GLOBAL INTELLIGENCE

 
 WORLDWIDE ANYTIME ANYWHERE ANYWAY FIRST TO KNOW FIRST TO ACT

Introduction

Diplomatic consulting

Political consulting

Second citizenship and residence permit

International lobby

Case studies in investigating espionage publicized and judicialized

Case studies in investigating espionage publicized and judicialized

Introduction to intelligence

Intelligence

Human intelligence

Signal intelligence

Imagery intelligence

Counterintelligence

Hybrid warfare

Asymmetric warfare

Electronic warfare

False flag operations

Privacy policy

blog

Contact

 



 

 

INTELLIGENCE

 

HUMINT uses people as the main medium with which to collect information. The information may be gathered, analyzed, and exploited for the ideal outcome. Since humans are such diverse beings, there are a variety of methods which are adapted for every situation, environment, and battlefield operations. There are a multitude of sources that can lead up to HUMINT collection from diplomatic relations to travelers to local and military personnel.

 

Agent provocateur


An agent provocateur is a person assigned to provoke unrest, violence, debate or argument by or within a group while acting as a member of the group but covertly representing the interests of another. An agent provocateur seeks to secretly disrupt a group’s activities from within. Agents provocateurs are employed to disrupt or discredit a group by performing acts for which the group will be falsely accused, by leading the group into activities it would not otherwise pursue or by creating discord between members. Provocateurs may encourage illegal acts, recommend unsound belligerent tactics, spread false rumors intended to provoke unwise and hasty action, spread malicious rumors within a group about a group member, or employ other tactics intended to provoke improper action by a group or to divert a group from its chosen purpose. An agent provocateur might attempt to implicate as an accomplice an innocent target who becomes unwittingly involved in a crime or criminal conspiracy.

 

Ambush


An ambush is a long-established military tactic, in which combatants take advantage of concealment and the element of surprise to attack unsuspecting enemy combatants from concealed positions, such as among dense underbrush or behind hilltops. Ambushes have been used consistently throughout history, from ancient to modern warfare.


There does not appear to be any precedent historically where ambushes on civilian targets are deemed to have any legitimacy in terms of the proper conduct of war. Historically, many instances of extracting taxation upon occupied civilian areas have occurred, and there are also instances of civilians being ambushed or otherwise drafted for enslavement into forces which are hostile to them – perpetrators of such strategies do not tend to get a very good hearing in the history books.


In the context of neuro-warfare, where ambushes can be performed from a great distance and where civilians are not equipped to locate the specific source of the psychological onslaught in the ambush, a great number of civilians are vulnerable to ambush. This vulnerability is due to the fact that most civilians are not aware of the technologies and techniques which are being used to violate a great number of domestic and international laws to draft (enslave, brainwash) them into certain ways of doing things, presented in an altogether non-optional manner – it is not clear whether even silence is sufficient to avoid ambush of civilians in neuro-warfare. As such, full disclosure of the uses of neuroweapons in conjunction with classic conditioning and brainwashing techniques is of vital importance.

 

Assets (intelligence)


In intelligence, assets are persons within organizations or countries that are being spied upon who provide information for an outside spy. There are different categories of assets, including people who:


Willingly work for a foreign government for ideological reasons such as being against their government, but live in a country that doesn't allow political opposition.


Work for monetary gain. Intelligence services often pay good wages to people in important positions that are willing to betray secrets.


Have been blackmailed and are forced into their role.


Do not even know they are being used. Assets can be loyal to their country, but may still provide a foreign agent with information through insecure computers or through day-to-day chatting.

 

Augmented cognition


Augmented cognition research generally focuses on tasks and environments where human-computer interaction and interfaces already exist. Developers, leveraging the tools and findings of neuroscience, aim to develop applications which capture the human user's cognitive state in order to drive real-time computer systems. In doing so, these systems are able to provide operational data specifically targeted for the user in a given context.
There are likely to be positive uses of such technologies. In the present context, I highlight application of augmented cognition for electronic warfare and psychological warfare (neuro-warfare) situations. Namely, that in a context of remote neural monitoring in conjunction with pulse-modulated electromagnetic waves which influence neural processes, this provides a highly asymmetric situation between civilians who insist upon enjoyment of cognitive freedom and perpetrating entities (rogue actors in the security state; other criminals) who amass information on targeted individuals, then, with the support of computers which provide a degree of augmented cognition, seek to assert psychological domination over those with the temerity to think for themselves or questions the powers that be.

Blackmail


Blackmail is an act, often a crime, involving unjustified threats to make a gain (commonly money or property) or cause loss to another unless a demand is met. Essentially, it is coercion involving threats to reveal substantially true or false information about a person to the public, a family member, or colleagues, or threats of physical/mental harm or criminal prosecution. It is the name of a statutory offence in the USA, England and Wales, Northern Ireland, Victoria, Australia, and Tasmania, and has been used as a way to refer to other offences.


Blackmail is also the use of threats to prevent another from engaging in a lawful occupation (for example, speaking the truth about electronic harassment or neuro-weapons) and writing libelous letters (or otherwise spreading rumors or innuendo to sabotage potential in the workplace or socio-political realm), as well as use of intimidation generally for the purpose of preventing the individual from promoting certain views or communicating certain facts such as in a situation of whistleblowing.


For the present context of psychological warfare in the electronic age, two issues relating to blackmail stand out.


1) Perpetrating entities may try to blackmail you into doing wrong things, or to submit to the brainwashing process, by claiming that "it will never end" (i.e., the harassment/torture you will never end unless you submit) which unless we achieve change may in fact be true, and


2) regardless of whether acting on real or fabricated ‘evidence’, that they will publicly or surreptitiously slander you (no matter whether or not based on facts) if you do not do what they say or submit to the brainwashing.


With regard to the potential for political repression and social control, it is worth noting that perpetrating entities may try to draw you into embarrassing or even illegal situations for the purpose of blackmailing you in the future. If you face the risk of eternal blackmailing that may subsume your soul and freedom, it may indeed be worth considering coming clean and facing the music, regardless of the potential to slander you in the future – however, in the electronic age where remote neural monitoring is possible, it is advisable to consider such possibilities in the least conscious manner possible. If the blackmail involves fabricated ‘facts’ or things that you know to not be illegal or unethical, then be on guard to resist external influences which may try to plant a false memory, or convince you that you are evil, or that you can be socially castrated as a result of these false claims – the perpetrating entity will consider it as a great victory and sign of control over you to have convinced you to admit to something that you never did (refer to sub vocalization for possibilities of eliciting a false ‘admission’), and on your part, this may lead to a sense of hopelessness and lack of control (refer to early steps of brainwashing).

Blacklisting


A list of persons or organizations designated for special discrimination or boycott; also, to put a person or organization on such a list. Blacklists have been used for centuries as a means to identify and discriminate against certain persons or organizations. A blacklist might consist of, e.g.: a list of names developed by a company that refuses to hire individuals identified as union organizers; a country that seeks to boycott trade with other countries; a labor union that identifies firms with which it will not work; or a government that wishes to specify who will not be allowed entry into the country.

Blocking harassment


In organized stalking, blocking harassment is one of a thousand ways to wear down the targeted individuals and to drive them nuts. Examples may include many things that at face value sound trivial: at the shop people getting in your way every time you go to get something; in a hotel with shared facilities every time you go to use the shower or bathroom a bunch of people are all of a sudden lined up once you get there; when waiting for a bus (or anything else) people will crowd around and make it difficult to move; when driving other drives will FAR more often than normal pull man oeuvres that leave you boxed in by getting in your way or alternatively coordinate swerving lane changes in front of you that make it difficult to focus and drive safely; things that you regularly buy or have researched online for purchase are regularly sold out or have inflated prices because limited stock is left; the list going on … Things that,
if reported to a psychiatrist, would be interpreted as a sign of delusional thinking because these are occasionally experienced by everyone. But, a targeted individual may experience such things basically every time they try to do anything.

Brain fingerprint


Brain fingerprinting is a forensic science technique used to determine whether specific information is stored in a subject's brain. It consists of measuring and recording a person's electrical brainwaves and brain response after the subject is exposed to words, phrases, or pictures (whether on a computer screen or via synthetic telepathy).
I theorize that the earlier technologies which used electroencephalography (EEG) to perform this are presently adapted to do remote neural monitoring by use of an analogue of the laser microphone at other wavelengths in the electromagnetic spectrum.

Brainwashing


The Oxford dictionary defines brainwashing as follows: “Pressurize (someone) into adopting radically different beliefs by using systematic and often forcible means”.


For a very short definition in layman’s terms, brainwashing can be defined as follows: “Heavy on the stick until you’re broken into pieces, then ease in on the carrot (which may be nothing more than absence of the stick) and take credit for this ‘loving’ treatment while inseminating new values and preferences”.


The remainder of this entry is adapted from science.howstuffworks.com2 with some additional insights for the specific situation of psychological warfare in the electronic age. Do not be deterred by the length of this entry. It is very important to have a good grasp on all these elements as a means of self-protection for civilians by understanding how this works. If you are a targeted individual, try to identify which aspects of your experience roughly relate to these different stages.


Each stages in the brainwashing takes place in an environment of isolation, meaning all ‘normal’ social reference points are unavailable, and mind-clouding techniques like sleep deprivation and malnutrition are typically part of the process. There is often the presence or constant threat of physical/mental harm, which adds to the target's difficulty in thinking critically and independently.


We can roughly divide the process Lifton identified into three stages: breaking down the self, introducing the possibility of salvation, and rebuilding the self.


Breaking down the self
The basic idea is to make you hate everything about who you are (were), so that you may eventually be persuaded to believe that you ‘deserved’ it, so that the new brainwashed self will believe itself to be a new and improved person, who has admitted your former shortcomings, repented, and seen the light.


1) Assault on identity
You are not who you think you are. This is a systematic attack on a target's sense of self (also called his identity or ego) and core belief system. The perpetrator denies everything that makes the target who he is: "You are not a soldier." "You are not a man." "You are not defending freedom." The target is under constant attack for days, weeks or months, to the point that he becomes exhausted, confused and disoriented. In this state, his beliefs seem less solid.
In my personal case, this involved diverse strategies like “you’re a spy” whereas in fact I’m a translator and editor of research which has relevance for public policy. And, importantly, almost everything I work on ends up in the public domain, freely available to the public. For your specific case, this will be individually tailored based on what they can determine is important to your identity.


Various forms of gas lighting are common at this stage, to try to make you believe that you do not have a grasp on reality, whereas in fact the perpetrating entity is intentionally controlling your environment, etc., in ways that make it difficult for you to maintain a firm grasp on reality. In short, gas lighting aims to make you think you are crazy, and this may serve to prevent you from speaking openly about the experiences, because you may believe that others (especially psychiatrists) will brand you as crazy if you talk about what is happening.


As a part of this process, the perpetrating entity is liable to try to imbue the notion that the targeted individual (and more specifically, ALL people in general) are (not) in possession of themselves and that people are not thinking and acting freely at all. In addition to serving as a form of dehumanization, this serves the role of delegitimizing any of your values, preferences, etc., which is tantamount to innuendo which promotes openness to being brainwashed.


2) Guilt
You are bad. While the identity crisis is setting in, the perpetrator is simultaneously creating an overwhelming sense of guilt in the target. He/she repeatedly and mercilessly attacks the subject for any ‘sin’ the target has committed, large or small. He may criticize the target for everything from the ‘evilness’ of his beliefs to the way he eats too slowly. The target begins to feel a general sense of shame, that everything he does is wrong.

In my personal case, and I think this is a rather common sort of experience in the current situation of psychological warfare in the electronic age, this will involve anything they can figure out about you that may seem inconsistent in any sort of way, so they can badger you about all big or small things. In a sense, this may contribute to your belief that, in a rather sick fashion, that they actually want to ‘help’ you be a better person. Since the efforts are largely geared towards whatever they can figure out about your personal values, this may appear as credible (whereas in fact they are engaged in acts of pure evil, whereas you may just have some matters of minor inconsistency or imperfection).


Often, this will involve trying to set you up in a way so you may be led to believe that you are the cause of some problems, and that you yourself need to reform. For example, while travelling for an extended period, I had people tampering with my laundry so it would smell bad. Then, they would harass me about the smell. Eventually, I had to wash my clothes by hand and stay to watch my clothes dry, to get clean clothes. They also harassed me about other details like how often (or how) I showered or brushed my teeth, and would go around broadcasting any moment when I was not in a situation of perfectly clean hygiene (many analogues will abound for your specific case, but here, someone who actually wants to help might just mention a good deal on soap at a nearby shop, or give a bar away – it’s cheap).


Another example involves the use of neuro-programming, potentially with neuro-weapons to, first, associate a certain trigger with an interest in members of the opposite sex, then to progressively try to apply this same trigger to increasingly young children. In the earlier stages, they may try to convince you that you are disgusting for looking at women/men in any way, for having any sexual attraction, while at the same time actively trying to direct attention towards genital regions or other areas associated with arousal. The trigger having been established, they apply it to increasingly young children, then start to suggest that the target is a pedophile. In such a case their want you to end up in a psychiatrist’s chair making an ‘incriminating’ statement like “I have sexual interest in children”, whereas in fact THEY were at all times trying to push sexual thoughts into your mind at times when children were at the forefront of cognition. (So … who are the real pedophiles in such a case?)


Other examples could have anything to do with whatever they have figured out is important to your values. For example, if vegetarian, try to make you feel extremely guilty about eating eggs or use of any animal products, no matter that the hypocrites clearly have no qualms about inflicting suffering on humans, let alone animals. Or, if you have some sympathies for vulnerable people, to try to make you feel guilty about not solving all problems on earth in such regards (while they go about trying to program disgust for vulnerable people or non-white people, for example).


The main idea is that whatever they can figure out is important to your values or even very minor details about how you live your life, they will use it to pick away at you in any sort of way to make you feel ‘guilty’. This may be to establish a conditioned trigger of a sense of guilt and/or disgust with oneself, and later this conditioned trigger may be used to elicit ‘guilt’ in relation to other things, perhaps to help convince you that a planted false memory is in fact true and that you feel guilty about it (this could be used to blackmail you, even if you don’t believe it, but if you can be persuaded to believe that others do). Perhaps it could be used to trigger a sense of guilt and/or disgust, for example to be disgusted with homeless people, disabled people, non-white people, ‘weak’ people who help others, or basically any group that they want to brainwash you into believing is inferior.


Whatever it takes to make you think you ‘deserve’ it. No one deserves to be brainwashed. No one.


3) Self-betrayal
Agree with me that you are bad. Once the subject is disoriented and drowning in guilt, the perpetrator forces him/her (either with the threat of physical harm or of continuance of the mental attack) to denounce his family, friends and peers who share the same ‘wrong’ belief system that the targeted individual holds. This betrayal of his/her own beliefs and of people he/she feels a sense of loyalty to increases the shame and loss of identity that the target is already experiencing.


In the context of psychological warfare in the electronic age, I think the main thing to be aware of here is the use of pulse-modulated electromagnetic waves to communicate into your head, and to try to drive your own subvocalizations3 to create a false ‘admission’ or false statement of ‘belief’. For example, trying to drive a sub vocalization of something like “there’s a terrorist” when you see a Muslim, “that’s a criminal” when you see a black man, “the NWO is real” when you consider speaking the truth, or perhaps “I love/want (genetalia)” when you see a member of the opposite sex and are influenced to focus on regions associated with sexual arousal, etc. The examples are essentially endless. Presumably many people have experienced essentially similar tactics, in addition to tactics refined to whatever the perpetrating entity can figure out about the specific values of the individual.


4) Breaking point
Who am I, where am I and what am I supposed to do? With his identity in crisis, experiencing deep shame and having betrayed what he has always believed in, the target may undergo what in the lay community is referred to as a ‘nervous breakdown’. In psychology, a ‘nervous breakdown’ is really just a collection of severe symptoms that can indicate any number of psychological disturbances. It may involve uncontrollable sobbing, deep depression and general disorientation. The target may have lost his grip on reality and have the feeling of being completely lost and alone. When the target reaches the breaking point, the sense of self is pretty much up for grabs -- he has no clear understanding of who he is or what is happening to him. At this point, the perpetrator sets up the temptation to convert to another belief system that will save the target from his misery.


The only thing I would add to this is the potential use of positive conditioning to add to the temptation to convert to the other belief system. For example, the perpetrating entity may have established positive conditionings surrounding whatever things they can figure out make you feel good. Then, when proposing the other belief system, they will make use of the trigger so that you feel good when you start to contemplate the conversion. A slightly different example I experienced was, when they managed to drive a sub vocalization through my mind, in MY FIRST PERSON, to the effect of “I really did it”, they would first use the negative conditioned response and say “that’s what guilt feels like”, and then use the positive trigger and communicate “that’s what forgiveness feels like”. However, many instances of triggering the positive conditioning (generally, a peaceful, euphoric or generally happy feeling) were also applied when starting to entertain any possible legitimacy of the views they wish to impart (see stage 9, below).


As a general rule of thumb, I think it is safe to say that if someone is ‘good’, they will be very open to explain the who/what/when/why/where kinds of questions. Good parenting often involves much use of sticks and carrots, and we can openly discuss these, even though not all parents will agree on the precise strategies. If someone is not willing to demonstrate evidence that allows you to CONCRETELY have strong knowledge of who is doing it, how they are doing it, and what the desired outcome is (it is always possible to lie about such things in the meantime, so be aware of how they may continuously change goalposts in the process of brainwashing), then it should be easy to conclude that you are dealing with some altogether evil influences and should resist the reprogramming at all costs.


The possibility of salvation
Having been psychologically tortured for quite some time, you may be willing to entertain any sort of change in the ways you think or do things. The possibility of salvation is that your suffering may come to an end if you see the light (i.e., allow the perpetrating entity to program you as they see fit). This may involve the use of conditioned positive and negative responses, for example triggering a good feeling when you start to ‘confess’. If they have gone heavily enough on the stick for some time, the absence of the stick may itself feel like a carrot – the weight of the world being lifted from your shoulders, as it were.


5) Leniency
I can help you. With the target in a state of crisis, the perpetrator offers some small kindness or reprieve from the abuse. He may offer the target a drink of water, or take a moment to ask the target what he misses about home. In a state of breakdown resulting from an endless psychological attack, the small kindness seems huge, and the target may experience a sense of relief and gratitude completely out of proportion to the offering, as if the agent has saved his life.
This stage can be of diverse forms. I would add to this that at this point you are incredibly vulnerable. You may be drawn into a relationship or group where all the above strategies are repeatedly applied, albeit most likely in subtle forms. Having entered an environment where others are largely or fully in control of what’s going on, there is little hope to keep thinking for yourself in such a situation. Do, not, go, there. No matter how lonely you feel. Just don’t do it. Seek out positive influences and relationships instead, which may involve working to build ties with friends and family who may have been persuaded or forced to participate in the previous steps (perhaps they were brainwashed too).


If someone who has been abusing you turns around and offers help, do not accept! If you have been exposed to the above brainwashing techniques and you meet someone who offers any sort of help that you do not see as being normal (or even if it IS rather normal), apply your spider sense to the nth degree. If they start any sort of harassment, or do things which seem likely to be designed to continue with the attacks described above, for example out of nowhere speaking unnecessarily critically of things which they know are important to you, or speaking positively of things they are trying to persuade you to accept, then probably you should just make any old excuse to leave. Perhaps you are lured with a promise for a job, or they are taking you to events which are supposed to be related to your interests but are in fact designed to get you into a controlled environment where the perpetrating entity might continue to use brainwashing techniques against you.


6) Compulsion to confess
You can help yourself. For the first time in the brainwashing process, the targeted individual is faced with the contrast between the guilt and pain of identity assault and the sudden relief of leniency. The target may feel a desire to reciprocate the kindness offered to him, and at this point, the agent may present the possibility of confession as a means to relieving guilt and pain. (This last point was addressed in stage 4, above, in terms of using conditioned positive responses applied by the perpetrating entity when they try to drive a sub vocalization of the ‘confession’ through your head.)


7) Channeling of guilt
This is why you're in pain. After weeks or months or even years of assault, confusion, breakdown and moments of leniency, the target's guilt has lost all meaning -- he's not sure what he has done wrong, he just knows he is wrong. This creates something of a blank slate that lets the perpetrating entity fill in the blanks: He/she can attach that guilt, that sense of ‘wrongness’, to whatever he wants (and so, even if you have actually done something that is actually wrong, I recommend rapidly equilibrating your emotional response in order to protect against the laying of conditioned triggers which may be used to associate a sense of ‘guilty’ to other things – also, it is best to take charge of your cognition, and focus on the evil of what is being done to you (some people recommend just ignoring it), which is rather likely to be very evil in comparison with the relatively trivial thing you may be concerned about. We are human. We try to do our best. Sometimes we err, and learn from these mistakes. However, someone who takes advantage of the situation to try to brainwash you can hardly be ‘good’, in particular in a situation where they refuse to be explicit about who/when/where/why/what questions).


The perpetrating entity attaches the targeted individual's guilt to the belief system the agent is trying to replace. The targeted individual comes to believe it is his/her belief system that is the cause of the shame. The contrast between old and new has been established: The old belief system is associated with psychological (and/or physical) agony; and the new belief system is associated with the possibility of escaping that agony. (This can be referred to as ‘stick and carroting’, basically, making use of classic conditioning in the emotional, spiritual and/or political realms.)


8) Releasing of guilt It's not me; it's my beliefs. The embattled target is relieved to learn there is an external cause of his/her wrongness, that it is not they themselves who are inescapably bad – this means he/she can escape his/her wrongness by escaping the wrong belief system. All he has to do is denounce the people and institutions associated with that belief system, and he won't be in pain anymore. The target has the power to release him/herself from wrongness by confessing to acts associated with his old belief system. With his full confessions, the target has completed his psychological rejection of his former identity. It is now up to the perpetrator to offer the target a new one.
(I never got to this stage, although perpetrating entities tried to force me through in on a great number of occasions. Hence, I do not have additional advice or commentary on recognizing signs or dealing with it, except, just be aware of the conditioned triggers the perpetrating entity may try to use to make you feel good if/when you give a second or moment’s thought to denouncing the previous views and/or considering anything good about the new views they want to force you into.)


Rebuilding the Self


9) Progress and harmony if you want, you can choose good. The perpetrating entity introduces a new belief system as the path to ‘good.’ At this stage, the agent stops the abuse, offering the target physical comfort and mental calm in conjunction with the new belief system. The target is made to feel that it is he who must choose between old and new, giving the target the sense that his fate is in his own hands. The target has already denounced his old belief system in response to leniency and torment, and making a ‘conscious choice’ in favor of the contrasting belief system helps to further relieve his guilt: If he truly believes, then he really didn't betray anyone. The choice is not a difficult one: The new identity is safe and desirable because it is nothing like the one that led to his breakdown.


10) Final confession and rebirth
I choose good. Contrasting the agony of the old with the peacefulness of the new (refer to conditioning, and hence it is often appropriate to refer to the process as ‘conditioning and brainwashing’), the target chooses the new identity, clinging to it like a life preserver. He/she rejects their old belief system and pledges allegiance to the new one that is going to make his/her life better. At this final stage, there are often rituals or ceremonies to induct the converted target into his new community.5 This stage has been described by some brainwashing victims as a feeling of ‘rebirth’. Rinse and repeat if other aspects of your individual self-have not been reformed by the perpetrating entity. If the efficacy of one stage of the process is in doubt, the perpetrating entity may return to an earlier stage in the brainwashing process, for example by returning to gas lighting techniques or other strategies to wear down the identity of the victim or their sense of self.


One of the main protections against brainwashing is simply to know that it is can happen even to very intelligent people, and to be able to identify that it is (or might be) happening.


Important sources of vulnerability to brainwashing include: black and white thinking, being in a vulnerable situation due to job loss, relationship troubles or illness, being alone in a new environment, being socially isolated whether due to personal choice or as orchestrated by the perpetrating entity, and also having released significant amounts of publicly available information which may be mined by a perpetrating entity to refine the brainwashing strategy in a personalized manner (and hence massive data collection by security state officials should be regarded as inherently suspect).


One of the most difficult aspects of reaching out to a brainwashed victim is to help them see that they have indeed been brainwashed. Exposure to multiple options, without overwhelming the subject with too many options at once, will provide the subject with a new, broader perspective from which to challenge the beliefs implanted by the perpetrating entity. If the victim is able to recognize that in fact they have been brainwashed and they desire to seek freedom, do not seek to shame the victim. They have been through enough already.

Brain programming


Signals intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agreements to keep this technology secret. The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all of the electrical activity in the brain continuously. The NSA records and decodes individual brain maps (of a large number of persons) for national security purposes. EMF brain Stimulation is also secretly used by the military for bring-to-computer links. (In military fighter aircraft, for example.) For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. Remote neural monitoring can send encoded signals to the brain’s auditory cortex thus allowing audio communications direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia. Without any contact with the subject, remote neural monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. Remote neural monitoring can send images direct to the visual cortex, bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain-programming purposes. (I’m sceptical of that very last sentence, but that’s what the source says. All the rest, with 100% certainty, I have personally experienced. Also, I do not consider it as proven that the lettered organization specified in the source correctly identifies the source of the various forms of torture that are being implemented, however, it does seem rather consistent with their specific areas of activity – and I hesitate to say ‘mandated areas of activity’, because clearly, the issues surrounding psychological warfare in the electronic age as used against civilians could not possibly fall anywhere but about as far on the wrong side of the law as imaginable – this is torture and highly refined methods of brainwashing civilians whom they are morally and legally bound to protect, nothing more, nothing less.)

Brain imaging (brain scanner)


Neuroimaging or brain imaging is the use of various techniques to either directly or indirectly image the structure, function/pharmacology of the nervous system.


Neuroimaging falls into two broad categories:


1) Structural imaging, which deals with the structure of the nervous system and the diagnosis of gross (large scale) intracranial disease (such as tumor), and injury, and


2) Functional imaging, which is used to diagnose metabolic diseases and lesions on a finer scale (such as Alzheimer's disease) and also for neurological and cognitive psychology research and building brain-computer interfaces (see augmented cognition).


While there is a lot of cutting edge development happening in the area of brain imaging, this should be considered as generally unrelated to technologies which harvest information relating to brain wave patterns associated with different processes which are fairly generalizable across humans or those which are specific to an individual, generally for the purpose of eliciting a certain output from a targeted individual, such as triggering a neural event after planting a false memory or in relation to real associations.

Cause stalking


Cause stalking is an alternate term for what some multi stalking targets call organized stalking or gang stalking. It is specialized groups of people who think they are supporting some cause, but are more interested in harassing targets designated by their leaders. Lies told by the leaders add fuel to the fire.

Civil society


Civil society is the “the aggregate of non-governmental organizations and institutions that manifest interests and will of citizens; individuals and organizations in a society which are independent of the government“ – or, " the elements such as freedom of speech, an independent judiciary, etc., that make up a democratic society”.


Volunteering is often considered a defining characteristic of the organizations that constitute civil society, which in turn are often called NGOs, NPOs, or CSOs. Most authorities have in mind the realm of public participation in voluntary associations, trade unions and the like, but it is not necessary to belong to all of these to be a part of civil society.

Civilian


In general, a civilian is "a person who is not a member of the military or of a police or firefighting force".8 The term also includes chaplains and medical personnel who are not part of the organizations mentioned in the preceding sentence, as well as those who are not perpetrators, in order to distinguish between those who are law-abiding people and those who are dedicated criminals.


Under the laws of war (also known as international humanitarian law), a civilian is one not being a member of the armed services and does not take a direct part of hostilities in times of armed conflict. The term ‘civilian’ is slightly different from a non-combatant under the laws of war, because some non-combatants are not civilians (for example, military chaplains attached to the belligerent armed forces or neutral military personnel). Under international law, civilians in the territories of a Party to an armed conflict (here I think it is more appropriate to define it as a ‘weaponized conflict’, since electronic weapons are not well defined in international law, especially as ‘arms’) are entitled to certain privileges under the customary laws of war and international treaties such as the Fourth Geneva Convention. The privileges that they enjoy under international law depends on whether the conflict is an internal one (a civil war) or an international one.


The Fourth Geneva Convention of 1949, and additional protocols signed in 1977 and 2005, include a number of relevant specifications with regard to civilians. Appendix C highlights many potentially relevant articles with regard to the treatment of civilians, and draws analogues for the present situation of neuro-warfare which involves significant intentional targeting of civilian populations.

Coercive persuasion or thought reform


Coercive persuasion or thought Reform is best understood as a coordinated system of graduated coercive influence and behavior controls designed to deceptively and surreptitiously manipulate and influence individuals, usually in a group setting, in order for the originators of the program to profit in some way, normally financially or politically. Using rewards and punishments, efforts are made to establish considerable control over a person’s social environment, time, and sources of social support. Social isolation is promoted. (See brainwashing for a more detailed definitions of stages involved.)


Cognitive liberty:
Cognitive liberty, or the "right to mental self-determination", is the freedom of an individual to control his or her own mental processes, cognition, and consciousness. It has been argued to be both an extension of, and the principle underlying, the right to freedom of thought. Though a relatively recently defined concept, many theorists see cognitive liberty as being of increasing importance as technological advances in neuroscience allow for an ever-expanding ability to directly influence consciousness. Cognitive liberty is not a recognized right in any international human rights treaties, but has gained a limited level of recognition in the United States, and is argued to be the principle underlying a number of recognized rights.


The United States Supreme Court has recognized:
"Freedom of thought... is the matrix, the indispensable condition, of nearly every other form of freedom. With rare aberrations a pervasive recognition of this truth can be traced in our history, political and legal"


Without freedom of thought, the First Amendment right to freedom of speech is moot, because you can only express what you can think. Constraining or censoring how a person thinks (cognitive censorship) is the most fundamental kind of censorship, and is contrary to some of our most cherished constitutional principles.


Cognitive liberty is much more than freedom of thought. To believe in cognitive liberty is to believe that the individual is absolute sovereign over their own consciousness. It is an extension of the concepts of freedom of thought and self-ownership. It is a reaction against the prevailing assumption that other people have the right to tell you what you can do with your mind and body.

Conditioning


This entry is long, but extremely important to understand thoroughly, and is itself a very short discussion of concepts which are elaborated upon in great detail in many other sources.


A simple example of conditioning might be easily understood by considering the perfume/cologne of a romantic partner, and how this association may bring back many memories of that person including emotional responses you continue to associate with them. Simply smelling the same perfume/cologne might trigger an emotional response associated with this romantic partner. It may, however, be far more nefarious than that. In the process of brainwashing someone, consider how various conditionings may be used as ‘sticks’ against ‘wrong’ things and ‘carrots’ to support indoctrination of ‘right’ things, in a way that ultimately leads to taking over your person, perhaps so far as being able to play you like a doll.


The classic experiment relating to conditioning is ‘Pavlov’s dog’ (1907). Pavlov noticed that the dogs in his experiments, on digestion in dogs, began to salivate in the presence of the technician who normally fed them, rather than simply salivating in the presence of food. Pavlov called the dogs' anticipatory salivation ‘psychic secretion’. From his observations he predicted that a stimulus could become associated with food and cause salivation on its own, if a particular stimulus in the dog's surroundings was present when the dog was given food. In his initial experiments, Pavlov presented a stimulus and then gave the dog food; after a few repetitions, the dogs started to salivate in response to the stimulus.


The Wikipedia entry on Classic conditioning presently contains details on many more refined applications of the basic idea of conditioning. One may get good value out of reading up on all of them, but all the details are not particularly important for understanding the basic idea of how understanding conditioning is important for the present situation of psychological warfare in the electronic age. Rather, I wish to distinguish between positive conditioned responses (‘carrots’) and negative conditioned responses (‘sticks’). Many people are loosely familiar with the idea of ‘sticks and carrots’, although perhaps more along the lines of ‘economic incentives’ or ‘social sanction’, and not so much in relation to the concepts of classic conditioning. ‘Sticks and carrots’ are key for understanding certain processes involved in brainwashing an individual or asserting influence over their mind, and so it is important for the broader public to have some understanding of these processes, and this is all the more important in the context of psychological warfare in the electronic age.


Let me approach this by means of an example. First, let us take is as a given that the perpetrating entity that wishes to brainwash the targeted individual have amassed some amount of information about what the targeted individual likes and dislikes. (It is not necessary that the ‘stick’ is a pain stimulus or that the ‘carrot’ is a pleasure stimulus, given that many strategies being used are essentially psychological and not physical in nature). With some knowledge of what you like and dislike, what you value and consider abhorrent, what makes you happy and what makes you sad, what makes you feel like your situation is meaningful or not having meaning, what makes you feel successful or a like a failure, what makes you feel proud or embarrassed, etc., the perpetrating entity may then make use of this information to establish a variety of sticks and carrots. Keep in mind that the basic process here is to apply the negative stimulus (‘stick’) when you are doing/thinking ‘wrong’ things and to apply the positive stimulus (‘carrot’) when you are doing/thinking ‘right’ things.


Let’s say that you are a peace-loving person who promotes respect across diverse groups of society, who sees it as important to help vulnerable people, and are generally quite nice to people. And that the perpetrating entity wishes to transform you into a person who sees aggressive war as critical for civilizational development, and that it would be best to eradicate all who do not belong to the correct ethnic group or social class such as by eradicating the homeless, disabled or other groups deemed ‘inferior’ (i.e., transform you into a Nazi). Every time you act, speak or think11 in a way that is in line with your current self, the perpetrating entity will apply a treatment that they know makes you feel shame, guilt, embarrassment, inferior, angry, etc. And, every time you do something rather more in the direction of what they want, such as be a little bit mean to someone or be in any way critical of the hated group (these may be elicited by introducing ideas into your mind via neuro-weapons), they will apply a treatment that will make you feel good in some way, such as a compliment tailored to what they know about your pre-existing value system or directly triggering a positive neural or physiological sentiment

.
What makes it conditioning is this. The perpetrating entity may devise some rather simply trigger, such as “boom boom boom” for negative events (which may itself have been conditioned to elicit a stress response), and “thank you” for things that they want to elicit you to do in the future. Eventually, they need not apply the rather more complex psychological attacks – all they need to do is apply the simple gestural or verbal trigger (stimulus) and slowly go about reprogramming you.


Here is some elaboration on the method. The positive and negative conditionings (‘sticks’ and ‘carrots’) may be applied generally as follows. Say, they have figured out what disgusts you. Every time you are disgusted, they may apply the same treatment, perhaps a sound, gesture, or even a specific rhythm or maybe even frequency, to use as the trigger. And, essentially the same for things that make you feel good. Every time you perceive disgust, they will apply the treatment that can be used to trigger disgust at the same time as another event (the one they want you to feel disgusted about). And, every time you do something that makes you feel good in whatever way, they apply some other treatment that can be used to trigger a good feeling at the same time as another event (the one they want you to feel good about). In the case of transforming a loving peacenik into a Nazi, the situation may be approached as follows. Keep in mind here that the ‘disgusted’ feeling or sentiments you have been told to understand as and ‘happy’/’powerful'/etc. (which may be nothing but butterflies in your stomach or tingly spine, which the perpetrating entity suggests is what ‘happy’ or ‘powerful’, etc. feels like) can now be stimulated with the triggers they have constructed (what the specific trigger is not important, what is important to understand is the fact that the triggers can be laid and used as follows).


When the loving peacenik encounters or even thinks about homeless people, disabled people or any individual belonging to a non-white group, the trigger for ‘disgust’ may be applied. Presumably so as to not be too obvious about things, this will begin with a rather weakly embedded trigger, which may become sequentially stronger over time. On the other side of things, to program in the new values, they may apply a ‘happy’/’powerful’/etc. trigger when you do something like be assertive or a little bit mean, and this can be sequentially applied to make you a meaner and meaner person until you feel ‘happy’ and ‘powerful’ when doing very hurtful things to people. In a more subtle manner, and this requires some acceptance of the facts of remote neutral monitoring to see how this could happen, when reading or thinking about something aligned with your pre-existing values, the ‘disgust’ feeling may be elicited, and when reading or thinking of something which involves doing bad things to people, especially members of one of the hated groups, the ‘happy’/’powerful’/etc. feeling may be elicited. (This is likely to be accompanied by pulse-modulated electromagnetic radiations which can communicate verbally directly into your head, which, when applied with specific knowledge of your values, preferences, insecurities, desires, etc., can be tailored to the individual to help ensure that the use of the conditioned triggers are guiding the targeted individual in the ‘right’ direction.) Slowly, the oblivious peacenik is transformed into a Nazi, disgusted with the stupidity of their former values, now having seen the light that Nazi thought, actions, and politics are required to make the world a better place, and that ‘powerful’ people engage in the various forms of harassment used in the process of brainwashing the no-reviled loving peaceniks.


In addition to this more refined application of classic conditioning, and use of conditioned triggers to alter your views, more easily understood applications of ‘sticks’ (negative stimulus) and ‘carrots’ (positive stimulus) can be used to wash away aspects of your personality that they want to get rid of, and to sequentially promote new views and practices. It should be clear that a good understanding of the ways in which conditioning can be used is critical for being able to reject emotional, psychological and/or physiological manipulations which are applied for the purpose of brainwashing a targeted individual.


Knowing this can help prevent you from being brainwashed (from basically anything to basically anything). If this is not clear to you. Re-read this entry, and then re-read it again after you have digested the remainder of this glossary. Become highly attuned to your emotional state and responses in relation to your actions, values, speech, thoughts, etc. Otherwise, you may be exposed to being slowly brainwashed against your will even though you understand the basic principles of conditioning. Do not deny your emotional experiences, but learn to equilibrate them rapidly and to identify sources of interference which are likely to originate from conditioned triggers.


(It is worth mentioning that this is not altogether different in some ways from some rather effective parenting techniques. Parents can explain their methods and objectives openly. Not so with those who refuse to identify themselves, refuse to be clear about their methods, and refuse to be clear about their ultimate objectives. Obviously, in this second case, we are dealing with a situation of extreme evil – if it was good, it would be explained on paper who/what/when/why/where, but clearly if the perpetrating entity were to answer all such questions, they would all find themselves in prison for a very long period of time, and perhaps instigate a violent revolution, if the victims of their conditioning and brainwashing were able to identify just who the perpetrating entity(ies) are – at the very least, any official resources directed towards such ends would see funding completely removed and a complete shakeup of all hierarchical structures in order to assert citizen’s control over the offending institutions.)


Important: such triggers may be planted at barely audible, or perhaps even sub-audible volume. Triggers may be planted without you even knowing. If you feel yourself having strange impulses, this may be the cause – pay VERY close attention to whether you can recognize some Pavlovian trigger that is barely noticeable. Knowing this is all possible is the first step in protection against conditioning and brainwashing.

COINTELPRO


COINTELPRO (a portmanteau derived from Counter Intelligence Program) was (past tense?) a series of covert, and at times illegal, projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrating, discrediting and disrupting domestic political organizations. The present naming and nature of activities of the present day analogue of COINTELPRO appears to remain unknown to the public, as does the extent of such activities throughout other known and unknown agencies of the security state such as the CIA and NSA. It is not clear whether even an order from Congress or the President of the USA would be able to penetrate through existing layers of classification which purport to work on behalf of ‘national security’, without first shaking up the upper management of these institutions and asserting civilian democratic control over them.


What I Do know, is that things like trying to start an organization to put an end to unpaid internships (the Giving Yourself Away Internship project) and involvement in environmental advocacy were claimed as reasons that I was ‘rightfully’ made a target of covert surveillance and psychological torture designed to put an end to my participation in various forms of advocacy and political expression which prioritized peaceful relations between those with different views (realistically though, having identified me as someone who questions things, the name of the game was basically to persuade me to believe any line of thinking whatsoever whereby I could be considered as a ‘legitimate’ target of surveillance – of course, I’m fully aware that no court in the West would authorize a warrant based on any information whatsoever they have about me, and regardless of which, the methods being used would certainly cross the lines of what any court would authorize).

Conspiracy


Conspiracy (civil): an agreement between persons to deceive, mislead, or defraud others of their legal rights or to gain an unfair advantage.


Conspiracy (criminal): an agreement between persons to break the law in the future, in some cases having committed an act to further that agreement.


Conspiracy (political); an agreement between persons with the goal of gaining political power or meeting a political objective.


Note: people who discuss the possibility of a conspiracy are routinely labelled as delusional, and, online, can expect a personalized attack from anonymous commenters who focus on maligning the individual making the claim of conspiracy, and only very rarely will attempt to debate the specific facts/assertions being made. That’s suspicious. (Most conspiracy theories, however, tend to be based on a mere grain of truth and make an illogical jump from “it’s plausible and probably they would want to” to “it’s definitely happening and a threat to civilization as we know it.)

Controlled personnel effects


Controlled personnel effects involves targeting individuals with non-lethal force to make selected adversaries think or act according to ‘needs’. Through the application of non-lethal force, it is possible to influence or incapacitate personnel. By studying and modeling the human brain and nervous system, the ability to mentally influence or confuse personnel is also possible. Through sensory deception, create synthetic images or holograms to confuse an individual's visual sense or, in a similar manner, confuse his senses of sound, taste, touch, or smell. Through cognitive engineering, develop a better understanding of how an individual's cognitive processes (pattern recognition, visual conditioning, and difference detection) affect his decision making processes. Scientists could use these cognitive models to predict a person's behavior under a variety of conditions with the potential to affect an adversary's mission accomplishment via a wide range of personnel effects.

Corruption


Corruption is a form of dishonest or unethical conduct by a person entrusted with a position of authority, often to acquire personal benefit. Corruption may include many activities including bribery and embezzlement, though it may also involve practices that are legal in many countries. Government, or 'political', corruption occurs when an office-holder or other governmental employee acts in an official capacity for personal gain.


Stephen D. Morris,13 a professor of politics, writes that [political] corruption is the illegitimate use of public power to benefit a private interest. Economist Ian Senior14 defines corruption as an action to (a) secretly provide (b) a good or a service to a third party (c) so that he or she can influence certain actions which (d) benefit the corrupt, a third party, or both (e) in which the corrupt agent has authority. Daniel Kaufmann,15 from the World Bank, extends the concept to include 'legal corruption' in which power is abused within the confines of the law — as those with power often have the ability to make laws for their protection.


Government/public sector


Public sector corruption includes corruption of the political process and of government agencies such as the police as well as corruption in processes of allocating public funds for contracts, grants, and hiring. Recent research by the World Bank puts forward that who makes policy decisions (elected officials or bureaucrats) can be critical in determining the level of corruption because of the incentives different policy-makers face.


Political corruption


Political corruption is the abuse of public power, office, or resources by elected government officials for personal gain, by extortion, soliciting or offering bribes. It can also take the form of office holders maintaining themselves in office by purchasing votes by enacting laws which use taxpayers' money. Evidence shows that corruption can have political consequences- with citizens being asked for bribes becoming less likely to identify with their country or region.


Police corruption


Police corruption is a specific form of police misconduct designed to obtain financial benefits, other personal gain, and/or career advancement for a police officer or officers in exchange for not pursuing, or selectively pursuing, an investigation or arrest. One common form of police corruption is soliciting and/or accepting bribes in exchange for not reporting organized drug or prostitution rings or other illegal activities.


Another example is police officers flouting the police code of conduct in order to secure convictions of suspects—for example, through the use of falsified evidence. More rarely, police officers may deliberately and systematically participate in organized crime themselves. In most major cities, there are internal affairs sections to investigate suspected police corruption or misconduct.


Judicial corruption


Judicial corruption refers to corruption related to misconduct of judges, through receiving or giving bribes, improper sentencing of convicted criminals, bias in the hearing and judgment of arguments and other such misconduct.


It is important to distinguish between the two methods of corruption of the judiciary: the government (through budget planning and various privileges), and the private. Judicial corruption can be difficult to completely eradicate, even in developed countries.


The issue of corruption can hardly be separated from considerations of blackmail, with especially pernicious possibilities in a context of psychological warfare in the electronic age, where electronic weapons are used for electronic harassment and/or remote neural monitoring. Among other things, this may involve threatening a public official with exposure of their secrets (and/or threats of psychological torture) if they do not vote in a particular manner, or demanding money in exchange for continued secrecy.


From a highly informal analysis of social networks inhabited by targeted individuals, it appears that many targeted individuals who are outspoken about their experiences are also outspoken about various forms of (proven and unproven) corruption.

Covert surveillance


Covert surveillance is a situation in which someone or something is observed without the observation being known. This may be performed by agents of a security state, private investigators, business owners, or even by individuals seeking to collect information on those who have wronged them or who they perceive as enemies. Covert surveillance is by no means a new thing, although the technologies used for covert surveillance have advanced significantly (especially in the realm of neuroweapons), literally beyond belief for the vast majority of the population.
Classically, covert surveillance involved any variety of ways for a spy to listen in on or watch an important conversation, such as peep holes, secret side rooms, flimsy walls to make it easy to listen in on a conversation, etc. Classic covert surveillance also involved things like befriending the target of surveillance in order to stay close to them, watch them, learn about them, and ultimately extract information from them or learn to manipulate them better.
Neo-classical covert surveillance involved the use of early digital technologies, basically any sort of wiretap designed to collect information without the target knowing, or otherwise monitoring communications which were deemed to be secret (perhaps access a radio wave transmission, or decoding any variety of signals). CCTVs, GPS monitors, aerial surveillance and other audio surveillance technologies can also be classified as neo-classical covert surveillance technologies.
Present day covert surveillance may involve any of the above, in addition to new technologies. Most especially, technologies which transmit words, images or ideas into the mind of the monitored individual via electromagnetic waves (and modulated pulses of these waves), and then the response of the individual within their brain is monitored using remote neutral monitoring mechanisms to collect information.

Crime against humanity


Crime against humanity means murder, extermination, enslavement, deportation, imprisonment, torture, sexual violence (including rape), persecution or any other inhumane act or omission that is committed against any civilian population or any identifiable group and that, at the time and in the place of its commission, constitutes a crime against humanity according to customary international law or conventional international law or by virtue of its being criminal according to the general principles of law recognized by the community of nations, whether or not it constitutes a contravention of the law in force at the time and in the place of its commission.
‘Genocide’ means an act or omission committed with intent to destroy, in whole or in part, an identifiable group of persons, as such, that, at the time and in the place of its commission, constitutes genocide according to customary international law or conventional international law or by virtue of its being criminal according to the general principles of law recognized by the community of nations, whether or not it constitutes a contravention of the law in force at the time and in the place of its commission. In the sense of certain groups which try to intimidate and brainwash entire other groups (or all other groups) into their ideological, nationalist, ethnic, religious and/or other views, this can be considered as genocide on a worse scale than mass murder, in the sense of transforming people into their very own enemies.

Crowd manipulation


Crowd manipulation is the intentional use of techniques based on the principles of crowd psychology to engage, control, or influence the desires of a crowd in order to direct its behavior toward a specific action. This practice is common to politics and business and can facilitate the approval or disapproval or indifference to a person, policy, or product. The ethical use of crowd manipulation is debatable and depends on such factors as the intention of and the means used by the manipulator, as well as the ends achieved. Crowd manipulation differs from propaganda although they may reinforce one another to produce a desired result. If propaganda is “the consistent, enduring effort to create or shape events to influence the relations of the public to an enterprise, idea or group”, crowd manipulation is the relatively brief call to action once the seeds of propaganda (i.e. more specifically ‘pre-propaganda’) are sown and the public is organized into a crowd. Crowd manipulation also differs from crowd control, which serves a security function. Local authorities use crowd-control methods to contain and defuse crowds and to prevent and respond to unruly and unlawful acts such as rioting and looting.

Cyber stalking


Cyber stalking is the use of the internet or other electronic (digital) means to stalk or harass an individual, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass. The definition of harassment must meet the criterion that a reasonable person, in possession of the same information, would regard it as sufficient to cause another reasonable person distress.

DARPA


The Defense Advanced Research Projects Agency (DARPA) is an agency of the U.S. Department of Defense responsible for the development of emerging technologies for use by the military.


DARPA was created in February 1958 as the Advanced Research Projects Agency (ARPA) by President Dwight D. Eisenhower. Its purpose was to formulate and execute research and development projects to expand the frontiers of technology and science, with the aim to reach beyond immediate military requirements.20 The administration was created in response to the Soviet launching of Sputnik 1 in 1957, and DARPA's mission was to ensure U.S. military technology would be more sophisticated than that of the nation's potential enemies.


A relevant share of conspiracy theories pinpoint DARPA as the origins of technologies with potential nefarious applications, referring to patents held by companies having partnered with DARPA and specific research projects funded under DARPA (limited to those which were publicly disclosed, of course). However, it should be emphasized that a patent is not proof that a technology is functioning and that a research project is not evidence that the desired outcomes were achieved (however, ongoing funding or increased funding can easily be considered as proof that at least some results in the expected direction were being achieved). However, both are evidence of long standing interests in the technologies defined elsewhere in this glossary.

Decoy(ing)


Decoy(ing) is usually a person, device or event meant as a distraction, to conceal what an individual or a group might be looking for. Decoys have been used for centuries most notably in game hunting, but also in wartime and in the committing or resolving of crimes.


In a context of organized stalking, electronic harassment, and psychological warfare in the electronic age in general, the perpetrators consistently try to coax targets into blaming either the wrong technology, or the wrong people, or both. This is a sub-task of their attempting to get targets to discredit themselves by making nonsensical or unsupportable claims to the public, and especially officials


A safe rule of thumb is that, in such contexts, whatever appears to be going on at face value is rather unlikely to be the actual motive, identity, etc. Significant effort will be made to hide the motives and identity(ies) of the underlying perpetrating entity, and any explanation that is accepted or promoted is more likely to be the product of manipulation or imagination than any move in the direction towards truth.

Dehumanization


Dehumanization is to make somebody feel or be perceived as less human by taking away his or her individuality, the creative and interesting aspects of his or her personality, or his or her compassion and sensitivity towards others. Dehumanization may be directed by an organization (such as a state) or may be the composite of individual sentiments and actions, as with some types of de facto racism. State-organized dehumanization has been directed against perceived racial or ethnic groups, nationalities (or ‘foreigners’ in general), religious groups, genders, minorities of various sexual orientations (e.g., homosexuals), disabled people as a class, economic (e.g., the homeless) and social classes, and many other groups.


Broader dehumanization of specific groups can be viewed as a pre-condition to citizens of a nation accepting severe human rights violations to be committed in acts of war against another group. Prior to the 1994 genocide in Rwanda, radio programming had been full of propaganda calling the eventual targets of the genocide ‘cockroaches’, etc., in very hateful voices full of disgust.

Delusion


Individuals who speak out about political corruption, the potential for unaccountable actors within the police state to be involved in political repression or subversion, who make claims that any agency whatsoever of the state is investigating them or monitoring them, etc., are often labelled as ‘delusional’. This is especially common if the targeted individual can be persuaded to sit down with a psychiatrist who is usually quite happy to write up a mental health record for anyone making such claims – without, of course, ever bothering to make any effort whatsoever to enquire as to whether any such claim may be true. (See entry on schizophrenia for other aspects of how these claims may be portrayed. Also, see political abuse of psychiatry.)

Depersonalization


Depersonalization is an anomaly of self-awareness. It can consist of a reality or detachment within the self, regarding one's mind or body, or being a detached observer of oneself. Subjects feel they have changed, and the world has become vague, dreamlike, less real, or lacking in significance. It can be a disturbing experience.


Though degrees of depersonalization and derealization can happen to anyone who is subject to temporary anxiety or stress, chronic depersonalization is more related to individuals who have experienced a severe trauma or prolonged stress/anxiety. Depersonalization-de-realization is the single most important symptom in the spectrum of dissociative disorders, including dissociative identity disorder and "dissociative disorder not otherwise specified" (DD-NOS). It is also a prominent symptom in some other non-dissociative disorders, such as anxiety disorders, clinical depression, bipolar disorder, schizophrenia, borderline personality disorder, obsessive-compulsive disorder, migraines, and sleep deprivation.

De-patterning


De-patterning involves prolonged, drug-induced sleep comas, followed by multiple doses of electroshock therapy, designed to erase memory and make a subject available for reprogramming. Most famously experimented by Ewen Cameron, with a well-known case of Linda MacDonald in 1963 having been tortured and experimented upon to such extreme degrees using these methods that she was reduced to a vegetable state, having to relearn everything, from how to go to the bathroom to the identity of her children.


Several hundred (but not all) victims of such research eventually received monetary compensation for their suffering.
It is not clear to me the extent to which this concept may apply to the current situation of psychological warfare in the electronic age, but I do not doubt that the nefarious types who are making use of the technologies described in this glossary would absolutely love to be able to completely erase (or create) memories by remote means. (Why they don’t just kill people instead is beyond me. How can someone possibly imagine that it is OK to do such horrible things to people, but somehow draw the line at the much nicer practice of just killing people. Clearly there are experimental objectives.)

Directed conversation


Directed conversation is a term referring to a stalking tactic using stranger's conversation to both intimidate and to convey to the victim that they are under surveillance. During directed conversation, two or more stalkers will approach near to the target and engage in ‘normal’ conversation with one another. The conversation is purposefully made at a level so that the victim can adequately hear what is being said. During directed conversation, personal information concerning the victim (refer to remote neural monitoring to understand how this information may be collected without use of ‘traditional’ tools used to violate privacy) is inserted into the speech and emphasized by the stalkers in a fashion that most non-victims would not be able to discern as harassment (however, if the targeted individual calls the stalkers out on it, they will respond in a way so as to make the targeted individual look crazy).


One purpose of directed conversation is to harass a victim, as well as make the victim appear mentally unstable should they attempt to complain about such abuse. This may be combined with carefully orchestrated manipulations related to brainwashing the targeted individual (this may involve the use of mimicking harassment for conditioning purposes, which can applies later for brainwashing purposes), such as trying to portray the values of the targeted individual as something socially determined as pathetic, undesirable, weak, or something that makes them a ‘legitimate’ target – if an unaware targeted individual is exposed to such treatment, they may find themselves subtlety brainwashed without even knowing it, only loosely aware of the fact that they are being stalked. Similarly, directed conversation may be applied to use the stalker’s knowledge of the psychology and values of the targeted individual to try to massage their values, preferences, etc., in the direction of what the organized stalkers, or more importantly those directing their actions, want to instil into the population – most generally, pro-eugenics anti-socialist ‘values’). These are conversations that complete strangers will have out in public relating to the target and their personal situations. E.g., they will repeat things a target said in their home, or on the phone. They will drop very personal details into the conversation, that could only be related to the target.

Directed energy weapons


A directed energy weapon (DEW), also known as electronic heating, RF heating, high-frequency heating and diathermy, is the process in which a high-frequency alternating electric field, or radio wave or microwave electromagnetic radiation heats a dielectric material.


Potential applications of this technology include anti-personnel weapon systems, potential missile defense system, and the disabling of lightly armored vehicles such as cars, drones, jet skis, and electronic devices such as mobile phones.


The energy can come in various forms, for example:


1) Electromagnetic radiation, including radio frequency, microwave, lasers and masers;


2) Particles with mass, in particle-beam weapons;


3) Sound, in sonic weapons.


Widespread reports from targeted individuals, many of whom believe themselves to be subjects of non-consensual human experimentation for illegal research on the part of the security state, claim that directed energy weapons are being used to inflict pain on them, including experiences of mysterious burns and inflammation by individuals who have also experienced diverse other forms of harassment. However, it is possible that this is part of an intimidation-oriented disinformation campaign where targeted individuals (and/or others) are persuaded to believe that this is happening (and are further convinced of it when other targeted individuals claim the same), whereas it may not in fact be the case. Another explanation for these experiences is that pain centers of specific limbs or parts of the body are being stimulated in the brain.

Disinformation


Disinformation is false or inaccurate information that is spread deliberately with intentions of turning genuine information useless. For this reason, it is synonymous with and sometimes called black propaganda. It is an act of deception and false statements to convince someone of untruth. Disinformation should not be confused with misinformation, information that is unintentionally false. Unlike traditional propaganda techniques designed to engage emotional support, disinformation is designed to manipulate the audience at the rational level by either discrediting conflicting information or supporting false conclusions.


In the context of psychological warfare in the electronic age, the targeted individual may in fact be a source of disinformation, whether as a product of imagination, suggestion, or be reiterating seemingly plausible disinformation that they are repeating. A reasonable rule of thumb is that if the perpetrating entity is content for you to believe that the origins of the attack is some particular thing, then almost certainly it is something else. The disinformation may extend to efforts to convince you that many people who are not in fact ‘in on it’ are also perpetrators, which may end up driving hostile interactions which contribute to the social isolation and discrediting of the targeted individual.


One of the objectives of this disinformation is to lead the targeted individual to appear as mentally ill or otherwise unstable by proposing explanations widely online and to the public, which are patently untrue or highly unlikely, and by engaging in highly erratic behavior.

Electromagnetic radiation/waves


Electromagnetic waves are waves which can travel through the vacuum of outer space. Mechanical waves, unlike electromagnetic waves, require the presence of a material medium in order to transport their energy from one location to another. Sound waves are examples of mechanical waves while light waves are examples of electromagnetic waves.
Electromagnetic waves are created by the vibration of an electric charge. This vibration creates a wave which has both an electric and a magnetic component. An electromagnetic wave transports its energy through a vacuum at a speed of 3.00 x 108 m/s (a speed value commonly represented by the symbol c). The propagation of an electromagnetic wave through a material medium occurs at a net speed which is less than 3.00 x 108 m/s.


The following image should give a basic idea of how such waves may continue largely in their original form despite much interference, which should be conceptually available in mathematical form to those who have studied some physics at the upper high school or first year university level. However, much like waves in the ocean, once the area of interference has been passed, the underlying wave of the particle should remain essentially unchanged, on average.


For purposes of the present glossary, we should be most interested in a) the microwave regions of the spectrum relevant for the ‘modulated microwave pulse auditory effect’ (hundreds of MHz to tens of GHz), and b) lower ends of the spectrum which have more generalized effects on mood, emotion, etc. by mimicking brain waves (this is not the same as more targeted uses of such technologies to trigger conditioned emotional responses at the level of an individual) – in this second case, pulse modulations of higher frequency waves may serve to mimic a lower frequency brain wave. Directed energy weapons rely on higher frequency waves in the electromagnetic spectrum, because higher frequency waves contain more energy (and can be targeted with more precision).

Electromagnetic shielding


Electromagnetic shielding is the process of reducing the electromagnetic field in a space by blocking the field with barriers made of conductive and/or magnetic materials. Shielding is typically applied (1) to enclosures to isolate electrical devices from the ‘outside world’ and (2) to cables to isolate wires from the environment through which the cable runs. Electromagnetic shielding that blocks radio frequency electromagnetic radiation is also known as RF shielding. The shielding can reduce the coupling of radio waves, electromagnetic fields and electrostatic fields, though not static or low-frequency magnetic fields (a conductive enclosure used to block electrostatic fields is also known as a Faraday cage). The amount of reduction depends very much upon the material used, its thickness, the size of the shielded volume and the frequency of the fields of interest and the size, shape and orientation of apertures in a shield to an incident electromagnetic field.


There are rumors that solutions like anti-electromagnetic paint may mitigate the problem. Also, if a microwave oven is protective against microwave radiation, presumably it would be somewhat costly but not technologically difficult to apply something similar for protection against neuroweapons).


The difficulties in creating a perfect Faraday cage on a large scale is likely to explain the 2015 decision of the Pentagon to move significant communications resources to a deep mountain bunker in Cheyenne, Colorado. The decision was reportedly to safeguard the command's sensitive sensors and servers from a potential electromagnetic pulse (EMP) attack.


Electromagnetic weapons (a.k.a. Electronic weapons, Psychotronic weapons, Neuro-electro-magnetic frequency weapons, High powered magnetic weapons, Radio frequency weapons, Electromagnetic radiation weapons, Directed energy weapons, Through-the-wall weapons, Remote influencing technologies, Neuroweapons, etc.):


These are weapons which involve the diffusion of electromagnetic waves for a diversity of purposes, from a) traditional applications of weapons which inflict pain, damage or destroy (directed energy weapons) to b) the use of pulse-modulated electromagnetic waves for sending audible voices directly into the minds of individuals, and other outgoing transmissions of images or ideas into the minds of the targeted individual – On the surveillance end, this presumably involves an array of radar-like tools (e.g., analogues of the laser microphone) which should not be of particular interest to the average citizen, including applications for remote neural monitoring which can be used in conjunction without outgoing communications (into the mind of the targeted individual) for the purpose of an extreme form of social control where cognitive liberty is threatened, and c) neuro-effective signals (whether or not achieved via conditioning) that may cause other nerve groups to be remotely influenced. Generally speaking, the goal is to engage in behavior modification by covertly manipulating the minds of persons under attack.


According to N. Anisimov, psychotronic weapons (neuroweapons) are those that act to "take away a part of the information which is stored in a man's brain. It is sent to a computer, which reworks it [sometimes with human support] to the level needed for those who need to control the man, and the modified information is then reintroduced [by suggestion or mere exposure to the modified information] into the brain. «Included in the arsenal are VHF generators, X-rays, ultrasound, and radio waves.


It is not uncommonly asserted that microchip implants are used to increase the strength of the influence of these electronic weapons in targeted individuals or in instances of non-consensual human experimentation. However, it is difficult to ascertain whether such reports can be taken credibly – such claims may reflect successfully convincing a targeted individual of something that can be proven as factually false at a later date, in order to entirely discredit any claims they make. The fact that such events may have transpired historically does not mean it is still happening – after all, that would leave evidence.


Unclassified official reports in relation to such weapons are not altogether sparse, but are altogether vague in the specific technologies they use or the impacts they may have on targets.


(Note: this class of weapons also includes legitimate military uses which are analogous to traditional radar, signal jamming and spoofing technologies. Such uses are not of interest for the context at hand.)


As early as 1979, the Soviet Union was promoting an international treaty against the development of weapons of mass destruction, and among others, specified the following types of weapons:


Infrasonic means using acoustic radiation to affect biological targets;


Means using electromagnetic radiation to affect biological target.


However, Western powers claimed that such a treaty on all potential new weapons of mass destruction would have to be so general in scope and vague in its definitions so as to render it useless, and no such treaty was ever drawn up.


However, the Soviets did not cite potential applications for mind control (other citations in this document demonstrate that such uses of electromagnetic radiations to influence the mind and other neural processes were already in practice at that time), and it would be reasonable to wonder if the actual intent was to ban development of weapons that they would nevertheless continue developing.


In case there is any doubt that these SHOULD be classified as weapons, and therefore subject to a diversity of controls in their use, trade, etc., refer to HR 2977 Space Preservation Act of 2001, promoted by Dennis Kucinich (unrelated sections redacted):


(2)(A) The terms `weapon’ and `weapons system’ mean a device capable of any of the following:


(III) directing a source of energy (including molecular or atomic energy, subatomic particle beams, electromagnetic radiation, plasma, or extremely low frequency (ELF) or ultra-low frequency (ULF) energy radiation) against that object;


(v) through the use of land-based, sea-based, or space-based systems using radiation, electromagnetic, psychotronic, sonic, laser, or other energies directed at individual persons or targeted populations for the purpose of information war, mood management, or mind control of such persons or populations;


(ii) Inflicting death or injury on, or damaging or destroying, a person (or the biological life, bodily health, mental health, or physical and economic well-being of a person)–


(B) Such terms include exotic weapons systems such as–


(i) electronic, psychotronic, or information weapons;


(iii) high altitude ultra-low frequency weapons systems;


(iv) plasma, electromagnetic, sonic, or ultrasonic weapons;


However, these passages were deleted from the bill prior to being passed, on October 2, 2001.


Electronic harassment (including no-touch torture):


This is the sum of any and all torture, harassment and brainwashing experiences perpetrated by use of electromagnetic weapons, whether directed energy weapons or other weapons designed for remote neutral monitoring, synthetic telepathic communications into and from the mind of the targeted individual, or otherwise. The terms should not be confused with cyber stalking.


In Michigan, Public act 257 of 2003 makes it a felony for a person to “manufacture, deliver, possess, transport, place, use, or release” a “harmful electronic or electromagnetic device” for “an unlawful purpose”; also made into a felony is the act of causing “an individual to falsely believe that the individual has been exposed to a harmful electronic or electromagnetic device”. In Maine, Public law 264, H.P. 868 – L.D. 1271 criminalizes the knowing, intentional, and/or reckless use of an electronic weapon on another person, defining an electronic weapon as a portable device or weapon emitting an electrical current, impulse, beam, or wave with disabling effects on a human being.


Knowledge of such harassment goes back at least as far as 1993. I believe this term is generally used in relation to physical torture, or elicitation of pain centers in the brain, rather more so to the largely psychological torture aspects of this neuro-warfare against civilians who refuse to submit and be brainwashed into Nazis (for practical purposes, whether or not that is the affiliation the perpetrator believes themselves to hold). Common symptoms include:


- Sharp pain and burning in the chest, generally in the region of the heart


- ‘Fluttering’ or ‘gulping’ sensation in heart area


- ‘charged’ sensations in the heart area


- Racing or irregular heart beat


- Hard/heavy pumping of the heart beat


- Fatigue/exhaustion, dizziness, vertigo, loss of balance


Intense headaches
- Pain in other centers, likely induced via the brain, at least in most cases


- Pain at the surface of the skin, which may involve the use of ‘active denial technology’ which boils the water molecules in the skin, causing much pain but not damaging the skin and therefore not leaving ‘evidence’


- Elicitation of various physiological processes, in ways designed to be embarrassing


- Interference with the senses, emotions, etc. (perhaps by stimulating neural processes similar to those senses, emotions, etc. in the individual)


It is commonly believed that satellites are being used a highly targeted beacons of electromagnetic radiation, although presumably in at least some cases this is complemented or even largely applied by lesser sources in cases where autonomous (perhaps vindictive) operators wish to add to the torture.

ELINT


Electronic signals intelligence (ELINT) refers to intelligence-gathering by use of electronic sensors. Signal identification is performed by analyzing the collected parameters of a specific signal, and either matching it to known criteria, or recording it as a possible new emitter. ELINT data are usually considered as highly classified.


The satellites which have been deployed for radar or ELINT purposes (both of which necessarily equipped with electromagnetic radiation facilities) are as follows. Naturally, it remains unknown to the public when these satellites began to be equipped with pulse-modulation capacities of sufficient quality to diffuse outgoing synthetic telepathy communications.


Viewed by 5-year periods, the rate of deployment of ELINT and radar satellites is as follows: 1984-1989 (5); 1990-1994 (2); 1995-1999 (4); 2000-2004 (3); 2005-2009 (5); 2010-2014 (8); 2015-2016 (2). With no less than 12 satellites equipped with electromagnetic wave capacities, it should be considered as a rather uncontroversial statement to claim that much of the globe is covered most of the time, and this does not account for a large number of other satellites (and/or undisclosed satellites) which monitor via other means – also, following the popular mythology relating to the HAARP program, a fair number of other satellites described as ‘weather satellites’ may also be equipped with targeted electromagnetic wave capacities. Moreover, this does not include any land-based or non-satellite aerial capacities along these lines. Neuro-warfare applications presumably remain classified and therefore officials hidden from civilians who are vulnerable to abuse of such technologies.


Open question: Why such a large ramp up of satellites with electromagnetic wave capacities in the 2010-2014 period? I am not aware of any significant build-up of legitimate risks or threats which would justify this. I cannot speak for all places, but this most certainly is consistent with the Canadian history of 2013-2014, which to date remains essentially undocumented, but a few reminders of which will hopefully help to fill in the record once people can feel less threatened by psychiatric reprisal for describing their experiences, in particular following disclosure on the current state of technologies in neuro-warfare.

Emotional cloning
US patent 5,159,703 (1992) includes the following description through use of silent sound: “By using these computer-enhanced EEGs, scientists can identify and isolate the brain's low-amplitude "emotion signature clusters", synthesize them and store them on another computer. In other words, by studying the subtle characteristic brainwave patterns that occur when a subject experiences a particular emotion, scientists have been able to identify the concomitant brainwave pattern and can now duplicate it. "These clusters are then placed on the Silent Sound carrier frequencies and will silently trigger the occurrence of the same basic emotion in another human being!" “


It seems unlikely that such a technology could be implemented by silent sound, but an analogue of such a technology certainly exists which instead uses electromagnetic radiations/waves for essentially the same purpose. This may be complementary to the use of low frequency electromagnetic waves with more generalized impacts.


Also, applications of electromagnetic analogues of this technology seem to explain other experiences of targeted individuals and victims of non-consensual human experimentation, as described elsewhere under mimicking harassment, evoked action, driven sub-vocalization, etc.

Evoked action


An evoked action is an action that is evoked neurally, normally by a decision that is essentially conscious and intentional (i.e., not a fight or flight response to pain or a threat). This often involves visual selection of the event, in addition to encoding of motor control. However, actions may be automatically invoked, in the sense that one may intend to perform a specific action, but the brain automatically produces some other action reflecting automatic computation on the part of the brain.


This entry on evoked action should be considered as highly incomplete. However, in the context of psychological warfare in the electronic age, what is relevant is the following.


First, in relation to mimicking harassment, it is obvious to those who have experienced it that continuous mimicry of movements eventually leads to a situation where other parties may trigger an involuntary movement on the part of the targeted individual – for example, having mimicked every movement for some time, the perpetrating entity may seek to establish a sense of control over the targeted individual by, at a mere gesture, triggering an involuntary movement. It appears as though a similar connection may exist between mimicry and involuntary speech, most especially involuntary sub vocalizations (which, among other things, may be used to help brainwash an unaware targeted individual by ‘speaking in their first person’, or to extract false ‘confessions’ which may be observed via remote neural monitoring).


Second, somewhat in relation to the process of visualizing the action prior to doing it, a targeted individual who is completely unaware of such possibilities may find themselves triggered to make some kind of action, generally one which may be dangerous (for example, steer he car right, into the tree) or criminal (for example, a sexual or terrorist offense, or more innocuously, to shoplift something).


I assume that most targeted individuals can attest to such experiences, but given that the purportedly established scientific knowledge is essentially hidden undercover as ‘classified’ for ‘national security’, a targeted individual describing such experiences is liable to be directed towards a psychiatrist who will write them up with some sort of mental health record (for referring to such innocuous things as some involuntary movements, and as bad as impulses to act on a sexual perversion that the perpetrating entity have otherwise been trying to plant or force into the mind of the targeted individual).

Extremely low frequency waves


Extremely low frequency (ELF) is the ITU designation for electromagnetic radiation (radio waves) with frequencies from 3 to 30 Hz, and corresponding wavelengths from 100,000 to 10,000 kilometers. ELF waves can also penetrate significant distances into earth or rock, and ‘through-the-earth’ underground mine communication systems use frequencies of 300 to 3000 Hz. The frequency of alternating current flowing in electric power grids, 50 or 60 Hz, also falls within the ELF band, making power grids an unintentional source of ELF radiation.


The following was lifted from an online source dedicated to mystical sorts of relations with mother earth and the like. The attribution is to Lewis B. Hainsworth, but I have not yet been able to verify this information from any peer-reviewed scientific outlet. I think it suffices to say, however, that ELF waves are known to have diverse relations (extent and directionality of causation?) with our cognitive and emotional states, and among many other specific experiences, are likely to explain fatigue attacks.


- Gamma waves (25-60 Hz) appear to relate to simultaneous processing of information from different brain areas, e.g., involving memory, learning abilities, integrated thoughts or information-rich task processing. Gamma rhythms modulate perception and consciousness, which disappear with anesthesia. Synchronous activity at about 40 Hz appears involved in binding sensory inputs into the single, unitary objects we perceive.


- Beta waves (12-25 Hz) dominate our normal waking state of consciousness when attention is directed towards cognitive tasks and the outside world. Beta is a ‘fast’ activity, present when we are alert or even anxious, or when engaged in problem solving, judgment, decision making, information processing, mental activity and focus. Nobel Prize winner Sir Francis Crick and other scientists believe the 40 Hz beta frequency may be key to the act of cognition.


Alpha waves (7-12 Hz) are present during dreaming and light meditation when the eyes are closed. As more and more neurons are recruited to this frequency, alpha waves cycle globally across the whole cortex. This induces deep relaxation, but not quite meditation. In alpha, we begin to access the wealth of creativity that lies just below our conscious awareness. It is the gateway, the entry point that leads into deeper states of consciousness. Alpha waves aid overall mental coordination, calmness, alertness, inner awareness, mind/body integration and learning.


- Theta waves (4-7 Hz) occur most often in sleep but are also dominant in the deepest states of meditation (body asleep/mind awake) and thought (gateway to learning, memory). In theta, our senses are withdrawn from the external world and focused on the mindscape–internally originating signals. In theta, we are in a waking dream; vivid imagery flashes before the mind’s eye and we are receptive to information beyond our normal conscious awareness. Theta meditation increases creativity, enhances learning, reduces stress and awakens intuition and other extrasensory perception skills.


- Delta waves (0-4 Hz) are the slowest but highest in amplitude. They are generated in deepest meditation and dreamless sleep. Delta waves confer a suspension of external existence and provide the most profound feelings of peace.


Extremely low frequency (ELF) transmissions (or, more specifically, pulse modulations of higher frequency waves) are directed against an individual or larger population to influence their brain waves, for example by mimicking natural brainwaves, or in any cases by transmitting electromagnetic waves which may have similar effects on cellular communications and other biophysical processes involved in neural activity, thereby stimulating effects on the brain. Dr. W. Volkrodt states, with regard to the potential uses of ELF waves for neuro-warfare:


The technical principal of receivers for electromagnetic waves is fully analogous with biological information and communications system. If several thousand of the hundreds of billions of nerve cells in our brain resonate with man-made centimeter waves, the carrier frequency has to be suppressed when the signal is passed on to the synapses.


To overcome cell membranes, living organisms use electrochemical processes involving sodium and potassium ions. This suppresses the carrier frequency in the high-frequency range just as the demodulation circuit does in man-made receivers. What remains is the signal impressed on the carrier frequency, e.g. in the low frequency ELF range. This is also the frequency range at which our own nervous system normally works.


Using these frequencies, the nerve fibers convey pain sensations, the feeling of hungry, tiredness, nausea, and signals on the sense of balance to points in the brain which invoke these stages in a awake consciousness.

If interference signals are superimposed on the natural signals generated by the body as a carrier, the brain could be presented with stimulated states that we consciously perceive, but which do not appear as reality.


A state of disturbed sense of balance, which seems to us to be real, is enough to stop people from being able to run or make them fell dizzy even they are lying down.


In a ‘psycho-tronic war’ using microwaves modulated using ELF waves, it would no longer be necessary to kill whole armies by inducing cardiac or respiratory irregular signals. The enemy can simply be incapacitated by disturbing their states of balance or confusing the ability to think logically.


The manipulation of human beings, by means of ELF waves is relatively easy to perform.


Government authorities and military would have to overcome no insurmountable difficulties to modulate carrier frequencies with ELF signals in existing centimeters radio-relay links.


…an army of occupation could then manipulate a nation’s ability to make decisions in confusing political situations or disable undesirable activities. ELF-modulated microwave transmitters employed in this way could also serve to obviate the use of force (non-lethal weapons).


An entire nation can be gradually subjugated psychically by the means of long-term radiation using ELF-modulated centimeter waves.


This is not science fiction!


Historically, there was a legitimate military use of ELF waves. Namely, because ELF waves can be transmitted through rock, water, etc., they were used to transmit simple signals to submarines, which could then surface to receive detailed orders by other ordinary radio and satellite communications. In 2004 the Navy shut down both transmitters, with the explanation that very low frequency (VLF) communication systems had improved to the point that the ELF system was unnecessary.


This would imply that there is no legitimate application for ELF research or usage, within military industries, which is not related to neuro-weapon applications.

False flag


The contemporary term false flag describes covert operations that are designed to deceive in such a way that the operations appear as though they are being carried out by entities, groups, or nations other than those who actually planned and executed them. As a rule of thumb, targeted individuals should assume that any group that the perpetrators accept/suggest as the correct explanation is very unlikely to be the actual group responsible for the electronic harassment, organized stalking, etc.

Fatigue attacks and “electronic caffeine”:
A fatigue attack occurs which the targeted individual all of a sudden feels an overwhelming sense of fatigue for little or no identifiable cause. Many targeted individuals and victims of non-consensual human experimentation report fatigue attacks which are assumed to be implemented via means of electronic weapons. The extent to which this relies strictly on remote electromagnetic mimicking of brain waves (including via pulse modulations), other means of remote stimulus and/or conditioned responses to unheard stimulus do not appear to be understood by the community of targeted individuals.


An ancient example of a device that can accomplish such a thing is the Russian medical device known as a LIDA machine, a pulsed 40 watt, 40 MHz radio transmitter, which can be used to make a target exhausted on the job when pulsing at the rate consistent with sleep, and with a pulse rate increase, DEPRIVE a target of sleep too.


This device is a radio transmitter version of other types of trance induction devices, such as a swinging watch, or pulsing lights, or pulsing sound. Trance induction works using any low speed, regular stimulus. Even slowly swinging in a hammock or rocking in a rocking chair can induce sleep. But if someone comes along and suddenly rocks a snoozing person's rocking chair at a high rock rate, that person is going to be forced awake. Same with a slowly beeping tone changing to a rapidly beeping tone. Alarm clocks use rapid beeps, for example. (Similarly, slow music is generally soothing whereas faster music is generally energizing.)

Freedom:


The Merriam-Webster dictionary includes the following in its definition of freedom:


The quality or state of being free: as


a: the absence of necessity, coercion, or constraint in choice or action


b: liberation from slavery or restraint or from the power of another: independence


c: the quality or state of being exempt or released usually from something onerous (freedom from care)


d: ease, facility (spoke the language with freedom)


e: the quality of being frank, open, or outspoken (answered with freedom)


f: improper familiarity


g: boldness of conception or execution


h: unrestricted use (gave him the freedom of their home)


i: a political right


j: franchise, privilege

FOIA


The Freedom of Information Act enables citizens to obtain non-classified information about government activities. Most Western countries have a somewhat functioning variant of this. However, it is likely to be necessary to know the internal terminology being used to make good use of the FOIA or its equivalent. Also, in the context of psychological warfare in the electronic age (neurowarfare), presumably little of any additional relevance is likely to be disclosed. However, theoretically it may be possible for the targeted individual to find out if they are on a list of sorts (however, my understanding is that there are also lists which are impervious to such information requests).

Gagged person


A gagged person is whispered lies and slander, by a perpetrating entity, about a targeted individual. If the gagged person believes the lies, they become infuriated at the targeted individual – and are recruited into piling on, and targeting them. Gagged persons are threatened, either subtly or aggressively, when they are gagged by the perpetrating entity, even though they usually have no legal authority to do so. After this the gagged person will not advise the targeted individual of either the slander they have been told or the identity of the perpetrator who whispered it. The gagged person’s fear is based on the possibility that the slander may be justifiable and true – or even worse – if it is false, they fear that similar slander may be unleashed against them, unless they cooperate with the unjust targeting of the targeted individual.

Gang stalking


Individuals are being flagged and placed on notification lists. This is happening without the knowledge of the targeted individual. In many countries these community notifications are being used by companies and/or agencies of the security state and others to target innocent individuals such as whistleblowers, the outspoken, those perceived as a threat to certain partisan and/or ideological views, etc. In conjunction with these notifications, in some cases this is combined with a practice that was used in the former Soviet Union called psychiatric reprisal. This is used as a means of retaliation, blacklisting, silencing, or controlling members of society. Once on the notification system, warnings about the targets are sent out to every individual the target comes in contact with40, thus poisoning their associations, and socially annexing the targeted individual. As a massive understatement, this could also be described as a ‘negative energy campaign’.


As a general rule of thumb, the methods are applied in a way that is conducive to gas lighting the individual or, at the very least, that they will match established definitions of so-called mental illnesses. Failing psychiatric reprisal and/or other means of sabotaging the individual, another objective may be to drive the targeted individual to respond in some way which will lead to their incarceration (which is rather likely to be paired with exceedingly intentional efforts to try to push/provoke them to do so – apparently willingness to do evil, “for the team” (whichever ‘team’ is most likely to elicit the behaviors and preferences ‘they’ want, but generally in the direction of white supremacist neo-Nazi behavior and preferences), is one of the desired traits in this situation). And, failing either one of those, the ‘spontaneous combustion’ of the eternally harassed, tortured and frustrated is another objective (an ‘example’, so to speak, of what happens to those who do not submit to slavery).


Common organized stalking methods include:
1) Mobbing/crowding a target by swarming the

m (not tooooo obviously, but obviously enough to be unmistakable to the target) in public.


a. Similarly, many reports suggest the same applies when driving, with a variety of tactics devised to maximize the agitated state of the targeted individual, at times clearly with a view to leading them to do something dangerous and/or illegal


2) Directed conversations 1: conversations strangers have in public relating to the target's personal life (including false accusations, to make the target believe that the slander is widely believed, which sometimes may actually be the case).


3) Directed conversations 2: media content which appeared to be directed towards your life, for example something that should have been private and where media content was highly related to your personal situation, beyond what might reasonably be considered as coincidence.


4) Entrapment: setting the target up on criminal charges.


5) Slander campaigns: spreading lies and rumors about the target such as they are a drug dealer, accusations of various sex crimes such as rape, pedophilia, etc., with no opportunity to defend oneself. Including efforts to persuade the victim that the slander is widely believed (which may at times in fact be true, regardless of whether or not based in reality).


6) Illegal entry into the target’s home or car.


7) Illegal audio/visual surveillance/ bugging of target. (Presumably this is often identified mistakenly, whereas the reality is remote neural monitoring. However, traditional illegal bugging/surveillance mechanisms are liable to have more usable ‘evidence’).


8) Isolation: isolating the target from friends, family, etc., by spreading lies and rumors.


9) Insertion as faux friends to take over the social life of the targeted individual. They are always rude, and manipulative and not real friends.


10) Mail and email tampering.


11) Mimicking harassment: a) copying the target’s daily routine by throwing out the garbage at the same time or using the water or bathroom in an adjacent apartment at the same time; b) also, mimicking their movements, speech patterns, etc., which are liable to asserting a certain degree of perceived control over the individual by building up an ability to elicit evoked action or speech.


12) Noise campaigns: slamming doors, loud stereos, car alarms going off in tandem, using power tools at late hours.


13) Psychological sensitization/anchoring: getting the target sensitive to everyday stimuli like colors or everyday actions such as following the target in bright red clothing and/or swarming the target’s vehicle with red vehicles continuously until the target develops a phobia to the color red. (This should be understood in the sense of classic conditioning or priming. But this vocabulary also appears common.)


14) Creating ‘symptoms’ of mental illness (voices in the subconscious, V2K; trying to describe what is happening for others) putting the individual in psychiatric care.


15) Creating ‘symptoms’ or dementia because of apparent difficulty, sometimes, to express one’s feelings and thoughts; memory problems when the ‘attacks’ are enormous.


16) Sleep deprivation: timing noise campaigns at the time the target normally sleeps.


17) Telephone re-directs/wrong numbers.


18) Theft: stealing from a target. (Liable to be highly regular but fairly small thefts that the police will not take seriously, and may lead to being directed/forced into psychological evaluation if the targeted individual makes any claims of organized stalking or conspiracy against them.)


19) Moving foot and vehicular surveillance techniques: following the target wherever they go, perhaps including tracking the target using a GPS monitor, etc.


20) Being followed to restaurants, hotels, etc., where various other forms of harassment would continue. (Or intercepted there shortly after arrival.)


21) ‘Bighting’: perpetrators flash their (car) lights at the targeted individual at all times of the day to let the targeted individual know they are being watched.


22) Vandalism, breaking windows, slashing tires, dumping garbage on a target’s lawn. (Liable to be highly regular but fairly small incidents that the police will not take seriously, and may lead to being directed/forced into psychological evaluation if the targeted individual makes any claims of organized stalking or conspiracy against them.)


23) Ruined relationships: friendships and acquaintances going sour or talking in the same catch phrases (e.g., targeted to something assumed to have a negative psychological effect on your identity or values, perhaps unknown to these individuals) even though they do not know each other.


24) Public rudeness: rude stares, bumps or unexpected actions or talk from people you do not know or strange chat from strangers, or other behaviors that are known to be offensive or bothersome to the targeted individual.


25) Efforts to recruit you into some particular activity or event, perhaps meeting someone who has suspiciously similar interests, or invites you to events out of the blue which are suspiciously aligned with your specific interests – after which point in time their control over the venue will serve to continue with more subtle forms of the above, in addition to more calculated efforts contributing the process of establishing control over the targeted individual, to brainwash the target, in short.


26) Heavily targeted individuals may themselves end up being perpetrators of sorts, in the sense of terrorizing others, by engaging in fear-driven and hysterical descriptions of their experiences (especially when combined with various speculations relating to electronic harassment which are difficult to prove).


The key is the frequency, in addition to the events being not notable in any given instance but with a psychological effect that piles on with their high frequency and intensity. Because any single event is not that strange on its own, attempts to report on such organized stalking methods are liable to contribute to gaslighting the targeted individual, or at the least, persuading others to believe that the targeted individual is delusional and/or crazy when they try to describe the conspiracy.


It seems rather obvious that at least some degree of government complicity, whether by rogue factions or otherwise, must be necessary given the apparent futility of trying to seek official intervention in such matters, including what appears to be psychiatric reprisal for those who try to report on such events .


Why would anyone get involved in such a thing? In addition to those who are coerced, having been targeted individuals, etc., who feel “there is no choice”, or what have you … To everyday citizens, it presents itself as a group trying to monitor terrorists (or any other kind of flavor-of-the-month undesirables like gays/communists/witches) and drive them out. To other people, it’s a rotary club/chamber of commerce type operation. To others still, the most twisted conspiratorial minds, it is an organization that pulls the strings behind everything. To the puritan, it is a cleansing force. To the deviant, it is a gang of other deviants where everything is permissible. Whatever it takes to make you do what they want. I believe it is essentially white supremacist neo-Nazis, in consideration of


a) its virtual perfect consistency with white supremacist ideology (strong rule the weak, eugenics towards a lovely world) and


b) in observation of the (lack of) values they wish to indoctrinate into people with respect to the value of a human being, and


c) views relating to various non-white and biologically (subjectively) ‘imperfect’ peoples which are projected as observations introduced to me in the course of remote neural monitoring. It is not clear to me the extent to which these operatives have been brainwashed into their views as adults or grew up in families where such views and/or abuse was deemed ‘normal’. Also, it is important to understand that, as a matter of external influences that they may be unaware of, at least some people participating in the stalking are completely oblivious as to their role.


According to Julianne McKinney, “The long-term objectives of these harassment and experimentation campaigns appear to be quite fundamental;


(1) induce a sense of perverted “loyalty” toward the very agencies engaged in the individual’s harassment, to confuse his or her priorities where the possibility of obtaining legal redress might be concerned;


(2) redirect the targeted individual’s feelings of hopelessness, anger and frustration toward racial and ethnic groups, and toward select, prominent political figures, to include the President of the United States; and


(3) force the individual to commit an act of violence, whether suicide or murder, under conditions which can be plausibly denied by the government.”

Gaslighting


Gas lighting is a form of mental abuse in which a victim is manipulated into doubting his or her own memory, perception and sanity.


The word gas lighting comes from a 1938 play name Gas Light and its film adaptations. It is a form of psychological abuse in which false information is presented to the victim with the intent of making him/her doubt his/her own memory and perception.


The basic principle from the play runs something like this. Say, you have a light with a dimmer switch and the light is 100% on. Then, every few minutes, someone dims the switch by 1%. Each increment is too small to notice, but slowly, things are dimming. Eventually, the lights may reach, say, 60%. You may ask “hey, doesn’t it seem like it’s getting darker in here?” And the other person may say “WHAT? Are you CRAZY? The lights work just fine! It’s as bright as ever. You must be having some mental problems”, like, not just kidding, but they’re literally trying to convince you that you’re crazy. Then, perhaps, the light is slowly dimmed further, say, to 20-30%. Left to you own devices, you would be 100% sure that the lights were in fact significantly dimmed. However, another person is there to persuade you that you are losing your sanity. Say, the lights become dimmed to 20% and you’re having troubles reading, and you comment on this. The other person may suggest that you’re losing your mental faculties and need to see a psychiatrist, or perhaps only suggest that you’re clearly having problems with your eyes and that you need to see a doctor or optometrist. Of course, when you visit the optometrist, they will confirm that you have precisely zero problems with your eyes. The whole procedure may be repeated many times until the other person manages to convince you that you’re crazy, and that you must see a psychiatrist (presumably they would apply other methods in addition to this to promote the idea that you’re crazy). Or, just as a part of demeaning you and slowly asserting control over you, they may use such techniques to incrementally diminish your sense of self (see step 1 in brainwashing), your confidence in the perceptions of your senses, and eventually, perhaps, the belief that you are in touch with reality at all, and must be entirely dependent on this other person in order to have the ‘right’ to hold any view whatsoever.


The principle of increments could be applied to anything, but what makes it gas lighting is the presence of people who will try to convince you that you’re crazy when you mention how things are dimming.


The above is a specific example of a type of gas lighting. In current parlance, gas lighting refers to any sort of technique which is designed to make you think you are crazy, that you have lost touch with reality, when in fact you have a very good grasp on reality. For example, telling people that they must be crazy to think that the security state is spying on them, or that they are being followed, or are targeted by organized stalking (which includes high-tech stalking by proxy). Such techniques are also widely documented in domestic abuse, where the abuser seeks to assert total control over the victim. If you are a victim of gas lighting, and there is any way you can get out, GET OUT! For practical purposes, given the neuroweaponry described in this glossary, you may not be able to protect yourself from the communications which seek to gaslight you, to convince you that you are crazy. In which case, search out the anti-Nazi anti-Brainwashing Toolkit (very incomplete draft available), which may have some useful advice for recognizing some diversity of gas lighting approaches in addition to strategies to deal with it psychologically.


Gas lighting is especially common in early stages of brainwashing.

Guilt


Guilt is a cognitive or an emotional experience that occurs when a person believes or realizes—accurately or not—that he or she has compromised his or her own standards of conduct or has violated a moral standard and bears significant responsibility for that violation. It is closely related to the concept of remorse

.
In a context of psychological warfare in the electronic age, it is common to try to figure out your values to the extent that the perpetrating entity can elicit a sense of guilt by harassing you endlessly about the remotest sign of ‘hypocrisy’. For example, if you’re an environmentalist, maybe to harass you for the most extremely trivial matter such as occasionally taking a taxi instead of walking, or throwing a cigarette butt on the ground. Or, if you’re a Christian, that something can in the loosest terms be framed as a ‘sin’ such as a stealing a paper clip. The list goes on. The may have a few objectives.


1) The perpetrating entity may be trying to convince you that they are ‘good’ and helping you to uphold your own values, whereas in fact they are trying to assert a sense of control where you are open to their suggestions;


2) Slowly, over time, the perpetrating entity will try to massage these feelings of guilt to gradually shift you towards the personality they want to take you to (refer to conditioning and brainwashing, and consider how they may elicit the guilty trigger for things they want to plant in relation to new values). For example, perhaps an environmentalist could be persuaded to believe that due to love of nature, a genocide to get rid of all the inferior people would be consistent with their values;


3) This can also be a part of an effort to assert control over the targeted individual by a) a continuous invasion of privacy that wears down the individual and may make them feel hopeless and b) just simply by endless nagging and harassment that wears you down psychologically, to the point that the targeted individual may simply wish to submit to control, since the option of leaving is not on the table given the present reality of no technological defensive tools available to civilians against neuroweapons;


4) Having figured out what may elicit guilt, this may be used to try to convince the targeted individual that the punishment is ‘deserved’. Whatever it takes to make you think you ‘deserve’ it – no one, and I mean NO ONE, deserves what they are doing to people.

HAARP


The High Frequency Active Auroral Research Program (HAARP) was an ionospheric research program jointly funded by the U.S. Air Force, the U.S. Navy, the University of Alaska, and the Defense Advanced Research Projects Agency (DARPA), designed and built by BAE Advanced Technologies (BAEAT).


Its purpose was to analyze the ionosphere and investigate the potential for developing ionospheric enhancement technology for radio communications and surveillance. The HAARP program operated a major sub-arctic facility, named the HAARP Research Station, on an Air Force-owned site near Gakona, Alaska.


The findings of the research program are numerous, but of particular interest with respect to neuroweapons is the discovery of the ability to generate extremely low frequency electromagnetic waves by modulated heating of the auroral electrojet.
Reportedly, the specific site of research has been shut down. So the conspiracy theorists should self-report to a mental hospital.

Handler


Agent operations are run by specially trained officers known as agent handlers, and can continue for long periods, sometimes for many years.


A handler in the intelligence services (and MKULTRA survivor group) is the direct supervisor of an intelligence asset. Someone who has been programmed (perhaps somewhat different than brainwashed) to do the will of a controlling agency, such as a mind control target, is an asset to the controlling agency. Present day organized stalking and electronic harassment targets are not usually acquainted with their handlers, however, we can be certain at any given time that each frontline perpetrator has at least one. The handlers know the appropriate words, tones, or other signals to invoke the asset’s programming.


Sometimes, agent handling is done indirectly, through ‘principal agents’ that serve as proxies for case officers. It is not uncommon, for example, for a case officer to manage a number of principal agents, who in turn handle agent networks, which are preferably organized in a cellular fashion. In such a case, the principal agent can serve as a ‘cut-out’ for the case officer, buffering him or her from direct contact with the agent network.


Utilizing a principal agent as a cut-out, and ensuring that the human agent network is organized in a cellular fashion, can provide some protection for other agents in the network, as well as for the principal agent, and for the case officer in the event that an agent in the network is compromised.


In the context of organized stalking (including electronic stalking by proxy), a handler is not one of these really high up people in an intelligence agency. The word handler is often used to refer to a person, often an ex-targeted individual and recruited from the army of front-line perpetrators (presumably after their brainwashing/subservience appears to be complete and secured), who remain behind the scenes scripting everything; they are the first to receive community notifications (this view is probably insufficiently considering remote influencing technologies which may also direct/influence the stalking).

Harassment


Harassment covers a wide range of offensive behavior. It is commonly understood as behavior intended to disturb or upset. In the legal sense, it is behavior which is found threatening or disturbing. Sexual harassment refers to persistent and unwanted sexual advances, typically in the workplace, where the consequences of refusing are potentially very disadvantageous to the victim. In 1984, the Canadian Human Rights Act prohibited sexual harassment in workplaces under federal jurisdiction.


The crime of stalking is defined legally as criminal harassment. The following section of the Criminal Code of Canada pertains to criminal harassment: Section 264. (1) No person shall, without lawful


44 MI5, authority and knowing that another person is harassed or recklessly as to whether the other person is harassed, engage in conduct referred to in subsection (2) that causes that other person reasonably, in all the circumstances, to fear for their safety or the safety of anyone known to them. Prohibited conduct: (2) The conduct mentioned in subsection (1) consists of (a) repeatedly following from place to place the other person or anyone known to them; (b) repeatedly communicating with, either directly or indirectly, the other person or anyone known to them; (c) besetting or watching the dwelling-house, or place where the other person, or anyone known to them, resides, works, carries on business or happens to be; or (d) engaging in threatening conduct directed at the other person or any member of their family.

Hate crime

The Criminal Code of Canada says a hate crime is committed to intimidate, harm or terrify not only a person, but an entire group of people to which the victim belongs. The victims are targeted for who they are, not because of anything they have done. Hate crimes involve intimidation, harassment, physical force or threat of physical force against a person, a family or a property.

Human rights


Human rights are moral principles or norms, which describe certain standards of human behavior, and are regularly protected as legal rights in municipal and international law. They are commonly understood as inalienable fundamental rights to which a person is inherently entitled simply because she or he is a human being, and which are inherent in all human beings regardless of their nation, location, language, religion, ethnic origin or any other status. They are applicable everywhere and at every time in the sense of being universal, and they are egalitarian in the sense of being the same for everyone. They require empathy and the rule of law and impose an obligation on persons to respect the human rights of others. They should not be taken away except as a result of due process based on specific circumstances; for example, human rights may include freedom from unlawful imprisonment (see Political abuse of psychiatry), torture, and execution.

Hypogenic method


A historically early term used to discuss the power of suggestion, more specifically, a hypnotically planted suggestion which is triggered by an electromagnetic transmission (in the historical case, a radio wave transmission).

Hypnosis


Hypnosis is a state of human consciousness involving focused attention and reduced peripheral awareness and an enhanced capacity for response to suggestion. The term may also refer to an art, skill, or act of inducing hypnosis.
Theories explaining what occurs during hypnosis fall into two groups. Altered state theories see hypnosis as an altered state of mind or trance, marked by a level of awareness different from the ordinary conscious state. In contrast, Non-state theories see hypnosis as a form of imaginative role-enactment.


During hypnosis, a person is said to have heightened focus and concentration. The person can concentrate intensely on a specific thought or memory, while blocking out sources of distraction. Hypnotized subjects are said to show an increased response to suggestions. Hypnosis is usually induced by a procedure known as a hypnotic induction involving a series of preliminary instructions and suggestion.


If you find yourself excessively open to suggestion and wonder if you might be in a partially hypnotized state, perhaps in relation to some of the technologies and strategies presented in this glossary, assert control over the situation mentally, or divert your mental attention by focusing on some physical task. Do not allow yourself to be hypnotized by anyone who you do not have a high level of trust in (and even then, a trustworthy person should be entirely OK with you recording the event). Obviously, you cannot trust the motives of a wannabe hypnotist who you cannot see.


It seems to me that the use of certain types of repeated rhythms, patterns, and meter in speech and sounds may push the individual towards a more suggestive state (in addition to hypothesized ‘hard-wired’ effects on emotion, etc. as a function of tone, rhythm, meter, etc.). In such a case, it may be effective to keep yourself busy doing other things, or if you cannot fully prevent yourself from having a sort of ‘self-hypnotic’ pattern being pushed through your brain with the effect being your own sub vocalization, it should not be at all difficult to then take charge of this pattern at any instant and take it in another direction.


Finally, some writers have referred to ‘hypnotic triggers’ which cause specific involuntary actions or physiological responses. However, the appropriate framing should be classic conditioning with triggers used to elicit response, not ‘hypnotic triggers’.

Information Awareness Office


The Information Awareness Office (IAO) was established by the Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to U.S. national security by achieving ‘Total Information Awareness’ (TIA).


This was achieved by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social networks, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a search warrant.This information was then analyzed to look for suspicious activities, connections between individuals, and ‘threats’. Additionally, the program included funding for biometric surveillance technologies that could identify and track individuals using surveillance cameras, and other methods.


Following public criticism that the development and deployment of this technology could potentially lead to a mass surveillance system, the IAO was defunded by Congress in 2003. However, several IAO projects continued to be funded and merely run under different names, as revealed by Edward Snowden during the course of the 2013 mass surveillance disclosures.

Informed consent


Informed consent often pertains to signing consent forms for medical procedures, such as surgery, or for cancer treatments such as radiation or chemotherapy. For clinical trials and experimentation, however, informed consent involves much more than just reading and signing a piece of paper. Rather, it involves two essential parts: a document and a process. The informed consent document provides a summary of the clinical trial (including its purpose, the treatment procedures and schedule, potential risks and benefits, alternatives to participation, etc.) and explains your rights as a participant. It is designed to begin the informed consent process, which consists of conversations between you and the research team. If you then decide to enter the trial, you give your official consent by signing the document. You can keep a copy and use it as an information resource throughout the course of the trial. The informed consent process provides you with ongoing explanations that will help you make educated decisions about whether to begin or continue participating in a trial. Researchers and health professionals know that a written document alone may not ensure that you fully understand what participation means. Therefore, before you make your decision, the research team will discuss with you the trial’s purpose, procedures, risks and potential benefits, and your rights as a participant. If you decide to participate, the team will continue to update you on any new information that may affect your situation. Before, during, and even after the trial, you will have the opportunity to ask questions and raise concerns. Thus, informed consent is an ongoing, interactive process, rather than a one-time information session.


More generally speaking, consent can be classified into the following types:
Implied consent is a form of consent which is not expressly granted by a person, but rather inferred from a person's actions and the facts and circumstances of a particular situation (or in some cases, by a person's silence or inaction).

Some examples include implied consent to follow rules and/or regulations at an education institution.


Expressed consent is clearly and unmistakably stated, rather than implied. It may be given in writing, by speech (orally), or non-verbally, e.g. by a clear gesture such as a nod. Non-written express consent not evidenced by witnesses or an audio or video recording may be disputed if a party denies that it was given.


Informed consent in medicine is consent given by a person who has a clear appreciation and understanding of the facts, implications, and future consequences of an action. The term is also used in other contexts.


Unanimous consent, or general consent, by a group of several parties (e.g., an association) is consent given by all parties.


Substituted consent, or the substituted judgment doctrine, allows a decision maker to attempt to establish the decision an incompetent person would have made if he or she were competent.
 
Innocence


Not guilty of a crime or offense. Innocence cannot be proven (refer to kangaroo courts). However, if one gives up on the principle of one’s own innocence, then eventually the prospect of perpetrating progressively worse violations of ethics and might seem OK (refer to conditioning and brainwashing).

 

Inner voice cloning


Inner voice cloning refers to a process where, via remote neural monitoring, perpetrators either on the street via organized stalking or those participating via electronic harassment, may copy your subvocalized inner voice. In terms of organized stalking, this may contribute to wearing down the individual to encourage them to submit via a display of the sheer extent of the invasion of privacy that may be sustained until the targeted individual submits (as though it would end then … but anyways, some periods of respite may lead the targeted individual who is desperate to escape the psychological torture to believe that this may be the case). In terms of electronic harassment, and more specifically the use of pulse-modulated electromagnetic (microwave) radiations to communicate voices (synthetic telepathy; voice to skull; auditory disturbances) directly into the head of the targeted individual via the microwave auditory effect, the nefarious potential is particularly dangerous to any individual who is unaware of such possibilities. Namely, having established the word choice, rhythm, tones, etc., of one’s subvocalized inner voice, the perpetrating entity may try to drive an involuntary sub vocalization purporting to speak in the first person of the targeted individual. As mentioned elsewhere, this may be used to extract false confessions, to reinforce planting a false memory, and generally for the purpose of brainwashing the targeted individual by slowly refining thinking processes, where they may believe themselves to have actually come to some particular conclusion on their own – in such cases, the perpetrating entity is likely to carefully select the phrases according to what is known about psychology and personality of the targeted individual, in order to slowly bring them over to the dark side (which, will application of other conditioning and brainwashing techniques, may very well seem like the light side by the time the process is complete).


If you ever notice anyone speaking in YOUR first person, re-read this entire glossary twice, thrice and twice more again, then refer to the anti-Nazi anti-Brainwashing Toolkit (very incomplete draft available) for more specific advice on strategies to protect yourself psychologically in the process of retaining your identity and avoiding being transformed into something altogether different from what you ever were.

Innuendo


Statement A logically implies statement B if and only if the truth of A guarantees the truth of B. Innuendo occurs when statement A suggests the truth of statement B, without logically implying it.


Innuendo can take diverse forms, but for present purposes largely relates to a statement which indirectly suggests that someone has done something immoral, improper, etc. This is liable to be combined with strategies bordering on (or significantly surpassing) libelous slander (which may not name you specifically, but it should be clear to the targeted individual due to other obvious signs of who is being spoken of), but by virtue of innuendo, the perpetrating entity can uphold a degree of plausible deniability, that they were not in fact saying that the targeted individual actually did precisely the thing that the innuendo is supposed to leave others to conclude in fact happened.


For one of a million types of examples, consider a statement made to a person who routinely stands up to claim that most Muslims are decent people, that we shouldn’t jump to conclusions, etc., and who is also critical of ongoing expansions and increasing arbitrary and unaccountable powers of the police state – someone might say “some people think you’re a terrorist” or “I guess he supports terrorism” – depending on the tone, phrasing, rhythm, etc. of the words, and the body language of the speaker, the innuendo may communicate, not that “some people think you’re a terrorist” as in just a few people think that, but perhaps something more like “some people are still dumb enough not to see the obvious fact that you’re definitely going in the direction of terrorism, perhaps already plotting something”. (It is worth mentioning that at the time of this statement, significant effort had been expended to slowly mould the perception of tree huggers to that of being borderline terrorists, as a result of suggesting that rapid exploitation of natural resources as critical to the economy and legislation which suggested that any threat to the economy could be considered as terrorism – I had previously run for office with the Green Party, and presumably was one of a great number of people who came under intense political repression as a result of former and/or ongoing advocacy for environmental issues).


For a second type of example, consider the following statement: “he sure LOVES children doesn’t he” (while making some gesture or other trigger which has been conditioned to be associated with a sexual interest or response).


Combined with other forms of electronic harassment, remote neutral monitoring, and triggering of conditionings, etc., via such innuendo, it may even be possible to convince the targeted individual THEMSELVES that this might be true, and that as a result that the 24/7 absolute privacy invasion is somehow warranted (which, personally, leads me to believe that a terrorist- or revolutionary-like response is 100% warranted, but I absolutely do not believe that this is an effective means of advancing the situation, because such a strategy is rather more likely to attract backlash and merely result in further increases in resource allocations to the police state and acceptance by many citizens of further entrenchment and/or extensions of civil and cognitive liberty violations.)


Key here is to consider the great diversity of meanings that innuendo can take depending on the phrasing, tone, rhythm, etc. of the innuendo-filled statement. Were you to write down the statement, it might seems purely harmless, and in recounting the situation, one might appear delusional to claim that it clearly meant the (intended) innuendo that it communicated. As already alluded to, innuendo can have highly pernicious interactions with techniques involved in slander, blackmailing, and even full-on brainwashing.


As a final note on innuendo, refer to directed conversations and parroting, and consider how circular thinking may be promoted in ways which are progressively manipulated in ways which a) are tiresome and frustrating, and b) which may lead to the targeted individual’s values, etc., being progressively manipulated over time(refer to brainwashing).

Intimidation


Intimidation is intentional behavior that "would cause a person of ordinary sensibilities" fear of injury or harm. It is not necessary to prove that the behavior was so violent as to cause terror or that the victim was actually frightened.


Threat, Criminal threatening (or threatening behavior) is the crime of intentionally or knowingly putting another person in fear of bodily injury. Threat of harm generally involves a perception of injury...physical or mental damage...act or instance of injury, or a material and detriment or loss to a person.


A terroristic threat is a crime generally involving a threat to commit violence communicated with the intent to terrorize other.

Joint


A marijuana cigarette which, when smoked, alleviates symptoms of a diversity of illnesses and in healthy subjects generally improves mood and happiness. For medical purposes, the plant generally has significantly fewer negative side effects than almost all other (EXPENSIVE!) pharmaceutical options, and moreover is not addictive whereas many of the (EXPENSIVE!) pharmaceutical options are addictive. The theoretical lethal dose is physically impossible to actually consume, although there are legitimate (unproven) concerns that regular use, in particular among youth, may have some associations with suboptimal brain development.


The powers that be go to extreme lengths to discredit anyone who speaks of any positive associations with this plant, which would cost basically nothing to grow if it were not for draconian laws which may lead to a permanent criminal record and/or prison for those who consume, grow, and/or distribute any related products.

Kangaroo court
“A mock court in which the principles of law and justice are disregarded or perverted”, especially without good (or any) evidence for the purported guilt of a crime or misdemeanor.

Laser microphone
A laser microphone is a surveillance device that uses a laser beam to detect sound vibrations in a distant object. This technology can be used to eavesdrop with minimal chance of exposure.


The object is typically inside a room where a conversation is taking place, and can be anything that can vibrate (for example, a picture on a wall) in response to the pressure waves created by noises present in the room. The object preferably has a smooth surface. The laser beam is directed into the room through a window, reflects off the object and returns to a receiver (for example a solar panel) that converts the beam to an audio signal. The beam may also be bounced off the window itself. The minute differences in the distance traveled by the light as it reflects from the vibrating object are detected interferometrically. The interferometer converts the variations to intensity variations, and electronics are used to convert these variations to signals that can be converted back to sound.


However, countermeasures exist in the form of specialized light sensors that can detect the light from the beam. Rippled glass can be used as a defense, as it provides a poor surface for a laser microphone.


However, by simple extrapolation it should be easily possible to adapt this technique to a maser or focused microwave beam in order to fire the beam through ordinary building materials and bounce it off of internal metal objects such as heating ducts or filing cabinets. At this point the only acceptable defense is electromagnetically and acoustically isolating the interior of the structure.


It seems rather obvious that an analogue of the laser microphone has been devised to engage in remote neural monitoring, presumably something along the lines of sending a microwave beam and reading the resulting patterns to reconstruct certain basic features or neural activity, presumably calibrated to previously established brainwave patterns of the individual. However, it is possible that the remote neural monitoring is making use of other technologies that have yet to be uncovered on either a theoretical or officially documented basis.

Learned helplessness


Learned helplessness is behavior typical of an organism (human or animal) that has endured repeated painful or otherwise aversive stimuli which it was unable to escape or avoid. After such experience, the organism often fails to learn escape or avoidance in new situations where such behavior would be effective. In other words, the organism seems to have learned that it is helpless in aversive situations, that it has lost control, and so it gives up trying. Such an organism is said to have acquired learned helplessness.


Research has found that human reactions to a lack of control differ both between individuals and between situations. For example, learned helplessness sometimes remains specific to one situation but at other times generalizes across situations. Such variations are not explained by the original theory of learned helplessness, and an influential view is that such variations depend on an individual's attributional or explanatory style.66 According to this view, how someone interprets or explains adverse events affects their likelihood of acquiring learned helplessness and subsequent depression. For example, people with pessimistic explanatory style tend to see negative events as permanent ("it will never change"), personal ("it's my fault"), and pervasive ("I can't do anything correctly"), are likely to suffer from learned helplessness and depression.(So it should not be surprising that perpetrating entities will try to ‘teach’ such outlooks.) Such people can often be helped to learn a more realistic explanatory style by cognitive behavioral therapy, a therapy heavily endorsed by Seligman.


In CIA interrogation manuals learned helplessness is characterized as ‘apathy’ which may result from prolonged use of coercive techniques which result in a "debility-dependency-dread" state in the subject, "If the debility-dependency-dread state is unduly prolonged, however, the arrestee may sink into a defensive apathy from which it is hard to arouse him.

MALINTENT


MALINTENT is technological system that was developed by the U.S. Department of Homeland Security to be implemented for detection of potential ‘terrorist suspects’.


The system does various test scanning, for example including elevated blood pressure, rapid heart and breath rate, and non-verbal cues (so don’t you dare even TWITCH in a ‘suspicious’ way!). According to the scientists, the MALINTENT system uses a barrage of non-invasive sensors and imagers to detect and evaluate a person's facial expressions which are purported to gauge be planning to commit an attack or crime.


In its state of development in 2008, almost 10 years ago, it could already recognize seven primary emotions and emotional clues and will eventually have equipment which can analyze full body movement, an eye scanner and a pheromone-reader.


If the sensors pick up anything considered alarming, analysts can decide whether to subject a person to questioning.
So all they have to do is use ELF waves to affect your physiological variables and then subject you are ‘suspicious’ and in need of interrogation for no fucking reason? And this wasn’t front page news until the program was killed? What. The. Fuck?

Masers


A maser, an acronym for "microwave amplification by stimulated emission of radiation", is a device that produces coherent electromagnetic waves through amplification by stimulated emission. The first maser was built by Charles H. Townes, James P. Gordon, and H. J. Zeiger at Columbia University in 1953. Contemporary masers can be designed to generate electromagnetic waves at not only microwave frequencies but also radio and infrared frequencies. For this reason Charles Townes advised replacing "microwave" with the word "molecular" as the first word in the acronym maser. The laser works by the same principle as the maser, and the maser was the forerunner of the laser, inspiring theoretical work by Townes and Arthur Leonard Schawlow that led to its invention in 1960.
In 2012, a research team from the National Physical Laboratory and Imperial College London developed a solid-state maser that operates at room temperature by using pentacene-doped p-Terphenyl as the amplifier medium.

Mass murder


Mass murder (sometimes interchangeable with ‘mass destruction’) is the act of murdering a number of people, typically simultaneously or over a relatively short period of time. The FBI defines mass murder as murdering four or more persons during an event with no ‘cooling-off period’ between the murders. A mass murder typically occurs in a single location where one or more people kill several others. Many acts of mass murder end with the perpetrator(s) dying by suicide or suicide by cop.


There are appear to be increasing levels of suspicion, in some circles, that rogue agents in the security state, whether via use of the variety of electronic weapons discussed in this glossary or via other means, are pushing targets towards situations where they may commit a mass murder. Among other things, this would serve to justify a) the historically unprecedented levels of surveillance, and b) increased budgetary appropriations to ‘keep the public safe’. In the context of neuro-warfare, it should not appear delusional to wonder whether it may also serve experimental purposes to devise methods which may persuade people to go commit a murder (see mass murder), perhaps even against a suggested target.

MEDUSA


MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulse-modulated electromagnetic radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a ‘discomfort’ level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals.

Megalomania


Megalomania is a psychopathological condition characterized by fantasies of power, relevance, omnipotence, and by inflated self-esteem. Historically it was used as a name for narcissistic personality disorder prior to the latter's first use by Heinz Kohut in 1968, and is used today as a non-clinical equivalent. It is not mentioned in the Diagnostic and Statistical Manual of Mental Disorders (DSM) or the International Statistical Classification of Diseases (ICD).
Narcissistic personality disorder (NPD) is a personality disorder, characterized by grandiosity, excessive need for admiration, and little empathy for others.75 People with the disorder often come across as arrogant, callous, and envious, tend to be exploitative in their interpersonal relationships, and can be excessively preoccupied with personal adequacy, power, prestige and vanity. As a personality disorder, those with NPD generally have poor insight into their condition and may not acknowledge that their behavior causes problems for others or themselves.
It is classified as a cluster B personality disorder by the Diagnostic and Statistical Manual of Mental Disorders.

Magnetophosphenes


Magnetophosphenes are flashes of light (phosphenes) that are seen when one is subjected to a changing magnetic field – among others, this is experienced by some people when in an MRI. This changing field76 causes current within the retina or visual cortex resulting in the illusion of light. The effect was first reported by d'Arsonval (1896).


A 1979 study roughly determined the threshold for the appearance of magnetophosphenes as a function of magnetic-field frequency in normal and color-defective volunteers in addition to the site in the visual system where the magnetophosphenes arise. A similar study in 1980 reports on the specific thresholds and other variables of interest.
Then, formal study of this topic appears to have largely dropped off the radar, although an online search shows that at least some publicly available research has referenced these studies.


This should be of some interest with regards to many reports of unwanted images, etc. being introduced into the minds of targeted individuals. However, due to the likely difficulty of creating a targeted magnetic field compared to more common uses of electromagnetic radiation in triggering/influencing neural and/or physiological processes, I believe that many (not all) such experiences instead most often involve introducing an idea by suggestion, with some triggering of an image or visual ‘memory’ with most of the activity happening within the brain of the targeted individual, and rather limited informational input from the perpetrating entity. Also, this may involve progressively changing an image or visual ‘memory’ by power of suggestion and by introduction of progressively different images, images which need not be particularly detailed, but which need only contain sufficient detail in order to suggestively and progressively change the ‘memory’.

Man-in-the-middle attack


In cryptography and computer security, a man-in-the-middle attack is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. One example of man-in-the-middle attacks is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all relevant messages passing between the two victims and inject new ones.


For the context of psychological warfare in the electronic age, this concept only needs minor refinement. For a rather ‘mundane’ example of how this may apply to a targeted individual, for consider how one of the first priorities is to socially isolate/castrate the targeted individual. Consider three (of many) types of applications that may be made via use of neuroweapons:


1) Having ‘cloned’ the voice of a contact, friend, family member, etc., the perpetrators may inject words and sentences into conversations (and it sounds exactly like them due to voice cloning), and you are none the wiser. For example, being ‘spoken to’ by someone you are interacting with, but their lips are not moving (in some cases this may also involve ventriloquism, but it should not be difficult to detect the difference if you are aware of this). What is really happening is synthetic telepathy being sent when one’s gaze shifts from their face for a split second. Among other things, the purpose of this is to one, sensitize you to stimuli in your environment, and two, to deceive you. It is a power game. The deception may involve things like money or sex, and they want you to act on the misleading information in order to compromise your social status.


2) Not altogether different from the above scenario, this may be applied to sow discord between people, along the principle of “divide and conquer them one friendship and family member at a time”. Say, the perpetrating entity is trying to drive you and a friend apart. There's some knowledge of pet peeves about each other. Your stalkers (remote or otherwise) play this in some way to add to the irritation, and you bring it up with the friend, which perhaps leads to some conflict. Say, via remote neural monitoring or more traditional techniques, they observe how both of you are planning to address the situation. BUT, before you have a chance to speak about it next time you meet up, you both face some directed conversations, perhaps unknown to you, or perhaps via manipulations via synthetic telepathy (with the support of a computer to process information and to help a human craft and some messages) to inflame the situation. The plan could orchestrated so that BOTH of you are walking into the next meeting with a plan to talk about it, each one of you having a plan that is maximally likely to make you hate each other, say things about each other that will drive you apart. Or, perhaps, both of you will give priming signals which lead BOTH of you to believe that the OTHER is respectively the perp. Result? You are both involved in organized stalking (electronic stalking by proxy, in other parlance) each other AND YOU DON'T EVEN KNOW IT! Such strategies could be applied to any type of relationship, whether personal, business, political, or other.


3) For someone who is involved in any sort of peaceful advocacy (including by elected politicians, other recognized leaders in civil society, etc.), this may involve the use of remote neural monitoring, in addition to monitoring of completed actual writing or publications, organizational strategies, etc., to pre-empt anything that the peaceful advocate may be putting into motion. If there is a plausible prospect for success, the perpetrating entity may strive to maintain the upper hand, by always knowing what’s coming, and releasing various media, rumors, etc., which are specifically calibrated to undermine the strategy that the peaceful activist is about to follow through on. This could take a greater diversity of forms depending on the specific plans of the peaceful activist. And, in the future, similar applications of such strategies are liable to make use of remote neural monitoring for seeking out thought crimes, such as an interest to engage in peaceful advocacy or speaking truth to power, and, if it is not possible to coerce or brainwash the peaceful advocate out of their desired path of action and communication, the man-in-the-middle attack may be used to interfere with any effort to network and get projects off the ground (may also be applied to any sort of work/business opportunity of the targeted individual). This is liable to be accompanied by many means of organized stalking, especially by targeting of the prospective contacts to make the networking relationship feel costly and undesirable, in addition to spreading vicious rumors which, given knowledge of what the potential contacts know about the peaceful advocate, these rumors would be associated with that peaceful advocate, in an effort to destroy any such advocacy before networking and communications could help it to get off the ground – in short, severe political repression.


One example I experienced was, in starting a project to end unpaid internships (with reasonable exceptions for non-profit activities or opportunities revolving around training which allowed a business to ‘try out’ a potential hire in non-profit centers) called the GivingYourselfAway Internship Project, there was a release of a political cartoon in the Globe and Mail which portrayed a mob of minimum wage workers asking an executive “do you want fries with that?” while placed under a guillotine – clearly, this was to be perceived as a threat to public safety due to the supposed potential for youth to rise up violently – however, around that time the Ontario government also enacted additional protections for interns which reduced the ease with which for-profit businesses can make use of interns for $0/hr labor. I still intend to implement the legal code violation monitoring mechanism proposed as the organizational principle of that project, but other issues seem rather more pressing at present.


Naturally, this may apply to much higher levels of organization, such as those who are organizing to expose the realities of neuroweapons, applications for political repression, etc., or even at the level of international security (most likely supplemented by a dedicated agent provocateur, whose devious strategies may take advantage of the man-in-the-middle attack strategy).


For strictly computer-related applications, many online forums discuss issues surrounding authentication, etc., but few of these are likely to be impervious to remote neural monitoring of targets.

Martha Mitchell Effect

The Martha Mitchell Effect is named after a historical situation where Martha Mitchell, wife of the Attorney-General during the Nixon Administration, told her psychologist that top White House officials were engaged in illegal activities. Her psychologist labeled these claims as caused by mental illness. The Mitchell Effect can be defined as a situation where “improbable reports are erroneously assumed to be symptoms of mental illness [due to a] failure or inability to verify whether the events have actually taken place, no matter how improbable intuitively they might appear to the busy clinician If you are a targeted individual, and have somehow been drawn into making claims about the present reality, and the psychiatrist tries to write you off as ‘mentally ill’, one should consider refusing to speak with them any further until they have gone and researched the Martha Mitchell Effect.

Microwave auditory effect


The very surprising fact that microwave electromagnetic waves can be perceived as sound in the brain. Since we can see light, but not hear it, this is very surprising. The effect was first reported by persons working in the vicinity of radar transponders during World War II.


During the Cold War era, the American neuroscientist Allan H. Frey studied this phenomenon and was the first to publish information on the nature of the microwave auditory effect.81 Research into radar hearing by Dr. Allen Frey began in the 1960s and established that roughly three-tenths of a watt per square centimeter of skull surface is required to generate the clicks from which the voice is synthesized. Synthesis of voice from clicks is a primitive form of "digital audio." The image included in this entry shows the basic idea of how voice can be transmitted via microwave pulses For some years in the 1990s and early 2000s, the United States Army recognized "voice to skull" technology, which they abbreviated as "V2K," in their on line thesaurus. For reasons unknown, the Army removed that thesaurus entry circa 2007. Some references to developing more advanced types of voice to skull can be found among patents, and rare United States Air Force references to the technology in the late 1990s forward. The mechanics of this effect have been explained more precisely in the civilian sector as early as 2007.

Microwave mind control


The use of microwave (electronic) weapons, namely those which speak into your mind, engage in remote neural monitoring, and which may modulate moods and other behaviors and/or physiological responses (in conjunction with conditioning) to attempt to sequentially assert control over an individual, to the point that they are essentially brainwashed, or willing to submit to any or all directives they are given (which may involves brainwashing or use of conditioning for them to believe that they are ‘powerful’ or somehow doing the right thing when engaged in such psychological torture).

Microwave Doppler movement measuring device


The Life Assessment Detector System (LADS) by VSE Corp., a microwave Doppler movement measuring device, can detect human body surface motion, including heartbeat and respiration, at ranges up to 135 feet (41.15 meters). The LADS consists of a sensor module, a neural network module, and a control/monitor module. The sensor module is an x-band (10 GHz) microwave transceiver with a nominal output power of 15 milliwatts, operating in the continuous wave (CW) mode. The neural network module device can store many complex patterns such as visual waveforms and speech templates, and can easily compare input patterns to previously ‘trained’ or stored patterns. The control/monitor module provides the LADS' instrument controls, such as on-off switches, circuit breakers, and battery condition, as well as motion, heartbeat waveform, pulse strength, and pulse rate displays.


Among other likely applications, such a device could be paired with essentially any type of conditioning or priming (for example, words, gestures and images, whether subliminal or supraliminal, or alternatively electromagnetic waves which would be essentially unobservable by the victim). Then, such triggers could be used for the purpose of eliciting fear, paranoia, etc., due to irregular heartbeats or a degree of apparently unexplained constriction of the lungs or breathing apparatus.

For a rather nefarious type of application of being able to trigger a skipped heart beat or heart palpitation or increase in heart rate, the perpetrating entity, having planted a false memory, might then try to elicit this ‘memory’ at basically the same time as triggering the heart event, and then via synthetic telepathy to elicit a sub vocalization where the target says “I really did X”, claim “that’s what guilt feels like”, perhaps followed by an ELF wave geared to triggering a tingly sensation which is supposed to be some sort of elation or release, accompanied by “that’s what forgiveness feels like”.


Such strategies might be applied for a variety of reasons, not excluded to:


a) persuading the target that they are guilty of something and hence ‘deserved’ it;


b) persuading the target to publicly admit to something (which perhaps they never did) and therefore self-destruct for purposes of credibility, or social-political and/or career advancement;


c) establish a control over the individual, who may still be somewhat aware that it’s a carefully orchestrated set-up from the inside out (or alternatively that they actually did it but that it is not at all possible that any ‘good’ entity could possibly see torture and brainwashing as a means of redress or ‘justice’), but having gone through such an experience, may be persuaded to submit to the domination of the nefarious entities responsible for the brainwashing;


d) so that later, having massaged the meanings of various words and triggers away from their applied usage during the psychological torture and brainwashing, the newly ordained slave puppet may be persuaded to believe that it was all for their own good, perhaps even that the perpetrators of psychological torture and brainwashing against civilians through combinations of neuroweapons and ‘traditional’ conditioning and brainwashing techniques are agents of God, ‘angels’, or some such thing (and hence the term Voice of God for synthetic telepathy) – this will be specifically tailored according to whatever can be figured out about the specific beliefs, desires, insecurities, etc., of the targeted individual.


Other applications are by no means benign. The ability to trigger a physiological stress event can be a powerful tool for brainwashing, in the sense that whenever doing, saying, thinking, etc., the ‘wrong’ thing, the ‘stick’ can be applied – if the targeted individual is unaware of such possibilities, he/she may sequentially develop high discomfort associations with the activities/views/etc. that the perpetrating entity is trying to eliminate from the personality and consciousness of the targeted individual. Contrarily, a release from such stress may itself serve as a sort of ‘the absence of the stick is itself the carrot’ scenario, where when straying into thoughts/behaviors/etc. (perhaps introduced suggestively, or by driving a sub vocalization of a ‘desired’ phrase or way of thinking or treating people) that the perpetrating entity wishes to condition and brainwash INTO the targeted individual, a positive ‘absence of the stick is a carrot’ association may be progressively ‘train’ the targeted individual into these new values, ways of thinking or behaviours.


Theoretically, such triggers may plausibly be paired with software which is programmed to ‘train’ itself to recognize certain brainwave patterns, for the purpose of mimicking these patterns to additionally influence heart and breathing related phenomena, or at the very least, to elicit the ‘desired’ stress/fear/comfort/etc. response.

Millimeter waves


The millimeter-wave region of the electromagnetic spectrum is usually considered to be the range of wavelengths from 10 millimeters (0.4 inches) to 1 millimeter (0.04 inches).


Millimeter waves travel solely by line-of-sight, and are blocked by building walls and attenuated by foliage. The high free space loss and atmospheric absorption limits propagation to a few kilometers. Thus they are useful for densely packed communications networks such as personal area networks that improve spectrum utilization through frequency reuse.


One current application is the Active Denial System (ADS), directed energy weapon developed by the U.S. military, designed for area denial, perimeter security and crowd control. The ADS works by firing a high-powered beam of 95 GHz waves at a target, which corresponds to a wavelength of 3.2 mm.86 The ADS millimeter wave energy works on a similar principle as a microwave oven, exciting the water and fat molecules in the skin, and instantly heating them via dielectric heating. One significant difference is that a microwave oven uses the much lower frequency (and longer wavelength) of 2.45 GHz. The short millimeter waves used in ADS only penetrate the top layers of skin, with most of the energy being absorbed within 0.4 mm (1/64"), whereas microwaves will penetrate into human tissue about 17 mm (0.67").


The ADS's repel effect in humans occurs at slightly higher than 44 °C (111 °F), though first-degree burns occur at about 51 °C (124 °F), and second-degree burns occur at about 58 °C (136 °F). Most human test subjects reached their pain threshold within 3 seconds, and none could endure more than 5 seconds.

Mimicking harassment


Mimicking harassment (parroting) is one of the most relied upon methods and tactics being used in organized stalking and electronic harassment. It basically amounts to continuously copying the movements, words, tones, rhythms, etc. of the targeted individual, and may involve a substantial degree of directed conversation in addition to the parroting itself.
For a less easily believed types of mimicking harassment (parroting), and this is especially likely to apply to targeted individuals who are particularly outspoken on certain issues, and especially if they are able to be outspoken in a particularly effective manner which demolishes easily anticipated counterarguments, parroting may be done by the media or individuals on TV (which either implies that much media is ‘in on it’, or perhaps in some cases that mind influencing technologies and strategies are being used to suggest certain content relating to the targeted individual). This could involve more easily believable situations such as mining the life, writings, etc. or the targeted individual to create content in some media outlet that you are known to regularly consume. Perhaps less easily believed, are instances where (illegal) remote neural monitoring is used to (illegally) directly relay very recent thoughts (sometimes almost immediate) to the live media outlet the targeted individual is currently watching or listening to – for example, you are listening to the radio and the radio announcer is parroting back what you have just subvocalized, or what you are reading. Non-verbal cues may also appear in such media.


Almost everyone that the targeted individual is believed to be in contact with (or in more extreme cases extending to anyone they know in any capacity at all) may be contacted, then coerced or intimidated into participating into this criminal relaying and repeating activity against the target and victim, not realizing that they are involving themselves in a criminal conspiracy – a similar effect may be achieved by spreading various slander about the targeted individual, in order to turn their contacts against them: whether or not they truly believe the slander, in addition to the intimidation, etc., they may fear repercussions for failing to join in on the criminal harassment. A parrot is asked, coerced, fooled, bribed or intimidated into participating.


This may have a few types of effects, which should not be considered as mutually exclusive, and the following is certainly not an exhaustive description of the psychological effects it may have. a) Mimicking harassment may wear down the targeted individual psychologically by driving them crazy with extreme irritation and destroying their ability to concentrate on just about anything (just about anyone who had siblings of a similar age can probably attest to experiencing this at a relatively young age). b) If applied by people experienced in such nefarious means of psychological torture, it may eventually produce an involuntary movement (see evoked action) on the part of the targeted individual at a mere partial gesture, thereby leading to a loss of sense of control on the part of the targeted individual, and perhaps a sense of ‘power’ on the part of the lost souls who have so little control over themselves that they must seek control over others to feel like that have any ‘power’. c) Similar to b, mimicking harassment may be used in conjunction with motion- or sound-based conditionings (or other conditionings) to produce a diversity of physiological and/or mental responses (including triggering a planted ‘memory’) at a mere gesture.

Mind control


See brainwashing. The term ‘mind influence’ or ‘mind influencing technologies and strategies’ should be preferred because ‘mind control’ has a rather ominous ring which attributes more power and intimidation than is warranted. In the sense that it might be asserted as ‘mind control’, this is rather more likely to involve conditioned triggers that the target is unaware of, or which, due to eliciting positive/negative associations (or actual conditioned triggers), may persuade the victim to feel like they must do things that they might not otherwise do.


Despite my preference to refer to this as ‘mind influencing technologies and strategies’ (which is a less intimidating framing) and to frame this rather more so under brainwashing than ‘mind control’, it may nevertheless be useful to outline some basic technologies and strategies as play:


- Influence (including by suggestion, remotely or otherwise) of thoughts and thought patterns; feelings and their expression; influence of behavior.


- Organized stalking (street theater) that ‘anchors’ (see priming) feelings to certain words, and sometimes colors, certain types of people or objects. Creating the illusion of ‘guilt’.


- ‘Hypnotic trigger’ words that result in (or influence) specific sensations, feelings or behaviours.


- Monitoring what the target is paying attention to, to influence where to look, what to think about, in what terms, etc..
- Real time mind reading (especially pernicious before the targeted individual becomes aware of it); erasing thoughts and memories; short-term memory problems.


- Planting a false memory, and primed/conditioned ‘synthetic’ associations (at times supported by a computer programmed to imbue the association according to the specific context, applied via synthetic telepathy).


- Induced dreams or manipulation of dreams.


This description is by no means exhaustive. However, in the interests of diverting attention away from the rather intimidating notion of mind CONTROL, other related concepts are defined in other entries in this glossary.

MKULTRA


One of the surest ways to find yourself under character assassination from some anonymous individuals as ‘mentally ill’, ‘deluded’, or otherwise unable to keep a grasp on reality, is to make any reference whatsoever to the (illegal) MKULTRA experiments performed by the CIA from the 1950s to 1970s (and thereafter ‘disbanded’, i.e., with virtual certainty continued under some other unknown name or resource allocation). The main outline and objectives of the program are as follows.


Project MKULTRA—sometimes referred to as the CIA's mind control program—was the code name given to an illegal program of non-consensual human experimentation, designed and undertaken by the United States Central Intelligence Agency (CIA). Experiments on humans were intended to identify and develop drugs and procedures to be used in interrogations and torture, in order to weaken the individual to force confessions through mind control. Organized through the Scientific Intelligence Division of the CIA, the project coordinated with the Special Operations Division of the U.S. Army's Chemical Corps.87 The program began in the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and officially halted in 1973.The program engaged in many illegal activities, including the use of unwitting U.S. and Canadian citizens as its test subjects, which led to controversy regarding its legitimacy. MKULTRA used numerous methodologies to manipulate people's mental states and alter brain functions, including the surreptitious administration of drugs (especially LSD) and other chemicals, hypnosis, sensory deprivation, isolation, verbal and sexual abuse, as well as various forms of torture.


The scope of Project MKULTRA was broad, with research undertaken at 80 institutions, including 44 colleges and universities, as well as hospitals, prisons, and pharmaceutical companies. The CIA operated through these institutions using front organizations, although sometimes top officials at these institutions were aware of the CIA's involvement. As the US Supreme Court later noted, MKULTRA was: concerned with "the research and development of chemical, biological, and radiological materials capable of employment in clandestine operations to control human behavior". The program consisted of some 149 subprojects which the Agency contracted out to various universities, research foundations, and similar institutions. At least 80 institutions and 185 private researchers participated. Because the Agency funded MKULTRA indirectly, many of the participating individuals were unaware that they were dealing with the Agency. One 1955 MKULTRA document gives an indication of the size and range of the effort; this document refers to the study of an assortment of mind-altering substances described as follows:


1. Substances which will promote illogical thinking and impulsiveness to the point where the recipient would be discredited in public.


2. Substances which increase the efficiency of mentation and perception.


3. Materials which will cause the victim to age faster/slower in maturity.


4. Materials which will promote the intoxicating effect of alcohol.


5. Materials which will produce the signs and symptoms of recognized diseases in a reversible way so that they may be used for malingering, etc.


6. Materials which will cause temporary/permanent brain damage and loss of memory.


7. Substances which will enhance the ability of individuals to withstand privation, torture and coercion during interrogation and so-called ‘brainwashing’.


8. Materials and physical methods which will produce amnesia for events preceding and during their use.


9. Physical methods of producing shock and confusion over extended periods of time and capable of surreptitious use

.
10. Substances which produce physical disablement such as paralysis of the legs, acute anemia, etc.


11. Substances which will produce a chemical that can cause blisters.


12. Substances which alter personality structure in such a way that the tendency of the recipient to become dependent upon another person is enhanced.


13. A material which will cause mental confusion of such a type that the individual under its influence will find it difficult to maintain a fabrication under questioning.


14. Substances which will lower the ambition and general working efficiency of men when administered in undetectable amounts.


15. Substances which promote weakness or distortion of the eyesight or hearing faculties, preferably without permanent effects.


16. A knockout pill which can surreptitiously be administered in drinks, food, cigarettes, as an aerosol, etc., which will be safe to use, provide a maximum of amnesia, and be suitable for use by agent types on an ad hoc basis.


17. A material which can be surreptitiously administered by the above routes and which in very small amounts will make it impossible for a person to perform physical activity.


But it never happened. Just like electronic harassment doesn’t exist, nor does any ongoing non-consensual human experimentation, nor do pulse-modulated communications or brainwave stimulations (all of which documented elsewhere in this glossary).


After Congress learned of the program, most records were destroyed. However, one batch of documents was missed, enabling Congressional oversight to shut down the program (it is generally believed to have continued elsewhere in the agency). These remaining 20,000 pages are available to the public.


Other known experiments which included ‘mind control’ elements include Project CHATTER, Project BLUEBIRD, Project ARTICHOKE, Project MKULTRA, Project MKSEARCH, Project SLAMMER and Project MKNAOMI, in addition to discrediting tactics applied as a part of Project MKDELTA.

‘Five Eyes’ intelligence alliance


The ‘Five Eyes’ intelligence alliance originates from UKUSA –a secret wartime treaty that says member nations can spy on each other’s population without warrants or limits, and that this can be shared with the spied-on country’s SIGINT agency. It is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom and the United States. The alliance of intelligence operations is also known as the Five Eyes.


Emerging from an informal agreement related to the 1941 Atlantic Charter, the secret treaty was renewed with the passage of the 1943 BRUSA Agreement, before being officially enacted on March 5, 1946 by the United Kingdom and the United States. In the following years, it was extended to encompass Canada, Australia and New Zealand. Other countries, known as ‘third parties’, such as Germany, the Philippines, Italy, Turkey and several Nordic countries also joined the UK USA community.


The result is that laws which constrain spying on own citizens without due process (a warrant) are essentially void, because other partners can collect this information and exchange it. For much of the Cold War, not even elected officials were aware of this secret treaty which violates numerous constitutionally entrenched principles in most parties to the treaty (subject to judicial interpretation, which does not seem to be forthcoming), and its text was only released to the public in 2010.


In recent years, this has been accompanied by significant erosions of compartmentalization of information – previously, very few agencies in any given country were able to share information with other agencies without a specific legal order. Increasingly, state agencies are encouraged to freely share information in the absence of due process or explanations of reasons, with essentially no protections for risk of data leakages to diverse criminal elements, and implying massive data sharing between often unaccountable security agencies of these states, which now have access to treasure troves of data previously forbidden to them.


The main reason this entry is included it to draw attention to the potential for


a) information sharing, in addition to


b) capacity in relation to satellite activities and


c) EM transmissions other than radio, at a distance, which plausibly explain reports of FBI drones circling around certain locations without clear explanations for why or what they are doing. Also, this should draw attention to the degradation of information compartmentalization, which can be assumed to be


a) a significant intelligence threat and


b) a threat to the privacy and security of the public.

Noise campaign


A noise campaign is an orchestrated effort to produce stress in a victim through prolonged exposure to significant noise levels. A noise campaign can range from multiple neighbors routinely playing loud music, individual stalkers with air-horns or fireworks, or organized ‘repair work’ that involves a high level of noise.

 

Non-consensual human experimentation


Non-consensual human experimentation relates to are individuals who are the subject of study for scientific purposes, including military and social control purposes, sometimes without their knowledge, but most certainly without their consent. Historically, non-consensual human experimentation has included individuals who belong to a politically and socially disenfranchised class which renders them unable to have their complaints heard, or which leads nefarious types to believe that it is OK to experiment upon these ‘lesser’ people without their permission. For example, prisoners, those confined to a mental health facility perhaps for failing to be sufficiently in line with mainstream societal expectations, those who are deemed mentally inferior for any other reason, those who belong to disenfranchised groups (such as native Indians or African Americans, historically, in the USA). Probably the most well-known example of non-consensual human experimentation in a Western country involves the MKULTRA project of the CIA, which involved experiments on vulnerable individuals to refine drugs, other technologies, and abusive means of persuasion for the purpose of social control and brainwashing (or, if you take their word at face value, to develop better methods for CIA agents to resist interrogation).


While the full scope of relevance for non-consensual human experimentation certainly goes well beyond this, for present purposes, this largely refers to experimentation of a diversity of electronic weapons on vulnerable (and/or outspoken) individuals who are unlikely to be able to have their experienced taken as credible. Also, clearly the era of ‘mere’ experimentation has passed, these tools having been made operational for the purposes of suppressing the speech (and even thought!) of those who are critical of certain political issues, most especially relating to various perceived corruptions, concerns about the rise of the spy state, tyranny in general, and various forms of unnecessary social control which are likely to have their strongest effects against individuals and groups deemed ‘inferior’ by certain segments of society, some of which have been well implanted within the security state since at least WWII (i.e., pro-eugenics anti-socialists of the white supremacist version, a.k.a., Nazis, at least 1,000 of which were imbedded in the CIA at least up to the end of the Cold War)


We are well beyond experimentation and have passed well into the stage of implementation, which appears to primarily revolve around a conspiracy to implement the most extreme form of social control and the most fundamental attack on freedom, at the very level of cognitive liberty itself (where a mere thought crime may make an individual a primary target for attacks via electronic weapons), that humanity has ever faced. Electronic weapons are with 100% certainty in use, including against civilians of the countries that employ them. However, it appears that non-consensual human experimentation continues, against groups which are deemed ‘inferior’ or in any case sufficiently vulnerable to have difficulties having their experiences made public, in addition to politically targeted individuals who can be presumed to be both victims of state terrorism committed by rogue actors within the state and subjects of non-consensual human experimentation at the same time.


In the USA, non-consensual human experimentation has lax safeguards as a part of legislation referred to as The Common Rule, which is the Federal Policy regarding human subjects protection. It is written with several loopholes for the allowance of non-consensual human experimentation, mostly by intelligence agencies.

Neural oscillation

This entry is not important for a non-specialist in understanding the current situation of neuro-warfare, but it may be of interest as an introduction to some of the ways in which neuroweapons can influence cognition and neural activities.
Neural oscillation is rhythmic or repetitive neural activity in the central nervous system. Neural tissue can generate oscillatory activity in many ways, driven either by mechanisms within individual neurons or by interactions between neurons. In individual neurons, oscillations can appear either as oscillations in membrane potential or as rhythmic patterns of action potentials, which then produce oscillatory activation of post-synaptic neurons. At the level of neural ensembles, synchronized activity of large numbers of neurons can give rise to macroscopic oscillations, which can be observed in the electroencephalogram (EEG) (or remote neural monitoring technologies, which are not yet demonstrated in a scientific manner in the civilian sector). Oscillatory activity in groups of neurons generally arises from feedback connections between the neurons that result in the synchronization of their firing patterns. The interaction between neurons can give rise to oscillations at a different frequency than the firing frequency of individual neurons. A well-known example of macroscopic neural oscillations is alpha activity.


Neural oscillation can also arise from interactions between different brain areas. Time delays play an important role here. Because all brain areas are bi - directionally coupled, these connections between brain areas form feedback loops. Positive feedback loops tends to cause oscillatory activity which frequency is inversely related to the delay time. An example of such a feedback loop is the connections between the thalamus and cortex. This thalamocortical network is able to generate oscillatory activity known as recurrent thalamo-cortical resonance. The thalamocortical network plays an important role in the generation of alpha activity.


Neurotechnological warfare (a.k.a. Psychotronic warfare, Neurowarfare):


This term is largely related to the additional discussion relating to classical psychological warfare.


Neurotechnological warfare is said to have originated from extensive research programs and numerous conferences into the field during the 1970s and 1980s sparked Cold War fears of mind control and other neurotechnological weaponry (neuroweapons) being developed by Eastern Bloc countries which led to popularization of the term in the West. (Of course, I find it extremely suspicious/unlikely to think that the losers of the Cold War were at all times ahead in such technologies, and the winners of the Cold War always passive observers who were behind in these technologies.)


Neurotechnological warfare or psi warfare is the use of electronic machines to send beams of energy or frequencies directly to people’s brains and bodies through the air. This is the new stealth warfare. It is inexpensive and simple, and often hard to detect and defeat. The same method is used, at times, to brainwash people to believe certain information and no other information by making subtle suggestions to them via electronic beams or frequencies.

Neuroweapons


Any weapon that targets the nervous system or brain functioning of a target, whether as a matter of responses triggered in conjunction with longer-term pre-established conditionings, or as a matter of more generalizable effects which most or all targeted individuals are likely to be vulnerable to. While traditionally these may have involved things like drugs or neurotoxins involved in chemical warfare, in the present day, the nature of the issue largely revolves around the use of electromagnetic weapons which serve as neuroweapons by use of electromagnetic waves to interfere with (or mimic) the natural roles of brainwaves in guiding communication and information processing in the brain, whether used against enemies of a state or for the purpose of social control and/or political repression within a friendly/unfriendly/domestic state.

Nuremberg Code


In response to the atrocities of WWII, the Nuremburg Code was established in 1946 to govern medical research in order to avoid a repeat of the experimentation conducted by Nazi doctors.


Under the principles of the Nuremburg Treaties, no person may be experimented upon for any reason, without their consent, and before they give their consent, they must have full knowledge of the length of the experiment, the outcomes, any potential dangers, any potential ill effects on health, it must be fully understand and explained, and they must give individual consent. More explicitly, the ten points of the Nuremburg Code are:


1) Required is the voluntary, well-informed, understanding consent of the human subject in a full legal capacity.


2) The experiment should aim at positive results for society that cannot be procured in some other way.


3) It should be based on previous knowledge (like, an expectation derived from animal experiments) that justifies the experiment.


4) The experiment should be set up in a way that avoids unnecessary physical and mental suffering and injuries

.
5) It should not be conducted when there is any reason to believe that it implies a risk of death or disabling injury.


6) The risks of the experiment should be in proportion to (that is, not exceed) the expected humanitarian benefits.


7) Preparations and facilities must be provided that adequately protect the subjects against the experiment’s risks.


8) The staff who conduct or take part in the experiment must be fully trained and scientifically qualified.


9) The human subjects must be free to immediately quit the experiment at any point when they feel physically or mentally unable to go on.


10) Likewise, the medical staff must stop the experiment at any point when they observe that continuation would be dangerous.

Operation Paperclip


Operation Paperclip (1949–1990) was the Office of Strategic Services (OSS) program in which more than 1,500 German scientists, engineers, and technicians were brought to the United States from Nazi Germany and other countries for employment in the aftermath of World War II. It was conducted by the Joint Intelligence Objectives Agency (JIOA) and in the context of the burgeoning Cold War. One purpose of Operation Paperclip was to deny German scientific expertise and knowledge to the Soviet Union and the United Kingdom, as well as to inhibit post-war Germany from redeveloping its military research capabilities. The Soviet Union had competing extraction programs known as ‘trophy brigades’ and Operation Osoaviakhim.


In such a historical context, there does appear to be some legitimacy in bringing so many Nazi scientists into the CIA. However, it seems rather obvious that, in addition to being allowed to continue their research with very little ethical limitations for example in mind control, they left their own mark on the organization. Protections against infiltration by these Nazi researchers appear to have been few or none. They were offered new identities and well paid work in laboratories for the American government, under the additional condition that they hand over all their research performed during Nazi rule. This became the basis of the mind control research, with drugs, microwaves (electromagnetic waves), etc. This Nazi-era research formed the basis of ‘too much’ of the research illegally performed by the CIA (refer to MKULTRA).


A conspiracy theorist might even wonder if it gets more devious than that, perhaps that these leading scientific figures may have always had connections in the USA, and failing a Nazi victory in Europe and/or the broader world, already believed themselves to have assurances to continue with their devious plans. Now THAT would be a conspiracy!

P300


The P300 (P3) wave is an event related potential (ERP) component elicited in the process of decision making. It is considered to be an endogenous potential, as its occurrence links not to the physical attributes of a stimulus, but to a person's reaction to it. More specifically, the P300 is thought to reflect processes involved in stimulus evaluation or categorization. It is usually elicited using the oddball paradigm, in which low-probability target items are mixed with high-probability non-target (or "standard") items. When recorded by electroencephalography (EEG), it surfaces as a positive deflection in voltage with a latency (delay between stimulus and response) of roughly 250 to 500 ms. The signal is typically measured most strongly by the electrodes covering the parietal lobe. The presence, magnitude, topography and timing of this signal are often used as metrics of cognitive function in decision making processes. While the neural substrates of this ERP component still remain hazy, the reproducibility and ubiquity of this signal makes it a common choice for psychological tests in both the clinic and laboratory.


Early observations of the P300 (more specifically, the component that would later be named the P3b) were reported in the mid-1960s. In 1964, researchers Chapman and Bragdon found that ERP responses to visual stimuli differed depending on whether the stimuli had meaning or not. They showed subjects two kinds of visual stimuli: numbers and flashes of light. Subjects viewed these stimuli one at a time in a sequence. For every two numbers, the subjects were required to make simple decisions, such as telling which of the two numbers was numerically smaller or larger, which came first or second in the sequence, or whether they were equal. When examining evoked potentials to these stimuli (i.e., ERPs), Chapman and Bragdon found that both the numbers and the flashes elicited the expected sensory responses (e.g., visual N1 components), and that the amplitude of these responses varied in an expected fashion with the intensity of the stimuli. They also found that the ERP responses to the numbers, but not to the light flashes, contained a large positivity that peaked around 300 ms after the stimulus appeared. Chapman and Bragdon speculated that this differential response to the numbers, which came to be known as the P300 response, resulted from the fact that the numbers were meaningful to the participants, based on the task that they were asked to perform. (This paragraph should suffice to demonstrate that these principles have been understood and demonstrated since at least 50 years ago.)


Since the mid-1980s, one of the most discussed uses of ERPs such as the P300 is related to lie detection. In a proposed "guilty knowledge test" a subject is interrogated via the oddball paradigm much as they would be in a typical lie-detector situation. (However, to my knowledge this only reveals a desire to hide something, which for practical purposes may involve disallowing a planted memory to be elicited as ‘evidence’. I have personally experienced this no less than several hundred thousand times, in an effort which simultaneously strives to reinforce the planted memory. The method is inherently bunk as a result.)


This practice has recently enjoyed increased legal permissibility while conventional polygraphy has seen its use diminish, in part owing to the unconscious and uncontrollable aspects of the P300. The technique relies on reproducible elicitation of the P300 wave, central to the idea of a Memory and Encoding Related Multifaceted Electroencephalographic Response (MERMER) developed by Dr. Lawrence Farwell.


Applications in brain-computer interfacing (BCI) have also been proposed. The P300 has a number of desirable qualities that aid in implementation of such systems. First, the waveform is consistently detectable and is elicited in response to precise stimuli. The P300 waveform can also be evoked in nearly all subjects with little variation in measurement techniques, which may help simplify interface designs and permit greater usability. The speed at which an interface is able to operate depends on how detectable the signal is despite “noise.” One negative characteristic of the P300 is that the amplitude of the waveform requires averaging of multiple recordings to isolate the signal. This and other post-recording processing steps determine the overall speed of an interface.


I highlight that this entry demonstrates civilian sector advances in this and related technologies, and does not provide information on the state-of-the-art in purportedly ‘national security’ uses which remain classified. It should be rather clear that related principles ant technologies are being applied for brainwashing and social control, including thought crime and pre-crime, rather more so than any sort of ‘legitimate’ applications as described above.

Peace


Peace occurs between heterogeneous social groups and is characterized by a lack of conflict and freedom from fear of (psychological or physical) violence. Commonly understood as the absence of hostility, peace often involves compromise, and therefore is initiated with thoughtful listening and communication to enhance and create mutual understanding.


Peace in the broader socio-political sense can be distinguished from ‘inner peace’. Inner peace (or peace of mind) refers to a state of being mentally and spiritually at peace, with enough knowledge and understanding to keep oneself strong in the face of discord or stress. Being ‘at peace’ is considered by many to be healthy homeostasis and the opposite of being stressed or anxious. Peace of mind is generally associated with bliss and happiness.

Pedophilia


Pedophilia is a psychiatric disorder in which an adult or older adolescent experiences a primary or exclusive sexual attraction to prepubescent children. Although girls typically begin the process of puberty at age 10 or 11, and boys at age 11 or 12, criteria for pedophilia extend the cut-off point for prepubescence to age 13. A person who is diagnosed with pedophilia must be at least 16 years old, but adolescents must be at least five years older than the prepubescent child for the attraction to be diagnosed as pedophilia. In the present context of psychological warfare including neurowarfare, this is relevant due to the potential for slander, slander geared towards blackmail, and a variety of situations relating to conditioning and brainwashing geared towards establishing control over a targeted individual, most especially with a view to blackmail. The perpetrating entity may try to sequentially condition a sexual interest from normal and healthy sexual attractions towards increasingly young persons. Then, try to drive a sub vocalization of this interest to extract a ‘confession’. By trying to condition a response of feelings, images and/or project images of sexual organs at any time the targeted individual is physically aligned with or otherwise aware of increasingly young children, in combination with driven sub vocalizations, use of mimicking harassment, conditioned triggers and/or projected sexually-oriented imaging to drive an evoked action, etc., the targeted individual may eventually come to believe that they are in fact a pedophile.


Theoretically speaking, of course. Anyone who admitted to such an experience would see themselves rapidly written off as an actual pedophile were they to openly admit to such an experience. Blackmail. Control. Guilt. Self-loathing. Brainwashing. Anyone experiencing such a situation should refrain from pornography which may help avoiding elicitation of the conditioned and/or otherwise triggered association with sexual organs or arousal, and ensure maximum awareness when around youth or children to be aware of this particularly disgusting type of electronic harassment. In fact, it would be recommended to abstain from any sort of sexual thoughts whatsoever, and to always re-direct your consciousness or physical activity to unrelated issues, no matter how intensely the perpetrating entity may try to use diverse strategies to manipulate your sexual identity, interests, attractions, etc.


In the United States, following Kansas v. Hendricks, sex offenders who are diagnosed with certain mental disorders, particularly pedophilia, can be subject to indefinite civil commitment.


What percentage of child sexual abuse is the result of mind control experimentation and/or establishing blackmail for potential future movers and shakers? If there was ever any doubt that those involved in electronic harassment have some serious mental disorders …

Predictive programming


Predictive programming predicts that people would be more likely to accept an idea based on exposure to the concept in fiction.


A related idea refers to the use of the power of suggestion using the media of fiction to create a desired outcome.


(It seems rather more likely that someone creates a work of fiction, and some nefarious character/organization takes up the idea and makes it happen. However, I think it is essentially not debatable that at least some media are involved in degrees of programming designed to soften or manipulate public opinion with regard to things that they might otherwise have opposed/supported. On the matter of predictive programming, it doesn’t seem very likely to be very relevant, but perhaps not worth discounting altogether. I find it more plausible to think that entertainment media would try to warn us of possibilities that we might not believe, rather than trying to soften us up to accept them.)

PGP


PGP is free and unbreakable encryption, available world-wide.

Plausible deniability


Plausible deniability is the ability for persons (typically senior officials in a formal or informal chain of command) to deny knowledge of or responsibility for any damnable actions committed by others (usually subordinates in an organizational hierarchy) because of a lack of evidence that can confirm their participation, even if they were personally involved in or at least willfully ignorant of the actions. In the case that illegal or otherwise disreputable and unpopular activities become public, high-ranking officials may deny any awareness of such act in order to insulate themselves and shift blame onto the agents who carried out the acts, confident that their doubters will be unable to prove otherwise. The lack of evidence to the contrary ostensibly makes the denial plausible, that is, credible, although sometimes it merely makes it unactionable. The term typically implies forethought, such as intentionally setting up the conditions to plausibly avoid responsibility for one's (future) actions or knowledge. In some organizations, legal doctrines such as command responsibility exist to hold major parties responsible for the actions of subordinates involved in heinous acts and nullify any legal protection that their denial of involvement would carry.


In politics and espionage, deniability refers to the ability of a powerful player or intelligence agency to pass the buck and avoid blowback by secretly arranging for an action to be taken on their behalf by a third party ostensibly unconnected with the major player. In political campaigns, plausible deniability enables candidates to stay clean and denounce third-party advertisements that use unethical approaches or potentially libellous innuendo.
In the US, plausible deniability is also a legal concept. It refers to lack of evidence proving an allegation. Standards of proof vary in civil and criminal cases. In civil cases, the standard of proof is "preponderance of the evidence" whereas in a criminal matter, the standard is "beyond a reasonable doubt." If an opponent cannot provide evidence for his allegation, one can plausibly deny the allegation even though it may be true.


Although plausible deniability has existed throughout history, that name for it was coined by the CIA in the early 1960s to describe the withholding of information from senior officials in order to protect them from repercussions in the event that illegal or unpopular activities by the CIA became public knowledge. The roots of the name go back to Harry Truman's national security council paper 10/2 of June 18, 1948, which defined "covert operations" as "...all activities conducted pursuant to this directive which are so planned and executed that any U.S. Government responsibility for them is not evident to unauthorized persons and that if uncovered the U.S. Government can plausibly disclaim any responsibility for them.


Planting a false memory:
Basically, planting a false memory operates first with a suggestion, and then diverse other efforts to reinforce that memory (refer to warnings in relation to sub vocalization). The question is not “can they do it” for people who are not aware of the possibility and highly attentive to such things, the question is when you may be vulnerable. Unfortunately, in the present situation of psychological warfare in the electronic age, it may be difficult for many targeted individuals to have full control over these factors.


People are particularly prone to having their memories be affected by misinformation when it is introduced after the passage of time has allowed the original event memory to fade. One reason this may be true is that with the passage of time, the event memory is weakened, and thus, there is less likelihood that a discrepancy is noticed while the misinformation is being processed.


The Discrepancy Detection principle (Tousignant et al. 1986). It essentially states that recollections are more likely to change if a person does not immediately detect discrepancies between misinformation and memory for the original event. Of course, it should be kept in mind that false memories can still occur even if a discrepancy is noticed.


Also, you may be vulnerable to memories being planted if you are sleep deprived, in part because you may not have the energy to sustain your cognitive independence, and in part because you're plain and simply tired and less able to recognize the suspicious signs of the new ‘memory’ being planted, or of an old recollection being slowly manipulated to fundamentally alter details into a completely different ‘memory’. Here, be especially attuned to the possibility that someone on the other end of the augmented cognition device may imagine themselves performing a specific act, and try to project this into your mind (via synthetic telepathy), and then reinforce this as the actual ‘memory’. They may try to get you to subvocalize something like "that's a real memory" or "that really happened" or "I can't believe I did that" or "I'm soooo sorry", at the same time as trying to trigger a conditioned response associated with guilt, or trigger an increase in heart rate or a skipped beat (this may also involve a degree of conditioned response, but this may even involve the ability of electromagnetic weapons to influence cellular communications, plausibly including those relating to the electric signals driving the pumping of the heart), so as to persuade you to believe that it all really happened. (Of course, an external third party observer to the whole situation may actually believe that it all really happened, given these other observations.)


Also, being in any sort of hypnotic state may make you more susceptible to ‘memories’ being planted.


Also worth noting is that you are more susceptible to planted misinformation when you are busy doing something. Example: I found myself regularly bombarded with efforts to reinforce false ‘memories’ when I was doing cognitively intensive tasks. Recognizing that it was a dangerous situation, most often I broke off from the cognitively intensive task, unless the looming deadline was truly pressing (in which case ‘they’ would increase their efforts by orders of magnitude).


In the context of psychological warfare in the electronic age, I believe that the primary purposes of planting memories are a) to establish a sense of loss of control on the part of the victim, so that they will submit completely to the perpetrating entity, b) to promote the delusion that the perpetrating entity serves ‘good’, wherein the victim may be persuaded to believe that they ‘deserve’ what is happening to them, and c) for blackmail purposes – if you believe you did it, or in any case believe that someone else may investigate your brain and find the ‘memory’, then the planted memory can be used as blackmail.

Political abuse of psychiatry


Political abuse of psychiatry is the misuse of psychiatry, including diagnosis, detention, and treatment, for the purposes of obstructing the fundamental human rights of certain groups and individuals in a society. In other words, abuse of psychiatry including one for political purposes is deliberate action of getting citizens certified, who, because of their mental condition, need neither psychiatric restraint nor psychiatric treatment. Psychiatrists have been involved in human rights abuses in states across the world when the definitions of mental disease were expanded to include political disobedience. As scholars have long argued, governmental and medical institutions encode menaces to authority as mental diseases during political disturbances. Nowadays, in many countries, political prisoners are sometimes confined and abused in psychiatric hospitals. Psychiatric confinement of sane people is a particularly pernicious form of repression.


Psychiatry possesses a built-in capacity for abuse that is greater than in other areas of medicine. The diagnosis of mental disease allows the state to hold persons against their will and insist upon therapy in their interest and in the broader interests of society. In addition, receiving a psychiatric diagnosis can in itself be regarded as oppressive. In a monolithic state, psychiatry can be used to bypass standard legal procedures for establishing guilt or innocence and allow political incarceration without the ordinary odium attaching to such political trials. The use of hospitals instead of jails prevents the victims from receiving legal aid before the courts, makes indefinite incarceration possible, and discredits the individuals and their ideas. In that manner, whenever open trials are undesirable, they are avoided.


Examples of political abuse of the power entrusted in physicians, and particularly psychiatrists, are abundant in history. Descriptions of political abuses of psychiatry tend to be focused almost exclusively on Nazis, Soviets and Maoist communists, however a book published in 2010 also demonstrates that such abuses also extend throughout the post-WWII era in the USA as well (perhaps just better at hiding the truth than other powers).

Political repression


Political repression is the persecution of an individual or group within society for political reasons, particularly for the purpose of restricting or preventing their ability to take part in the political life of a society thereby reducing their standing among their fellow citizens.


Where political repression is sanctioned and organized by the state, it may constitute state terrorism, genocide, politicide or crimes against humanity. Systemic and violent political repression is a typical feature of dictatorships, totalitarian states and similar regimes. Acts of political repression may be carried out by secret police forces, army, paramilitary groups or death squads. Repressive activities have also been found within democratic contexts as well. This can even include setting up situations where the death of the target of repression is the end result.


If political repression is not carried out with the approval of the state, a section of government may still be responsible. An example is the FBI COINTELPRO operations in the United States between 1956 and 1971.


In a context of psychological warfare in the electronic age, for example including diverse forms of electronic harassment in addition to remote neural monitoring, there appear to be legitimate concerns that the political repression and social control may be reformed in a manner where not only the actions and speech of non-conformists may be threatened, but where cognitive liberties themselves may be threated to the point where individuals may not even be allowed to THINK ‘incorrect’ thoughts without fear of reprisal. I.e., a most draconian and absolute form of political repression and social control is theoretically possible given existing electronic weapons. This, most especially so in the absence of disclosure/whistleblowing to the public about the existence and potential of such electronic weapons.

Pre-crime


Pre-crime is a term coined by science fiction author Philip K. Dick. It is increasingly used in academic literature to describe and criticize the tendency in criminal justice systems to focus on crimes not yet committed. Pre-crime has been defined as 'substantive coercive state interventions targeted at non-imminent crimes'. Pre-crime intervenes to punish, disrupt, incapacitate or restrict those deemed to embody future crime threats. The term pre-crime embodies a temporal paradox, implying both that a crime has not occurred and that the crime that has not occurred is a foregone conclusion (McCulloch and Wilson 2016).

Priming


Priming is an implicit memory effect in which exposure to one stimulus (i.e., perceptual pattern) influences the response to another stimulus. Priming can occur following perceptual, semantic, or conceptual stimulus repetition.


For a simple example, consider a situation where someone always/routinely appears in a red shirt shortly before a type of harassment or street theatre begins which is known to make the targeted individual irritated, angry, fearful, etc. In time, simply seeing anyone in a red shirt may elicit the associated response. The priming will be more rapidly effective with strongly perceived stimuli, but can also work with subliminal stimuli. If subliminal stimuli are used for the priming, one may find oneself facing out-of-place emotional, mechanical and/or biophysical evoked actions, and if priming/conditioning are involved, it should be possible to eventually establish the trigger – however, in the case where conditioned and/or directly applied use of electronic weapons are the source of influence on neural activity and/or related biophysical responses, in some cases an entirely different type of conscious attention may identify the priming and conditioned trigger, and in other cases it will be essentially impossible to consciously pinpoint the trigger – one may train oneself to be consciously aware of the outcomes of the trigger in order to mitigate against undesirable effects or being persuaded to do things that one doesn’t actually want to do/think, but only specialized scientific instruments are able to read incoming electromagnetic waves and the brain does not have the ability to consciously intuit the specific form/nature of the incoming wave.


The targeted individual may have nothing more to go on than the elicited effect without being able to identify the specific trigger in such cases. (Bear in mind here that low frequency waves, or pulse modulations which mimic low frequency waves, are also known to have certain effects on mood, emotion, energy levels, etc.) Also, the stimulus for the priming is something that would generally be unremarkable to other people, so the targeted individual would look ‘crazy’ if they point it out – but, the stimulus is so regularly presented that it is simultaneously 100% obvious to the targeted individual and completely unremarkable to anyone else. This is part of the gas lighting, harassment, etc., perhaps with an aspect of psychiatric reprisal involved (since the people in white coats will try to take it as ‘evidence’ or delusional paranoia). As such, it is also part of isolating the individual (useful for brainwashing), in the sense that it is designed to make friends, family, etc., think that the targeted individual is losing their mind, perhaps becoming a ‘paranoid delusional schizophrenic’.

Prison of your own making


This generally involves a process where a person has been convinced, for whatever reason, that they are stuck in their present situation, and have no power to break free and take control of their life. In a situation of psychological warfare in the electronic age, nefarious actors may strive to convince you that everything that has happened to you is completely your own fault, and that the lack of options is due to your own failures, etc. Essentially, this is a trick to convince you that you can be ‘free’, whereas if the targeted individual is persuaded to ‘free’ themselves in the manner suggested by the nefarious perpetrating entity, for example to submit to a false admission (which may be used for blackmail purposes), or otherwise to submit to whatever they want you to do –the end result may be increasing comfort with an utter lack of freedom, a prison which could prove to be incredibly difficult to break free from (in particular given the neurally whipped conditioning and brainwashing that is likely to accompany such decisions).


Breaking free from such a prison requires recognizing whether you are in fact in a prison of your own making, or whether the prison has in fact been carefully constructed by others. In either case, be the master of your own destiny, and do not become a slave puppet by deluding yourself into believing that you have broken down the walls of the prison of your own making, when in reality you have done nothing but strengthen the chains and walls of the prison of their making.

Propaganda


Propaganda is a form of communication that is aimed at influencing the attitude of a community toward some cause or position. As opposed to impartially providing information, propaganda, in its most basic sense, presents information primarily to influence an audience. Propaganda often presents facts selectively (thus possibly lying by omission) to encourage a particular synthesis, or uses loaded messages to produce an emotional rather than rational response to the information presented. Using manipulative suggestion is also common, e.g. “How evil is the Pope?”, where a few nice things and a few bad things might be said, and the actual conclusion not that strong, but the reader/listener mostly remembers “Pope” and “evil”. The desired result is a change of the attitude toward the subject in the target audience to further a political agenda. Propaganda can be used as a form of political warfare. Common media for transmitting propaganda messages include news reports, government reports, historical revision, junk science, books, leaflets, movies, radio, television, and posters.

Psychic driving


Psychic driving was a psychiatric procedure in which patients were subjected to a continuously repeated audio message on a looped tape to alter their behavior. In psychic driving, patients were often exposed to hundreds of thousands of repetitions of a single statement over the course of their treatment. They were also concurrently administered muscular paralytic drugs such as curare to subdue them for the purposes of exposure to the looped message(s). The procedure was pioneered by Dr. D. Ewen Cameron, and used and funded by the CIA's Project MKULTRA program in Canada. Similar techniques are alleged to have been used in the kidnapping and death of CIA operative William Francis Buckley by Aziz al-Abub, a medical doctor from Beirut who was seen as epitomizing medical torture. Aziz al-Abub, also known as Ibrahim al-Nadhir, was known for using his medical training to refine torture techniques. His techniques were shown to be closely connected to the CIA-developed torture techniques. As with the CIA, he used drugs to make it easier to handle those he tortured, carefully determined how long to keep a prisoner hooded and when to isolate them and other techniques seen as medical torture.


The topic of psychic driving is dealt with in some detail in the docudrama entitled The Sleep Room (1998) directed by Anne Wheeler. The psychic driving procedure was a chronological precursor to Cameron's de-patterning – theoretically, psychic driving could then be used with some efficacy in establishing a new personality.

Psychological evaluation


A psychological evaluation is defined as a way of testing people about their behavior, personality, and capabilities to draw conclusions using combinations of techniques. Over the years, it has developed from unethical methods of locking people up for tests to the many different strategies seen today. We currently see evaluation being used in several different settings for multiple purposes, such as education or legal situations. The purpose behind many modern psychological evaluations is to try to pinpoint what is happening in someone's psychological life that may be inhibiting their ability to behave or feel in more appropriate or constructive ways. It is the mental equivalent of physical examination. It is important to use psychological evaluation properly otherwise violations of the professional ethical code can occur, resulting in harm to the client and invalid assessment results. There is also a risk of evaluation based upon unscientific principles, as found in pop psychology, or pseudo-psychology.


While it is very unfortunate that the following advice will also amount to directing some individuals who actually need help AWAY from resources that should be available to help them, if you are personally familiar with many of the terms and technologies defined in this glossary, these two points are VERY IMPORTANT.


1) If at all possible, the targeted individual should NOT submit to a psychological evaluation, should reject any suggestion to do so, and otherwise try to remain very peaceful and calm in their insistence that it is not at all necessary and that they are in perfectly good command of their senses and mental faculties. If someone is trying to force you to submit to a psychological evaluation, LEAVE! Some vague excuse like “I just remembered I have an important that I cannot miss” might work, and “I’m sure you have more important things to do than worry about my personal life” might suffice to make any feigned interest unquestionably suspicious if they push further. In online outlets, when called crazy for speaking certain truths, you can just point out that it’s VERY suspicious that they always try to malign people as mentally ill and efforts to draw such slanders into rational conversation almost always fail, the slandered only willing to twist all words in a way to attack the credibility of the speaker or their words, without ever offering any sort of rational debate. At present, regardless of whether the people in white coats are aware of their role in the situation, being forced/drawn into a psychological evaluation is liable to result in the equivalent of a psychiatric reprisal.


2) In any instance where the targeted individual is forced to undergo a psychological evaluation, it is recommended to completely deny any description whatsoever that has been provided to them about your claims, or perhaps to say something like “I guess I was just having an active imagination (or just made up a story because I thought it would be funny) but I’m feeling 100% fine now and recognize that all of those things are completely impossible and there couldn’t possibly be any conspiracy, because conspiracies never ever exist in the real world”. Do NOT, I repeat DO NOT be lured into any specific description of the experiences WHATSOEVER, perhaps saying “you know, I really don’t feel that it’s relevant to anything”. Sticking to these lines may cost you some days or weeks of illegal confinement, in which case you can be fully assured that this is indeed a psychiatric reprisal and you are correct to refuse to self ‘incriminate’ by setting yourself up for a mental health record. Finally, in such a situation, demand that you will not submit to any psychological evaluation unless there is a video record of the proceedings and that you are satisfied that you will be able to easily access the proceedings.

Psychological torture


Psychological torture is a type of torture that relies primarily on psychological effects, and only secondarily on any physical harm inflicted.


The Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment (commonly known as the United Nations Convention against Torture) is an international human rights treaty, under the review of the United Nations, that aims to prevent torture and other acts of cruel, inhuman, or degrading treatment or punishment around the world. The Convention requires states to take effective measures to prevent torture in any state under their jurisdiction, and forbids states to transport people to any country where there is reason to believe they will be tortured The text of the Convention was adopted by the United Nations General Assembly on December 10, 1984 and, following ratification by the 20th state party, it came into force on June 26, 1987. June 26 is now recognized as the International Day in Support of Victims of Torture, in honor of the Convention. As of May 2015, the Convention has 158 state parties The Convention gave for the first time in history a definition of psychological torture:


Torture is any act by which severe pain or suffering, whether physical or mental, is intentionally inflicted on a person for such purposes as obtaining from him or a third person information or a confession, punishing him for an act he or a third person has committed or is suspected of having committed, or intimidating or coercing him or a third person, or for any reason based on discrimination of any kind, when such pain or suffering is inflicted by or at the instigation of or with the consent or acquiescence of a public official or other person acting in an official capacity.


Many forms of psychological torture methods attempt to destroy the subject's normal self-image by removing them from any kind of control over their environment, creating a state of learned helplessness, psychological regression and depersonalization. Other techniques include forced nudity and head shaving, sleep deprivation, hooding and other forms of sensory deprivation.


While psychological torture may not leave any lasting physical damage—indeed, this is often one of the motivations for using psychological rather than physical torture—it can result in similar levels of permanent mental damage to its victims.

Psychological warfare


Psychological warfare (PSYWAR), or the basic aspects of modern psychological operations (PSYOP), have been known by many other names or terms, including MISO, Psy Ops, Political Warfare, ‘Hearts and Minds’, and propaganda. The term is used "to denote any action which is practiced mainly by psychological methods with the aim of evoking a planned psychological reaction in other people". Various techniques are used, and are aimed at influencing a target audience's value system, belief system, emotions, motives, reasoning, or behavior. It is used to induce confessions or reinforce attitudes and behaviors favorable to the originator's objectives, and is sometimes combined with black operations or false flag tactics. It is also used to destroy the morale of enemies through tactics that aim to depress troops psychological states.Target audiences can be governments, organizations, groups, and individuals, and is not just limited to soldiers. Civilians of foreign territories can also be targeted by technology and media so as to cause an effect in the government of their country.


Of importance, in the present context, is that psychological warfare (neuro-warfare) has expanded from things like flyer drops, radio diffusions and planted media stories, etc. (all of which can be easily tuned out just by turning the radio off, or not reading the dropped flyers, etc.), or even traditional interrogation techniques, to include extensive use of the electronic weapons referred to in this glossary, most especially ones which use pulse-modulated electromagnetic radiations to communicate directly into the minds of targeted populations (see synthetic telepathy). In short, psychological warfare in the modern day appears to have the objective to go far further than to merely demoralize victims of such methods, or even to merely interfere with the functioning of non-civilian personnel, and extend to efforts to brainwash entire populations (such an effort was in full swing in Canada with 2013-2014 being a particularly dark time – nary a genuine laugh or smile could be seen for nearly two years during this period - but few have yet to take the plunge towards a first open description of these events), and most especially targeted individuals who may have a degree of influence within a population (including for purposes of repression of statutorily acceptable political expression). In China, I have observed the use of these technologies in combination with on-the-ground efforts to try to stir up revolutionary fervour (I believe, of the pro-Nazi variant) in a complete absence of any notion of how anything would get better as a result. At the very least, the objective would be to stimulate additional political repression in China, perhaps in order to ‘slander them better’ to the international community (regardless of the extent of covert political repression which appears to be presently going on in much of the West) and/or to stir up a backlash to additional social controls as a result.

Psychiatric reprisal


This was a practice first identified as being used in the former Soviet Union. Targeted individuals of this practice were misdiagnosed as being mentally ill and hundreds of thousands of activists, dissidents and citizens who were outspoken against their government were placed in psychiatric facilities. Many thousands of individuals were eliminated in this way before the practice was brought to light.


This may be used in conjunction with many other strategies, in particular various forms of gas lighting. Regardless of whether the targeted individual actually believes they are crazy, they may be drawn into (or forced into) a situation where a psychiatrist is questioning (in some cases interrogating) them, and at the stroke of a pen can a) leave them with a mental health record which can be used to discredit the individual in the case of any official complaint, and b) have them confined against their will even if they are in fact perfectly sane and have committed no crime. Due to the possibility of a) and b), what amounts to a threat of psychiatric reprisal may serve the purpose of blackmail; due to heightened fear., disgust, lack of respect and general social sanction against those with a mental health record, threats to disclose a mental health diagnosis (generally illegal, but anyways..) may also serve as material for blackmail.


Since the perpetrating entity is perfectly aware of the checkboxes which have been established to describe various mental illnesses, the methods of harassment are liable to be refined in a manner where, when the targeted individual makes a complaint, they can be written off as crazy. In pushing the matter, for example to initiate a legal process, they may be required to submit to a psychological evaluation, which can result in them being forcibly confined and treated with mind numbing drugs. Due to existing diagnostic criteria in psychiatry, even a well-meaning psychiatrist may do such a thing, without any intention on their part of participating in the psychiatric reprisal. As a result, it is advisable, if persuaded or forced to submit to a psychological evaluation, to refrain from making any comment whatsoever with regard to the actual experiences suffered, and to claim that everything is A-OK. Until broader awareness of the technologies and strategies involved in electronic harassment is made clear to citizens on a very widespread basis, it will be exceedingly difficult to avoid what will essentially function as a psychiatric reprisal against anyone who tries to make the truth known. Sadly, these victim of torture cannot go to the police, and cannot speak to a psychiatrist about their experiences, and this will remain the case until the media and/or civil society is persuaded to report openly about these issues and/or a clear legislative agenda is enacted to provide a means of pursuing complaints and/or legal action which are not liable to be met with a psychiatric reprisal.


While the extent to which the profession of psychiatry is “in on it”, the following makes it rather predictable how a psychiatric reprisal can be orchestrated:


1. All complaints about covert harassment can be dismissed as paranoia.


2. All complaints about, DOD Voice of God, voice-to-skull, Neurophone, Frey microwave, Neural Decoding, Synthetic or Artificial Telepathy technology, etc., can be dismissed as psychosis, delusions, or schizophrenia. This is although the technology is patented at the United States Patent and Trademark Office


3. All complaints about media feedback in surveillance can be dismissed as delusional.


4. All complaints about oppression, torture, abduction, etc., can be dismissed as fantasy.


Pulsed energy projectiles:


This type of weapon involves the emission of an invisible electromagnetic pulse which, upon contact with the target, ablates the surface and creates a small amount of exploding plasma. This produces a pressure wave that stuns the target and knocks them off their feet, and electromagnetic radiation that affects nerve cells causing a painful sensation. The technology can also be used as a lethal weapon.


(It is not clear to me whether this technology is yet in active deployment, whether for military purposes or for the purpose of ‘crowd control’, i.e., suppression of peaceful protest.)

Pulse-modulated electromagnetic radiations


In consideration of the microwave auditory effect, this refers to pulse modulations of microwave frequency electromagnetic radiations which can transmit auditory perceptions at great distance into one’s head (see voice to skull or synthetic telepathy for explanations and references relating to this effect). For example, if you have a transmission at 100 MHz, the transmission may be ‘pulse modulated’, say, to transmit a pulse 10 times a second, in which case the received communication mimics a 10 Hz wave. This overcomes a major technological barrier to transmitting low frequency waves, which are relatively long, and therefore would require unrealistically massive antennae for transmission – the pulse modulated transmissions of higher frequency waves are then able to mimic the lower frequency waves for many purposes.


Applications across a diversity of frequencies are liable to influence many, or perhaps at some later date all, neural and biophysical processes, in particular because these waves and related magnetic fields influence inter-cellular communications and in at least some cases ion gradients in cells. However, the current abilities in targeting such technologies are not publicly known, which implies a great vulnerability to the public in the case where nefarious actors may get their hands on such technologies.


For a rather well-known example of the effects of pulse-modulated electromagnetic waves on neural function, consider that strobe lights are known to cause seizures in some persons with epilepsy. The visual region of the electromagnetic spectrum is known as light. A strobe light is a sort of pulse-modulated electromagnetic wave, diffusing, for example, 10 or 20 pulses per second – anyone who has been exposed to a strobe light, for example at a dance club or party, is fully aware that directing one’s attention away from the immediate surroundings and allowing the pulse-modulated electromagnetic radiation (the strobe light in this case) can have relatively profound impacts on cognition and emotion.
Over 15 years ago, as early as the year 2000, there was already a product on the market with highly pinpointed accuracy in pulse modulations which are able to pass through many types of materials such as walls, etc., named the ‘ground penetrating radar’ produced by the Patriot Scientific Corporation. The impulse radar (pulse-modulated electromagnetic waves) of this technology uses low power inherently because the transmissions occur in pulses separated by periods of no transmission. The power of the pulses is offset by the dead time between the pulses. The average output of the current system is about 300 MICROwatts. THE LOW AVERAGE POWER OF AN IMPULSE SYSTEM EFFECTIVELY HIDES THE TRANSMISSIONS FROM CONVENTIONAL RECEIVERS.

Questions


Humans ask them. Be human. Don’t stop asking questions. Ever. The only things that are black and white, are black and white themselves. And even then, pure black is theoretically something which reflects no light whatsoever (a physical impossibility outside of a black hole) and white is merely the sum of all visible colors, in which case black and white don’t even really exist for practical purposes.


Everything is a construct. Everything is real. Nothing speaks for itself. Everything is open to interpretation. Embrace the contradiction. Be human. Do not stop asking questions. Perhaps the only thing that is more quintessentially human than to speak truth to power, is to ask questions. Question that.

Rage Against the Machine


A fairly anti-establishment hard rock band from the 1990s. You just don’t get that kind of stuff coming out of the music industry any more, do you? Perhaps it is time for a repeat of the 1960s and 1970s in that regard. Support your local peace-preferring anti-establishment artist today.

Rape


Rape is a type of sexual assault usually involving sexual intercourse or other forms of sexual penetration perpetrated against a person without that person's consent. The act may be carried out by physical force, coercion, abuse of authority or against a person who is incapable of giving valid consent, such as one who is unconscious, incapacitated, has an intellectual disability or below the legal age of consent. The term rape is sometimes used interchangeably with the term sexual assault.


Widespread and systematic rape and sexual slavery can occur during international conflict. These practices are crimes against humanity and war crimes. Rape is also recognized as an element of the crime of genocide when committed with the intent to destroy, in whole or in part, a targeted ethnic group.


People who have been raped can be traumatized and develop posttraumatic stress disorder.


Lack of consent is key to the definition of rape.


Duress is the situation when the person is threatened by overwhelming force or violence (for example harassment, intimidation and/or threat of blackmail via nefarious applications of electronic weapons), and may result in the absence of an objection. This can lead to the presumption of consent (rather unlikely that any sort of consent would be assumed, however, since the situation is generally one of trying to assume complete domination and psychological control over the targeted individual).


In a context of psychological warfare in the electronic age, I hope it should suffice, given the definitions of conditioning and stimulated response (whether by gestures or neurologically invoked conditioned triggers), evoked action, etc., to assert that it is in fact possible to rape a person remotely. No small number of targeted individuals attest to this. In addition to the direct emotional and psychological trauma and the highly invasive nature of this sexual penetration into one’s cognition and even physiology, this form of sexual harassment (rape) may also serve to offer some sort of sick sense of power to assets who are very much under the thumb of their handler(s) and whose only means of having any sense of control over anything is to exert abusive control over another individual.


In 1998, Judge Navanethem Pillay of the International Criminal Tribunal for Rwanda said: "From time immemorial, rape has been regarded as spoils of war. Now it will be considered a war crime.”


Mental rape:


- When your mind it invaded and then rape by words or images.


- The definition of 'rape' is to steal a person's innocence without their consent although this is most often used in sexual cases. However, mental rape occurs probably just as much, if not more, than other forms of mental abuse and can result in the victim finding it hard to ever trust another person again. … Mental rape is the act of stealing the victim’s thoughts (and sometimes emotions) then reporting them in secret back to the abuser who then uses the information to manipulate their victim even further. Not only are the participants stealing the victims thoughts, they are also committing a violation of the victims privacy and basic human rights.


- A targeted individual is attacked by a perpetrating entity in the most painful non-physical way possible: Their mind and soul are assaulted with painful, horrifying visions, sensations, and/or (real or planted) memories, and their will and sanity broken until afterward they're powerless, hopeless and numb, but not dead, although they may wish they were. Minimal to no sexual contact actually occurs, but as the name indicates, everything else is there to resemble a rape — the ultimate violation of privacy and consent, extreme humiliation that annihilates all sense of self-esteem, near-absolute helplessness even against your very own mind and body, and the corrupt perversion of what could otherwise be a source of identity and joy. … A Well-Intentioned Extremist, Anti-Villain, or even the heroes may resort to Mind Rape if circumstances force them to (and will probably regret it with all grief for the rest of their existence), but only the most disgusting lowest of the low shall take a sick enjoyment out of it.


The best prevention against rape is for the rapist to not rape people. However, in the context of psychological warfare in the electronic age, until these new electronic weapons come under full social, legislative and judicial control, targeted individuals will need to devise psychological and habitual methods of mitigating against rape and mental rape.

Remote neural monitoring


What does remote neural monitoring (RNM) do? For purposes of electronic evaluation, electrical activity in the speech center of the brain can be translated into the subject's verbal thoughts. On the side of eliciting a response, RNM involves sending encoded signals to the auditory cortex of the brain directly bypassing the ear. This encoding helps in detecting audio communication. It can also perform electrical mapping of the brain's activity from the visual center of the brain, which it does by bypassing the eyes and optic nerves, thus projecting images from the subject's brain onto a video monitor.


Here is an example of a reconstruction from the civilian sector using more proximate technologies than those assumed to be in remote neural monitoring:


With this visual and audio memory, both can be visualized and analyzed. This system can, remotely and non-invasively, detect information by digitally decoding the evoked potentials in 30-50Hz, 5 millwatt electromagnetic emissions from the brain. The nerves produce a shifting electrical pattern with a shifting magnetic flux which then puts on a constant amount of electromagnetic waves. There are spikes and patterns which are called evoked potentials in the electromagnetic emission from the brain.


For the purpose of remote neural monitoring, the perpetrating entity will introduce various stimuli in order to get the targeted individual to think about something. Then, unless the targeted individual can think about something else, via remote neural monitoring it is possible to monitor and evaluate the response. Of course, the method has no protections against the possibility that ‘memories’ may have been planted or that the ‘information’ collected may be the result of efforts to reprogram the brain of the individual.


Another recent civilian sector breakthrough relates to semantic maps (mapping words). The abstract states summarizes how the study “systematically map[s] semantic selectivity across the cortex using voxel-wise modelling of functional MRI (fMRI) data collected while subjects listened to hours of narrative stories. We show that the semantic system is organized into intricate patterns that seem to be consistent across individuals. We then use a novel generative model to create a detailed semantic atlas. Our results suggest that most areas within the semantic system represent information about specific semantic domains, or groups of related concepts, and our atlas shows which domains are represented in each area. This study demonstrates that data-driven methods—commonplace in studies of human neuroanatomical and functional connectivity—provide a powerful and efficient means for mapping functional representations in the brain. ”In short, it is indeed possible to map neural activation related to language and concepts (ideas) (and presumably, then, to train software to recognize these maps and work backwards to determine what is being thought of) – however, the civilian sector has yet to officially prove the ability to do so by remote means, for example by using an analogue of the laser microphone to intercept brain wave activity and to progressively learn which signals are linked to which words/concepts, etc.


Unverified account of how this may operate which appears roughly accurate (non-civilian technologies):
A scan of the specific brain emissions given off when the victim subvocalizes using an array of pulsed frequency MASERs fired at the targeted individual, enables the victim to be scanned. By firing an array of ELF pulse modulated MASERs, which scan up and down the window of frequency emissions given off by subvocalized thought (or images and other thought processes), interference effects can be measured in the MASER beam. The victim's ELF brain emissions will interact constructively or destructively with the pulsed frequency MASER carrying ELF in the ELF window associated with subvocalized thoughts. If we fire an array of pulsed MASERs, which are out of phase with each other, extraneous noise can be filtered out in the digital domain. Since the converging ELF modulated MASERs are being effected by the low-level emissions in the victim's brain, the shifts in the ELF pulsed signal going into the targeted individual’s brain can be detected. A simplistic version of this would be the laser beam shone at the window of the person that is being bugged (a laser microphone). The vibrations in the window cause modulations in the laser that can be converted into electrical signals and hence into sound. In this way the subvocalized thoughts (or images and other thought processes) in the victim's brain can be read. Having already built up a library of excitation potential signatures for differing words and groupings of words, a sophisticated computer can begin to decode the emission signatures into word streams. In this way the subvocalized thoughts of the victim can be stored in the memory of a supercomputer and analyzed to give a read out of what the target is thinking.


Here’s another explanation drawn from an online source:


How does RNM. work? It employs a set of programs functioning at different levels, like:


1) The signals intelligence system which applies electromagnetic frequencies (EMF), to excite the brain for the system and the electronic brain link (EBL).


2) The brain stimulation system that has been planned as particle emission intelligence, which means receiving information from unintentionally created electromagnetic waves in the environment. However, it is not related to radioactivity or nuclear detonation.

3) The recording machines that have electronic equipment to examine electrical action in human beings from afar. This computer-generated brain charting can always record all electrical events in the cerebrum.


4) The recording aid system deciphers individual brain maps for ‘security purposes’.


The machinery involved can, remotely and non-invasively, detect information by digitally decoding the evoked potentials in 30-50Hz, 5 mW electromagnetic emissions from the cerebrum. The EMF emissions can be decoded into current thoughts and audiovisual perception, in the subject’s gumption.


Civilian sector research has also demonstrated the ability to decode visual imagery during sleep, whether as a matter of ‘organic’ dreaming or in response to stimulus. It is not clear whether it is possible to plant a false memory via such means, but the period just before sleep and just after awakening, in addition to periods of sleep deprivation are (according to my personal experience) certainly periods of high vulnerability in this regard.

Right of revolution


In political philosophy, the right of revolution is the right or duty of the people of a nation to overthrow a government that acts against their common interests. Stated throughout history in one form or another, the belief in this right has been used to justify various revolutions including the English Civil War, the American Revolution and the French Revolution.


However, in times of tyranny it may not always be desirable to upend the entire political infrastructure to achieve anti-tyranny objectives. If the political structure is already propitious to serving the interests of a public that is ready and willing to defend their rights, ideally it should suffice to remove the rogue elements within the governing apparatus, for example rogue elements within the unseen parts of the security state. For national security in the international sense, it should not be viewed as generally desirable to excessively distract legitimate security forces which serve the common interest and are dedicated to protecting the public from doing what we pay them to do. Peaceful means may often be sufficient to achieve such objectives and should at all times be preferred as a means of upending, neutralizing or even eradicating tyrannical factions which act contrary to the common interest, and only when continued pursuit of peaceful means of anti-tyrannical efforts becomes patently absurd in the face of reality, should genuine consideration of the more extreme versions of any right to revolution be promoted as self-evident.


Considering that all of the technologies and methods defined in this glossary generally lead to some sort of psychiatric reprisal or other means of political repression (but not likely worse, after all, we do not live in North Korea or anything), the organizing method should be as a pre-emptive organization dedicated to peaceful and/or violent revolutionary objectives in the eventuality that all of these patently impossible things should ever come to pass. If claims relating to such technologies and strategies are evidence of mental illness, then anyone who opposes the organization of a pre-revolution on such a basis can only be … crazy, no?


A.k.a., how to legally organize a revolution in plain sight against something that the public is not allowed to know about. Worst case scenario? Full disclosure. Which would suit many people just fine.

Ritual abuse


Ritual abuse is an extreme, sadistic form of abuse of children and non-consenting adults. It is methodical, systematic sexual, physical, emotional and spiritual abuse, which often includes mind control, torture, and highly illegal and immoral activities such as murder, child pornography and prostitution. The abuse is justified by a religious or political ideology.


It is believed that, in at least some cases, such methods may be directed towards the creation of an army of ‘Manchurian Candidates’, by starting the abuse and programming from a very young age, with the objective to use such an army to eventually achieve world domination. Dr. Cordyn Hammond states that many such victims he worked with had relatives in NASA, in the CIA, and in the military, including very high-ups in the military.(Of course, that could be the product of a disinformation campaign to cover up the true nature of the research and programming, one that the victims could presumably be persuaded to believe without too much difficulty.) Regardless of the extent to which this may be a realistic threat, it is clear that such groups would also have no qualms about using neuroweapons to further their aims.

Schizophrenia


This is a mental health classification based on a checkbox list which refers to ‘symptoms’ such as ‘false beliefs’, ‘unclear or confused thinking’, ‘hearing voices’, ‘reduced social engagement’, ‘lack of motivation’ a variety of ‘hallucinations’, etc. There is precisely zero neurological or biological basis for any such ‘diagnosis’, and the ‘diagnosis’ is 100% based on the descriptions of experiences made by the ‘patient’, followed by a psychiatrist writing down that these experiences are a product of delusional thinking, and cannot possibly reflect anything that was actually experienced. Commonly understood indicators of ‘schizophrenia’ in addition to ‘hearing voices’ include things like ‘being followed’, ‘being monitored by the CIA’, belief in conspiracy theories, etc. Note, that the diagnostic criteria is essentially identical to what an individual would describe were they in fact speaking openly about an actual conspiracy, and being targeted by various intimidation, harassment and surveillance technologies which are now known to exist.


However, the above description does not necessarily mean that such experiences can always be attributed to external manipulations, and perhaps there are in fact individuals who have such experiences and ‘symptoms’ which originate from ‘deluded’ and ‘anti-social’ thinking or behavior. Plausibly, nefarious types have merely piggybacked upon pre-existing definitions in order to have their critics silenced by destroying their credibility via a mental health record.

Self-incrimination


Self-incrimination is the act of exposing oneself (generally, by making a statement) "to an accusation or charge of crime; to involve oneself or another [person] in a criminal prosecution or the danger thereof". Self-incrimination can occur either directly or indirectly: directly, by means of interrogation where information of a self-incriminatory nature is disclosed; indirectly, when information of a self-incriminatory nature is disclosed voluntarily without pressure from another person.


In an instance where a targeted individual feels forced to make an untrue statement that may appear as self-incrimination, the real criminals are the party that forced the statement (this includes elicited sub vocalizations which the perpetrating entity will try to portray as ‘evidence’).


In an instance where innocent statements by the targeted individual are twisted beyond recognition of their original meaning and used as ‘evidence’ of self-incrimination, the real crimes are slander (defamation), harassment and others depending on the specific laws of the country.

Sensitization


Sensitization is an example of non-associative learning in which the progressive amplification of a response follows repeated administrations of a stimulus. Sensitization often is characterized by an enhancement of response to a whole class of stimuli in addition to the one that is repeated. For example, repetition of a painful stimulus may make one more responsive to a loud noise.

Silent sound


Silent sound, or sound from ultrasound is the name given here to the generation of audible sound from modulated ultrasound without using an active receiver. This happens when the modulated ultrasound passes through a nonlinear medium which acts, intentionally or unintentionally, as a demodulator.


Ultrasound has much shorter wavelengths than audible sound, so that it propagates in a much narrower beam than any normal loudspeaker system using audio frequencies. This makes it possible to have the sound directed in a very specific direction rather than being heard widely.


A transducer can be made to project a narrow beam of modulated ultrasound that is powerful enough, at 100 to 110 dBSPL, to substantially change the speed of sound in the air that it passes through. The air within the beam behaves nonlinearly and extracts the modulation signal from the ultrasound, resulting in sound that can be heard only along the path of the beam, or that appears to radiate from any surface that the beam strikes. This technology allows a beam of sound to be projected over a long distance to be heard only in a small well-defined area; a listener outside the beam hears nothing. This effect cannot be achieved with conventional loudspeakers, because sound at audible frequencies cannot be focused into such a narrow beam.


This technology is commercially available, for example the HyperSonic Sound and Audio Spotlight products. In addition to concerns that this allows audible transmission to an individual which may not be heard by others, additional subliminal programming into the signals may be even more of a threat to the public, considering possible applications used together with conditioned triggers. To my knowledge, silent sound is not common in electronic harassment.

Sleep deprivation


Sleep deprivation is the condition of not having enough sleep; it can be either chronic or acute. A chronic sleep-restricted state can cause fatigue, daytime sleepiness, clumsiness and weight loss or weight gain. It adversely affects the brain and cognitive function. However, in a subset of cases sleep deprivation can, paradoxically, lead to increased energy and alertness and enhanced mood; it has even been used as a treatment for depression. Few studies have compared the effects of acute total sleep deprivation and chronic partial sleep restriction. Complete absence of sleep over long periods has not been seen in humans (unless they suffer from fatal familial insomnia); it appears that brief micro sleeps cannot be avoided. Long-term total sleep deprivation has caused death in lab animals.

Physiological effects:
aching muscles; confusion, memory lapses or loss; depression; development of false memory; hallucinations; hand tremor; headaches; raccoon eyes; malaise; stye; periorbital puffiness, commonly known as ‘bags under eyes’ or eye bags; increased blood pressure; increased stress hormone levels; increased risk of diabetes; increased risk of fibromyalgia; irritability; nystagmus (rapid involuntary rhythmic eye movement); obesity; seizures; temper tantrums in children; yawning; mania; symptoms similar to: attention-deficit hyperactivity disorder (ADHD) and psychosis.


Among the numerous physical consequences of sleep deprivation, deficits in attention and working memory are perhaps the most important; such lapses in mundane routines can lead to unfortunate results, from forgetting ingredients while cooking to missing a sentence while taking notes.


The attentional lapses also extend into more critical domains in which the consequences can be life-or-death; car crashes and industrial disasters can result from inattentiveness attributable to sleep deprivation


Microsleeps


Microsleeps occur when a person has a significant sleep deprivation. Microsleeps usually last for a few seconds and happen most frequently when a person is trying to stay awake when he or she is feeling sleepy.


Some sleep deprivation techniques are (please don’t use them, this is for informational purposes only):
During the sleep deprivation period, the targeted individual and their polysomnograph record are continuously observed; when the targeted individual displays sleep electrophysiological signals or assumes a sleep posture, he/she may be activated by acoustic169 and, if necessary, tactile stimuli. This technique is used for total sleep deprivation as well as REM or NREM sleep deprivation. This technique often requires polysomnography. Similar methods may also be used to allow a very small amount of sleep (so you might ‘forget’ that you are being extremely sleep deprived, which would be rather obvious if you literally didn’t sleep for many days, or so that you might later be persuaded that in fact you were sleeping, say, 6 hours a night and not 15 minutes or 2 hours a night).


Other induced physiological responses, such as those which may be influenced by pulse-modulated electromagnetic waves which operate in the ELF spectrum, and/or including those which involve a conditioned response such as stress, increased heart rate, heart palpitations, etc., may also be applied to prevent the targeted individual from falling asleep.
Under one interrogation technique, a subject might be kept awake for several days and when finally allowed to fall asleep, suddenly awakened and questioned. Menachem Begin, the Prime Minister of Israel from 1977 to 1983, described his experience of sleep deprivation as a prisoner of the NKVD in Russia as follows:


In the head of the interrogated prisoner, a haze begins to form. His spirit is wearied to death, his legs are unsteady, and he has one sole desire: to sleep... Anyone who has experienced this desire knows that not even hunger and thirst are comparable with it.


It is not common among targeted individuals to refer to a sort of ‘electronic caffeine’ which is used in the sleep deprivation, although the extent to which this relies strictly on brain wave manipulation, other means of stimulus and/or conditioned stimulus do not appear to be understood by the community of targeted individuals.

Slander


Slander and defamation are common features of organized stalking. In short, slander is the communication of a false statement that harms the reputation of an individual person, business, product, group, government, religion, or nation. Under common law, to constitute defamation, a claim must generally be false and have been made to someone other than the person defamed. Some common law jurisdictions also distinguish between spoken defamation, called slander, and defamation in other media such as printed words or images, called libel.


In the context of psychological warfare in the electronic age, where electronic harassment and organized stalking appear to be increasingly common yet generally not addressed whatsoever by the authorities of the state (very suspicious), the use of slander can meet several objectives which are most certainly not mutually exclusive.


First, the mere threat of slander may serve for the purpose of blackmail. To blackmail someone, the threat need not relate to disclosing an event that actually transpired – all that is necessary is that the targeted individual can be persuaded to believe that some or many other in the community may believe this. For example, that you cheat on your taxes, cheated on a romantic partner, raped an adult, minor or even a child, or basically any personality ‘flaw’ (real or imagined) that they have discovered that the targeted individual might find embarrassing enough (for example, the concern that the targeted individual will be branded as ‘mentally ill’ if they try to publicly disclose the reality of electronic harassment and organized stalking; that the targeted individual secretly loves something that they would be embarrassed to admit to) that they may submit to increasing levels of control on the part of the perpetrating entity in order to avoid disclosure. In at least some cases, the blackmail itself may serve as a means to be able to proceed with brainwashing without the targeted individual feeling like they are at all able to speak, write, communicate, or even THINK about the unfortunate nature of their situation. Various forms of electronic harassment, in addition to organized stalking, are liable to be applied to make the blackmail threat seem credible. (Indeed, the perpetrating entity is rather likely to start spreading the slander if/when the targeted individual continues with their whistleblowing or efforts to make anyone aware of the reality of the electronic harassment and/or organized stalking).


Second, and not mutually exclusive with the above description of how slander and/or the threat of slander can serve the purpose of blackmail, the slander can be refined according to the specific personality, values, insecurities, etc., of the targeted individual, as a part of attacking the targeted individual’s sense of self, an early stage in the process of brainwashing the targeted individual, or at the very least, contributing to their willingness to, at a minimum SHUT UP, and ideally, to be ‘recruited’ (i.e., forced) to participate in the organized stalking or getting involved in the sorts of harassment and bullying that contribute more generally to the ‘success’ of the organized stalking and electronic harassment as a means of social control.


Third, the threat of slander, and more relevantly in this case, the widespread spreading of slander (or at least making sure that the targeted individual is exposed to individuals who publicly communicate awareness of the slanderous details, even if the targeted individual is not explicitly pinpointed at any moments of the communication) may serve the purpose of generally tiring out and wearing down the targeted individual. Similar to the second point, this may serve as a means to try to force the targeted individual to shut up about whatever social issue, political issue, or matter of disclosure/whistleblowing that the targeted individual continues to communicate about (this may be applied in conjunction with negative conditionings or other forms of psychological and/or physiological ‘punishment’ which are intended to be associated with the ongoing communication). In the sense of wearing down the individual, the slander may also be related to the process of trying to brainwash the targeted individual. But, in the case that the perpetrating entity may have concluded that the program of control or brainwashing has basically failed and will continue to fail, the slander may serve the purpose of pure punishment by a vindictive perpetrating entity which is angered that you will not submit to them (this may also serve as intimidation to others). (And, meanwhile, ongoing efforts to slander the targeted individual, in particular in a context where remote neural monitoring is understood to be possible, may serve the purpose of continuing to figure out the psychology and personality of the targeted individual better, with the objective of being able to devise alternative strategies to assert control over or brainwash the targeted individual).


Fourth, perhaps even in conjunction with planting a false memory, as the organized stalking process continues, with the sheer weight of many people (and voices) who surround you at most or all times, to try to convince you that the elicited images, recollections, etc., in fact represent an event that actually transpired. In which case, if the targeted individual themselves can be made to believe such a planted memory, for example, as supported by an intense and continuous project of neuro-programming and conditioning, to believe that they have highly perverted sexual interests, and are therefore ‘guilty’ in a sense that these ‘facts’ can be used to blackmail them.


This list should not be considered as an exhaustive description of how slander is being used in the current situation of psychological warfare in the electronic age. In short, slander helps with blackmailing, processes involved in asserting control over the targeted individual or even brainwashing them, serves to intimidate others who don’t roll over and do what they’re told, and the slander/blackmailing/brainwashing nexus is all highly intertwined.

Social control


Sociologists identify two basic forms of social control:


Informal means of control: Internalization of norms and values by a process known as socialization, which is defined as "the process by which an individual, born with behavioral potentialities of enormously wide range, is led to develop actual behavior which is confined to the narrower range of what is acceptable for him by the group standards".


Formal means of social control - External sanctions enforced by government.

Originally, the concept simply referred to society's ability to regulate itself. However, in the 1930s, the term took on its more modern meaning of an individual's conversion to conformity. Social control theory began to be studied as a separate field in the early 20th century.


The concept of social control is related to another concept, which is the notion of social order. Social control is a thing which is identified as existing in the following areas of society:
The education system
Policing and the law
Psychiatry
Social work
The welfare state
The working environment
In a context where electronic weapons and remote neutral monitoring can be applied for purposes of psychological warfare in the electronic age, the potential for essentially unobserved applications of social control and/or political repression, perhaps even so far as a complete abrogation of cognitive liberty for some or all individuals – this situation can only be assumed to be a serious threat, until enough whistles are blown, society-wide awareness of such electronic weapons is achieved, and an appropriate legislative and regulatory apparatus is devised to ensure that the guiding principles of traditional legal, political and social freedoms and responsibilities are upheld. At present, neither the letter and most especially not the spirit of the law is being upheld – significant civilian/citizen involvement will be required to ensure that electronic harassment does not end up being the tool of the previously unimaginable levels of social control and political repression.

Stalking


Stalking is a term commonly used to refer to unwanted, obsessive attention by individuals (and sometimes groups of people) to others. Stalking behaviors are related to harassment and intimidation. The word ‘stalking’ is used, with some differing meanings, in psychology and psychiatry and also in some legal jurisdictions as a term for a criminal offense. It may also be used to refer to criminal offences or civil wrongs that include conduct which some people consider to be stalking, such as those described in law as ‘harassment’ or similar terms.

Stasi/Gestapo


Stasi: The Ministry for State Security (German: Ministerium für Staatssicherheit, MfS), commonly known as the Stasi, also State Security Service (German Staatssicherheitsdienst, SSD), was the official state security service of the German Democratic Republic (GDR) (Deutsche Demokratische Republik, DDR), colloquially known as East Germany. It has been described as one of the most effective and repressive intelligence and secret police agencies to have ever existed.
The number of Gestapo and Stasi officers was not actually all that high, and were primarily involved in processing all the information, while as much as 1/7 of the population was busy working as informants.
Historian Robert Gellately says that it is somewhat of a myth that people normally reported on neighbors out of ideological commitment or fear of authority – rather, they may often have had more banal motives such as greed, jealousy and petty differences. He also states that he “found cases of partners in business turning in associates to gain full ownership; jealous boyfriends informing on rival suitors; neighbors betraying entire families who chronically left shared bathrooms unclean or who occupied desirable apartments. And then there were those who informed because for the first time in their lives someone in authority would listen to them and value what they said.”
Gestapo: The Gestapo, abbreviation of Geheime Staatspolizei, or the Secret State Police was the official secret police of Nazi Germany and German-occupied Europe.

StingRay


The StingRay is an IMSI-catcher, a controversial cellular phone surveillance device, manufactured by Harris Corporation. Initially developed for the military and intelligence community, the StingRay and similar Harris devices are in widespread use by local and state law enforcement agencies across the United States and possibly covertly in the United Kingdom. Stingray has also become a generic name to describe these kinds of devices.


One of these devices can be outfitted to monitor as many as 10,000 phones at a time. Police routinely claim that they can only be used to intercept metadata, but in fact they can be set to intercept, record and store the communications (which then does not leave any paper trail of a request from the corporate provider). By viewing the signal strength of an identified phone, the device can be used to narrow in on the source of the signal, enabling an operator of such a device to identify the location of the phone.


It is only recently that these technologies have come to light, since police were (illegally, yet to be tested in court) required to not disclose the usage of such devices even when presenting evidence in court – reportedly, in many cases police would instead claim that a confidential informant provided them with the information, whereas in fact due process was violated in an absence of a warrant.

Street theater


Street theater when spoken of in an organized stalking context refers to carefully scripted harassment by neighbors and strangers especially, but can include harassment by family, friends and co-workers. The methods and scripts employed in street theater are very subtle, innumerable and almost always are meant to mimic normal life and be symbolically meaningful only to the targeted individual.


These acts are designed to keep a target at a high stress level, and are crafted so that outside observers are likely to wave the skits off as just being a complaint about something that is annoying but just happens from time to time. The cumulative effect of such acts can be crushing to sensitive targets. Noise, crowding in person or on the highway, stealing items from shopping cart when in the checkout line (or high regularity of other petty thefts), and kids sent to hang out in front of, stare, make noise, and even throw tennis balls against the target’s house are simple examples. What differentiates street theater from normal but annoying/unsettling experiences is that street theater goes on every day, often by different mind control (mind influencing) operatives, far too often to be random or ‘natural’. Cover is provided by the tendency of people to refuse to acknowledge the frequency of these acts and consider the complainer just being overly sensitive or irrationally or in a deluded manner seeing some conspiracy against them (and in the case of street theatre, it is indeed a conspiracy against the targeted individual).


The street theatre may include engineered skits where your (current or previous) thoughts are spoken to you by strangers on street or events requiring knowledge of what you were thinking. Refer to remote neural monitoring to see how this can happen, unless you prefer explanations which rely on unrealistic distances of possible organic human-to-human telepathic communications.

Subliminal stimuli


Subliminal stimuli (literally "below threshold"), as opposed to supraliminal stimuli ("above threshold"), are any sensory stimuli below an individual's threshold for conscious perception. A recent review of functional magnetic resonance imaging (fMRI) studies shows that subliminal stimuli activate specific regions of the brain despite participants being unaware. Visual stimuli may be quickly flashed before an individual can process them, or flashed and then masked, thereby interrupting the processing. Audio stimuli may be played below audible volumes or masked by other stimuli.


Applications of subliminal stimuli often base themselves on the persuasiveness of the message. Importantly, research on ‘action priming’ has shown that subliminal stimuli can trigger only actions a receiver of the message plans to (or anyways may be persuaded to have an inclination to) perform anyway; however, consensus of this finding remains unsubstantiated by other research. Most actions can be triggered subliminally only if the person already has the potential to perform a specific action.


The potential applications of subliminal stimuli may appear very scary at first thought because it seems like someone might program (condition and brainwash) you without your even knowing. However, awareness of the possibility alone is strong protection – after many repetitions, with careful awareness of one’s thoughts, emotions, urges, etc., and effort to eventually derive the source of the subliminal stimuli (which are likely to have begun or be more strongly enforced with some supraliminal messaging at times) will enable a targeted individual to at least divert their consciousness away from the subliminally planted trigger, or perhaps even reprogram the trigger (however, reprogramming the trigger is likely to be nearly impossible if the perpetrating entity is continuously using diverse methods to reinforce the association, so asserting control over one’s consciousness by redirecting every time the stimulus is applied may, for practical purposes, be the best you can hope for).


A very obvious means of masking subliminal stimuli in a public setting which is very unlikely to leave easily recorded evidence, if one is not aware of what is going on and not paying attention, is for one individual or group to make lots of noise or a distraction and for another to plant or elicit the conditioned trigger – for example, several people make a loud noise which completely distracts you at the moment that a sexually attractive individual crosses in front of you, while another person says the verbal trigger or makes a gesture which you are not consciously aware of but which your brain picks up, thus enabling the eventual programming of an unknown-to-you association with a verbal or gestural trigger, to be used at a later date to make mysterious emotional and/or physiological things happen in order to make the targeted individual feel like they have lost control over their body and that someone else is able to control them, feeding a sense of powerlessness and inevitability that they must do as they are told, since “there is no choice”.
The image to the right explains one of many forms of subliminal stimuli (the case of audio – sound). Analogues for many other types of stimuli, from images to gestures and EM waves, can be assumed to be in use on some regular basis.


This entry is well worth exploring in much more detail, but for brevity additional explanation is not included. The current Wikipedia entry on subliminal stimuli provides a good overview. Key concepts for audio stimuli include the ‘objective threshold’, the ‘subjective threshold’ and ‘auditory masking’. Key concepts for visual stimuli involve the use of subliminal (very rapid) images to elicit a natural and/or conditioned trigger, ‘emotion eliciting stimuli’, ‘word and non-word stimuli’ and ‘masking visual stimuli’.

Sub vocalization


Sub vocalization, or silent speech, is the internal speech typically made when reading; it provides the sound of the word as it is read. This is a natural process when reading and it helps the mind to access meanings to comprehend and remember what is read, potentially reducing cognitive load.


In a context where pulse-modulated electromagnetic radiations are being used to communicate voices directly into your head, there is a very serious danger here that you may attribute certain sub vocalizations to your very own self. In which case, it is strongly recommended to be very aware of your own first person, and to always question the origin of strange thoughts or sub vocalizations that come to mind. For example, a nefarious actors might try to slowly manipulate you via driving your own sub vocalizations (I have some theories on how they drive this, somewhat along the lines of mimicking harassment, but have not yet developed it fully), say, starting with “that’s a terrorist” every time you see a brown man with a beard, and perhaps, trying to convince you that you’re really smart and a spy and can immediately identify terrorists, with the possibly effect of Muslims getting regularly called in as suspicious. A diverse variety of other nefarious applications could be made, so far as “I want to kill …”, or “I hate myself because…”, or “I’m sexually attracted to young children…” – combined with other conditioned responses, if you are not aware of the reality that basically everyone subvocalizes (you’re not crazy), and also the reality of pulse-modulated electromagnetic radiation used to transmit voices into your head.


Another very interesting aspect relating to sub vocalization (and also vocalized speech) is that it is possible to decode thought even before it is subvocalized. This was demonstrated experimentally in 2012: “While [subjects] read the text out loud, the team worked out which neurons were reacting to what aspects of speech and generated a personalized decoder to interpret this information. The decoder was used to create a spectrogram – a visual representation of the different frequencies of sound waves heard over time. As each frequency correlates to specific sounds in each word spoken, the spectrogram can be used to recreate what had been said. They then applied the decoder to the brain activity that occurred while the participants read the passages silently to themselves. … [2014:] Despite the neural activity from imagined or actual speech differing slightly, the decoder was able to reconstruct which words several of the volunteers were thinking, using neural activity alone.… The [civilian sector] team is now fine-tuning their algorithms, by looking at the neural activity associated with speaking rate and different pronunciations of the same word, for example. If you notice that people are starting to try to learn about and copy your speech patterns, there is a near 100% likelihood that such strategies will soon be used against you. Also, if you are not careful, you may be led into any number of false ‘confessions’, or perhaps even be brainwashed into believing that you in fact did something that you never did, e.g., “I really did …”, which can be latched onto to try to persuade you that you are guilty of something, or even if you cannot be persuaded to believe that you actually did something that you never did, that this ‘confession’ is justification for what they are doing to you. No one deserves that kind of treatment, NO ONE. Do not even WONDER about how you might ‘deserve’ it.

Suggestion


Suggestion, in the context of psychological warfare in the electronic age (neuro-warfare), is the psychological process by which one person guides the thoughts, feelings, or behavior of another.


Modern scientific study of hypnosis, which follows the pattern of Hull's work, separates two essential factors: ‘trance’ and suggestion. The state of mind induced by ‘trance’ is said to come about via the process of a hypnotic induction—essentially instructing and suggesting to the subject that they will enter a hypnotic state. Once a subject enters hypnosis, the hypnotist gives suggestions that can produce sought effects. Commonly used suggestions on measures of ‘suggestibility’ or ‘susceptibility’ (or for those with a different theoretical orientation, ‘hypnotic talent’) include suggestions that one's arm is getting lighter and floating up in the air, or that a fly is buzzing around one's head. The ‘classic’ response to an accepted suggestion that one's arm is beginning to float in the air is that the subject perceives the intended effect as happening involuntarily.


The power of suggestion should be considered as strategically linked to classic conditioning in the context of psychological warfare in the electronic age. I am not aware of cognitive or manifested physiological outcomes which are not susceptible to ‘training’ via these methods.


As a matter of curiosity, when faced with difficulties to stay in control of one’s cognition, for example when a verbal or visual trigger/suggestion is used to elicit a response, it is claimed that temporal lobe stimulation (presumably by mimicking certain brainwaves, although it is likely to be somewhat more complex than that), “can activate images stored in the subject's memory, including nightmares and monsters that are normally suppressed It is likely that suggestion, likely including efforts by those on the other end of the remote neural monitoring to visualize themselves doing a particular action and transmitting the ‘idea’ of this action via synthetic telepathy, may contribute to a variety of experiences related to being set up for priming or trying to suggest/persuade the targeted individual to take a particular course of action, which may range from the entirely trivial to the lowest of the low of criminal acts.

Suggestive guilt


See entry on sub vocalizations for some of how this can work. Also, refer to the entry on synthetic telepathy on how imagined or real ‘memories’ or ideas may be triggered. In my personal experience, this primarily involved efforts to brainwash me into believing that I had various forms of despicable desires, in order to persuade me that I ‘deserved’ it (refer to voice of God for how/why they hoped I might have believed this).


Here are some examples of the sorts of things that the perpetrating entity might say, either having already engaged in planting a false memory, or perhaps genuinely trying to dig into the privacy of your mind. This should be read in a context where remote neural monitoring is assumed to be currently in practice, regardless of whether the technological specifications of the technology remain inaccessible to the public. “You need a lawyer” (yeah, I need a lawyer to sue your asses). “I’m guilty …” (Yeah, YOU are guilty of breaking dozens and hundreds of laws, no matter that some other specific laws have not been broken, and moreover, are acting completely antithetical to long-cherished values of the civilization and culture you purport to act on behalf of). “You’re under investigation…” (Uh, yeah, just wait until we manage to investigate YOU guys for all the crap you’re doing). Or, if you can manage to just keep busy doing other stuff, you might be able to learn about the people who are monitoring you, by observing the things they try to persuade you to believe are a reason that you ‘deserve’ what is happening to you.


Synthetic telepathy


Synthetic telepathy is any technology which enables silent communication of words, images, or even ideas from one mind to another mind, including individuals who are interfaced with a computer which aids them in assembling the communication to be transmitted. Outgoing communications may involve low frequency electromagnetic transmissions which, due to their low frequency, cannot contain much information but may affect states of the brain. Outgoing communications involve higher frequency pulse-modulated electromagnetic radiations which, when they hit the brain, travel to the cochlear region of the ear and are perceived as a ‘voice in your head’.(Other influences on neural states and brain activity as influenced by low frequency electromagnetic waves should be considered as something other than synthetic telepathy, however.) The other direction of ‘communication’ for remote neural monitoring does not appear to be well understood in civilian sources, although some breakthroughs are referenced elsewhere in this document. This likely involves a technology roughly analogous to the laser microphone, which reads interference patterns after bouncing electromagnetic waves off the brain, by using these interference patterns to determine the brain waves associated with a diversity of cognitive events (whether conscious or perhaps even subconscious). Then, the other party of the communication is interfaced with a computer that helps to decode the interference patterns, which are then progressively compared with assumptions/information about the actual cognitive and sensual experiences occurring in the targeted individual, in a way that eventually enables the perpetrating entity to be aware of what the other individual is thinking, seeing, doing, etc. For longer distances, presumably some sort of signal relay is used, certainly in some cases involving the use of relays to satellites.


It is important for citizens to know that such technologies exist so that targeted individuals will not receive a mental health record for speaking to authorities about related experiences, and so that they can be prepared to psychologically defend themselves if they come under a psychological attack via synthetic telepathy. Importantly, this is not restricted to the communications of words, images or abstract thoughts. The extent to which these methods rely on classic conditioning is not clear, but it is obvious that such communications are also used to directly influence the emotional state of targets often with the objective of ‘teaching’ the target to feel one way or another about specific issues (i.e., brainwashing).

While synthetic telepathy has certainly advanced well beyond sounds to include images, thoughts, etc., targets report regular and invasive good fidelity sound transmissions. Voices saying profane and disparaging things are common. False sounds of telephones ringing, pagers beeping, alarm clocks going off, knocking on the target's door, etc. have been reported. The fidelity of these transmissions indicates improvement over the method demonstrated by Dr. Joseph Sharp (see microwave auditory effect).

Targeted individual


A term that has been used by a variety of people who have been attacked using many of the electronic weapons and techniques described in this glossary. Some believe themselves to be under attack by traditional criminal syndicates, others understand themselves to be targets of suppression by partisan, ideological and/or nationalist plants working under the cover of the security state in their respective countries to repress constitutionally protected freedom of speech or the right to peaceful protest. In many cases, these appear to be individuals who suffered under attacks from such electronic weapons and strategies, whether for purposes of experimentation, political repression or intimidation, and who spoke out openly about what is happening instead of submitting to whatever forces were trying to establish their obedience. In some cases, these targeted individuals seem to have been selected on the basis of belonging to a hated group, being vulnerable in some manner, and not so much in relation to trying to shut them up or brainwash them into submission to become a slave puppet of the forces which are presently using these technologies for highly nefarious sends.
Refer to organized stalking for a description of common experiences of targeted individuals. Also, this entire glossary is designed to fill in all the rest of the gaps in the technologies (neuroweapons) and strategies being used against targeted individuals. There appear to be two general groups of targeted individuals: 1) those who are targeted because someone thought they were vulnerable or weak and could be ‘recruited’ into a brainwashed, coerced and/or intimidated informal enslaved army of sorts, or alternatively who were deemed ‘expendable’ for torturous experimentation of these methods, and 2) those who are targeted because they are outspoken about various threats to the wellbeing of the general population. In both cases, the psychological torture, organized stalking, use of neuroweapons, etc. against these individuals serves as intimidation against others.

Terrorism


There is no established definition of terrorism in international law, largely because the need to recognize a legitimate right to revolution, a legitimate right for freedom fighting, etc., tends to prevent any such agreement. Many nation states have their own specific definitions of terrorism, and this definition is not based on those nation-specific laws.


Dictionary.com defines terrorism as follows, with some minor modifications to reflect the realities of neuro-warfare and electronic weapons:


1.the use of violence (psychological and/or physical) and threats to intimidate or coerce, especially for political purposes.


2.the state of fear and submission produced by terrorism or terrorization.


3.a terroristic method of governing or of resisting a government.


In the present context of psychological warfare in the electronic age, including via neuroweapons, many who end up on related watch lists may in fact be ‘Truthers’, some of whom secretly fight for the freedom of the handlers, frontline perpetrators, in addition to seeking to promote the ongoing freedom of targeted individuals and diffusion of information which may serve to protect the public. Of course, it is rather obvious who the real terrorists are in such a situation – those who brainwash others into perpetrating terroristic strategies are clearly orders of magnitude more guilty than the frontline perpetrators.

THINTHREAD


ThinThread is the name of a project that the United States National Security Agency (NSA) pursued during the 1990s. The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued three weeks before the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority.


The "change in priority" consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that claimed to protect the privacy of U.S. citizens. ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections. A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.


Trailblazer was chosen over a similar program named Thin Thread, a less costly project which had been designed with built-in privacy protections for United States citizens. Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.


Several whistleblowers involved in the much cheaper Thin Thread project which was purported to protect the privacy of US citizens, and who reported waste, fraud and abuse in the TrailBlazer Project were later raided by the FBI.

Thought crimes


‘Traditionally’, or rather as used in popular culture, thought crimes have referred to instances where people are prevented from voicing opinions which are politically incorrect or which others may potentially be offended by. In the present day in the West, complaints relating to thought crimes abound from those who wish to express racist, homophobic and/or sexist views – however, these are socially enforced norms and rarely, almost never, involve any sanction by use of any powers associated with the state unless actively promoting violence (or in some jurisdictions, ‘merely’ hateful attitudes) towards any group on such bases.


The term thought crime was popularized in in the novel Nineteen Eighty-Four by George Orwell (published in 1949), where the job of The Thought Police (the secret police of the novel) is to uncover and punish thought crime. The Thought Police use surveillance and psychological monitoring to find and eliminate members of society who challenge the party's authority and ideology.


Cases of theocracies and/or ideologically conformist (generally authoritarian) political entities (such as a nation or state) where outward conformity has been required abound in history – easily understood requirements for outward conformity such as not questioning the authority of a king, other dictator figure and/or specific political or social institution also abound historically. I do not deem it to be constructive to go about listing specific historical or present cases, but it should suffice to say that the range of ‘thought control’ may range from raised eyebrows in disagreement to lifelong torture.


In the context of an age where electronic weapons are real, the concept of thought crimes needs to be updated. While the traditional view of what constitutes a thought crime should still involve considering the entire concept as morally repugnant – with some reasonable exceptions where clear, transparent and publicly available argumentation is put forward, and where there are at least occasional venues for good-faith open debate in any absence of any social or formal reprisal for taking any position – thought crimes in the electronic age are an entirely different issue.


In instances of theocracies and/or ideologically conformist (generally authoritarian) political entities, it has always been sufficient to outwardly display conformity, while retaining complete cognitive liberty to privately dissent within the freedom of one’s own mind. In the age of electronic weapons, freedom of conscience and cognitive liberty is significantly threatened in a manner that goes well beyond ‘merely’ requiring outward conformism. Any such notion of thought crimes in the electronic age should be strictly prohibited – among other things, it should be considered as desirable that some people (conditional on having a strong moral compass and/or mastery of anti-brainwashing techniques) may, at times, wish to explore a variety of otherwise ‘unacceptable’ thoughts, actions, etc., within the confines of their own mind, in order to understand human consciousness, the human condition, and the potential for ‘deviance’ more fully, and should expect to be able to do so in a complete absence of external monitoring of such intellectual inquiry which would constrain their perceived freedom of such pursuits, including an expectation to be free from externally directed cognitive interference which may strive to surreptitiously persuade (brainwash) them into a preference for such ‘deviant’ streams of thinking or action, for the purpose of, say, psychiatric reprisal and/or blackmail.


Requiring outward conformism is very often morally repugnant itself – any actual or perceived requirement of inner conformity would be the greatest threat to individual and societal freedom ever faced in the history of the planet, and that is not an exaggeration in the slightest.

Trans cranial magnetic stimulation


Trans cranial magnetic stimulation (TMS) is a method used to stimulate small regions of the brain. During a TMS procedure, a magnetic field generator, or ‘coil’, is placed near the head of the person. The coil produces small electric currents in the region of the brain just under the coil via electromagnetic induction. The coil is connected to a pulse generator, or stimulator, that delivers electric current to the coil. In addition to legitimate medical and health potential of such technologies, there may also be a civilian sector interest to demonstrate the potentials of neuroweapons and their threats.


One discovery in the civilian sector using such technology relates to an experiment where researchers discovered that a group which had the targeted brain region shut down reported 32.8% less belief in God, angels, or heaven, and were 28.5% more positive in their feelings toward an immigrant who criticized their country (reduced religious faith was also found). Clearly such technologies are not benign Could an opposite effect be elicited, for MORE hostility against certain groups, or to promote additionally dogmatic subservience to a programmed ideological outlook ?

Torture


Torture means any act or omission by which severe pain or suffering, whether physical or mental, is intentionally inflicted on a person


(a) for a purpose including


(i) obtaining from the person or from a third person information or a statement,


(ii) punishing the person for an act that the person or a third person has committed or is suspected of having committed, and


(iii) intimidating or coercing the person or a third person, or


(b) for any reason based on discrimination of any kind, but does not include any act or omission arising only from, inherent in or incidental to lawful sanctions.


While torture breaks numerous laws in every country on the planet, the international legal framework is guided by The Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment.

Totalitarianism


Totalitarianism is a political system where the state recognizes no limits to its authority and strives to regulate every aspect of public and private life wherever feasible.

Unique electric resonance frequencies


This theory posits that every individual has a unique electric resonance frequency in their brain, and may be understood as one of the mechanisms whereby remote neural monitoring operates. However, it is altogether possible that this concept was planted by nefarious operatives who wish to instil fear and intimidation in the populace. Far more likely, rather more well understood (and often very ‘traditional’) means of identifying the location and identity of an individual are used, after which point advanced means of tracking and remote neural monitoring are applied.

Vision reconstruction


As early as 2011, civilian researchers at Berkley were encoding models which intercepted brain activity for the purpose of reconstructing visual imagery (in addition to predicting which words would be associated with those images/thoughts). This civilian technique was based on fMRI imaging.

Voice of God (electronic weaponry)


Refer to voice to skull or pulse-modulated electromagnetic radiations for some technical explanations. This is basically just a different word for the same thing. In applying these technologies, the perpetrating entity may seek to convince the target that it is the voice of God speaking to them. If the target can be persuaded to believe that this is true, they may ultimately believe that they are serving ‘good’ in following diverse orders, which, in fact, serve some particularly evil ends. For example, to convince the target(s) that it is necessary to bring war upon some enemy in order to lead the pathway to heaven. For an extended period of time in Canada, in particular around 2013-2014, the ‘success’ of such an approach was apparent, until it because patently obvious that the whole thing was a work of pure evil, at which point the notion that “there is no choice”, etc., was promoted along the lines that citizens should believe that the ‘successful’ ambush in the psychological warfare (neuro-warfare) had resulted in a situation that was a completely done deal, along the lines of “resistance is futile”.

Voice to skull


Voice to skull devices or V2K are nonlethal electronic weapons which include (1) a neuro-electromagnetic device which uses microwave (electromagnetic wave) transmission of sound into the skull of persons or animals by way of pulse-modulated electromagnetic waves; and (2) a silent sound device which can transmit sound into the skull of person or animals. NOTE: The sound modulation may be voice or audio subliminal messages. One application of V2K is use as an electronic scarecrow to frighten birds in the vicinity of airports.


Microwave (electromagnetic wave) radiation pulses (frequencies roughly in the range of hundreds of MHz to tens of GHz) are transmitted to the individual, then, “upon absorption by soft tissues in the head, launches a thermo elastic wave of acoustic pressure that travels by bone conduction to the inner ear. There, it activates the cochlear receptors via the same process involved for normal hearing. ”Most likely, this involves use of a transducer to modify the spoken word into ELF audiograms, that are then superimposed on the pulse modulated microwave beam.


Using ELF audiograms carried by a single pulse-modulated maser, subvocalized thoughts can be placed in the targeted individual’s brain. This enables synthetic telepathy operators the ability to enter into conversations with the targeted individual to drive him/her mad or to bring up key words which will get the victim thinking about the (potentially falsely planted) information they wish to find. Visual cortex excitation potentials can also be broadcast into the victim's brain so that illusory images can be projected into their brain for a diversity of purposes according to the ‘needs’ of the perpetrating entity.


The specific interest of this term is that it describes how people can ‘hear voices’ (or even ‘hallucinate’ images) but not be hallucinating. The nefarious ends to which such technologies may be used may be understood by referring to the anti-Nazi anti-Brainwashing toolkit (very incomplete draft available) or reading up on targeted individuals in a variety of online locations. I am aware of some potential positive uses of such technologies. The people who wish to defend such arguments should step forward into the light and make them. I will not make those arguments for them.


As early as 1995, the US military was on the verge of breakthrough with such technologies in the sense of modulating the electromagnetic pulses for the purpose of remotely communicating voices into the mind of a target.

War crime


A war crime is an act that constitutes a serious violation of the law of war (defined in the statute that established the International Criminal Court) that gives rise to individual criminal responsibility. Examples of war crimes include intentionally killing civilians or prisoners, torture, destroying civilian property, taking hostages, perfidy, rape, using child soldiers, pillaging, declaring that no quarter will be given, and using weapons that cause superfluous injury or unnecessary suffering.

Whistleblower


A whistleblower is a person who exposes any kind of information or activity that is deemed illegal, unethical, or not correct within an organization that is either private or public. The information of alleged wrongdoing can be classified in many ways: violation of company policy/rules, law, regulation, or threat to public interest/national security, as well as fraud, corruption or tyranny. Those who become whistleblowers can choose to bring information or allegations to surface either internally or externally. Internally, a whistleblower can bring his/her accusations to the attention of other people within the accused organization. Externally, a whistleblower can bring allegations to light by contacting a third party outside of an accused organization. He/she can reach out to the media, government, law enforcement, or those who are concerned. Whistleblowers also face stiff reprisal/retaliation from those who are accused or alleged of wrongdoing.


Third-party groups like WikiLeaks and others offer protection to whistleblowers, but that protection can only go so far. Whistleblowers face legal action, criminal charges, social stigma, and termination from any position, office, or job.


Two classifications of whistleblowing are private and public, depending on the type of organizations someone chooses to whistleblow on: private sector, or public sector. Both can have different results that depend on many factors. However, whistleblowing in the public sector organization is more likely to result in federal felony charges and jail time. A whistleblower who chooses to accuse a private sector organization or agency is more likely to face termination and legal and civil charges. Legal protection can be granted to protect whistleblowers, but that protection is subject to many stipulations. Hundreds of laws grant protection to whistleblowers, but stipulations can easily cloud that protection and leave whistleblowers vulnerable to retaliation and legal trouble. However, the decision and action has become far more complicated with recent advancements in technology and communication. Whistleblowers frequently face reprisal, sometimes at the hands of the organization or group which they have accused, sometimes from related organizations, and sometimes under law.


Targeted individuals who experience electronic harassment are all potential whistleblowers. And hence, the interest to ambush them and brainwash or otherwise silence them before they have a clue what is going on. In addition to targeted individuals who appear to have been selected for non-consensual human experimentation, a rather unscientific analysis of targeted individual social networks is strongly indicative that this group disproportionately involves people who are outspoken on issues of corruption in the nexus of politics and big business, who are strong advocates of freedom and civil liberties, and who tend to be peace advocates who promote good relations between genders, sexes, and ethnic/racial and/or religious groups.


A recent study on whistleblowing shows that when you start listing all the protections that you give whistleblowers, you start raising awareness of the risks and dangers and does more to deter whistleblowing than to encourage it – it recommends that rather than describing explicit protections offered from retaliation, organizations could instead more explicitly describe the organization's commitment to good corporate governance and ethical behavior.

X-ray


An electromagnetic wave of high energy and very short wavelength, which is able to pass through many materials opaque to light. This has absolutely nothing to do with the issues at play in relation to this glossary, but “X” was looking rather empty. Naturally, I sympathize with the empty feelings of the X, and thought this would be a much more homely entry than “X-rated”, a word relating to thoughts which have come to dominate the minds of those involved in the offending end of the psychological warfare in the electronic age, to an altogether unnatural degree.

Yo-yo


If you can identify with many of these terms, you know what it’s like to be treated like a yo-yo. Build you up, break you down, build you up, break you down … brainwashing.


If you cannot identify with the above, please help to raise awareness about these issues so that electronic weapons and neuroweapons as described in this glossary will cannot be used to treat you like a yo-yo (or worse) either. Learn to rapidly equalize your emotional self, but do not deny your emotional self.

Zersetzung


This entry primarily serves as a matter of historical interest and does not provide any additional information with regards to psychological warfare in the electronic age (neuro-warfare). Clearly, the methods previously applied by the Stasi have become much more highly refined (especially as paired with neuroweapons) and broadly implemented in the present day, including in many countries with long-standing society-wide dedication to political freedom and freedom of expression. Of particular interest is that a) the truth DID come out, and b) the repressive political entities which used such tactics eventually collapsed in the face of widespread latent hate and feelings of resistance against the system that would do such things.


Zersetzung (German; variously translated as decomposition, corrosion, undermining, biodegradation or dissolution) was a psychological technique of the East German secret police, the Stasi, and was used to silence political opponents. The "measures of Zersetzung", defined in the framework of a directive on police procedures in 1976, were used in the context of so-called "operational procedures". They replaced the overt terror of the Ulbricht era.


The practice of political repression in Zersetzung comprised extensive and secret methods of control and psychological manipulation, including personal relationships of the target, for which the Stasi relied on its network of informal collaborators, the State's power over institutions, and on operational psychology. Using targeted psychological attacks the Stasi tried to deprive a dissident of any chance of a "hostile action".


The Stasi, or Ministry for State Security, defined Zersetzung in its 1985 dictionary of political operatives as:
"...a method of operation by the Ministry for State Security for an efficacious struggle against subversive activities, particularly in the treatment of operations. With Zersetzung one can influence hostile and negative individuals across different operational political activities, especially the hostile and negative aspects of their dispositions and beliefs, so these are abandoned and changed little by little, and, if applicable, the contradictions and differences between the hostile and negative forces would be laid open, exploited, and reinforced.


The goal of Zersetzung is the fragmentation, paralysis, disorganization, and isolation of the hostile and negative forces, in order to preventatively impede the hostile and negative activities, to largely restrict, or to totally avert them, and if applicable to prepare the ground for a political and ideological reestablishment.


Zersetzung is equally an immediate constitutive element of "operational procedures" and other preventive activities to impede hostile gatherings. The principal forces to execute Zersetzung are the unofficial collaborators. Zersetzung presupposes information and significant proof of hostile activities planned, prepared, and accomplished as well as anchor points corresponding to measures of Zersetzung."


The Stasi used Zersetzung essentially as a means of psychological oppression and persecution. Findings of operational psychology were formulated into method at the Stasi's College of Law (at Potsdam Legal University - Juristische Hochschule Potsdam), and applied to political opponents in an effort to undermine their self-confidence and self-esteem. Operations were designed to intimidate and destabilize them by subjecting them to repeated disappointment, and to socially alienate them by interfering with and disrupting their relationships with others as in social undermining. The aim was to induce personal crises in victims, leaving them too unnerved and psychologically distressed to have the time and energy for anti-government activism. The Stasi intentionally concealed their role as mastermind of the operations. Author Jürgen Fuchs was a victim of Zersetzung and wrote about his experience, describing the Stasi's actions as “psychosocial crime”, and “an assault on the human soul”.


Although its techniques had been established effectively by the late 1950s, Zersetzung was not defined as a scientific method until the mid-1970s, and only then began to be carried out in a systematic manner in the 1970s and 1980s.It is difficult to determine how many people were targeted, since the sources have been deliberately and considerably redacted; it is known, however, that tactics varied in scope, and that a number of different departments implemented them. Overall there was a ratio of four or five authorized Zersetzung operators for each targeted group, and three for each individual. Some sources indicate that around 5,000 people were “persistently victimized” by Zersetzung. (Presumably the number could easily run into the hundreds of thousands or millions who were victimized as a part of the Zersetzung, since the vast majority of targeted individuals wouldn’t have had a clue, but nevertheless would have gotten the message, and in a matter of some days or weeks would have “got the message”


and became submissive, or in any case not persist in their freedom.) The College of Legal Studies had a comprehensive 50-page Zersetzung teaching manual, which included numerous examples of its practice.


It was applied against both groups and individuals. Methods against individuals include the following:
“…a systematic degradation of reputation, image, and prestige in a database on one part true, verifiable and degrading, and on the other part false, plausible, irrefutable, and always degrading; a systematic organization of social and professional failures for demolishing the self-confidence of the individual; [...] stimulation of doubts with respect to perspectives on the future; stimulation of mistrust or mutual suspicion among groups [...]; putting in place spatial and temporal obstacles rendering impossible or at least difficult the reciprocal relations of a group [...], for example by [...] assigning distant workplaces. — Directive No. 1/76 of January 1976 for the development of "operational procedures".
The naming of the present day Zersetzung is not available to the public. I believe it is roughly accurate to call it “Neurowar I: paid unprotect ion – ambush of civilians by rogue arms of the state”.

Introduction in the intelligence world


There are seven battlefield operating systems that build quality combat power. These include: intelligence, maneuver, fire support, air defense, mobility counter-mobility survivability, combat service support and command and control. Intelligence battlefield operating system (BOS) includes HUMINT, which allows for timely, quality, actionable, information to reach the necessary individual(s).


Once this knowledge reaches the end user, ISR (Intelligence, Surveillance, and Reconnaissance) operations can commence. The intelligence BOS is essential to help depict the enemy’s schedules, tactics, environment, and resources. Intelligence BOS follows a particular process: plan, prepare, collect, process, and produce.


The vocabulary surrounding matters of unauthorized disclosures is in flux. For readability and conciseness, in this article the behavior of individuals engaged in either espionage or leaking is referred to as “spying.” I use this word on the premise that in both cases insider access to classified information is deliberately abused to make unauthorized disclosures, in secret or publicly.

Spies engaged in espionage secretly deliver classified information to a party the spy understands is working directly against his or her own country. This typically involves an intermediary—a handler—who usually is a foreign intelligence service officer trained in managing agents safely and productively. The aim of a handler is to keep the spy undetected and the transfer of infor­mation ongoing and secret. For reasons of security and veracity, professional intelligence officers rarely handle anonymous sources for long periods.


Spies who leak make classified information publicly available without authorization, usually through contacts with media outlets or via the Internet. Leakers may have regular, dedicated interlocutors such as journalists, who receive and disseminate the information. Unlike spies engaged in espionage, most leakers are (at present) not paid or otherwise rewarded materially for their actions. Nor do their interlocutors normally engage in the kind of long-term han­dling tradecraft used by professional intelligence services—although source pro­tection and information authentication are core missions of journalists as well.


The key concept in defining spilling is lack of intent. Spies engaged in espionage or leaking have specific goals in mind, whereas spilling is the inadvertent, unintended disclosure of information to unclear environments, organizations, or people.


First, any consideration of mo­tivation in espionage must closely examine personality pathology. Per­sonality is the mix of traits, attitudes, and values that characterize a person. Spies frequently have pathological personality features that pave the way to espionage, such as thrill seeking, a sense of entitlement, or a desire for power and control. In addition, healthy countervailing traits—such as a calm temperament or strong sense of responsibility—may be either weak or entirely absent.


The second essential motivator is an experience of acute personal crisis resulting in intense distress.Though the spy may have regrets in hindsight, at the time he or she initiates the espionage, it appears a logical decision to solve a problem or the only option available to escape a desperate or painful situation.


Third, ease of opportunity is a prerequisite for espionage. The potential spy must have access not only to classified information but also to an interested “customer.” The ma­nipulations of such customers, who are often professionally trained to present themselves to potential spies as rewarding and safe patrons, can be a major determinant in motivating a vulnerable person to take the step of committing espionage.


The elements of personality, crisis, and opportunity do not operate inde­pendently.Vulnerabilities in one area generate vulnerabilities in the others. A person with a problematic mix of personality features will tend to have more than the average number of life crises, including job terminations, financial troubles. Such personal crises will, in turn, further stress and magnify problematic traits and behaviors just when the person needs most to function with stability and maturity.


Agents “spotting” a vulnerable relationship or family problems, and able person may insinuate themselves into the situation and find ways to exacerbate the personal crisis, “ripen­ing” a targeted person’s vulnerability to recruitment. Handlers will then continue to manipulate a recruited asset’s vulnerabilities to maintain the person’s long-term engagement in espionage.
 ­
The descriptive categories that follow are offered as a map of the psychological terrain of espionage. All maps oversimplify to a degree, and so does this one. No typology can encompass the full complexity of the psyche of any individual spy. Moreover, a proportion of people caught in criminally oriented or self-serving espionage will not fit the predicted patterns. Therefore, the ty­pology must be applied with caution.


Trained professionals can apply these concepts to mitigate risk in contexts such as applicant screenings and evaluations for clearances. Managers and other members of the Intelli­gence Community may use this in­formation to sharpen their awareness of potentially risky behavior patterns. They should bear in mind, however, that these psychological patterns do not always lead to trouble—and that many troubled people do not exhibit these patterns.
The planning step adheres to setting the vision. The commander must gather, analyze, address, and decide what the pertinent information is. The commander must determine how to use the information given for synchronization of the ISR operation. The commander utilizes the commander’s critical information requirements (CCIRs), priority information requirements (PIRs), friendly force information requirements (FFIRs), and involves the supporting staff judge advocate (SJA) to plan the intelligence operations.


All of these activities are essential to assess the situation and environment to optimize the likelihood of obtaining the desired outcome. Planning is not a static process, but revolving and interactive to obtain and maintain intelligence expectations. Through planning and direction by both collection and production managers, the process converts acquired information into intelligence and makes it available to policymakers and consumers.


Needs. Establishing the intelligence requirements of the policymakers—the President, the National Security Council (NSC), and other officials in major departments and government agencies. The needs process involves issue coordinators who interact with policymakers and military commanders to establish their core concerns and related information requirements. These needs are then used to guide collection strategies and the production of appropriate intelligence products.


The main goal of collection is to acquire data about the enemy’s environment, resources, and activities. Following are the intelligence disciplines that aid in collection of information:


Signals intelligence (SIG1NT) includes information derived from intercepted communications, radar, and telemetry. The National Security Agency (NSA), a component of the Department of Defense, is responsible for collecting, processing, and reporting communications intelligence (COMINT), electronic intelligence (ELINT), and foreign instrumentation signals intelligence (FISINT). The National SIGINT Committee within NSA advises the Director, NSA, and the DCI on SIGINT policy issues and manages the SIGINT requirements system.


Imagery intelligence (IMINT) includes both overhead and ground imagery. The National Imagery and Mapping Agency (NIMA), another Department of Defense component, is the functional manager for all imagery intelligence activities, both classified and unclassified, within the government including requirements, collection, processing, exploitation, dissemination, archiving, and retrieval.


Measurement and signature intelligence (MASINT) is technically derived intelligence data other than imagery and SIGINT. The data result in intelligence that locates, identifies, or describes distinctive characteristics of targets. It employs a broad group of disciplines including nuclear, optical, radio frequency, acoustics, seismic, and materials sciences.


Examples of this might be the distinctive radar signatures of specific aircraft systems or the chemical composition of air and water samples. The Central MASINT Organization, a component of DIA, is the focus for all national and DoD MASINT matters.


Human-source intelligence (HUMINT) involves clandestine and overt collection techniques. The following are some of the principal types of collection associated with HUMINT:


Clandestine source acquisition of information (including photography, documents, and other material) of intelligence value.


Overt data collection by civilian and military personnel assigned to diplomatic and consular posts.


Debriefing of foreign nationals and citizens who travel abroad or have access to foreign information.
Official contacts with foreign governments, including liaison with their intelligence and security services.


Open-source information is publicly available information appearing in print or electronic form. It may include radio, television, newspapers, journals, the Internet, commercial databases, and videos, graphics, and drawings.


Preparation is allowed to begin once the operations order (OPORD) or warning order (WARNO) is received by the commander. The commander can also improve the unit’s performance and survivability by conducting activities to generate additional quality intelligence for the ISR operation.


The main goal of collection is to acquire data about the enemy’s environment, resources, and activities.


Processing the data gathered is essential for commanders to make decisions. The data needs to be manageable, concise, and thorough in order for immediate decisions to be made that may affect the OPLAN. Conversion of large amounts of data to a form suitable for the production of finished intelligence" includes translations, decryption, and interpretation of information stored on film and magnetic media through the use of highly refined photographic and electronic processes. Processing this information involves sifting through the essential and non-essential information such as intelligence information collected by HUMINT, GEOINT, IMINT, MASINT, OSINT, SIGINT, TECHINT, MEDINT, and FININT. This culmination of data may appear as a puzzle pieces and it is the processing individual’s job to analyze all the data to help create actionable intelligence.


The production process essentially packages the final intelligence product(s). These manageable groups are divided by priority and are synchronized with the OPLAN essentials. . Integration, evaluation, and analysis of all available data and the preparation of a variety of intelligence products, including timely, single-source, event-oriented reports and longer term finished intelligence studies. Most intelligence organizations assign analysts to a particular geographic or functional specialty. Analysts obtain information from all sources pertinent to their areas of responsibility through the collection, forwarding, and processing systems.


Analysts absorb incoming information, evaluate it, produce an assessment of the current state of affairs within an assigned field or substantive area, and then forecast future trends or outcomes. Analysts are encouraged to include alternative futures in their assessments and to look for opportunities to warn about possible developments abroad that could either threaten or provide opportunities for US security and policy interests. The analyst also develops requirements for collection of new information. Counterintelligence and counterterrorism analyses provide strategic assessments of foreign intelligence and terrorist groups and prepare tactical options for ongoing operations and investigations. Longer range, more intractable intelligence challenges are addressed by grouping analytic and operational personnel from concerned agencies into closely knit functional units. When information has been reviewed and correlated with information available from other sources, it is called "finished intelligence."


Current intelligence addresses day-to-day events, seeking to apprise consumers of new developments and related background, to assess their significance, to warn of their near-term consequences, and to signal potentially dangerous situations in the near future. Current intelligence is presented in daily, weekly, and some monthly publications, and frequently in ad hoc written memorandums and oral briefings to senior officials.


Estimative intelligence deals with what might be or what might happen. Like all kinds of intelligence, estimative intelligence starts with the available facts, but then it migrates into the unknown, even the unknowable.


The main roles of estimative intelligence are to help policymakers navigate the gaps between available facts by suggesting alternative patterns into which those facts might fit and to provide informed assessments of the range and likelihood of possible outcomes.


Warning intelligence sounds an alarm or gives notice to policymakers. It connotes urgency and implies the potential need for policy action in response. Warning includes identifying or forecasting events that could cause the engagement of military forces, or those that would have a sudden and deleterious effect on foreign policy concerns (for example, coups, third-party wars, refugee situations).


Warning analysis involves exploring alternative futures and low probability/ high impact scenarios. The National Intelligence Officer (NIO) for Warning serves as the DCI's and the IC's principal adviser on warning. All agencies and intelligence staffs have designated warning components, and some have specific warning responsibilities.


Research intelligence is presented in monographs and in-depth studies by virtually all agencies. Research underpins both current and estimative intelligence; there are also two specialized subcategories of research intelligence: Basic intelligence consists primarily of the structured compilation of geographic, demographic, social, military, and political data on foreign countries. This material is presented in the form of maps, atlases, force summaries, handbooks, and, on occasion, sand table models of terrain.


The Directorate of Intelligence in CIA, NIMA, and the Directorate for Intelligence Production in DIA are major producers of this kind of material.  Intelligence for operational support incorporates all types of intelligence production—current, estimative, warning, research, scientific and technical; it is tailored, focused, and rapidly produced for planners and operators. The top priority of DIA is to satisfy the intelligence needs of operational forces and their commanders. DIA also provides near-real-time intelligence to military forces in peacetime, crisis, contingency, and combat operations. To accomplish this, it operates the Joint Worldwide Intelligence Communication System (JWICS) and deploys National Intelligence Support Teams (NISTs) as needed, - worldwide. The Associate Director of Central Intelligence for Military Support, via CIA's Office of Military Affairs, Oversees deployment of CIA components of NISTs.


Scientific and technical intelligence includes information on technical developments and characteristics, performance, and capabilities of foreign technologies including weapon systems or subsystems.


This information is derived from analysis of all-source data, including technical measurements. Generally, such technical analysis and reporting responds to specific national requirements derived from the weapons acquisition process, arms control negotiations, or military operations. It covers the entire spectrum of sciences, technologies, weapon systems, and integrated operations. This type of intelligence is provided to consumers via in-depth studies, detailed system handbooks, executive summaries, focused assessments and briefs, and automated databases.


Feedback. Interaction between consumers of finished intelligence and the producers to help intelligence managers evaluate the effectiveness of support, identify intelligence gaps, and focus more precisely on consumer needs. Feedback takes many forms and channels; it may be direct or through liaison contacts and consumer surveys.


Each intelligence collecting method is most effective during particular scenarios and timeframes. Each of the nine main areas of intelligence gathering allow for obtaining actionable intelligence that may be used by the higher echelons to synchronize and analyze data in order to meet the vision during the intelligence process.


HUMINT uses people as the main medium with which to collect information. The information may be gathered, analyzed, and exploited for the ideal outcome. Since humans are such diverse beings, there are a variety of methods which are adapted for every situation, environment, and battlefield operations. There are a multitude of sources that can lead up to HUMINT collection from diplomatic relations to travelers to local and military personnel.


Most of these encounters do not require a cost, thus illustrating how HUMINT is flexible, diverse, and cost effective. Depending on the available training and education of the HUMINT collector, intelligence can be obtained with speed and allow actionable intelligence decisions to be made quickly.


Geospatial intelligence (GEOINT) provides feedback to the appropriate individual(s), commanders and soldiers regarding the current geographical situation of the desired area on earth. This would assist in the unit in obtaining relevant information about an area they may have never seen before. Unfortunately, the intelligence method requires very expensive equipment and qualified personnel to run it.


Imagery intelligence (IMINT) is the intelligence of space and earth. High tech equipment is used to extract information on certain geographical areas. Space equipment, aircrafts (manned and unmanned), and high definition aerial photography is used to obtain analyze and record this data. Usually, this data requires time and resources and significant cost exhausted in the collection of this data.


Measurement and signature intelligence (MASINT) requires the use of mathematics, physics, chemistry, biology, and other scientific disciplines to obtain intelligence. These analysts search for consistencies, inconsistencies, and a variety of measurements to identify the source of each measurement.


This method requires time and highly specialized personnel to interpret and produce actionable information which may or may not be of immediate use to the soldiers on the battlefield.


Open source intelligence uses information gained through unclassified material and other outlets. Intelligence gained through this method comes from sources such as television, radio, newspapers, magazines, the internet, etc. Analysts view, read and study these sources and link seemingly harmless bits of information together to obtain legitimate intelligence.


Signals intelligence is a form of collecting intelligence by intercepting signals between entities. Those entities can be human to human, machine to machine or a combination. Since these signals are often encrypted, analysts require equipment that not only intercepts the transmission, but can also “break the code” on the encryption, or the analyst has to take the intercepted transmission and feed it through a system that can read the encrypted message(s).


There are several subcategories of SIGINT. These categories include communications intelligence, electronic intelligence, foreign instrumentation signals intelligence, and telemetry intelligence. Signals intelligence is very diverse and effective.


Technical intelligence is the branch of intelligence that provides our armed forces an advantage when going into a conflict. It informs us of the enemy’s weapons systems, capabilities, limitations, strengths, weaknesses, etc.


Medical intelligence is another branch of intelligence that ensures our armed forces are informed and able to prepare for matters they may encounter in a conflict. Medical intelligence focuses on the medical, environmental, and bio-scientific information that is of interest and may affect strategic planning. MEDINT also feeds into military medical planning and operations allowing friendly forces to prepare for conditions in a specific geographic location and obtain necessary immunizations before entering an area.


Financial intelligence is a complex matter. In financial intelligence the financial transactions or patterns of individuals, groups, countries, etc. are scrutinized. Money transferred to or from monitored accounts is followed electronically. Information gained through this method is shared with other intelligence services. The other methods of intelligence collection are used to validate the information and target the suspect or suspects.


Although all of the intelligence gathering methods are important and effective they each have advantages and disadvantages. For example, most of the intelligence gathering methods such as GEOINT, IMINT, MASINT, SIGINT, TECHINT, and FININT require very expensive equipment, highly trained, and highly paid personnel to operate the equipment.


Additional personnel are required to decipher the information gained from that particular equipment. This equipment is not only expensive to acquire, but it’s also expensive to maintain, operate, keep up to date with the latest software, and other upgrades.


Another disadvantage of these methods is the time commitment. Frequently, by the time the information gained is translated into intelligence and relayed to the person or agency that needs it most or who is in the best position to act on the intelligence, it is too late to obtain the desired results. This emphasizes the need for a change in our military intelligence culture to reflect the growing demand for faster accurate intelligence.


The advantage to all of the above mentioned intelligence gathering methods and including MEDINT and OSINT is that they do not require humans to be on the ground and in danger to acquire the information. This reduces risk to our most valuable resource…humans.


The reverse is true when referring to human intelligence. Most HUMINT methods do not require expensive equipment. Instead a moderately trained individual can gain a tremendous amount of information and intelligence through such seemingly simple methods as talking to a patrol after they complete a mission, having a conversation with a detainee, refugee, a non-governmental organization (NGO), or watching the activities in or around a specific area. The disadvantage to HUMINT is that in most cases it requires a human being to go into dangerous areas and situations to gain information or intelligence.


This risk can be remedied and reduced through the education and training of Soldiers and commanders on the HUMINT method. Unauthorized disclosure of sensitive or proprietary informa­tion to the media for political purposes is an age-old feature of political life and will remain a permanent fixture of any democratic society with a free press.


Those seeking political advantages through such disclosures generally partner with established media outlets, both to ensure an extensive au­dience and to gain legitimacy; they presume that audiences will assume the media partner has screened and verified the information before using it. Less well known is that profes­sional members of the media usually seek comment from rel­evant members of the Intelligence Community before making public classified information they have acquired.


Sometimes they will revise their drafts to mitigate credible risks described to them by the Intelligence Community or may even withhold a story when they are convinced that risks to national securi­ty, US citizens, or US allies or innocent persons are too high.


A 2013 case study on leaking published in the Harvard Law Reviewhypothesizes that periodic, tumult-inducing, unau­thorized disclosures are not caused so much by institutional weak points or failures (such as feeble security measures, law enforcement investigations, and prosecutions of leakers) but by the considered choices of high-level officials who benefit from lax enforcement of legal prohibitions against unauthorized disclosures.


The author further argues that, in subtle ways, lax enforcement benefits national security, government efficiency, and democratic transparency more than it harms them.


The Harvard Law Reviewpublished a riposte to the essay asserting that the harm caused by “high level” leaking is very real, but, despite the self-evident harm, “the executive branch has been unable and unwilling to close the ‘sluice gates’ due to easily underestimated legal and technological constraints and also because of political constraints emerg­ing from strong passions in American society that exert pressure on democratically elected leaders.” In an article in Foreign Policy, William J. Burns (former deputy secretary of state) and Jared Cohen (president of Jigaw (previously Google Ideas) argue that “We should build a global consensus around both the need to protect the integrity of financial data and systems on which the global economy relies and the illegality of cyber-enabled commercial espionage, making a clear distinction between tradition-al espionage and wholesale commercial theft.”


Apparently, in the international consensus these authors propose to build for the cyber age, an exception will remain between nations (in the tradition of a true gentlemen’s agreement) that permits political and military espionage against each other to continue unabated, whereas technology enabled commercial espionage and digital infrastructure destruction will be forbidden. Intelligence service officers will be pleased that their jobs remain secure, and at least somewhat respectable, according to the proposed rules for the brave new cyber world.


It is hard to predict where all of this is going to take us, nationally and globally; at present, we can only note that a sea change is occurring in the way all levels of society view technology and the access to information it enables. These are major areas of ongoing discussion and conflicts on both the formal governance level and on the “street” level. In regard to the psychology of espionage and leaking, persons considering spying will find ample justification and support to act on their impulses and desires in the evolving and contentious social dynamic in the public commons concerning the uses and control of technology and information.

Who are critical of certain political issues, most especially relating to various perceived corruptions, concerns about the rise of the spy state, tyranny in general, and various forms of unnecessary social control which are likely to have their strongest effects against individuals and groups deemed ‘inferior’ by certain segments of society, some of which have been well implanted within the security state since at least WWII (i.e., pro-eugenics anti-socialists of the white supremacist version, a.k.a., Nazis, at least 1,000 of which were imbedded in the CIA at least up to the end of the Cold War.


We are well beyond experimentation and have passed well into the stage of implementation, which appears to primarily revolve around a conspiracy to implement the most extreme form of social control and the most fundamental attack on freedom, at the very level of cognitive liberty itself (where a mere thought crime may make an individual a primary target for attacks via electronic weapons), that humanity has ever faced. Electronic weapons are with 100% certainty in use, including against civilians of the countries that employ them. However, it appears that non-consensual human experimentation continues, against groups which are deemed ‘inferior’ or in any case sufficiently vulnerable to have difficulties having their experiences made public, in addition to politically targeted individuals who can be presumed to be both victims of state terrorism committed by rogue actors within the state and subjects of non-consensual human experimentation at the same time.


In the USA, non-consensual human experimentation has lax safeguards as a part of legislation referred to as The Common Rule, which is the Federal Policy regarding human subjects protection. It is written with several loopholes for the allowance of non-consensual human experimentation, mostly by intelligence agencies.

 


 





© 2003 Global Intelligence Inc. All rights reserved.