual … to give Strength, love & hope – Public group · 381 members = a place to share what gets you through the day
Targeted-US – Public group · 466 members – This is a group for Targeted Individuals (TI). Any member can add and approve new members. Any member may post what they want. The information on the site will be helpful to TI’s.
TARGETED INDIVIDUAL RESISTANCE GROUP – Public group · 597 members
Targeted Connecticut & Northeast – Private group · 154 members – For people who are targeted individuals in the Connecticut or anywhere else looking to share their stories and connect with others dealing with this atrocity to mankind.
TARGETED INDIVIDUALS – NATION OF TURKEY – Public group · 9 members – Support platform of Turkish victims and friends under microwave weaponry torture.
Targeted Individuals Museum – Public group · 165 members – The Targeted Individuals Museum is dedicated to the conservation of videos and information of political, cultural, historical, and scientific importance regarding the systematic manipulation and abuse of the public. The Museum archives are available for public viewing to educate and inform. Visit the ‘Files’ section which contains the archives of the Targeted Individuals Museum.
Targeted Individuals In Africa – Private group · 365 members – The Group For Targeted Individuals In The African Continent.
Targeted Individuals in South Africa – Private group · 119 members – A group for TIs in South-Africa and the African continent. A place to post your stories and comments.
TARGETED INDIVIDUALS FROM POLAND – Private group · 501 members – https://tomekbieniek.wordpress.com/http://stopzet.org/ Jestem Targetem od urodzenia tylko dlatego że moja Mama była Targetem. Stosują wobec mnie gang stalking i electronic harassment. Będę poszukiwał innych Targetów z Polski chociaż wiem że większość Targetów z Polski nie jest świadoma co się wokół nich dzieje.
The Gang Stalking and The Targeted Individual Group – Public group · 3.1K members – This is a miss use of vital emergency services. NYPD, FDNY, EMS I already reported it. CCRB #IAB 201904539 on May 2019
Targeted Individuals, Danmark – Public group · 181 members – Elektromagnetisk tortur, en gruppe for danske T.I.s her kan man snakke med andre T.I.s, aftale møder, lave workshops og lign.
Targeted individuals Survival – Public Group – 219 Members
The Pattern of Choosing Targeted Individuals is in the Funding – Public group · 286 members – Targeted individuals are people who’s biological attributes could be exploited to receive government funding while using them as live human test subjects, which gives them the upper hand in advancing science and technology, in the race for profits. Neurotechnology is the main stage in this era of scientific research and brain has become the final battleground in a war that has our communities involved in a public slow motion harvest and humiliation ritual that rewards their behaviour financially.
Targeted Individuals Community – Public group · 325 members
Targeted Individuals Global Community – Public group · 195 members
Targeted Individuals and Gangstalking Victims International Support Group – Public group · 7.3K membershttp://facebook.com/stopgangstalking A group for targeted individuals, victims and researchers to organize and discuss gangstalking along with its related techniques.
Targeted Individual – Public group · 150 members – if you have been targeted by the Govt, then you are a targeted individual. only the truth can set us free.
Targeted Individuals Video Basement – Public group · 258 members – This group is dedicated to the TI’s out there also know as “Targeted Individuals. I made this group for TI”s to post video evidence to raise awareness of what is taking place to alot of law abiding citizens.
Targeted individuals balkans!!! – Public group · 745 members – Ovde cemo sve fino okititi kako nase balkanske pojedine drzave ljudima peru mozak u 21. Stoljecu
Targeted individuals Belgium and Holland – Public group · 398 members – Deze Groep is opgericht voor Targeted individuals uit België en Nederland..Ik S.V.d.V die deze groep oprichtte ben niet aansprakelijk voor de zaken die anderen plaatsen noch voor de commentaren van anderen/ This is a group for Targeted individuals from Belgium and Holland..Feel Free to post and share..
Targeted Individuals Chile – Public group · 93 members
Targeted Individuals Colombia – Public group · 169 members
Creative Targeted Individuals – Public group · 780 members– “Creative Targeted Individuals” is a group where one can see and share creative ideas, artworks, photos, poetry, stories or music made by and for Targeted Individuals.
ENEMIES OF THE STATE = TARGETED INDIVIDUALS!! – Public group · 58 members
Targeted Individuals USA – Public group · 58 members
Testimonies and Videos of Targeted Individuals and Whistleblowers. – Public group · 530 members – I Created This Group So Testimonies and Videos of Targeted Individuals and whistleblowers can be posted here..
Hour of Mercy/targeted prayers – Public group · 1.5K members
Most of these victims report many of the symptoms reported by US diplomats in Cuba, China, Washington D.C. and Florida … and now Vienna and Berlin? … the locations are multiplying … hmmm, seems global …
So, what are the symptoms of Havana Syndrome that our groups of targeted individuals on FaceBook are also experiencing? …
“Those affected report a range of conditions including dizziness, headache, fatigue, nausea, anxiety, cognitive difficulties and memory loss of varying severity. In some cases, diplomats and intelligence officers have left active service due to complications from the condition.”
and yes, the targeted individuals on FaceBook are experiencing those same symptoms as their years of digital testimony will reveal … they are experiencing those symptoms but they are also experiencing other symptoms which are much, much, worse … symptoms to do with injury and disease, symptoms to do with synthetic telepathy ( look it up ) and cognitive manipulation, … Symptoms which very much mirror these fine patents … … Let’s have a look at what the CIA and NSA have been developing shall we? … Wow, they’ve been busy, haven’t they? … Where are they going to find all of the people needed to test this stuff? … oh wait, isn’t it possible to use people branded as “terrorists” for this research? I hear that they have no rights at all …
CIA and NSA ELECTROMAGNETIC MIND CONTROL PATENTS
This is a PARTIAL listing of various technologies available which can be combined for use in direct or subliminal mind-control systems.
USP # 6,488,617 (December 3, 2002), Method and Device for Producing a Desired Brain State Abstract:
A method and device for the production of a desired brain state in an individual contain means for monitoring and analyzing the brain state while a set of one or more magnets produce fields that alter this state. A computational system alters various parameters of the magnetic fields in order to close the gap between the actual and desired brain state. This feedback process operates continuously until he gap is minimized and/or removed.
Abstract: An improved stealthy, non-surgical, biocompatible electronic tracking device is provided in which a housing is placed intraorally. The housing contains microcircuitry. The microcircuitry comprises a receiver, a passive mode to active mode activator, a signal decoder for determining positional fix, a transmitter, an antenna, and a power supply. Upon receiving a coded activating signal, the positional fix signal decoder is energized, determining a positional fix. The transmitter subsequently transmits through the antenna a homing signal to be received by a remote locator.
USP # 6,091,994 (July 18, 2000), Pulsative Manipulation of Nervous Systems
Abstract: Method and apparatus for manipulating the nervous system by imparting subliminal pulsative cooling to the subject’s skin at a frequency that is suitable for the excitation of a sensory resonance. At present, two major sensory resonances are known, with frequencies near 1/2 Hz and 2.4 Hz. The 1/2 Hz sensory resonance causes relaxation, sleepiness, ptosis of the eyelids, a tonic smile, a knot in the stomach, or sexual excitement, depending on the precise frequency used. The 2.4 Hz resonance causes the slowing of certain cortical activities.
USP # 6,052,336 (April 18, 2000), Apparatus and Method of Broadcasting Audible Sound Using Ultrasonic Sound as a Carrier
Abstract: An ultrasonic sound source broadcasts an ultrasonic signal which is amplitude and/or frequency modulated with an information input signal originating from an information input source. The modulated signal, which may be amplified, is then broadcast via a projector unit, whereupon an individual or group of individuals located in the broadcast region detect the audible sound.
USP # 5,539,705 (July 23, 1996), Ultrasonic Speech Translator and Communications System
Abstract: A wireless communication system, undetectable by radio-frequency methods, for converting audio signals, including human voice, to electronic signals in the ultrasonic frequency range, transmitting the ultrasonic signal by way of acoustic pressure waves across a carrier medium, including gases, liquids and solids, and reconverting the ultrasonic acoustic pressure waves back to the original audio signal. This invention was made with government support under Contract DE-ACO5-840R2l400, awarded by the US Department of Energy to Martin Marietta Energy Systems, Inc.
USP # 5,507,291 (April 16, 1996), Method and an Associated Apparatus for Remotely Determining Information as to Persons Emotional State
Abstract: In a method for remotely determining information relating to a person’s emotional state, an waveform energy having a predetermined frequency and a predetermined intensity is generated andwirelessly transmitted towards a remotely located subject. Waveform energy emitted from the subject is detected and automatically analyzed to derive information relating to the individual’s emotional state.
USP # 5,159,703 (October 27, 1992), Silent Subliminal Presentation System
Abstract: A silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain.
USP # 5,017,143 (May 21, 1991), Method and Apparatus for Producing Subliminal Images
Abstract: A method and apparatus to produce more effective visual subliminal communications. Graphic and/or text images, presented for durations of less than a video frame, at organized rhythmic intervals, the rhythmic intervals intended to affect user receptivity, moods or behavior.
USP # 4,877,027 (October 31, 1989), Hearing System
Abstract: Sound is induced in the head of a person by radiating the head with microwaves in the range of 100 megahertz to 10,000 megahertz that are modulated with a particular waveform. The waveform consists of frequency modulated bursts. Each burst is made up of 10 to 20 uniformly spaced pulses grouped tightly together. The burst width is between 500 nanoseconds and 100 microseconds. The bursts are frequency modulated by the audio input to create the sensation of hearing in the person whose head is irradiated.
Abstract: Apparatus for and method of sensing brain waves at a position remote from a subject whereby electromagnetic signals of different frequencies are simultaneously transmitted to the brain of the subject in which the signals interfere with one another to yield a waveform which is modulated by the subject’s brain waves. The interference waveform is re-transmitted by the brain to a receiver where it is demodulated and amplified. The demodulated waveform also can be used to produce a compensating signal which is transmitted back to the brain to effect a desired change in electrical activity therein.
The following is written by former White House insider Fred Burks (except for the patent obviously), The below patent describes technology used for behavior modification through TV, computer monitors, video, and DVD programming. If you have a science background, I invite you to read the full 16-page patent to see the high level of sophistication involved. The manipulation is not done through the insertion of single-frame anomalies, as has been done in the past, but rather by modulation of the feed or signal.
It is unfortunate that very few people are aware of these behavior modification capabilities. I doubt there are any laws to protect us from such manipulation. Like any tool, these technologies can be used for either the benefit or detriment of society. Let us spread this information so that we might assure that these technologies are not used for harm, but rather only for the benefit of humankind.
Note: For the U.S. Patent & Trademark Office patent search page, see this link. Or click here to go straight to patent #6,506,148. As the full patent is 16 pages long, only key excerpts are included below.
United States Patent 6,506,148 Loos, January 14, 2003 Nervous system manipulation by electromagnetic fields from monitors
Abstract Physiological effects have been observed in a human subject in response to stimulation of the skin with weak electromagnetic fields that are pulsed with certain frequencies near 1/2 Hz or 2.4 Hz, such as to excite a sensory resonance. Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is therefore possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream, either as an RF signal or as a video signal. The image displayed on a computer monitor may be pulsed effectively by a simple computer program. For certain monitors, pulsed electromagnetic fields capable of exciting sensory resonances in nearby subjects may be generated even as the displayed images are pulsed with subliminal intensity.
Inventors: Loos; Hendricus G. (3019 Cresta Way, Laguna Beach, CA92651) Appl. No.: 872528 Filed: June 1, 2001
SUMMARYComputer monitor and TV monitors can be made to emit weak low-frequency electromagnetic fields merely by pulsing the intensity of displayed images. Experiments have shown that the 1/2 Hz sensory resonance can be excited in this manner in a subject near the monitor. The 2.4 Hz sensory resonance can also be excited in this fashion. Hence, a TV monitor or computer monitor can be used to manipulate the nervous system of nearby people. The implementations of the invention are adapted to the source of video stream that drives the monitor, be it a computer program, a TV broadcast, a video tape or a digital video disc (DVD). For a computer monitor, the image pulses can be produced by a suitable computer program. The pulse frequency may be controlled through keyboard input, so that the subject can tune to an individual sensory resonance frequency. The pulse amplitude can be controlled as well in this manner. A program written in Visual Basic(R) is particularly suitable for use on computers that run the Windows 95(R) or Windows 98(R) operating system. The structure of such a program is described. Production of periodic pulses requires an accurate timing procedure. Such a procedure is constructed from the GetTimeCount function available in the Application Program Interface (API) of the Windows operating system, together with an extrapolation procedure that improves the timing accuracy. Pulse variability can be introduced through software, for the purpose of thwarting habituation of the nervous system to the field stimulation, or when the precise resonance frequency is not known. The variability may be a pseudo-random variation within a narrow interval, or it can take the form of a frequency or amplitude sweep in time. The pulse variability may be under control of the subject.
The program that causes a monitor to display a pulsing image may be run on a remote computer that is connected to the user computer by a link; the latter may partly belong to a network, which may be the Internet.
For a TV monitor, the image pulsing may be inherent in the video stream as it flows from the video source, or else the stream may be modulated such as to overlay the pulsing. In the first case, a live TV broadcast can be arranged to have the feature imbedded simply by slightly pulsing the illumination of the scene that is being broadcast. This method can of course also be used in making movies and recording video tapes and DVDs.
Video tapes can be edited such as to overlay the pulsing by means of modulating hardware. A simple modulator is discussed wherein the luminance signal of composite video is pulsed without affecting the chroma signal. The same effect may be introduced at the consumer end, by modulating the video stream that is produced by the video source. A DVD can be edited through software, by introducing pulse-like variations in the digital RGB signals. Image intensity pulses can be overlaid onto the analog component video output of a DVD player by modulating the luminance signal component. Before entering the TV set, a television signal can be modulated such as to cause pulsing of the image intensity by means of a variable delay line that is connected to a pulse generator.
Certain monitors can emit electromagnetic field pulses that excite a sensory resonance in a nearby subject, through image pulses that are so weak as to be subliminal. This is unfortunate since it opens a way for mischievous application of the invention, whereby people are exposed unknowingly to manipulation of their nervous systems for someone else’s purposes. Such application would be unethical and is of course not advocated. It is mentioned here in order to alert the public to the possibility of covert abuse that may occur while being online, or while watching TV, a video, or a DVD.
US Patent #4,395,600, Rene Lundy and David Tyler, July 26, 1983.Auditory Subliminal Message System and Method,
An amplitude-controlled subliminal message may be mixed with background music.
US Patent #4,335,710, John Williamson, June 22, 1982. Device for the Induction of Specific Brain Wave Pattern
Brainwave patterns associated with relaxed and meditative states in a subject are gradually induced without deleterious chemical or neurologic side effects.
US Patent #5,159,703, Olive Lowery, October 27, 1992.
Silent-Subliminal Presentation System, A silent communications system in which non-aural carriers in the very low or very high audio frequency renage, or in the adjacent ultrasonic frequency spectrum, are amplitude modulated with the desired intelligence and propagated acoustically or vibrationally for inducement into the brain.
US Patent #4877027, Wayne Brunkan, October 31, 1989. Hearing System,
A method for directly inducing sound into the head of a person, using microwaves in the range of 100 Mhz to 10,000 Mhz, modulated with a waveform of frequency modulated bursts.
Psycho-Acoustic Projector, US Patent# 3,568,347, Andrew Flanders, Feb 23, 1971.
A system for producing aural psychological disturbances and partial deafness in the enemy during combat situations.
US Patent #4,034,741, Guy Adams and Jess Carden, Jr, July 12, 1977.
Noise Generator and Transmitter, An analgesic noise-generator.
US Patent #5,123,899, James Gall, JUne 23, 1992. Method and System for Altering Consciousness,
A system for altering the states of human consciousness involving the use of simulataneous application of multiple stimuli, preferable sounds, having differing frequencies.
US Patent # 5,270,800, Robert Sweet, December 14, 1993. Subliminal Message Generator,
A combined subliminal and supraliminal message generator for use with a television receiver, permits complete control of subliminal message and their presentation. Also applicable to Cable television and Computers.
US Patent #4,777,529, Richard Schultz and Raymond Dolejs, October 11,1988. Auditory Subliminal Programming System.
US Patent #4,834,701, Kazumi Masaki, May 30, 1989. Apparatus for Inducing Frequency Reduction in Brain Wave.
US Patent #4,335,710, John Willaimson, June 22, 1982. Device for the Induction of Specific Brain Wave Patterns,
Brainwave Pattern associated with relaxed and meditative states in a subject are gradually induced without deleterious chemical or neurologic side effects.
Apparatus for the treatment of Neuropsychic and Somatic Diseases with Heat, Light, Sound and VHF Electromagnetic Radiation, US Patent #3,773,049, L.Y. Rabichev, VV.F. Vasiliev, A.S.Putilin, T.G.Ilina, P.V. Raku and L.P.Kemitsky, November 20. 1973.
Don’t let the nice title fool you. This is the patent for LIDA, the infamous Soviet brainwashing machine.
US Patent #5,539,705, M.A.Akerman, Curtis Ayers, Howard Haynes, July 23, 1996. Ultrasonic Speech Translator and Communication System,
A wireless communication system, undetectable by radio-frequency methods for converting audio signals, including human voice, to electronic signals in the ultrasonic frequency range, transitting the ultrasonic signal by way of acoustic pressure waves across a carrier medium, including gases, liquids and solids, and reconverting the ultrasonic acoustic pressure waves back to the original audio signal. This invention was made with government support under Contract DE-ACO5-840-R21400, awarded by the US Department of Energy to Martin Marietta Energy Systems Inc.
US Patent #4,821,326, Norman Macleod, April 11, 1989.Non-Audible Speech Generation Method and Apparatus.
US Patent #4,227,516, Bruce Meland and Bernard Gindes, October 14,1980. Apparatus for Electrophysiological Stimulation.
US Patent #5,352,181, Mark Davis, October 4, 1994. Method and Recording for Producing Sounds and messages to achieve Alpha and Theta Brianwaves States and Positive Emotional States in Humans,
US Patent #4,883,067, Knispel et. al., November 28. 1989.Method and Apparatus for Translating the EEG into Music to Induce and Control Various Psychological and Physiological States and to Control a Musical Instrument.
Method of and Apparatus for INducing Desired States of Consciousness, US Patent #5,356,368, Robert Monroe, October 18, 1994.
Improved methods and apparatus for entraining human brain patterns, employing frequncy-following-response (FFR) techniques and facilitating attainment of desired states of consciousness.
US Patent #4,889,526, Elizabeth Rauscher and William Van Bise, December 26, 1989. Non-Invasive Method and Apparatus for Modulating Brain Signals through an External Magnetic or Electric Field to Reduce Pain.
US Patent# 3,393,279, July 16, 1968 Nervous System Excitation Device, Gillis Patrick Flanagan.
A method of transmitting audio information via a radio frequency signal modulated with the audio info through electrodes placed on the subject’s skin, causing the sensation of hearing the audio information in the brain.
US Patent #3,647,970, G. Patric Flanagan, March 7, 1972. Method and Simplifying Speech Waveforms,
A complex speech waveform is simplified so that it can be transmitted directly through earth or water as a waveform and understood directly or after amplification.
US Patent #2,995,633, Henry Puharich and Joseph Lawrence, August 8, 1961. Means for Aiding Hearing.
Means for converting audible signals to electrical signals and conveying them to viable nerves of the facial system.
US Patent #3,170,993, February 23, 1965. Henry Puharich, Means for Aiding and Hearing by Electrical Stimulation of the Facial Nerve System
US Patent# 4,858,612, Philip Stocklin, August 22, 1989. Hearing Device.
A method and apparatus for stimulation of hearing in mammals by introduction of a plurality of microwaves into the regions of the auditory cortex.
US Patent# 5,134,484, Joseph Wilson, July 28, 1992. Superimposing Method and Appartus Useful for Subliminal Messages, Method of Changing Person’s Behavior.
US Patent # 5,213,562, Robert Monroe, May 25, 1993, Method of Inducing Mental, Emotional and Physical States of Consciousness, including Specific Mental Activity, in Human Beings.
US Patent 4,717,343, ALan Densky, January 5, 1988.
A method of conditioning a person’s unconscious mind in order to effect desired change in the person’s behaviour, and which does not require the services of a trained therapist.
US Patent US3014477, Carlin, 1961, Hypnotic Inducer (Mind ControlMachine)
US Patent US3060795, Corrigan Et al, 1962, Apparatus for Producing Visual Stimulation (Subconscious Transmission via Movie Film)
Patent US3278676, Becker, 1966, Appratus for Prdoucing Visual and Auditory Stimulation (Subconscious Transmission via TV)
Patent# US3563246, Flanagan, 1968, Nervous System Excitation Device
Patent# US3712292, Zentmayer Jr, 1973, Method of and Apparatus for Producing Swept Frequency Modulated Audio Signal Patterns for Inducing Sleep (Brain Frequencies Broadcast)
Patent# US3951134, Malech, 1976, Apparatus and Method for Remotely Monitoring and ALtering Brain Waves (RF/Electromagnetic Waves)
Patent# US4395600, Lundy, 1983, Auditory Subliminal Message System and Method (Subliminal Brainwash via Music or Other SOund)
Patent# US4717343, Densky, 1988, Method of Changing A Person’s Behavior, (Subconscious Brainwash via Video)
Patent# US4777529, Schultz/Dolejs, 1988, Audiotory Subliminal Progamming System (Silent Brainwash via Music or Other Sound)
So can we get real here and actually discuss what’s going on? … or are we going to continue to pretend that we’re totally innocent about these weapons and absolutely shocked that our government workers have been hit with them? ….
One more thing, … It’s illegal to conceal crime with government classification ….
As always, Shine a Light People !!!!
( and if you can help me to survive while I shine a light you’ll find a donation link on my about page )
World Economic Forum founder and executive chairman Klaus Schwab states openly that we will “Have Nothing and Be Happy” … their motives are in clear view …
Would he also like us to “be nothing”? I base my question on the following evidence of an extreme trend towards human roboticism, an agenda that I am acutely and intimately aware of, as are thousands, if not millions of global citizens who are being used for testing of these systems … wake the hell up Houston, we definitely have a problem …
Let me be clear about this … what is being studied is nothing less than the complete and utter takeover of the human being by connecting the brain to electronics … are you ok with that? Don’t believe me? Think that this is just a “conspiracy theory” ? Take a look at this website …
Are you getting all of this? Are you alarmed? “Neuroengineering, Future evolution strategy, Neo-Humanity, Cybernetic Immortality, Science and Spirituality”? … The last time that I looked science didn’t have anything to do with spirituality … Not a thing!!! … Unless, of course, you can manipulate the brain to achieve desired states of spirituality or non spirituality … now, that would be something … wouldn’t it? Talk to the CIA about this and read my previous works.
Manipulating the brain is nothing new. I’ve written books about it. But never before have the richest and most powerful people on earth stated publicly that this is the way of humanity in the future … Are they joking? … Watch this …
So this is all off in the future, right? … there are so many pressing problems right now that need immediate attention … talk to these people and then review the funding for Obama’s Brain Initiative … perhaps all of the pressing problems right now are fitting in just perfectly as a distraction for the implementation of this plan …
By the way, I am not a conspiracy theorist but a conspiracy realist meaning that I do not write about things that I can not prove. Because of this, I have been financially attacked for the last ten years. I will be adding a donation option on the about page just as soon as I can figure it out. Thank you for reading this. Thank you for your support.
I reproduce here a document of major importance. As a ten year non consensual test subject for electromagnetic weaponry I know first hand the dangers that they pose to all creatures on our planet. My experience can only be described as non-stop torture aimed at destroying cognitive liberty, free will, independent action and physical health. These gifts were given to all living creatures by our creator and were not meant to be tampered with. They form the basis of life as we know it and the control and destruction of these basic rights is catastrophic, cruel and tragic.
For ten long years I, along with thousands of other victims, have tried to expose these crimes against humanity. We’ve had limited success which leads me to believe that Dr. Robert Duncan, ex government scientist and whistle blower, was right when he told Jesse Ventura in a program appropriately entitled “Brain Invaders” that it was “too late”.
I am fully aware that these technologies can be used for good but that’s not what’s happening. I have to conclude that this weaponry has fallen into the wrong hands. My torture and programming has been aimed at enforcing Agenda 21 and other programs initiated by the global elite in their quest for total control of society and world domination.
If you care about your world you will read every word of this and when you’re finished please watch this video which was made by the victims.
Also, I had to reformat this piece to post it here and it’s been difficult because of the placement of the footnotes … If you’d rather read the original PDF without the reformatting you can do so here …
This research explores the current capabilities of the US military to use electromagnetic (EMF) devices to harass, intimidate, and kill individuals and the continuing possibilities of violations of human rights by the testing and deployment of these weapons. To establish historical precedent in the US for such acts, we document long-term human rights and freedom of thought violations by US military/intelligence organizations. Additionally, we explore contemporary evidence of on-going government research in EMF weapons technologies and examine the potentialities of continuing human rights abuses.
In the 1950s and 60s the CIA began work to find means for influencing human cognition, emotion and behavior. Through the use of the psychological understanding of the human being as a social animal and the ability to manipulate a subject’s environment through isolation, drugs and hypnosis, US funded scientists have long searched for better means of controlling human behavior. This research has included the use of wireless directed electromagnetic energy under the heading of “Information Warfare” and “Non Lethal Weapons.” New technological capabilities have been developed in black budget projects1 over the last few decades— including the ability to influence human emotion, disrupt thought, and present excruciating pain through the manipulation of magnetic fields. The US military and intelligence agencies have at their disposal frightful new weapons, weapons that have likely already been covertly used and/or tested on humans, both here and abroad, and which could be directed against the public in the event of mass protests or civil disturbance.
Human Rights belong to people collectively. To believe in rights for some and not others is a denial of the humanness of people worldwide. Yet, denial is exactly what Congress and George W. Bush did with the signing of the Military Commission Act of 2006. The new official US policy is that torture and suspension of due process are acceptable for anyone the president deems to be a terrorist or supporter. This act is the overt denial of the inalienable rights of human beings propagated in our Declaration of Independence and the Universal Declaration of Human Rights. More so, US actions declared to the world that the US suspends human rights for those it believes are evil.
The precious words, “We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness,” did not declare that only some men (and women) possess unalienable rights. Our independence was founded on the understanding that all men and women are recognized by this nation as having innate rights derived by their humanity.
Likewise, the Universal Declaration of Human Rights, created by the United Nations in 1948, signed and ratified by the US Congress, specifies in its preamble that “recognition of the inherent dignity and of the equal and inalienable rights of all members of the human family is the foundation of freedom, justice and peace in the world.”
1 Black budgets are government funded projects that are classified/secret to Congress and the American people. For an in-depth analysis on the topic, see Weiner, Tim , Blank Check: The Pentagon’s Black Budget, Warner: 1990.
The Universal Declaration of Human Rights has been a guide for international law for most of six decades, and as such binds the United States to its general principles. Article 10 states that “everyone is entitled to full equality, to a fair and public hearing by an independent and impartial tribunal, in the determination of his rights and obligations and of any criminal charge against him,” and Article 5 specifically prohibits torture or cruel, inhuman or degrading treatment or punishment. Both of these basic human rights have been superceded by the passage the of Military Commissions Act of 2006.
Additionally, the Universal Declaration of Human rights declares that everyone has the right to freedom of thought and freedom of expression and opinion. This means that humans have the inalienable right to be able to freely think their own thoughts and discover their own truths. This paper addresses this most fundamental human right and explores the pending threats to individual freedom of thought posed by new EMF weapons technologies.
Freedom of thought or cognitive liberty is the natural human right of each person to be secure in their ability to perceive the world to the best of their ability. To have true cognitive liberty in a world as complex as ours would mean that first we must have access to truthful and unbiased information about the actions of others and the general state of the world. The Center for Cognitive Liberties defines this as “the right of each individual to think independently and autonomously, to use the full spectrum of his or her mind, and to engage in multiple modes of thought.”2 Without accurate representations we cannot make independently informed choices. It is imperative that the human body and mind be considered sacrosanct. To invade a person’s body without their consent is an egregious human rights crime.
The circumstance may soon arrive in which anti-war or human rights protesters suddenly feel a burning sensation akin to touching a hot skillet over their entire body. Simultaneously they may hear terrifying nauseating screaming, which while not produced externally, fills their brains with overwhelming disruption. Not only are both phenomena currently possible, but designs for more powerful EMF technologies receive continuous funding from the US Government.
We are in a time of extremism, permanent war, and the unilateral manifestation of ethnocentrism and power by a cabal of people in the US government. These power elites have been in operation for decades and are set on nothing less than the total US military domination of the world. They defy the foundational values of the American people to achieve their ends. This is not a new phenomenon.
The repression of human rights has been present within the US Government throughout our history.3
A long thread of sociological research documents the existence of a dominant ruling class in the US that sets policy and determines national political priorities. The American ruling class is complex and inter-competitive, maintaining itself through interacting families of high social standing with similar life styles, corporate affiliations, and memberships in elite social clubs and private schools.4
This American ruling class is self-perpetuating,5 maintaining its influence through policy-making institutions such as the National Manufacturing Association, National Chamber of Commerce, Business Council, Business Roundtable, Conference Board, American Enterprise Institute, Council on Foreign Relations and other business-centered policy groups.6 C. Wright Mills, in his 1956 book The Power Elite, documents how World War II solidified a trinity of power in the US, comprised of corporate, military and government elites in a centralized power structure motivated by class interests and working in unison through “higher circles” of contact and agreement. Mills described how the power elite were those “who decide whatever is decided” of major consequence.7
With the advent of the military-industrial complex after World War II, President Eisenhower observed that an internal military industrial power faction was consolidating their long-term plans for the domination of America and, eventually, the world. Eisenhower was in no position to fight these men, and history records his feelings on the subject with the text of his short farewell address:
“….But threats, new in kind or degree, constantly arise. Of these, I mention two only…
…This conjunction of an immense military establishment and a large arms industry is new in the American experience. The total influence – economic, political, even spiritual – is felt in every city, every Statehouse, every office of the Federal government. We recognize the imperative need for this development. Yet we must not fail to comprehend its grave implications. Our toil, resources and livelihood are all involved; so is the very structure of our society.
In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist.
We must never let the weight of this combination endanger our liberties or democratic processes. We should take nothing for granted. Only an alert and knowledgeable citizenry can compel the proper meshing of the huge industrial and military machinery of defense with our peaceful methods and goals, so that security and liberty may prosper together.
5 Early studies by Charles Beard in the Economic Interpretations of the Constitution of the United States (1929), established that economic elites formulated the US Constitution to serve their own special interests. Henry Klien (1933) in his book Dynastic America claimed that wealth in America has power never before known in the world and was centered in the top 2% of the population owning some 60% of the country. Ferdinard Lundberg (1937) wrote American’s Sixty Families documenting inter-marring self-perpetuating families where wealth is the “indispensable handmaiden of government. C.Wright Mills determined in 1945 (American Business Elites, Journal of Economic History, Dec. 1945) that nine out of ten business elites from1750 to 1879 came from well to do families.
6 See R. Brady, Business as a System of Power, (New York: Columbia University Press, 1943) and Val Burris, Elite Policy Planning Networks in the United State, American Sociological Association paper 1991.
7 C. Wright Mills, The Power Elite, (New York: Oxford University Press, 1956).
Akin to, and largely responsible for the sweeping changes in our industrial-military posture, has been the technological revolution during recent decades.
In this revolution, research has become central, it also becomes more formalized, complex, and costly. A steadily increasing share is conducted for, by, or at the direction of, the Federal government.”8
We now understand that Eisenhower was referring to the conjunction of redirected tax monies to research secret new technology aimed at nothing less than increasing the controlling power of the military industrial elite to a global scale.
One particular faction of ambitious men, the former cold warriors and emerging neo-conservatives, were close followers of philosopher Leo Strauss. This elite group included not just generals and industrialists but philosophers, scientists, academics, and politicians have now become the most powerful public-private war organization ever known.
Strauss espoused an elitist philosophy that fawned over the characteristics of those who inherited wealth and lived lives of leisure to pursue whatever their interests may be. His ideas have been transformed into a cogent ideology in which the media, religion, and government are used to subdue the masses while the real “nobles” follow their own will without regard to the laws designed to control lesser men. Strauss was likewise fond of secrecy, as a necessity for control, because if the lesser men found out what was being done to them they would no doubt be upset.
“The people will not be happy to learn that there is only one natural right – the right of the superior to rule over the inferior, the master over the slave, the husband over the wife, and the wise few over the vulgar many.” In On Tyranny, Strauss refers to this natural right as the “tyrannical teaching” of his beloved ancients..9
Leo Strauss, Albert Wohlstetter, and others at the University of Chicago’s Committee on Social Thought receive wide credit for promoting the neo-conservative agenda through their students, Paul Wolfowitz, Allan Bloom, and Bloom’s student Richard Perle.
Canadian cultural review magazine Adbusters, defines neo-conservatism as, “The belief that Democracy, however flawed, was best defended by an ignorant public pumped on nationalism and religion. Only a militantly nationalist state could deter human aggression …such nationalism requires an external threat and if one cannot be found it must be manufactured.”10
8Public Papers of the Presidents, Dwight D. Eisenhower, 1960, p. 1035- 1040
9Leo Strauss, “On Tyranny”, Edited by Victor Gourevitch and Michael S. Roth, University Of Chicago Press, 2000.
10 Guy Caron, “Anatomy of a Neo-Conservative White House,” Canadian Dimension, May 1, 2005.
The neo-conservative philosophy emerged as a reaction to the 1960s era of social revolutions. Numerous officials and associates in the Reagan and George H.W. Bush presidencies were strongly influenced by the neo-conservative philosophy including: John Ashcroft, Charles Fairbanks, Richard Cheney, Kenneth Adelman, Elliot Abrams, William Kristol and Douglas Feith.11
Within the Ford administration there was a split between Cold War traditionalists seeking to minimize confrontations through diplomacy and detente and neo-conservatives advocating stronger confrontations with the Soviet’s “Evil Empire.” The latter group became more entrenched when George H.W. Bush became CIA Director. Bush allowed the formation of “Team B” headed by Richard Pipes along with Paul Wolfowitz, Lewis Libby, Paul Nitze and others, who formed the second Committee on the Present Danger to raise awareness of the Soviet threat and the continuing need for a strong aggressive defense policy. Their efforts led to strong anti-Soviet positioning during the Reagan administration.12
The Committees on the Present Danger (CPD) extend from the 1950s Russian threat to the present. The current CPD proudly boasts on their website;
“In times of great challenge to the security of the United States, Republicans, Democrats, and Independents have traditionally joined to make an assertive defense of American interests.
Twice before in American history, The Committee on the Present Danger has risen to this challenge. It emerged in 1950 as a bipartisan education and advocacy organization dedicated to building a national consensus for a strong defense against Soviet expansionism. In 1976, the Committee on the Present Danger reemerged, with leadership from the labor movement, bipartisan representatives of the foreign policy community and academia, all of whom were concerned about strategic drift in US security policy. With victory in the Cold War, the mission of the Committee on the Present Danger was considered complete and consequently was deactivated.
Today, the current CPD promotes radical Islamists as the primary threat to the American people and millions of others who prize liberty. They claim that the threat is global. They also claim that they operate from cells in a number of countries. Rogue regimes seek power by making common cause with terrorist groups. The prospect that this deadly collusion may include weapons of mass murder was the justification for the invasion of Iraq.”13
11Alain Frachon and Daniel Vernet, “The Strategist and the Philosopher: Leo Strauss and Albert Wlhlestetter,” LeMonde, April 16, 2003, English translation: Counterpunch 6/2/03.
12 Anne Hessing Cahn, Team B; The Trillion-dollar Experiment, Bulletin of the Atomic Scientists, April 1993, Volume 49, No. 03
Journalist John Pilger recalls his interview with neo-conservative Richard Perle during the Reagan administration: “I interviewed Perle when he was advising Reagan; and when he spoke about ‘total war,’ I mistakenly dismissed him as mad. He recently used the term again in describing America’s ‘war on terror’, “No stages, This is total war. We are fighting a variety of enemies. There are lots of them out there. All this talk about first we are going to do Afghanistan, then we will do Iraq . . . this is entirely the wrong way to go about it. If we just let our vision of the world go forth, and we embrace it entirely and we don’t try to piece together clever diplomacy, but just wage a total war . . . our children will sing great songs about us years from now.”14
There is ample evidence available to show that some individuals within government and industry have little problem with violating the public trust and using their positions to kill, maim, torture and destroy. It is of the utmost importance to our traditional American values of human rights and cognitive liberty that we recognize this threat from within. We must move to identify those who show these proclivities and ensure that their activities have adequate oversight.
Stanley Milgram’s famous experiment involving obedience to authority proved that individuals are fairly easily cowed into submitting to anyone who has a claim of authority, and that on average 61 percent of people will administer pain to another person if instructed to do so.15 Both test groups in these experiments rationalized their behavior by appealing to “the greater good.” Because it was for the “advancement of science” they were able to be convinced they should ignore personal judgment and obey the instructions given to them by the experimenters.16
Martin Orne, who was one of those paid by the CIA to conduct experiments on obedience, showed in 1962 that people would go to tremendous lengths to please a person in authority. Orne conducted research that involved presenting subjects with a stack of 2,000 pages of random numbers and instructing them to add each two adjacent numbers until he returned. Over 90 percent of the test subjects continued in this meaningless task for up to five hours.17
Today the combination of political climate and technological capability presents a condition in which widespread manipulation of, not only the flow of information through the media, but also the manipulation of the emotional states and cognitive ability in large populations could be achieved. If policy elites are unaccountable to the public for their actions, and the public has been emotionally manipulated to support them, we can assume that they will certainly abuse their positions in the pursuit of their agendas.
14 John Pilger, “The World Will Know The Truth,” New Statesman (London) (December 16 2002).
15 Stanley Milgram “Obedience to Authority: An Experimental View”, New York: HarperCollins, 2004.
16 “Obedience as a determinant of behavior is of particular relevance to our time,” Behavioral Study of Obedience, Stanley Milgram, Yale University, Journal of Abnormal and Social Psychology, Vol. 67, No. 4, p. 371
17 See Martin Orne-Orne, Martin T., “On The Social Psychology of the Psychological Experiment: With Particular Reference to Demand Characteristics and Their Implications,”Am. Psychol. 17 (1962): 776-783, Orne, M.T. The potential uses of hypnosis in interrogation. In A.D. Biderman (Ed.), The Manipulation of Human Behavior (pp. 169- 215). New York: John Wiley & Sons, 1961
Previous human rights and cognitive liberty violations are evidenced in CIA and FBI records pertaining to the infamous MK-ULTRA project and the grim record of harassment and subversion uncovered in the COINTELPRO program in force through the 1950s and into the 1970s. We also examined some of the cases of illegal experimentation on the public dating back to the 1930s. We consider, in depth, the forms of electromagnetic weapons entering the battlefield today that trace their origins back through the secret projects of the Defense Department in the 1950s and 1960s.
Psychological Warfare, Information War, and mind control may seem to be exotic topics, but the impact of these technologies and techniques is profound. Our minds are being impacted through a longstanding series of programs aimed at manipulating public opinion through intelligence agencies, think tanks, corporate media and a host of non-governmental organizations designed to engender fear, division and uncertainty in the public.18 Media manipulation involving the artificial framing of our collective reality is often a hit or miss proposition, but psychological operations have been carried out in the past, and are being carried out even today, through the practices of “Information Warfare,” directed at enemies abroad and at the American people.19
According to Mary C. FitzGerald of the Hudson Institute, New-concept weapons, such as laser, electromagnetic, plasma, climatic, genetic and biotechnological are the central principle driving the modernization of national defense. The potential for these weapons to be used for both good and bad deserves a great deal of attention, but there is little to be found in the media or discussed by our administration.20
The US is a system of many institutions including those whose sole function is to provide government oversight. When problems arise that threaten the stability of the country or the safety of the people, the US government is designed to have checks and balances that allow the people to challenge misconduct either directly or through congressional representatives. Increasingly, oversight is disintegrating. According to a 2006 report in the Boston Globe, the intelligence committee does not read most intelligence reports in their entirety.21
The media is complicit in omitting information necessary to make democratic decisions.22 A global dominance agenda includes penetration into the boardrooms of the corporate media in the US. A research team at Sonoma State University recently finished conducting a network analysis of the boards of directors of the ten big media organizations in the US. The team determined that only 118 people comprise the membership on the boards of director of the ten big media giants. These 118 individuals in turn sit on the corporate boards of 288 national and international corporations. Four of the top 10 media corporations in the US have DOD contractors on their boards of directors including:
William Kennard: New York Times, Carlyle Group Douglas Warner III, GE (NBC), Bechtel
John Bryson: Disney (ABC), Boeing Alwyn Lewis: Disney (ABC), Halliburton
Douglas McCorkindale: Gannett, Lockheed-Martin
18 For an analysis on the interlocking of the corporate media, think tanks and government organizations, see Peter Phillips, Bridget Thornton and Lew Brown “ The Global Dominance Group and the US Corporate Media” in Censored 2007, Seven Stories Press.
19 See: Snow, Nancy, Information War American Propaganda, Free Speech, and Opinion Control Since 9/11, 2004 Seven Stories Press and Chomsky, Noam Media Control: The Spectacular Achievements of Propaganda, 2002 Seven Stories Press
20 In researching this article, there are no instances of remarks by senior White House, Pentagon, or Congressional officials that specifically address the human effects of non-lethal EMF weapons. A search in Lexis Nexis from 2001- 2006 returned no results in American mainstream media.
21 Classified Intelligence Bills Often Are Unread: Secret Process Can Discourage House Debate, Susan Milligan, Boston Globe August 6, 2006.
22 The Global Dominance Group and the US Corporate media, by Peter Phillips, Bridget Thornton and Lew Brown, published in Censored 2007, Seven Stories Press, 2006, Chapter 10,
Given an interlocked media network, big media in the US effectively represent corporate America’s interests. The media elite, a key component of policy elites in the US, are the watchdogs of acceptable ideological messages, the controllers of news and information content, and the decision makers regarding media resources
It is not suggested that everyone in the government believes in global domination, nor that it is the intent of every government official to ‘cover up’ misconduct.23 Scientists involved in potentially harmful technology are not ‘mad scientists.’ In fact, there are many reports in the public sphere addressing government and military misconduct that are put forth by people within these very institutions. The problem is when the government threatens whistleblowers, intimidates officials with job loss, infiltrates activist organizations, and increases surveillance24.
Modern Psychological Operations (Psy-Ops) were significantly advanced in the Second World War25 and were brought to bear on the American public during the 1950s with the formation of a widespread network of social scientists, journalists, politicians, military specialists and intelligence operatives. Psy-Ops were used to promote a variety of programs in cooperation with the Industrial Military Complex. Their key piece of information warfare was the Communist Red Menace.26
23 Remarks on Classification, The Hon. Lee Hamilton, Information Security Oversight Office, October 18, 2005. “At a time when the US intelligence community is under intense scrutiny in the aftermath of 9/11 and the failure to find weapons of mass destruction in Iraq, we only increase public skepticism about our government by denying the public information.”
24 See: Valerie Plame, the Richard Leiby, Spy Who Got Shoved Out Into the Cold, Washington Post, October 29, 2005; Page C01; Amended 2006 surveillance bill by Bush; The FBI and the Engineering of Consent, Noam Chomsky, From Public Eye Magazine, Volume One, Number Two; and Demian Bulwa, Oakland: Police spies chosen to lead war protest, San Francisco Chronicle, Friday, July 28, 2006.
25 See William E. Daugherty and Morris Janowitz, A Psychological Warfare Casebook, Baltimore, MD: Johns Hopkins University Press, 1958. In particular, see Daugherty’s article on “US Psychological Warfare Organizations in World War II,” pp. 126-136.
26 For a current view of these kinds of operations and how they are outsourced see James Bamford’s article in the Rolling Stone, The Man Who Sold the War Meet John Rendon, Bush’s General In The Propaganda War, November 17, 2005. For more information on CIA control of the media refer to Carl Bernstein, “The CIA and the Media —
One of the opening salvos in this war of deception was fired by George Kennan, the American ambassador to Moscow, describing the Soviet threat in a “long cable” sent to Washington in 1946. Kennan spent decades studying the Russian political scene. He became convinced that there would be little chance of cooperation with the Soviets and recommended a number of actions, most notably the institution of “political war” through the newly formed CIA – a decision he later regretted, even arguing for the elimination of the CIA in 1997.27
In the late 1950s, a right-wing cadre of men within the new CIA was busy building secret armies, planning assassinations, and generally devising plans for world domination that still play out today. Operation Gladio was one example, well documented and international in scope, in which right-wing members of the US intelligence community created “stay-behind” armies in many of the nations of Europe. Those armies managed to infiltrate the highest levels of politics (most notably in Italy where the term “Gladio” refers to a double edged sword) and have been held responsible for numerous false-flag terrorist acts through the 1980s and 1990s. Terror and propaganda often go hand-in-hand in the extremist elements within our military and intelligence communities.28
To counter the divisions within the intelligence community, a greater voice was given to organizations formal and informal. In the 1950s, one such group, the first Committee on the Present Danger (CPD), promulgated a series of “gap crises.” The Bomber Gap, the Missile Gap, the Space Gap, and the Brainwashing and Psychotronic Gap were used to justify increased military technology spending. Congress was led to believe that the Soviets were a much greater threat than they actually were, and that a terrifying new weapon was being developed that threatened America. They were thus convinced to vote for virtually any black budget proposal that came their way. The CPD ran a series of broadcasts to the public through the Mutual Broadcasting Network that spread fear in the minds of the public.
Under the first civilian CIA Director, Allen Welsh Dulles, the Company began to push forward with its agenda of manufacturing consent from the American people for a new state of perpetual war industrialization. Dulles was a well-connected individual, a successful spy for the OSS in Switzerland during the war, related to three secretaries of state, and the chief advisor to Dewey when he ran for President in 1948. Dulles had access to the highest echelons of policy making and his
Most Powerful News Media Worked Hand in Glove with the Central IntelligenceAgency and Why the Church Committee Covered It Up”, Rolling Stone, October 20, 1977, p.63.-the title of the original operation was “Mockingbird” 27 George F. Kennan. “Spy and Counterspy.” The New York Times, May 18, 1997. For a sympathetic biography see George F. Kennan and The Making of American Foreign Policy, 1947-1950, Wilson D. Miscamble, C.S.C, 1993 Princeton University Press. George F. Kennan. “Policy Planning Staff memorandum on the inauguration of organized political warfare“, May 4, 1948. Published in Foreign Relations of the United States, 1945-1950: Emergence of the Intelligence Establishment. Discusses the need for political warfare: that is, measures short of war, such as propaganda and covert operations.
28 History News Network, USA 13 June 2005, Terrorism in Western Europe: An Approach to NATO’s Secret Stay- Behind Armies, by Daniele Ganser, The Whitehead Journal of Diplomacy and International Relations 1 June 2005, Kennan published his analysis anonymously in Foreign Affairs, the official magazine of the Council for Foreign Relations (CFR). [Mr. X (Alias ‘George C. Kennan): “The Sources of Soviet Conduct”, in Foreign Affairs, July 1947.] (http://www.isn.ethz.ch/php/documents/collection_gladio/Terrorism_Western_Europe.pdf.)
influence was global in scope, counting among his close friends Henry Luce, publisher of Newsweek. Relying heavily upon established circles of contacts within the nation’s media elites, Dulles recruited key members of the media to work directly for the CIA under Operation Mockingbird. Mockingbird was a psychological information campaign against the American people. In a campaign that would lead to acceptance of blanket secrecy for “national security”, “the Red Scare” became the excuse for spending vast sums of money on weapon systems and an increase in covert operations both in foreign countries and within the United States. In the 1950s and 1960s, movies, news articles, books, radio and television programs were carefully laced with anti- communist messages and images designed to produce an acceptance of the policies being promoted by the defense elite’s propaganda machine.29
“Among the executives who lent their cooperation to the Agency were William Paley of the Columbia Broadcasting System, Henry Luce of Time Inc., Arthur Hays Sulzberger of the New York Times, Barry Bingham Sr. of the Louisville Courier-Journal and James Copley of the Copley News Service. Other organizations which cooperated with the CIA include the American Broadcasting Company, the National Broadcasting Company, the Associated Press, United Press International, Reuters, Hearst Newspapers, Scripps-Howard, Newsweek magazine, the Mutual Broadcasting System, The Miami Herald, and the old Saturday Evening Post and New York Herald-Tribune. By far the most valuable of these associations, according to CIA officials, have been with The New York Times, CBS, and Time Inc.”30
One of the engineers of this deception was a former head of the stay-behind network, Edward W. Barrett, director of the Interdepartmental Psychological Strategy Board (IPSB) and, not coincidentally an editor at Newsweek. Barrett was seen as being very effective in his efforts to manipulate public opinion. At the same time, CPD was a “non-political group of citizens of the western coast” and launched a media campaign in favor of the urgent reinforcement of the national defense. Among the organizers of the Committee were Frank Altschul (Director of the Council for Foreign Relations), William Donovan (former head of the OSS during WWII) and General Dwight D. Eisenhower.31
All of this activity was more than enough to stoke the fears of the public and encourage policy makers to accept the Cold War view of the world. This allowed Truman to convince Congress to approve a tripled military budget that provided funding for secret research and development and turn a blind eye (in the name of National Security) to “black operations” programs authorized under the new Cold War rubric of “containment” and aimed at undermining otherwise peaceful nations and fomenting war, torture and assassination in countries as diverse as Iran, Guatemala and Indochina.32
29 Victor Marchetti and John D. Marks, The CIA and The Cult of Intelligence, Dell Books,1975 (as a matter of general interest this is reportedly the first book the Government went to court to have censored. There are 168 missing pages as a result of the courts ruling but the spaces were retained in the first edition.)
30 “The CIA and the Media”, Carl Bernstein Rolling Stone, Oct. 20, 1977
31 David F. Krugler, Will It Play in Peoria? The 1950 Campaign of Truth and the Reconstruction of Cold War Propaganda, British Association of American Studies Annual Conference April 1997 University of Birmingham, Birmingham, England
Post-war developments in Europe, especially the British withdrawal from Greece, led Truman to decide it was necessary to have a permanent American presence in the old continent to counteract the Communist influence.33 General George C. Marshall, Secretary of State, designed a vast plan that mixed economic assistance and secret actions aimed at establishing democracies and making sure that voters in foreign countries made “the right choice.” National Security Council directive NSC 10/2, essentially written by Kennan, made official the creation of an anti-Communist interference network.34
The US intelligence community had an ace in the hole, Reinhardt Gehlen, a Nazi spymaster with an existing network of agents became the front man in Eastern Europe for American intelligence.
General Reinhardt Gehlen proved to be troublesome for the CIA over the years. Communist counter- spies infiltrated his network, his information was often incorrect, and he had downplayed his eagerness to serve the Reich. But Gehlen was only one of thousands of Nazis recruited to assist in the new “Cold War” through Operation Paperclip.35 In fact, the intelligence assets acquired by bringing the Gestapo onto the US public payroll was overshadowed by the acquisition of dozens of brilliant Nazi scientists and researchers.
At this juncture, Truman, through the application of the 1947 National Security Act and the newly formed National Security Council36, authorized a vast number of secret projects involving chemical, biological, nuclear and electromagnetic experiments. Former Nazis were put in charge of many of the most sensitive programs and facilities. The Army Ballistic Missile Agency (ABMA) was entrusted to the former SS officer Wernher von Braun.37 Kurt Debus, another ex-SS officer, directed Cape Canaveral. At this time scientists began working on “black” projects in earnest, including attempts at finally developing the “lost” theories of Nicola Tesla, the Serbian-born American physicist, into military and intelligence applications.38
TESLA AND EMF
32 William Blum, Killing Hope: US Military and CIA Interventions Since World War II, Monroe, Maine: Common Courage Press, 1995; Ralph McGehee, Deadly Deceits: My 25 years in the CIA, New York: Sheridan Square Publications, 1983. http://www.sourcewatch.org/index.php?title=CIA Footnote on Ops)
33 Daniele Ganser, NATO’s Secret Armies. Operation Gladio and Terrorism in Western Europe, Frank Cass Publishers, 2004.
38 Hunt, L. Secret Agenda. The United States Government, Nazi Scientists, and Project Paperclip, 1945 to 1990. New York: St. Martin’s Press, 1991. Simpson, C. “Blowback. The First Full Account of America’s Recruitment of Nazis, and the Disastrous Effect on Our Domestic and Foreign Policy”. New York: Weidenfeld and Nicolson, 1988
Military interest into the weaponization of the electromagnetic spectrum has a long history, based on the theoretical work of Nikola Tesla. Radar, in its early inception, was seen not only as a means of tracking the position and speed of enemy targets, but as a potential weapon in its own right. There are very real problems however with overcoming the normal decrease in effect of an electromagnetic field over distance. This effect is a natural function of the laws of physics and applies to both electrical and magnetic fields39. In short, the strength of a field drops off in inverse proportion to the distance of the target from the source. Without a means of concentrating and directing a beam of energy across long distances, any effect that an EMF weapon may have would be limited to its immediate vicinity. From 1900 until his death in 1943, Nikola Tesla worked to develop just such a weapon.
In a letter to the New York Times editor in 1908 Telsa wrote,
“When I spoke of future warfare I meant that it should be conducted by direct application of electrical waves without the use of aerial engines or other implements of destruction…What I said in regard to the greatest achievement of the man of science whose mind is bent upon the mastery of the physical universe, was nothing more than what I stated in one of my unpublished addresses, from which I quote: “According to an adopted theory, every ponderable atom is differentiated from a tenuous fluid, filling all space merely by spinning motion, as a whirl of water in a calm lake. By being set in movement this fluid, the ether, becomes gross matter. Its movement arrested, the primary substance reverts to its normal state. It appears, then, possible for man through harnessed energy of the medium and suitable agencies for starting and stopping ether whirls to cause matter to form and disappear. At his command, almost without effort on his part, old worlds would vanish and new ones would spring into being. He could alter the size of this planet, control its seasons, adjust its distance from the sun, guide it on its eternal journey along any path he might choose, through the depths of the universe. He could make planets collide and produce his suns and stars, his heat and light; he could originate life in all its infinite forms. To cause at will the birth and death of matter would be man’s grandest deed, which would give him the mastery of physical creation, make him fulfill his ultimate destiny.”40
Tesla made several claims during the latter years of his life, published by the New York Times in what became an annual event. His theory of the hidden nature of our universe supplants those of many of his contemporaries in that he was able to infer a multidimensional model of the universe that is only now being investigated through the theoretical mathematics of our leading physicists.41
39 There are two laws of note here: the inverse square law, which relates to forces such as gravity, and the inverse cube law, which relates to electromagnetic forces. Both equations describe the relationship between the power of the force and the decrease in that forces effect over distance. In regards to magnetism we refer to the work of Maxwell. One easily accessible online source for his equations is: http://www.rialian.com/rnboyd/maxwell.htm A good place to start for understanding the man and his work is the James Clerk Maxwell Foundation at: http://www.clerkmaxwellfoundation.org/html/links.html
40New York Times, April 21st, 1908 (p.5 column 6) Tesla Letter to the Editor :.
41 “The Cosmic Triangle: Revealing the State of the Universe,” in the May 28, 1999 issue of the journal Science
Tesla also developed means of remotely controlling aircraft as early as 1915, foreshadowing the Unmanned Ariel Vehicles (UAVs) of today’s battlefields. In 1934 Tesla offers to build a “Death Ray” that would make the power of an opponents air force obsolete. This was one of the earliest recorded statements regarding directed energy weapons.42 Tesla’s offer to build this device for the US government for a bargain price, but with many caveats, was refused by officials who, preferred instead to pump money into the new Army Air Corp, which in turn gave rise to the military aviation complex that we have today.43
Before the war the airline industry was not a major part of the economic life of the nation.44 With huge wartime contracts, however, corporations such as Hughes, McDonnell Douglas, Lockheed, and Northrop quickly grew in power commensurate with the financial bonanza that was unearthed in the battlefields of Europe and the Pacific.45 These companies formed the core of the “military-industrial complex.” Their investors and managers began to consolidate their clout in political circles to keep the nation on a wartime economic footing, a simple and vastly powerful weapon that would make aircraft, bombs, missiles and attendant industries irrelevant would certainly be seen as a direct threat to the growing power of military arsenal. Instead, a “black budget” program was put into motion, which exploited the work of Robert Oppenheimer, Albert Einstein and others. The Manhattan Project, developed by the DOD in 1942, generated a vastly destructive weapon that required a well- established and unbelievably expensive aerospace industry, along with unprecedented levels of secrecy and autonomy from Congress and the public.46
The US government also ignored Tesla’s offer to produce a “city killing machine,” which was composed of an electromagnetic shield and a wireless torpedo. Tesla made several proposals during the 1930s, none of which received funding. Among Tesla’s claims, published annually on his birthday in the New York Times, were methods of harnessing the power of the sun to electrify the earth and provide free electrical power to anybody, anywhere.
discusses Dark Energy and Margaret Cheney, Tesla: A Man Out of Time, Dell Publishing, 1983.
42 Front page New York Times, July 11 1934 was entitled, “TESLA, AT 78, BARES NEW ‘DEATH BEAM'” and told of the inventor’s proposal that would “send concentrated beams of particles through the free air, of such tremendous energy that they will bring down a fleet of 10,000 enemy airplanes at a distance of 250 miles…”
43 To illustrate the control of science for corporate profit, Tesla’s practical applications all shared one thing in common, the were devoid of any profitable application. As a result, Tesla’s development of wireless electricity has never borne fruit, leaving us still in the 21st century surrounded by a landscape of transmission wires, faulty electrical grids, destructive (though profitable) electrical generation systems, wars for oil, and a suffering environment. See Marc J. Seifer, The Life and Times of Nikola Tesla, Citadel Press, 1998.
44 John B. Rae, Climb to Greatness: The American Aircraft Industry, 1920-1960, Cambridge: MIT Press, 1968. Roger E. Bilstein, The American Aerospace Industry: From Workshop to Global Enterprise, New York: Twayne Publishers, 1996. 45 Carol L. Cook, The Aerospace Industry: Its History and How it Affects the US Economy, Yale-New Haven Teachers Institute, 2005.
Tesla did, however, conceive of at least one device that became a major part of our nation’s arsenal -radar. As early as 1917 he published his theory and developed the first prototype in 1934. It is from the basis of this technology that future research into weaponizing the electromagnetic spectrum proceeded. At the same time Tesla was working on methods of transmitting and receiving communication signals through interplanetary space and reading the images on a sleeping person’s retina (by extension mind reading). His prediction that future wars would be fought with electromagnetic means foreshadowed the rise of electronic warfare and the non-lethal weapons technology being deployed today.47
At first glance, it would seem probable that the military had taken over the management of Tesla’s material. In fact, a number of projects related to his life’s work were in development. For instance, the building of beam weapons at Wright Patterson Air Force Base under the code name “Project Nick”48 headed by Brigadier General L.C. Craigie. This project was however, cancelled due to an apparent lack of understanding of Tesla’s means of transmitting high-energy waves without a loss of power over great distances. Defense Advanced Research Projects Agency (DARPA) began another project in 1958 codenamed “Seesaw” at Lawrence Livermore Labs49 aimed at combating reported Soviet advances in electromagnetic weapons and defenses, advances that many believe came about after 1952 when the bulk of Tesla’s research and personal effects were turned over to his nephew, Sava Kosanovic, who promptly whisked them away to Yugoslavia. Eight years later Soviet Premier Nikita Khrushchev would state that, “A new and fantastic weapon is in the hatching stage,”50 horrifying many and prompting calls for more effective means of using EMF, espionage and counter-espionage.
On February 9, 1981, the office of the Undersecretary of Defense Research and Engineering department sent a letter to the FBI that requested the papers of Tesla, stating, “We believe that certain of Tesla’s papers may contain basic principles which would be of considerable value to certain ongoing research within the DOD. It would be very helpful to have access to these papers. The letter was signed by Lt. Col. Allan J. Mclaren, an R.O.T.C. graduate from M.I.T. in 1960, who later went on to become a project director with Lockheed Martin Space Systems from which he retired in 2003.51
This section of his memo to the FBI was not declassified until 1993. In response, the FBI issued the same response as to all of the other inquiries with one exception, this time they identified who it was that examined the stored effects; it was the Office of Scientific Research and Development from MIT, a breeding ground of CIA. technical types the Office of Naval Intelligence and agents from US Naval Research.52 What they may have been looking for had likely already been taken, according to a recent PBS special entitled Tesla: Life and Legacy, Tesla’s nephew reported that Tesla’s most recent journal was missing from the bulk of material stored by the OAP.53 In recent years high profile projects such as the High Altitude Auroral Project (“HAARP”), the Strategic Defense Initiative (“Star Wars”), and many of the devices promoted by proponents of “Non-Lethal Weapons” have Tesla’s intellectual fingerprints all over them.54
47New York Times, 1937 “…will send concentrated beams of particles through the free air, of such tremendous energy that they will bring down a fleet of 10,000 enemy airplanes at a distance of 250 miles from the defending nation’s border and will cause armies of millions to drop dead in their tracks When put into operation, Dr. Tesla said, this latest invention of his would make war impossible. This death-beam, he asserted, would surround each country like an invisible Chinese wall, only a million times more impenetrable. It would make every nation impregnable against attack by airplanes or by large invading armies.” For an interesting article about Tesla’s “Death Ray” and the relationship to Tunguska see: http://www.viewzone.com/tesla.ray.html)
In terms of mind-control and the breaking down of prisoners for military interrogations, the events at Abu-Ghraib, Guantanamo, and in the CIA network of secret prisons dotting the globe, all have their intellectual origin in the work carried out by a network of scientists under the behest of the intelligence community beginning in the World War II period. Mind-control, per se, refers to a well- funded, broad based series of programs designed to explore the furthest reaches of human cognitive ability. The Nazis, as well as the Japanese, had been experimenting on prisoners throughout the war. Recovery of the records of these experiments led the US to proceed with investigations into new means of interrogations and the building of resistance to interrogations of US personnel..55
The CIA, in association with various other agencies, undertook a long series of experiments on unsuspecting prisoners, students, military personnel and others recruited into one of the at least 162 subprojects of what became known as MKULTRA.56 Interest was certainly piqued by the case of Cardinal Mindseztny and the reports of brainwashing techniques used on American soldiers in prisoner of war camps in Korea57. But even prior to the Korean War the resiliency of the human mind was being tested by researchers on the black budget. These projects reportedly at times violated every conceivable notion of human rights and dignity.58
53 Tesla: Master of Lightning PBS documentary Dec. 12th, 2000.
54 Box#8 of Declassified CIA documents pertaining to MKULTRA contains the following fragment: The Application of Tesla’s Technology in Today’s World. Obtain, online, through the National Security Archives at http://www.gwu.edu/~nsarchiv/
55 Harris, S. (1994) Factories Of Death: Japanese Biological Warfare, 1932-45, And The American Cover-Up. London: Routledge.Tanaka, Y. 1998. Hidden Horrors: Japanese War Crimes in World War II. Boulder, Colorado: Westview Press, Michalczyk, J. J. 1994. Medicine, ethics, and the Third Reich: Historical and Contemporary Issues (METR). Kansas City, Missouri: Sheed & Ward
57 Stephen Budiansky, Erica E. Goode and Ted Gest, “The Cold War Experiments”, U.S News and World Report January 24, 1994.
58 Patricia Greenfield, CIA’s Behavior Caper, APA Monitor, December 1977, pp. 1, 10-11
Frank Olson, a mid-level CIA operative, worked on the development of aerosol delivery of drugs and poisons at Ft. Detrick, Maryland. His work, which is still classified, was. funded through MKULTRA. Olson took a trip to England where MI6 and the CIA were working together on ways to prevent allied spies and servicemen from yielding to interrogation. Olson also traveled to Frankfurt, where the two agencies conducted fatal experiments on prisoners of war and others considered to be “expendable.” Olson had an ethical dilemma with the research and, after voicing his concerns, returned to the United States. On November 28, 1953, Olson was in room 1018A of the Hotel Statler in New York. At 2 a.m., Olson fell from the 10th floor window of his room to his death on the sidewalk below. The headline reported his death as an accident or suicide. This report was discredited when, in 1975, another official lie was issued to ease his family’s suffering and deflect public scrutiny. This time Olson was called the victim of an LSD experiment.59 Media reports cited in the New York Times focused on the sensational aspects of LSD use and psychic warfare, but did not dwell on the more egregious violations of human rights and dignity inherent in the programs overseen by the CIA.60
The truth was not revealed until 1994 when his son finally had his body exhumed and examined. The autopsy showed that Olson’s left temple had been fractured before he fell. According to the New York Times Magazine CIA tradecraft books from 1953, that have since been released teach that “one of the surest methods of killing somebody without a trace involves impairing their reflexes with alcohol (or drugs) and then stepping up behind them and stunning them with a blow to the temple.
After that you quickly grab their ankles and in a single motion flip them over a bridge, balcony or out of a window more than 70 feet off of the ground.”61 What Olson saw, and what cost him his life and his family their peace of mind for 30 years, was the beginning of a long term strategy to develop means of making individual both resistant to “brainwashing” and to control the actions of individuals.62 The cover story that was used to justify the beginning of the project was that there was a “brainwashing gap” with the Koreans.63
Experimenters used college students, servicemen, mental patients, the poor and, in several instances, children as young as four years old, in attempts to create untraceable assassins, couriers and other operatives. MKULTRA sub-projects involved the services of many notable universities and used a number of false front corporations such as the Foundation for the Study of Human Ecology and think tanks such as RAND, to shield the source of funding from those with ethical “problems.”64 We would still know nothing of these activities had it not been for the release of 16,000 pages of documents in 1977 through the FOIA request filed by the surviving family of Frank Olson.
59 Thomas O’Toole, “CIA Infiltrated 17 Area Groups, Gave out LSD Suicide Revealed”, front-page story Washington Post, June 11, 1975.
60 Carl Bernstein, “The CIA and the Media: How Americas Most Powerful News Media Worked Hand in Glove with the Central Intelligence Agency and Why the Church Committee Covered It Up”, Rolling Stone, October 20, 1977.
61 Michael Ignatieff, “What did the C.I.A. Do to Eric Olson’s Father?” New York Times Magazine, April 1, 2001.
63 Reported in the New York Times as “Mind Control Studies had Origin in Trial of Mindszenty”, Aug. 2, 1977, p.16. 64 See Athan G. Theoharis, “Researching the Intelligence Agencies: The Problem of Covert Activities”, The Public Historian, 1984 National Council on Public History, University of California Press.
Unfortunately CIA Director Richard Helms ordered the destruction of any MKULTRA records shortly before the order came in to his office65, leaving an incomplete picture of a concerted effort by various agencies to create new and better means of controlling the thoughts, emotions and thus behavior, of unsuspecting individuals.
MKULTRA was, however, neither the first nor the last project funded by government or industry to experiment on people in the name of some greater good. A quick review of the history of secret experimentation and medical atrocities reveals a pattern of deadly behavior.
The Tuskegee Experiments in 1932 cruelly condemned scores of black men to death from syphilis.66
The Pellagra Incident, in which millions died over two decades, in spite of the fact that the US Public Health Service knew at the time that these deaths were caused by little more than a niacin deficiency.67
In 1940 scientists exposed four-hundred prisoners in Chicago with malaria (a US experiment Nazis cited at the Nuremberg trials to defend their own experimentation).68
During WWII, Seventh Day Adventist conscientious objectors were enlisted into Operation Whitecoat by the US Army and the Adventist Church. They were told that they were being tested for defensive research purposes while the government was in fact testing offensive chemical and biological weapons.69
After WWII, matters became far worse for those who were caught up in the web of illegal scientific testing. In 1947 Colonel E.E. Kirkpatrick of the US Atomic Energy Commission issued a secret document stating that the agency would begin administering intravenous doses of radioactive substances to human subjects. At the same time atomic tests in which the residents of Utah and Nevada were purposely exposed to radioactive fallout. There were also a series of operations during the 1940s and 1950s in which US cities were attacked secretly by the military through the spread of biological agents in order to track their propagation through a real population.70
65 Project MKULTRA, The CIA’s Program of Research in Behavioral Modification, August 3, 1977, US Senate, Select Committee on Intelligence, and Subcommittee on Health and Scientific Research of the Committee on Human Resources.
66 Jean Heller (Associated Press), “Syphilis Victims in the US Study Went Untreated for 40 Years” New York Times, July 26, 1972: and VN Gamble, “Under the Shadow of Tuskegee: African Americans and Health Care.” American Journal of Public Health 7(1997):1773-1778.
67 Jon M. Harkness, “Prisoners and Pellagra”, Public Health Reports, Sep/Oct96, Vol. 111 Issue 5, p 463.
68 “They Were Cheap and Available: Prisoners as Research Subjects in Twentieth Century America.” British Medical Journal 315:1437.
69 Krista Thompson Smith, “Adventists and Biological Warfare”, Spectrum Magazine, Vol 25, no. 3, March 1996 and David R. Franz, DVM, PhD, Cheryl D. Parrott, Ernest T. Takafuji, MD, MPH, “The US Biological Warfare and Biological Defense Programs” in Medical Aspects of Chemical and Biological Warfare, Part 1; The Textbook of Military Medicine, Office of Surgeon General, Borden Institute 1997; p. 425-436.
70 Atomic Energy Commission Secret Memo by Kirkpatrick, E. E. Col. A January 8, 1947, This was a draft memo from
Once the details of MKULTRA came to light, the focus in the media and in the Senate, was on the use of drugs, especially LSD. While the researchers within the project did indeed concentrate on developing a variety of hallucinogenic concoctions, they did so with an end in mind. The goal was to devise means and methods of enabling undercover operatives, soldiers, contractors or anyone who was involved in secret projects, to be able to keep those secrets if they were captured or interrogated. Hypnosis, combined with drugs, sensory deprivation and systematic abuse were seen as a means to that end. The leader in this pharmaceutical and psychological research was Dr. Ewen Cameron.
Cameron was at the time, one of the most esteemed psychiatrists in the world. As president of the American Psychiatric Association, Canadian Psychiatric Association, and one of the founders of the World Psychiatric Association, Dr. Cameron began experimenting on brainwashing techniques as early as the 1930s with schizophrenic patients. At this time lobotomies were not yet in common use, though the procedure would begin to be implemented in 1936 on a wide scale. Electroshock therapy was some years from being accepted as a primary means of changing behavior.72
Cameron relied on torturous and highly stressful techniques for breaking down the personality of his patients. Schizophrenics would be stripped down naked beneath red lights for eight hours a day, sometimes for up to eight months with repeated messages inundating their senses. In other experiments Cameron would attempt to induce the delirium associated with a high fever by cooking his patients in an electric cage until their body temperature reached 102 degrees.
Colonel Kirkpatrick, Acting Manager, Field Operations of AEC, to the AEC Berkeley Area Engineer, puts the AEC stamp on termination of human testing, while simultaneously revealing it was going on under the Manhattan Project-at the request of Oppenhiemer: “Until the Atomic Energy Commission is able to consider sponsoring this type of experimentation, authorization cannot be given for the use of radioactive materials in human subjects under this contract.” A more current report from the National Security Archives that clearly lays out the timeline and the assault by researchers on “subjects” can be found at http://www.gwu.edu/~nsarchiv/radiation/dir/mstreet/commeet/meet12/brief12/tab_f/br12f1d.txt————————————————————————————————————- “ Personal Statement
from Elizabeth Zitrin, Attorney at Law Public Member of the Ad Hoc Committee on Radiation Experiments”. For information on biological warfare experiments a good starting place is : Biological Warfare: A Historical Perspective, by LTC George W. Christopher, USAF, MC; LTC Theodore J. Cieslak, MC, USA, MAJ Julie A. Pavlin, MC, USA, and LTC (P) Edward M. Eitzen Jr., MC, USA. — Operational Medicine Division, United States Army Medical Research Institute of Infectious Diseases, Fort Detrick, Maryland, as posted at http://www.fas.org/nuke/guide/usa/cbw/bw.htm
71 This section about Dr. Cameron is based on Orlikow Vs. United States, CIA Settlement of Some Complaints. Ewen Cameron and the Allan Memorial Institute – Subproject 68 funded by CIA from March 18, 1957 to June 30, 1960 Without conceding liability, in 1988 the CIA agreed to pay $750,000 to settle a case brought on behalf of nine plaintiffs who were subjected to federally funded mind control experiments sponsored by the CIA and conducted by prominent psychiatrist Ewen Cameron, M.D. The experiments included heavy does of LSD, electroshock and psychic driving.
72 See “CIA Brainwashing Experiments”, MacLean’s; January 28, 1985, Vol. 98 Issue 6, p46, 1/3p and “A cold-war horror show’s last act”, US News & World Report; October 17, 88, Vol. 105 Issue 15, p13, 1/3p.
From January of 1957 until September of 1960 Cameron became one of the promising researchers the CIA turned to in order to develop means and methods of “brainwashing” and programming human beings to do the will of the agency. Cameron received $64,242.4473 from the CIA. to develop a combination of techniques that would destroy an individual’s memory of an event and enable the programmer to control their behavior through post-hypnotic commands. Cameron used a variety of drug combinations coupled with prolonged sleep deprivation, isolation, hypnosis, and electro convulsive therapy in order to “ wipe” an individual’s memory. His techniques worked, to a certain extent, but ethical considerations led the CIA to cut Cameron’s funding in the US, prompting Cameron to move to Canada to continue his work with funding channeled through the Canadian Government.
He continued his work, officially, from 1961 until 1964 in Montreal where he received an additional $57,750.74 During this time Cameron combined his techniques (in a “therapy” he called de- patterning) with electroconvulsive therapy in which the voltage introduced into one subjects brain, Linda Macdonald, exceeded the APA’s guidelines by 76.5 times. He succeeded in wiping her memory and to this day, she cannot remember anything prior to 1963. In a January 17, 1984 broadcast of the Canadian Broadcasting System, a program called “The Fifth Estate” detailed the experiments of Cameron, prompting a burst of investigative journalism culminating in a class-action suit brought against the CIA by former subjects. In 1988, the case was settled out of court for $750,000, divided between 8 plaintiffs. Linda Macdonald received $100,000 and legal fees from the Canadian government, but Cameron himself, faced no punishment.75
Dr. Jose Delgado
Whereas Cameron focused on creating traumatized individuals through intense psychological pressure, Dr. Jose Delgado was investigating the direct route to control of “human subjects.” Delgado physically invaded the brains of subjects with electrodes in order to create emotions and control actions with the push of a button. As he stated himself,
“We need a program of psychosurgery for political control of our society. The purpose is physical control of the mind. Everyone who deviates from the given norm can be surgically mutilated. The individual may think that the most important reality is his own existence, but this is only his personal point of view. This lacks historical perspective. Man does not have the right to develop his own mind. This kind of liberal orientation has great appeal. We must electrically control the brain. Some day armies and generals will be controlled by electric stimulation of the brain.” 76
In his paper “Intracerebral Radio Stimulation and Recording in Completely Free Patients,” Delgado observed that:
“Radio Stimulation on different points in the amygdala and hippocampus in the four patients produced a variety of effect, including pleasant sensations, elation, deep thoughtful concentration, odd feelings, super relaxation (an essential precursor for deep hypnosis) colored visions, and other responses.”77
74 Collins, Anne. In the Sleep Room. The Story of CIA Brainwashing in Canada. Ken Porter Books, 1988
75 Tyner, Arlene. Mind-Control Part 1: Canadian and US Survivors Seek Justice, PROBE Magazine, March-April, 2000
76 Dr. Jose M.R. Delgado Director of Neuropsychiatry, Yale University Medical School. Congressional Record, No. 26, Vol. 118 February 24, 1974.
Delgado, to his credit, did make great strides toward a better understanding the physiology of brain structures and their attendant behavioral and emotional correlates, strides that did not go unnoticed by the intelligence community and the military.
While Delgado worked in an area of specific interest, the direct stimulation of brain structures through implanted electronics, other researchers explored means of creating multiple personalities and programming the alternate personalities that emerged to do a variety of intelligence related work as operatives, still others explored the effects of various drug combinations and other “programming” and interrogation techniques aimed at creating super spies and breaking down enemy agents.
THE EXPOSURE OF WATERGATE/MKULTRA/COINTELPRO
According to testimony by Senator Edward Kennedy in 1977,
“Some 2 years ago, the Senate Health Subcommittee heard chilling testimony about the human experimentation activities of the Central Intelligence Agency. The Deputy Director of the CIA revealed that over 30 universities and institutions were involved in an ‘extensive testing and experimentation’ program which included covert drug tests on unwitting citizens ‘at all social levels, [high and low], native Americans and foreign.’ Several of these [tests involved] the administration of LSD to ‘unwitting subjects in [social] situations.’ … The Central Intelligence Agency drugged American citizens without their knowledge or consent. It used university facilities and personnel without their knowledge.” 78
As an example of the hubris wrought by institutions veiled in secrecy, given unlimited funds and staffed with amoral people we can only refer to the statement made by George White in a letter to MKUltra director Sidney Gottleib: “I toiled wholeheartedly in the vineyards because it was fun, fun, fun! Where else could an American boy lie, cheat, rape and pillage with the sanction and blessing of the All Highest?” 79
After Watergate, more information hit the papers, COINTELPRO was uncovered by a group of people who have never been apprehended, in spite of a six-year FBI investigation. The COINTELPRO program was secret until 1971, when an FBI field office was burglarized by a group calling themselves the Citizens’ Commission to Investigate the FBI. These people broke into an FBI office in Pennsylvania, rifled through the filing cabinets and leaked to the press documents detailing the abuses suffered by a wide variety of activists, including a long-term plan to destroy Martin Luther King Jr.:
77 “Intracerebral Radio Stimulation and Recording in Completely Free Patients,”, The Journal of Nervous and Mental Disease, Lippincott Williams & Wilkins, October, 1968.
78 Testimony of US Senator Edward Kennedy, Joint Hearing before the Select Committee on Intelligence, US Senate, 95th Congress, 1977.
“Agents tapped his phone, bugged his rooms, trumpeted his supposed commie connections, and his sexual proclivities, and sicced the Internal Revenue Service on him. When it was announced in 1964 that King would receive a Nobel Peace Prize, the FBI grew desperate. Hoping to prevent King from accepting the award, the Bureau mailed him a package containing a tape of phone calls documenting King’s extramarital affairs and an anonymous, threatening letter (shown here in censored form). In barely concealed language, King was told to commit suicide before the award ceremony or risk seeing his “filthy, abnormal fraudulent self” exposed to the nation. Fortunately, King ignored the FBI’s advice. He accepted the award and lived four more years until his assassination.” 80
Some of the largest COINTELPRO campaigns targeted the Socialist Worker’s Party, the Ku Klux Klan, the “New Left” (including several anti-war groups such as the Students for a Democratic Society and the Student Nonviolent Coordinating Committee), Black Liberation groups (such as the Black Panthers and the Republic of New Africa), Puerto Rican independence groups, the American Indian Movement, and the Weather Underground. Later, Director Hoover declared that the centralized COINTELPRO was over, and that all future counterintelligence operations would be handled on a case-by-case basis.81
In addition, the MKULTRA documents hit the press and a number of books were written about the subject, most notable were’ “The Search for the Manchurian Candidate” by John Marks, “Bluebird” by Colin A. Ross MD, and “A Nation Betrayed” by Carol Rutz. At this point victims began to come forward with claims of being horribly abused in these programs, one of the most famous is a woman named Candy Jones who described in stunning detail a tale of corruption and abuse.82
When Jimmy Carter became President in 1976 he promptly moved to introduce a modicum of control, he instituted the Foreign Intelligence Surveillance Act establishing an 11 member secret court to oversee the surveillance activities of our covert agencies. As an example of the limited reporting requirements for the court we have the first report issued to Vice President Mondale from Attorney General Benjamin R. Civiletti in 1979:
80 Martin Luther King, Jr., “Statement on Joseph Alsop and J. Edgar Hoover’s charge of alleged Communist infiltration of the Civil Rights Movement,” 23 April 1964 and Select Committee to Study Governmental Operations with Respect to Intelligence Activities, United States Senate, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans, Book III, Final Report. 14 April 1976
81 “Me and My Shadow”: A History of the FBI’s Covert Operations and COINTELPRO – Part 1. Produced by Adi Gevins, Pacifica Radio. 1976. Rebroadcast by Democracy Now! Wednesday, June 5, 2002. See also Paul Wolf’s website for a detailed archive of official COINTELPRO documents and transcripts of the Church Committee hearings:http://www.icdc.com/~paulwolf/cointelpro/cointel.htm
82 Donald Bain, . The Control of Candy Jones. Chicago, Playboy Press, 1976. (Reissued in 2002 by Barricade books as The CIA’s Control of Candy Jones with a new introduction by Bain)
This report is submitted pursuant to Section 107 of the Foreign Intelligence Surveillance Act of 1978, Title 50, United States Code Section 1807.
During calendar year 1979, 199 applications were made for orders and extensions of orders approving electronic surveillance under the Act. The United States Foreign Intelligence Surveillance Court issued 207 orders granting authority for the requested electronic surveillances. No orders were entered which modified or denied the requested authority.83
Pointedly Carter’s reform measure did not do anything to insure that the American public would be protected in the future from abuse and testing at the hands of the intelligence arm of the military- industrial complex. Carter’s move to reform the CIA was to appoint an outsider as head of the agency, Admiral Stansfield Turner. After Turner took over as Director of the CIA 800 “rogue” agents were let go, though most all of them found work in various false front companies that had been set up in the previous years. 84
Both the Rockefeller Commission and the Church Committee revealed a long standing pattern of both developing new psychological, pharmaceutical and radiological technologies, to influence individuals and groups and long standing pattern of behavior whereby politically disruptive citizens were systematically targeted, harassed and destroyed. Yet there have, to date, been no provisions instituted which would stop this behavior, nor is there any guarantee that these kinds of covert programs ever actually ceased. The only practical change engendered by the disclosures of the 1970s was to drive these kinds of operations further into the shadows. That such research and experimentation may still be occurring is evidenced by a DOD directive, issued by the Secretary of the Navy on November 6, 2006 that specifically requires prior approval of the Under Secretary of the Navy before conducting “severe or unusual intrusions, either physical or psychological, on human subjects (such as consciousness altering drugs, or mind-control techniques).”85
Non-Lethal Weapons Research Today
There is a long history that illustrates US Intelligence operations had tragic results for many involved. There was, however, no public debate surrounding these black operations because they were classified under the guise of national security. MKULTRA, Project PANDORA, plutonium testing, and many more projects conducted by the DOD and the CIA were exposed by committees led by Senators Rockefeller and Church in the 1970s.86 However, tighter restrictions on human experiment including accountability and transparency did not occur until 1997, when President Clinton instituted revised protocols on human experiments.87
84 William Blum, The CIA: A Forgotten History, Atlantic Highlands, New Jersey, Zed Books Ltd. 1986; Alan Moore Bill Sienkewitz, Shadowplay-The Secret Team, Forestville CA, Eclipse Books, 1987 and Leslie Cockburn, Out of Control, New York, Atlantic Monthly Press 1987.
Official reports insist that the research involving experiments during the 1950s through the 1970s was destroyed. Yet, the scientists involved went without punishment, free to continue their careers.88 Given the levels of ongoing EMF technology research today, and the recent retroactive approval of torture approved by the Military Commissions Act, it may be that human testing is occurring under post-9/11 national security protocols. Can we accept that all the psychological research conducted with government funding up to the 1970s was simply destroyed? At this time, the American public has no way to answer this question. The current administration classifies more information than any previous US administration.89 Unclassified documents have even been recalled and re-classified.90
In the 1980s nuclear radiation experiments on humans became public knowledge and Russian tests making use of the electromagnetic spectrum were exposed.91 Countries around the world passed laws and signed treaties in response to the danger of weapons that could adversely effect human behavior or manipulate human cognition. The Russians banned all EMF weapons in 2001.
These treaties have roots in the human radiation experiments of the 1950s, 1960s and 1970s. In effect, these treaties declared a basic tenant of human rights and cognitive liberties.92
In the quest for global military superiority, the US stepped up funding for the concept of the “Future Warrior” beginning in the late 1990s with the use of advanced nano-technology.93 The idea was to streamline the military, improve soldier performance, control the fighting in real-time and avoid soldier mortality. Toward this end, the concept was to enhance the ability of soldiers in the field to interface with computer systems by using their own brain waves.94 The US began to fund research into decoding the brain as well as other neurological research. President George H.W. Bush declared the 1990s “The Decade of the Brain”.95 At the same time, funding for computer to human interface poured into universities and Defense Advanced Research Projects Agency (DARPA) stepped up their research and development. In the universities, the field became “cognitive science” and within DARPA, the term “augmented cognition” was born.96 While developments in brain research are touted for their amazing therapeutic advances in the medical field, they primarily serve the purposes of the US military.97
87 Memorandum of March 27, 1997–Strengthened Protections for Human Subjects of Classified Research. [Federal Register: May 13, 1997 (Volume 62, Number 92)] [Page 26367-26372].
88Scientific American talks about the work of Jose Delgado and states that Dr. Delgado stopped doing research as late as the 1990’s, see: John Horgan, “The Forgotten Era of the Brain”, Scientific American, September 26, 2005.
91The United Nations and Disarmament: 1945-1985 by the UN Department for Disarmament Affairs. (1985) New York, UN Publication Sales
92 For a comprehensive listing of treaties and international conferences surrounding these concerns, see the Sunshine Project at http://www.sunshine-project.org/, See Also: Human Rights: Beyond the Liberal Vision, Judith Blau and Alberto Moncada, Rowman and Littlefield Publishers, 2005
93 Amy Kruse, Program Manager at Defense Sciences Office, DARPA “Defense and Biology: Fundamentals for the Future”. MIT also has The Institute for Soldier Nanotechnologies established in 2002 with a five-year, $50 million contract from the US Army, http://web.mit.edu/isn/index.html.
Americans have little idea about the research concerning the capabilities of electromagnetism, directed acoustics, or computer-human interfacing. The majority of Americans do not know that we are currently using these new-concept weapons in Iraq and Afghanistan. Indiana University law professor David Fidler stated to the Economist, “because these weapons are most likely to be used on civilians, it is not clear that using them is legal under the international rules governing armed conflict…if they are used in conjunction with conventional weapons, they could end up making war more deadly, rather than less.”98
A peek into the US arsenal of weapons is like a look into a science fiction film. DARPA and various military research labs provide a view of the current technology available to enhance US soldiers in the field and manipulate the emotions and behaviors of the perceived enemy. As American sentiment toward the Iraq war spirals downward, along with the approval ratings of the US president, domestic civil disobedience is likely to rise, as it has in many countries in response to US foreign policy.
Are new electromagnetic weapons in the possession of the government be used on American citizens? The issue at hand is whether the research and technology currently being developed will benefit or harm us and how much liberty we are willing to sacrifice for a possibly skewed sense of national security and protection.
In September 2006, Air Force Secretary Michael Wynne announced that crowd control weapons should be tested on Americans first. “If we’re not willing to use it here against our fellow citizens, then we should not be willing to use it in a wartime situation,” said Wynne. “(Because) if I hit somebody with a non-lethal weapon and they claim that it injured them in a way that was not intended, I think that I would be vilified in the world press.”99
95 The proclamation declaring the 1990’s the “Decade of the Brain” was signed by President George H.W. Bush on July 17, 1990, which can be accessed at the Library of Congress, http://www.loc.gov/loc/brain/proclaim.html.
98 “Electromagnetic weapons: Come fry with me”, The Economist, January 30, 2003.
99 Lolita C. Baldor, Associated Press, 9/12/2006. In addition to this comment, the Air Force released a declassified document located at the website of the Federation of American Scientists, ( http://www.fas.org/sgp/eprint/hamilton.pdf directing the acquisitions team from the media. The author is the USAF principal deputy assistant secretary for acquisition, management and logistics, Darlene Druyun:“Effective immediately, I do not want anyone within the Air Force acquisition community discussing any of our programs with the media (on or off the record). This includes presenting program briefings in any forums at which the media may be present.”
Non-lethal weapons sound harmless in relation to guns and bombs. However, non-lethal weapons are not just tazers and annoying sounds. Nor are they harmless. In fact, NLWs are such a concern that many countries have treaties demanding transparency. Beginning in the 1990s, groups have formed to provide oversight of NLW research, including international committees, concerned scientists, and citizens’ groups including the Federation of American Scientists and the Center for Cognitive Liberty and Ethics.100 The proliferation of NLWs have raised concern within the EU, Russia, and other countries, as records of Cold War abuses come to light and people come forward with complaints of illegal testing.101
The concern is more than a political issue and stretches beyond civil liberties into human rights as they relate to a person’s cognitive liberties. The following section highlights technologies with the capability to control and manipulate individuals or large groups of people.
Crowd Control using the Electromagnetic Spectrum
The electromagnetic spectrum has provided the military with an expanse of weapons, which are operational and in military and private use today in the form of millimeter waves,102 pulsed energy projectiles, and high power magnetic weapons.
The US has deployed the Project Sheriff active denial weapon in Iraq. Raytheon outfitted Humvees with their Silent Guardian Protection System, a device capable of heating the skin to 1/64 of an inch, causing instant pain similar to intense sunburn, 103with the goal to facilitate dispersing a crowd.
According to a report released by the Air Force on the human effects of this weapon, people with contact lenses and those wearing metal suffered greater effects. An imprint of a coin was discovered on the skin of a test subject and death or severe heart problems may occur.104
Pulsed Energy Projectiles
100 For a list of these groups see, Non Lethal Weapons, July 2005, compiled by Terry Kiss, Bibliographer, Air University Library, Maxwell AFB, AL accessed at the Maxwell Internet site, http://www.au.af.mil/au/aul/bibs/soft/nonlethal.htm and Appendix A of this paper.
101 For further reading on these treaties, see The Bulletin of Atomic Scientists , September/October 1994 pp. 40-45 (vol. 50, no. 05), “The Soft Kill Fallacy” by Steven Aftergood and Barbara Hatch Rosenberg’s in the same issue, “Sidebar: A non-lethal laundry list”. Rosenberg cites the Conference on Disarmament, Report of the Ad Hoc Committee on Chemical Weapons to the Conference on Disarmament, Aug. 26, 1992, Nos. 22, 25, 34 (CD/1170) as well as the treaty, “Convention on Prohibition or Restriction of the Use of Certain Conventional Weapons Which May Be Deemed to Be Excessively Injurious or to Have Indiscriminate Effects.”
102 A detailed study conducted by Andrei G. Pakhomov, Yahya Akyel, Olga N. Pakhomova, Bruce E. Stuck, and Michael R. Murphy with the Brooks Air Force Base, Human Effectiveness Directorate, offers a scientific analysis of the effects of millimeter waves, “Current State and Implications of Research on Biological Effects of Millimeter Waves: A Literature Review”, McKesson BioServices (A.G.P., Y.A., O.N.P.), U. S. Army Medical Research Detachment of the Walter Reed Army Institute of Research (B.E.S.), and Directed Energy Bioeffects Division, Human Effectiveness Directorate, Air Force Research Laboratory (M.R.M.), Brooks Air Force Base, San Antonio, TX.
Pulsed Energy Projectiles (PEPs) are another form of weaponry that is used to paralyze a victim with pain. According to New Scientist magazine, the expanding plasma effects nerve cells, but the long- term effects remain a public mystery.105 The Joint Non-Lethal Weapons Program reports that, PEPs create a flash bang effect that startles and distracts.106 However, the effects are much greater than just startling an individual. A 2001 Time magazine article states that the PEP “superheats the surface moisture around a target so rapidly that it literally explodes, producing a bright flash of light and a loud bang. The effect is like a stun grenade, but unlike a grenade the pep travels at nearly the speed of light and can take out a target with pinpoint accuracy…as far away as 2 km.”107
While the effects of these weapons appear to be short-term and topical in nature, there is evidence that electromagnetic weapons have effects on the brain, including sleep disruption and behavior changes.108They can produce anxiety and fear or compliance in humans. It is possible to use these weapons as a means of torture, yet without knowing exactly when, where, and how the weapons are used, we are left to speculate.109 An article by David Hambling in New Scientist magazine, March 2005, was titled, “Maximum pain is aim of new US weapons.” In 2006, Dr. Brian Martin, associate professor in Science, Technology and Society, University of Wollongong, Australia, co-authored a paper entitled “Looming struggles over technology for border control,” which describes the potential catastrophes that would lead to an extreme border protection plan. In the event of a natural disaster, or the rapid reduction of resources, or a major climactic change such as drought, rich countries will have a need to reinforce their borders against a massive influx of refugees. This scenario is often described in the nation-state context but it is possible to imagine such a perceived need in the event of internal civil unrest.
In Maoist China, cities were equipped with megaphones, bombarding the people with on-going propaganda. The megaphones were in full vision of the people, yet there was no way to escape the sound. Today technology exists that fills a similar purpose. Voice to Skull directed acoustic devices are neuro-electromagnetic non-lethal weapons that can produce sounds within the skull of a human.110
A similar technology, known as Hypersonic Sound, is used in a similar fashion. According to its inventor, Elwood Norris of American Technology Corporation (ATC), the handheld speaker can focus sound waves directly at a person without anyone else hearing the sound. The technology is being tested by corporations such as McDonald’s and Wal Mart to direct advertisements into a consumer’s head.
109 David Hambling, Maximum Pain is Aim Of New US Weapons, New Scientist, March 2005.
110 Definition from the Center for Army Lessons Learned, Fort Leavenworth, KS: “Nonlethal weapon which includes (1) a neuro-electromagnetic device which uses microwave transmission of sound into the skull of persons or animals by way of pulse-modulated microwave radiation; and (2) a silent sound device which can transmit sound into the skull of person or animals. NOTE: The sound modulation may be voice or audio subliminal messages. One application of V2K is use as an electronic scarecrow to frighten birds in the vicinity of airports.”http://call.army.mil/products/thesaur/00016275.htm
The Long Rage Acoustical Device (LRAD),111 is used by the military in situations such as crowd control, mass notification, and perimeter enforcement. For instance, an unruly mob may not hear a warning to disperse with traditional acoustic technology, or border enforcement agents may need to warn an approaching intruder to turn away or face bodily harm. The technology has advantages over lethal force, yet it also has the potential to inflict physical harm, emotional manipulation, and death. According to Defense Update, the LRAD can produce a 150-decibel acoustic beam from 300 meters away. The human threshold for pain is between 120 to 140 decibels.112 In a 2003 New York Times article Mr. Norris demonstrates his technology to the reporter. At 1% of capacity, the reporter’s eyes hurt, and hours later still experienced a headache.113
This technology can inflict permanent damage and death despite its classification as a non-lethal weapon. While the LRAD may be seen as a way to save lives in times of disaster or to avoid civilian casualties, the LRAD and similar directed acoustics may be cause for concern to those who exercise their right to assemble and conduct peaceful demonstrations and protests. The New York City police used the LRAD at the Republican National Convention and it was also used in Miami at a WTO Free Trade protests.114 Covering one’s ears will not protect a person and given, the long-range capabilities, fleeing from the beam may not help either (as evidenced in the use of directed acoustics against Jewish settlers in Gaza). The Associated Press (AP) reported that a device called “the scream” was used in a 2005 protest against Palestinians who “covered their ears and grabbed their heads, overcome by dizziness and nausea, after the vehicle-mounted device began sending out bursts of audible, but not loud, sound at intervals of about 10 seconds. An AP photographer at the scene said that even after he covered his ears, he continued to hear the sound ringing in his head.”115
Neurobiology has many facets including therapeutic applications with Alzheimer’s, epilepsy, depression, and stroke victims using Trancranial Magnetic Stimulation (TMS). Bush’s Decade of the Brain produced outstanding advances for those with spinal cord injuries as well, which allows a paralyzed person to control a computer screen or a limb with a brain implant. There is also a new field in neurological research, Augmented Cognition. From universities to private business to the military, advances in neuro-technology can be used for amazing good. However, as we learned from the history of the Cold War, technology that has the capacity to heal also has the capacity to harm.
Of great concern is the research being conducted at DARPA, which is trying to revolutionize the way soldiers receive information, respond to orders, adapt to stress, and perform while sleep deprived.
111 The LRAD is another invention of Elwood Norris of American Technology Corporation.
112 Jurgen Altmann, “Acoustic Weapons: A Prospective Assessment,” Science and Global Security, Vol. 9, p. 13.
113 Marshall Sella, “The Sound of Things to Come”, New York Times, March 23, 2003.
TMS is being developed for military purposes using electrical impulses at close proximity to the skull to enhance mood, affect sleep patterns, and increase creativity.116 This technology is beginning to replace electro-shock therapy. DARPA granted a contract to the Medical University of South Carolina to research now to improve a soldier’s performance. A soldier’s reaction to stress may be less intense, or a 40-hour flight will allow for the soldier to remain awake without the side effects of sleep deprivation.117 Few, if any, understand the long-term effects of TMS, given its relative infancy in the overall field of Augmented Cognition. Does TMS produce unknown neurological effects ten, twenty, fifty years down the road? To what extent is TMS being researched? TMS is part of the overall field of Augmented Cognition. In essence, Augmented Cognition allows a human to interact with a computer through brain waves. The idea is to enhance a person’s cognitive capabilities in the area of memory, learning, attention, visualization, and decision-making.
One application of augmented cognition allows a user to monitor a person’s brain functions and send anticipatory commands to the person being monitored. For instance, a military command unit will be able to monitor a pilot in a cockpit, and based on the sensory output of the soldier, the base command can input messages directly into the pilot’s brain to improve performance. DARPA describes this as a human computer symbiosis whereby, “This research will enable development of closed loop human-computer technologies, where the state of the user is measured, analyzed, and automatically adapted to by the computational system.”118 The increase in human-computer relations and the ability to manipulate and control a person’s senses, memory, and neural output has wide implications.
The basic ability to enter a person’s mind is not a futuristic fantasy. This is real and in prototype. DARPA began this research in 1983.119 The Internet has become a focal point in our lives with reliance for information and communication. Our interaction and intimacy with computers is increasingly pervasive, as is our exposure to the field of augmented cognition. DARPA does not address the implications of such symbiosis, or the dilemma of he extent to which a person can or should be manipulated. The use of this technology is used for military purposes but it may not be long until it is used to “improve” the factory worker, prisoners, or the mentally ill.
117 MUSC To Develop Brain Stimulation Device For Military, Charleston, SC, May 9, 2002, www.musc.edu/pr/darpa.htm, “The overall goal of the project is to use the unique resources at MUSC’s Brain Stimulation Laboratory and Center for Advanced Imaging Research to determine if: 1. non-invasive stimulation of the brain can improve a soldier’s performance, 2. and then design, manufacture and test a prototype of a system that would be capable of delivering this technology in the field.”
119 New Generation Technology: A strategic plan for its Development and Application to Critical Problems in Defense, DARPA, 1983.
Another realm of brain research is the field of neural implants. Until recently, implants were a futuristic fantasy. Current advances in the private and military sectors have produced an implant that can allow a victim of a spinal cord injury to walk again or give an amputee the ability to control her leg with her mind. In the private sector, Cyberkinetics is leading the way to liberating some people from wheelchairs. This technology is a path to a more functional way of life, but it is also possible that the use of implants could be used for malevolence.
John Donohoe, founder, chief scientific officer, and director of Cyberkinetics, addressed the issue of mind control and neural implants. When asked if creating a brain-machine interface will open the door to mind control Donohoe responded, “We do that all the time already. Advertising is mind control. Even pharmaceutical agents are a form of mind control. When people have behaviors that deviate far from the norm, they are given medications that bring their mind back into the realm of behavior that we call normal. If a child were to have a seizure and became unconscious because of the seizure, and we controlled his mind so that he did not have seizures, that would be a wonderful thing. We want to do that.”120
Many scientists, philosophers, psychologists, and military analysts have written on the possibilities of accumulating information directly from the human brain as well as controlling human beings for various governmental and militaristic purposes using the aforementioned technologies. What follows are excerpts from recent interviews conducted by the authors with notable experts focusing on the capabilities of US EMF technologies and concerns about human rights and cognitive liberty. We contacted twenty-two experts in the fields of EMF technologies, many would not comment. The following are quotes from four experts who were willing to publicly address the subject.
Vladimir Nikolaevich Lopatin
Director of The Republican Scientific Research Institute of Intellectual Property, Moscow, former Deputy of the State Duma of the Russian Federation on the Vologda from 1995 to 1999, and Senior Assistant to the General Public Prosecutor of the Russian Federation. During the 1990s Lopatin was active in the Russian Federation’s banning of EMF technologies for military purposes.122
120 Neuroscience: John Donoghue By Aaron J. Sender, Discover Vol. 25 No. 11, November 2004, Mind & Brain
121 Gaining interviews with DARPA scientists and officials at the Human Effectiveness Directorate at Brooks proved troublesome. For information about current projects, see DARPA Defense Science Program, specifically COL Geoffrey Ling, M.D., PhD’s program “Human-Assisted Neural Devices” and Amy Kruse’s Improving War fighter Information Intake Under Stress (AugCog) and Neurotechnology for Intelligence Analysts. At the Human Effectiveness Directorate see Andrei G. Pakhomov , Yahya Akyel , Olga N. Pakhomova , Bruce E. Stuck , Michael R. Murphy, “Current state and implications of research on biological effects of millimeter waves: A review of the literature”, in Bioelectromagnetics, Volume 19, Issue 7 , Pages 393 – 413.
122 The following are excerpts of an interview with Lopatin translated by U.C. Davis student, Tatiana Kanare.
The following are quotes from Lopatin:
“At the same time, the necessity of protection from information weapons, information terrorism and information war is being discussed more often during the last years.”
“…according to the Security Department of the Russian Federation, directors of Russian Special Services and the Ministry of Defense of Russia. Based on the data of special services, by the beginning of the 21st century expenses for purchasing means of information war increased within the last 15 years in the USA in four times and are ahead of all armament programs. Information confrontation during the times of a regular war began to change to a new, higher level – information war.”
“According to article 6 of the Federal Law “On weapons,” as of July 30, 2001, on the territory of the Russian Federation it is forbidden to circulate as means of civil and service weapons: ‘weapons and other objects, destructive ability of which is based on the use of electro-magnetic, light, heat, infrasound and ultrasound radiation and which have output parameters that exceed the amounts, set by state standards of the Russian Federation and norms of the federal body of executive power responsible for healthcare, and also mentioned above weapons and objects, manufactured outside of the territory of the Russian Federation’.”
British psychoanalyst, private practice in London, member of The College of Psychoanalysts and the Institute for Psychotherapy and Social Studies and member of their Ethics Committee.
Asked if there are human rights concerns associated with these particular non-lethal weapons, Smith answered, “Yes – it depends though by what is meant by ‘the wrong hands’. For people who are targeted for experimentation – all such devices need testing – all hands are the wrong hands, be they government, private commercial, or sadistic/commercial. Ionatron, a large company based in Arizona, developed plasma channel directed energy weapons and state in their website: ‘What are LIPC laser-guided directed-energy weapons? Laser-guided directed-energy weapons work like “man-made lightning” to disable people or things. LIPC technology is Ionatron’s proprietary type of laser-guided directed-energy weapon. LIPC stands for laser-induced plasma channel; the plasma channel is how the energy is directed through the air at the target. Extremely fast femto-second lasers cause light to break into filaments, which form a plasma channel that conducts the energy like a virtual wire. This technology can be adjusted for non-lethal or lethal use’.”
Discussing neurotechnology, Smith adds, “Brain mapping indicated to us the pleasure centers of the brain. TMS is the accessing these with rapidly changing magnetic fields to produce electrical fields.
If the right hand rule is operative, the effect of inducing electrical fields by changing magnetic fields improves mood.
(Lenz’s law, however, gives the direction of the induced electromotive force (EMF) resulting from electromagnetic induction, thus: The EMF induced in an electric circuit always acts in such a
direction that the current it drives around a closed circuit produces a magnetic field which opposes the change in magnetic flux.) In other words, it would be possible to create depression and a feeling of overwhelming hopelessness by the induction of a current into the electrical circuit of the brain, which opposed the change in magnetic flux.123
“In 2004, The US Air Force Directorate: Controlled Effects gives a clear picture of objectives: “The Controlled Effects long-term challenge focuses technology developments in three primary areas Measured Global Force Projection looks at the exploitation of electromagnetic and other non- conventional force capabilities against facilities and equipment to achieve strategic, tactical, and lethal and non lethal force projection around the world. Controlled Personnel Effects investigates technologies to make selected adversaries think and act according to our needs. Dominant Remote Control seeks to control, at a distance, an enemy’s vehicles, sensors, communications, and information systems and manipulate them for military purposes. The S&T Planning Review panel looked first at extending the applications of advanced military technologies currently under development and then at new, revolutionary technologies for their military significance.”
“For the Controlled Personnel Effects capability, the S&T panel explored the potential for targeting individuals with non lethal force, from a militarily useful range, to make selected adversaries think or act according to our needs. Through the application of non-lethal force, it is possible to physically influence or incapacitate personnel. Advanced technologies could enable the war fighter to remotely create physical sensations such as pressure or temperature changes. A current example of this technology is Active Denial, a non-lethal counter-personnel millimeter wave system that creates a skin heating sensation to repel an individual or group of people without harm. By studying and modeling the human brain and nervous system, the ability to mentally influence or confuse personnel is also possible. Through sensory deception, it may be possible to create synthetic images, or holograms, to confuse an individual’s visual sense or, in a similar manner, confuse his senses of sound, taste, touch, or smell. Through cognitive engineering, scientists can develop a better understanding of how an individual’s cognitive processes (pattern recognition, visual conditioning, and difference detection) affect his decision-making processes. Once understood, scientists could use these cognitive models to predict a person’s behavior under a variety of conditions with the potential to affect an adversary’s mission accomplishment via a wide range of personnel effects.”124
Dr. Dean Radin
Former positions at AT&T Bell Labs and GTE Labs on advanced telecommunications R&D, appointments at Princeton University, University of Edinburgh, University of Nevada, SRI International and Interval Research Corporation, co-founder of the Boundary Institute, Senior Scientist at the Institute of Noetic Sciences. Adjunct appointment at Sonoma State University, Distinguished Consulting Faculty for Saybrook Graduate School.
“I have spoken with experts in this area (extremely low frequency) about health effects in general
and the consensus seems to be that non-ionizing EM radiation definitely does have effects on living systems, from individual cells to human behavior. The principle health concern is childhood leukemia associated with proximity to high-tension lines. There the epidemiological evidence is fairly clear. On other sources of EM, like cell phones and microwaves, the jury still seems to be out, although I strongly suspect that directed microwaves at non-ionizing strength can induce all sorts of behavioral changes through direct influence of the nervous system. This comes from my contacts in the non-lethal weapons arena, which is often lumped in with the hysteria over supposed psychic mind-control. All things being equal, I’d rather see development of non-lethal weapons than lethal ones. How such weapons are actually used is another matter, of course.”
“The question is, were there ever elements of the intel/military world engaged in experiments on human behavior (not mind) control? Yes, many decades ago, during the cold war. But is such work still taking place? I don’t know, because if it is it would be a black project and then by definition only those involved would know of it. I hope no such projects are underway, because I do believe that EMF, used in nefarious ways, can destabilize the brain, and potentially generate feelings of violence or apathy. But I very strongly doubt that specific thoughts or intentions or actions can be induced”
Dr. Nick Begich
He is the editor of Earthpulse Flashpoints, a new-science book series and published articles in science, politics and education and is a well known lecturer, having presented throughout the United States and in nineteen countries. Begich has served as an expert witness and speaker before the European Parliament and has spoken on various issues for groups representing citizen concerns, statesmen and elected officials, scientists and others. He is the publisher and co-owner of Earthpulse Press and Executive Director of The Lay Institute of Technology, Inc. a Texas non-profit corporation.
“There are several ways that microwaves can affect humans. For instance, the Sheriff and weapons that can heat the skin for crowd control do what the military states but they are capable of much more. The thermal heating weapons act like a car radio; you can change the frequencies to get different effects. The electromagnetic weapons send an impulse through the nervous system. They can transfer sounds, like Woody Norris’ directed acoustic weapons, which is contracted to the US government. It modulates a signal that is a radio frequency, which can be changed to affect certain organs. It can override an organ like the heart or the liver. So changing the perimeter is like changing the broadcast on the radio. These extremely low frequencies also have the capability to send messages directly into the head when only the receiver can hear it. (see the 1985 Radiofrequency Radiation Dosimetry Handbook).”
“The handbook talks about electromagnetics and about the rapid healing of bones. The frequencies can also be used to manipulate the brain and create a disequilibrium. These frequencies can also imbed signals on radio broadcasts to create a feeling of fear or anxiety. The US military would embed these signals on the Muslim prayer broadcasts during the first Gulf War. This was called Project Solo.”
“During the 1990’s, in both presidential administrations, non-lethal weapons such as these and others received priority funding. The Secretary of Energy under Clinton, O’Leary, warned that over a 40 year period, 500,000 had been unwitting test subjects for military research on non-lethal weapons, including MKULTRA who claims among many victims, Ted Kaczinky, the Unabomber. There is no way to know who these people are or how to help them because there is paranoia in the military and no oversight in Congress. These black projects probably don’t even make it to the President.”
“The problem is that the military’s role is to be paranoid and think up scenarios where the worst can happen then prepare for this in order to protect the people from a hypothetical future event. But there is little to no oversight. The Senate Intelligence Committee is made up of people like Ted Stephens who thinks the internet is made up of pipes and tubes. These people do not have the required background knowledge to ask the right questions. According to the defense budget report, 40% of the budget is dedicated to black projects. There is no oversight and no public knowledge. In the European Union, things are much different.”
“In February 1998, I testified before the European Union parliament for an hour and a half and convinced them of the detrimental effects of non lethal weapons on humans, their behavior and their minds. The EU was convinced and passed a resolution banning the use of weapons that can manipulate a person (see Parliament Resolution A4-005/99 entitled “Resolution on the Environment, Security, and Foreign Policy” passed on January 29, 1999). During the hearings, the US representative and NATO representatives sat in the back and declined to participate when asked. In the US, there is no such resolution or anything remotely close to being considered by any member of Congress. There is no concern for it in the US because no one knows about them.”
“During the 1980’s and 1990’s, there were a lot of papers that came out of the Naval War College and from top military officials that advocated using weapons that would cut down on the carnage seen by the American public in order to maintain public support. There was another paper that discusses how people will give up their liberties if they lived in a climate of fear by an outside enemy. If the US public knew about these weapons and what they could potentially asked to give up, their minds, the public would resist. So now, these weapons are being developed by the companies that comprise the industrial military complex who are immune from FOIA requests.”
“Without oversight, these weapons will a government to have absolute control. These weapons are most certainly in the hands of most industrialized countries. China certainly has them as intelligence reports released by the CIA reveal claims about these new concept weapons. There needs to be a debate in the public sphere because while these weapons appear frightening, they have amazing therapeutic potentials. There is the possibility of quicker healing and curing disease and what is just as important about government transparency concerning weapons is the transparency of life saving science being kept from the public. If we have the ability to cure and the government or military hides this, we have just as big a problem.”
Summary Analysis of Expert Interviews
From the four interviews we were able to complete, there is a clear consensus of concern for the potentiality of human rights abuses with EMF weapons testing and use. They collectively agree that the US is the leading global researcher in this area and spends increasingly more money building this technology. It is also clear that we know very little about the actual levels of experimentation, research, and capabilities of EMF weapons technologies due to high levels of US government security.
Department of Defense Military Contractors
Military contractors run our wars in concert with power elites. The corporation also has the power to determine which studies will reach the public.125 To be certain, the military, in the interest of budgets, will allow negative or alarming studies to remain unreported or lost in a sea of classified documents.
The power of the military and DOD contractors is staggering. In the interest of national security and lessons learned from an open democracy during the 1970s and the 1990s, operations have become more black. In essence, no one can know with certainty what our military, government, or corporations have in store for the world, though, we have some clues.
Michael Vickers, senior adviser to the Secretary of Defense for the 2005 Quadrennial Defense Review and principal strategist for the largest covert action program in the CIA’s history, recently testified on the importance of black operations:
“US Special Operations Command’s (SOCOM) emphasis after 9/11 has been to make white Special Operations Forces (SOF) more gray and black SOF more black. It is imperative, however, that white and black SOF be integrated fully from a strategic perspective.”126
The money involved in the non-lethal weapons industry is growing and military contractors are reaping the profits. According to Defense Industry Daily, Aaardvark Tactical, Inc. in Azusa, CA won a $50 million contract to develop non-lethal weapons, anti-terrorism capabilities, and riot gear.127 Ionatron was awarded a $12 million contract to develop the Laser Induced Plasma Channel technology which produces man-made lightening bolts.128 SAIC received a $49 million in November 2004 to develop High Power Microwave and other directed energy systems while Fiore Industries received a $16.35 million contract for similar technology and ITT received a $7.85 million contract
125 From Microwave News, July 2006, “Radiation Research and The Cult of Negative Results:” “When we investigated who sponsored the microwave-DNA papers published in Radiation Research, we discovered that four out of five were paid for by the wireless industry —notably Motorola— and/or the US Air Force, both of which have a long history of trying to control or suppress EMF research. Indeed, industry and the USAF paid for more than 75% of all the negative genotox studies, that is those published in all the various journals.”
127 “$50M for USMC Riot Gear, Protection Items, and Non-Lethal Weapons”, Defense Industry Daily, July 27, 2005.
128 “Ionatron Facing Scrutiny Over Laser Projects”, Defense Industry Daily, May 24, 2006.
for the same in 2000.129 Fiore Industries received a $7.1 million for High Power Microwave Research and Experiment Program as early as 1994 and the same year Hughes Missile Systems Company received a $6.6 million contract for High Power Microwave Suppression of Enemy Air Defense Technology.130 Lockheed Martin secured a deal with DARPA in 2005 to continue the development of the Space Based Radar Antenna Technology in a $19.5 million contract.131 According to the Lockheed press release, the technology, “could significantly increase global persistent surveillance coverage”.
In May of 2006, the Air Force issued $24 million in contracts for “Electro Magnetic Effects Research and Development” to Northrup Gruman, Voss Scientific, Lockheed Martin, Electro Magnetic Applications, and SAIC among others.132 The DOD viewed electromagnetic research and development as a key component in future wars as early as the 1990s. Emmett Paige Jr., Assistant Secretary of Defense for Command, Control, Communications and Intelligence declared in 1996 that, “Well over a decade ago, a Soviet general reportedly said something like ‘to prevail in the next conflict, one must control the electromagnetic spectrum.’ That statement proved true in the Bacca Valley and on deserts in Iraq. The Department of Defense is committed to ensuring that “in the next conflict it is we who will control the spectrum. We know its value’.133 Increasingly, the value of non lethal weapons continues to rise as they produce fewer images of death in the media than traditional weapons.”
In addition to DOD contractors, the realm of non-lethal weapons extends into the universities with millions of dollars in scholarships and research fellowships. Pennsylvania State University, sponsors the Institute for Non-Lethal Defense Technologies (INLDT), the University of Medicine and Dentistry of New Jersey has the Stress and Motivated Behavior Institute, University of New Hampshire houses the Non-lethal Technology Innovation Center, and many US military schools have classes directly related to non-lethal weapons technology.134 There are also numerous conferences each year hosted by the Department of Defense, contractors and universities.135 The business of non-lethal weapons is expanding and will continue to grow. In 2006, the Joint Non- Lethal Weapons Directorate received $43.9 million compared to $25.8 million in 2000.136
Ionatron’s website states that, “…the market for new directed-energy applications (will increase to $12.7 billion over the next ten years for the defense market alone.”137
129 “USAF Detachment 8 Continues US Research Into EMP-Microwave Weapons”, Defense Industry Daily, March 7, 2006.
131 Lockheed Martin news release, May 23, 2005, “Lockheed Martin Selected for Continued Development of the Innovative Space Based Radar Antenna Technology (ISAT)”.
132 US Department of Defense Office of the Assistant Secretary of Defense (Public Affairs), No. 169-06 March 01, 2006. 133 United States Department of Defense Speech, Volume 11, Number 83, “Electromagnetic Spectrum: Key to Success in Future Conflicts”, http://www.defenselink.mil/speeches/index.html.
134 See Industrial College of the Armed Forces, Naval War College, and the US Army War College course offerings on their websites.
135 Bunker, Robert J., “Non-Lethal Weapons Conferences”, Military Review, vol. 80, no. 2, Mar./Apr. 2000, pp. 103-109. 136 Pappalardo, Joe, “Homeland Defense Plan Favors Non-Lethal Technology”, National Defense Magazine, June 2005. 137 Direct quote from the Ionatron website: http://www.ionatron.com/default.aspx?id=4, accessed August 2006.
Despite Clinton’s reforms on human testing, the government, military and the corporation will undoubtedly want to test these weapons on humans whenever possible. Easiest to test would be prisoners in undisclosed CIA detention centers, civilians in war torn regions, and even US citizens in protest crowds or civilian jails. In addition to the rubber bullets and pepper spray, which are common in many police forces, new concept weapons are also in use. Perhaps soon Americans will learn first- hand, the effects of the new human control technologies.
However, hundreds of people continue to assert that a person or persons, whom they do not know, have been targeting them with electromagnetic weapons in a widespread campaign of either illegal experimentation or outright persecution.
These experiences involved a number of discrete phenomena:
Hearing voices when no one was present.
Feeling sensations of burning, itching, tickling, or pressure with no apparent physical cause. Sleeplessness and anxiety as a result of “humming” or “buzzing”.
Loss of bodily control, such as twitching or jerking of an arm or leg suddenly and without control.
Unexpected emotional states, such as a sudden overwhelming feeling of dread, rage, lust or sorrow that passes as quickly as it arises.138
The levels of research on directed energy is now large enough to support a Directed Energy (DE) Professional Society made up of private contractors and Department of Defense officials with security clearances. They have been holding high security symposiums since spring 2001 including a planned meeting set for March 2007. The following is from the Directed Energy Professional Society’s website.
“The Directed Energy (DE) Systems Symposium (March 2007) will focus on systems aspects of DE in a limited-attendance environment. The Systems Symposium consists of co-located technical sessions organized by five separate conferences, with joint technical and plenary sessions to encourage discussion outside narrow technical limits. Attendance at all sessions is limited to US citizens with classified visit requests on file.
138 This list of symptoms was compiled from material available on the website of Californians Against Human Rights Abuses (CAHRA) and can be found at www.mindjustice.org. In addition the authors conducted interviews with seven individuals who wish to have their identities protected and who presented anecdotal and physical evidence to support their assertions. There is, however, little in the public domain that conclusively states the existence of direct human manipulation by governments, militaries or private companies/researchers in the current day, MKULTRA and other historic programs notwithstanding. However, there are many organizations that seek to help these people including concerned scientists, Russian Duma members and EU parliamentarians, psychologists and academics. A list of organizations follows in Appendix A.
Beam Control Conference
Directed Energy Modeling and Simulation Conference Employment of Directed Energy Weapons Conference High Energy Laser Lethality Conference
High Power Microwave Systems and Effects Conference”139
The following are three course descriptions from the October Directed Energy Conference:
Course 9.†Military Utility Analysis for DE (Direct Energy) Systems Classification: Secret
Course Description: This course will provide an overview of military worth analysis for DE weapon systems. The course will include a description of four areas of systems engineering assessment that are brought together to form military worth analysis. These are: 1) weapon system concept performance trade studies, 2) target vulnerability assessment, 3) engagement-level system operational effectiveness assessment, and 4) war gaming and mission/campaign level analysis. Each of these areas will be covered during the short course, with emphasis on the elements that are drawn from each of these areas to support military worth analysis. The course will particularly emphasize methods for assessing system level effectiveness in the context of traditional weapon effectiveness tools such as the Joint Munitions Effectiveness Manuals (JMEMs) and for providing data on DE weapons effectiveness to mission and campaign level analysis tools and to models and simulations used to support war gaming.
Topics to be covered include:
Definition of military worth analysis
Elements of DE weapon system performance trade studies and how they feed military worth analysis Target vulnerability assessment and its use to support weapon effectiveness
Adapting standard weapon “kill” criteria to measure benefit of DE effects
Course Description: This course reviews laser material interactions over parameter ranges of interest for weapons applications. Fundamental considerations of the optical coupling of the laser energy into the material will be presented. This will be followed by physics-based treatments of the response of metals, organic-based materials, and ceramics to the laser irradiation.
Metals: Simple cw, one-dimensional treatments will be utilized to illustrate the general principles of the response of metals to laser radiation, but two-dimensional cases, phase changes, and pulsed effects will be discussed as well.
Organic Based Materials: The effects of high-energy laser (HEL) radiation on organic based materials, including fiber reinforced composites, plastics and coatings will be reviewed. Materials will range from char formers and charring ablators to clean ablators. The relationship between the pyrolysis processes taking place in various materials during HEL radiation will be reviewed as a function of material composition, form and structure.
Ceramic Materials: Considerations of the response of ceramic shapes when laser loading is added to in-service stresses will be presented. An understanding of these responses from models, which are based on a combination of the thermo-mechanical stress calculations and statistically based fracture initiation, will be presented.
Course 11.†Directed Energy Bioeffects Classification: Secret
Course Description and Topics: This course will introduce the basics of the biological effects of Directed Energy on cells, tissues, organisms, and humans, with particular emphasis on the influence of such effects on the development of use of Directed-Energy-Emitting technologies.
The student will learn about the mechanisms, resulting damage, and mission impact of laser-tissue interaction. The student will learn what tissues are most susceptible to laser damage based on wavelength, exposure duration, and irradiance. The potential mission-impact of sub0-threshold, threshold, and suprathreshold exposures will be discussed.
Student will understand the nature of RF bioeffects research, including human/animal studies, modeling and simulation, and biotechnology approaches. Students will become familiar with current state of knowledge on potential health effects RF, such as cancer, memory loss, and birth defects.
Students will become familiar with basis and structure of current RF safety standards, comparison between competing standards, and how RF safety standards are applied. Students will be instructed on common RF measurement equipment and important factors for investigating potential RF overexposures.
Topics to be covered include:
Laser damage of the eye (retina and cornea)
Laser damage to the skin Laser safety standards
Laser damage as a function of energy, pulse duration, wavelength, and spot size RF bioeffects research and the current scientific consensus on RF hazards
The US Joint Non-Lethal Weapons Directorate released a paper in 2004 which presents “Crowd Control Modeling and Simulation.” This report discusses behavioral changes human populations.141 That the Department of Defense calls for new weapons systems designed to work on the psychological underpinnings of a population should give human rights activists great cause for alarm. The use of electromagnetic weapons to alter the emotional state, hamper the ability of an enemy or US citizens, to think clearly, and result in chaos and pain are morally problematic for a number of reasons:
Creating fear, anxiety confusion and irrational behavior within an individual or a population is counterproductive to the operations of a free society and to the execution of warfare. Chaos only breeds the need for greater and greater means of physical repression; irrational behavior is by definition unpredictable and as such provides significant difficulty when the task is to secure an area.
These weapons leave no tell tale clues. There are no bullet holes or gross damage (with the exception of those designed to maim, burn or explode targets).
They are operated from a great distance, meaning that the operator has no feedback as to the effects of his or her actions. This provides us with a very dangerous circumstance very similar to Millgram’s experiment where we can predict with certainty gross abuses of power.
Any device that invades a persons mind, either through induction of “evoked potentials” through electromagnetic means or through the various “crazy-making” tactics employed in both information warfare and psychological operations is a violation of human rights and cognitive liberty.
In terms of authorizing and administering tests of radioactive substances and other tests on unsuspecting members of the public, history shows that people without ethical standards can rise to positions of great responsibility and once ensconced in such positions of trust, produce the most horrifying abuses without fear of reprisal. When layers of secrecy overlay the activities of otherwise rational and intelligent men, the failings of their hearts more readily show. In the case of actually attempting to control human behavior through both overt and covert means our departments of defense and intelligence agencies, both subordinate to the executive branch of government have historically proven incapable of protecting the public and undeserving of the trust given them to perform their functions for the public good.
141 Louis Slesin, “Radiation Research and The Cult of Negative Results”, Microwave News, July 31, 2006.
Total Surveillance: Cognitive Liberties vs. National Security
Today the US and the U.K. are becoming total surveillance societies in the name of national security. London, like cities across the US, is equipped with cameras citywide. Daily human actions are recorded with video and voice recognition device, while our email and computer usage is monitored. Increased demand for resources, the erosion of middle classes, war, poverty, and environmental disasters are historically factors leading to social uprisings and infiltration of political borders. As governments reinforce the threat of terror, people increasingly turn to their governments for protection.
The US has a long history of human rights violations through harassment, telephone tapping, video surveillance, behavior manipulation, torture, drug-induced states of conscience and psychological control. Congress’s passage of the Military Commission Act of 2006 put universal human rights outside the scope of US policy. Today, the US government is using the most technologically advanced forms of surveillance and control, along with the propaganda of fear and intimidation against its citizens. The US engages in covert torture, covert imprisonment, increased censorship and the massive secret classification of government documents.142
A prominent neuroscientist, Francis Crick stated in 1994, that “your joys and your sorrows, your memories and your ambitions, your sense of personal identity and free will, are in fact no more than the behavior of a vast assembly of nerve cells and their associated molecules.”143
Is it possible that today’s scientists in the employ of the US neo-conservative global-dominance policy elites believe the same? According to Steven Rose, there are, “bad hats” in neuroscience: “There are always opportunists. The current affairs of our country have produced many.”144 The abundance of neuro-research has led to the development of several products by private business in the name of national security, including brain fingerprinting.145
143 Michael Shermer, “Astonishing Mind: Francis Crick 1916–2004 recollections on the life of a scientist”.
144 Steven Rose, The 21st Century Brain: Explaining, Mending and Manipulating the Mind, Jonathan Cape Publishing, March 31, 2005.
145 The official explanation of Brain Fingerprinting from Dr. Lawrence Farwell: “Brain Fingerprinting testing is a scientific technique to determine whether or not specific information is stored in an individual’s brain. We do this by measuring brain-wave responses to words, phrases, sounds or pictures presented by a computer. We present details about a crime, training or other types of specific knowledge, mixed in a sequence with other, irrelevant items. We use details that the person being tested would have encountered in the course of committing a crime, but that an innocent person would have no way of knowing. We can tell by the brainwave response if a person recognizes the stimulus or not. If the suspect recognizes the details of the crime, this indicates that he has a record of the crime stored in his brain.” For more research, see the Brain Wave Science site, the official internet identity of Brain Fingerprinting Laboratories at http://www.brainwavescience.com/Publications.php.
John Norseen, a neuroscientist interested in Biofusion, the relationship between humans and computers, says, “If this research pans out you can begin to manipulate what someone is thinking even before they know it.” Norseen says he is agnostic on the moral ramifications of this research. He feels that he is not a “mad” scientist – just a dedicated one. “The ethics don’t concern me,” he says, “but they should concern someone else.”146
We, the authors of this report, contend that human ethics should concern every person who believes in human rights and desires control over their own mind and body. Our brains control our bodies, actions, and thought processes. If the government and the scientists they employ perceive that the human mind as simply a collection of neurons, it then becomes possible to justify the surveillance of the human mind and body for national security purposes.
The control and manipulation of a human brain is a terrifying possibility. Lieutenant Colonel Timothy L. Thomas, US Army (ret), published an article in the military journal Parameters which likens the mind as a new battlefield. He quotes a Russian army major in relation to mind wars, “It is completely clear that the state which is first to create such weapons will achieve incomparable superiority.” Thomas expresses concern about “information dominance” though he stops short on the moral implications.147
Under the cover of secrecy provided by claims of national security, researchers in service to higher circle policy elites have implanted electrodes into human subjects to control minds and tortured prisoners and the mentally ill in efforts to find better “brainwashing” techniques. They have poisoned thousands with atomic testing, experimented on young children using drugs, trauma and hypnosis, sprayed major cities with biological agents to prepare for a future attack, overthrown governments, instituted mass killings, and engaged in every form of information distortion.
The current “War on Terror” has revealed to the public some of the tools that the military has been developing for decades. High profile weapons systems flash across the nightly reports of the major news networks, including highflying Stealth bombers on grainy green tinted video from the noses of “smart” bombs. On occasion glimpses are given through the media of what one article dubbed “Wonder Weapons.”148 Weapons that fall under the military category of “Non-Lethal Weapons.” In fact the general position of the agencies who do comment on weapons that exploit the lower end of the electromagnetic spectrum is that they have no biological effect at all, except for what are dubbed “thermal effects,” in essence heating of human cells.149
Research into this subject has shown that this position is inaccurate, and that the effects of electromagnetic radiation weapons on human beings are in fact both chilling and dramatic. As reported in 2001, the statement of Dr. Eldon Byrd should be considered with great weight:
146 Douglas Pasternak, “John Norseen Reading your mind – and injecting smart thoughts”, US News and World Report, January 3-10, 2000.
147 Timothy L. Thomas, The Mind Has No Firewall, Parameters, Spring 1998, pp. 84-92.
148 Douglas Pasternak, “Wonder Weapons”, Newsweek August 22, 1994 p. 57.
149 H. Pollack, “Epidemiologic data on American personnel in the Moscow embassy”, Bull N Y Acad Med., 1979 Dec;55(11):1182-6.
“A medical engineer, Eldon Byrd, reported a case that illustrates this point. After working on the Polaris submarine, which carried long-range nuclear weapons, Byrd developed non-lethal weapons with reversible effects. He regarded this as a humanitarian alternative to ‘punching holes in people and having their blood leak out’ in battle. His inventions used magnetic fields at biologically active wave frequencies to affect brain function. Byrd could put animals to sleep at a distance and influence their movements. When the success of his research became evident, suddenly he was pulled off the project and it went “black.” His believes the electromagnetic resonance weapons he developed have been used for psychological control of civilians rather than for exigencies in battle. That is, to ensure his participation, he was uninformed about the true nature of the project. Byrd’s case also illustrates how morally tolerable operations may transition to morally intolerable operations, or at least rise above the atrocity line”150
Power elites who fund and support efforts at supplanting the will of the people do so from on high. Their ability to redirect public attention to ward external threats and away from their own motivations in effect silences opposition to their programs. By controlling the flow of information in society, the power elites provide the public with a limited choice in all matters that pertain to machinations of government and corporate control. Given more advanced technologies for the control of information unscrupulous individuals who ascribe to a “might makes right” philosophy may will find the ways and means of employing these technologies against those who would oppose their plans. The dangers here are great, in that the individual who would direct the torture and killing of innocents is usually removed from the actual fact. It is left up to lesser authorities to administer the beatings, bullets, and mind/body bending technologies.
For the US Government to unilaterally declare that our country will not comply with international human rights laws, nor uphold the core values of our nation’s foundation is an indication of extremism that supersedes the values and beliefs of the American people. When such extremism exists we need to take seriously the founders’ declaration that, “ to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed, — That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness.” (Declaration of Independence 1776)
Peter Phillips is a Professor of Sociology at Sonoma State University and Director of Project Censored. Principle researchers on this report were Lew Brown and Bridget Thornton. Lew Brown holds a degree in Psychology and was the main writer and researcher on the historical sections of
150 Military and Civilian Perspectives on the Ethics of Intelligence— Report on a Workshop at the Department ofPhilosophy Claremont Graduate University, September 29, 2000, Jean Maria Arrigo, Ph.D. Virginia Foundation for theHumanities and Public Policy Paper presented to The Joint Services Conference on Professional Ethics Springfield, Virginia January 25-26, 2001
this paper. Bridget Thornton is a senior level History major at Sonoma State University and the primary researcher and writer for the new EMF technologies portion. Final editing was completed by Trish Boreta with Project Censored. Special thanks to Andy Roth Ph.D. for his editorial review.
ORGANIZATIONS CONCERNED WITH ILLEGAL EXPERIMENTATION AND INDIVIDUAL VICTIMS
“Quiet Transformation: The Role of the Office of Net Assessment” The National Security Strategy Process, May 2, 2003
National Defense University
National War College, CDR Debra O’Maddrell
Therapeutic Application of repetitive Tran cranial magnetic stimulation: A Review Eric M. Wasserman and Sarah H. Lasanby
Elsevier, April 27, 2001
Magnetic Stimulation: An Introduction” by Grant Balfour
v1.0 – May 6, 2002
A Validation Methodology for Human Behavior Representation Models Authors: Simon R. Goerger; Michael L. McGinnis; Rudolph P. Darken Military Academy West Point, NY, Dept. of System Engineering
by Robert J. Bunker
By the way, I am not a conspiracy theorist but a conspiracy realist meaning that I do not write about things that I can not prove. Because of this, I have been financially attacked for the last ten years. I will be adding a donation option on the about page just as soon as I can figure it out. Thank you for reading this. Thank you for your support.
Diana Urrea Celis I have been a victim of very serious accusations and persecutions, and this organization has not only enslaved me for my whole life and my reputation, but also, they took my son from me and now they plan to deprive me of the few economic properties that I have and it has been perpetrated a long time ago.
David Savage They ask me what is wrong next time i attend they got security. Then they ask me what is wrong and i feel inclined not to speak. Is it a manipulation. Is it me hyperviligance. Idk. I follow my heart and i have not bad feeling or intent
David Savage Why dont people get me. Im not a bad man. Though i feel people feel i am
David Savage That being the case what are they judging me by
Michele Burns Like, wow. Nonstop. With some serious stuff, too. Unbelievable. I figure the jerk who put me into this wretched program had to be pretty scared of me to make up the kind of BS that he did. My understanding is that it is the fusion centers
Vonn Collin If you haven’t then you ain’t no target individual. We all get put through the same pathetic hivemind satanic pieces a sh*t nazi programs at different times.
Toby Foster Whats disturbing is that it appears that about 90% of the time approximately, a TI certainly knows that they are being slandered, but they don’t/can’t know what they are being slandered for. Can’t have them being able to speak, stand up for, defend themselves
Cabusao Jefferson many times, cannot be counted but God is also counting the times that we are being slandered by our perps
Michael E. Peoples ALL DAY, EVERYDAY. The flame of the programs can’t stay lit without the Gas of lies. Remember that
Chris Eckstein The slandering starts before we even realize we’re being targeted
Chris Eckstein The first two years just seems to be observation and slander.
David Mauricio I only know by the adverse behavior of others toward me that there must be something slanderous.
Karen Melton-Stewart Yep, and the worst are the vicious psycho or fake TIs. Fusion Center evil does not compare to them.
Jax DomnitzKaren Melton-Stewart I went to the TI events in 2019. I met more fake TIs than you can imagine. The perpetrators are sent to co-mingle. And those I trusted should not have been trusted. That is why I don’t go to these events any more.
Renee Dalton After 23 years I could write 10 million pages books on my life and these gangstalkers ..no lie …no lie …they want me you and all targets dead plain and ,simple, or in the nut house
Marina Ragsdale Slandering is the vital part of their ” programme ” against TI victims
Tami Friedman My entire neighborhood had me as the angry alone woman when prior to the program, I was a life coach with a fiancé and two children, and I always had parties with friends and family. It ended up the way they slandered me. I wrote a Book about how wonderful my life was in 2005. 4 Steps to manifest your Visions. unfnreal!
Su Bou All of us.. it starts with a smear campaign and then increasing the different campaigns along the way.. the forever purge..
Robert Rivers I was called a pedo by a member of Infragard that went my counselors church during our meeting she told me he knew him personally and she lives across the street from my grandmother. This guy from Infragard showed up seconds upon arrival for counseling was weird since it was systematic suggesting the fbi uses sting ray .That counselor is friends with my grandmother that stopped talking to me . Ive been called a bike thief when i had no bike just a car . Ive been called a murder , drug dealer , suspected human trafficker, my teacher at a school called Freenet funded by Mayor Steve Adler stated i was reported as a terrorism threat by the U.S Army , DHS , Fema .The teacher there is ex US Army and has a PMP teaches all CompTia certifications . I drove over an hour for IT certifications dressed nicely was respectful . My teacher at CyberTex in Austin told me the city was supporting my targeting. Ive been slandered so much i lost track of all the lies the perps spread.
Chris Kirby Six years know everywhere I go it’s sickening they can do this to us
Philippe Bouhadiba They have been slandering me since the beginning in 2015. They mostly say that I am a voyeur. On their part, it’s a shame
Bahar TI Philippe Bouhadiba for me also when my supervisor sexually harassed me in my working place in UK, they slandered that it was me who seduces men !
Philippe Bouhadiba OK I see. It’s the classic technique of stalkers, pretending to be victims. And I guess your targeting began after you denounced your supervisor, right?
Bahar TI Philippe Bouhadiba I didn’t denounce him, I didn’t dare ! he failed me in my defense to make me go into relationship with him ! and he was idiot he had talked about it to some ! So some people knew what happened! And yes later a smear campaign and later targeting happened
Philippe BouhadibaBahar TI I know a French ti, a young woman. Her story is very similar to yours. She was harassed by an employee on her workplace. She complained to her management. Some time later, she began to have intrusions in her home and a few months after the electronic harassment started. The guy who harassed her was a freemason. Freemasons seem to be very frequently involved in gangstalking and electronic harassment