Saturday, May 8, 2010

ONE HOUR LATER AND I AM STILL UPLOADING A VIDEO...AND HERE IT IS

THIS EXPERIMENT WAS DONE IN MY HOME ON MAY 6 2010. I HAVE OBSERVED THAT I FEEL REALLY SICK WHEN THE READINGS ARE HIGH. THE NAME OF THE RADIATION DETECTOR IS THE ZAP CHECKER - GOOGLE A LEARN ABOUT IT.

AS I AM UPLOADING THIS MY LOWER ABDOMEN IS PULSING IN SYCH WITH THE PULSES OF THE DETECTOR SHOWN ABOVE

what with the chinese bad behaviour inToronto...

Yesterday I went to Canadian Tire. I eventually went to the check out line. Immediately after joining the line, a chinese woman came behind me and stood so close I could smell her breath. I moved a little to put some personal space between us. She immediately moved forward behind me. The plastic container she held in her hand rubbed against my arms. I again moved forward and again she moved behind me.

I eventually left the line and put back the item I was going to purchase to avoid any confrontation and hassle.

PS I LIVE IN A MAINLY CHINESE OCCUPIED BUILDING AND AS I AM TYPING THIS MY MICROWAVE DETECTOR IS GOING LIKE CRAZY AND I AM GETTING REALLY PAINFUL JABS OF PAIN IN MY ARM - THE RADIATION AROUND THIS ARM IS ESPECIALLY HIGH.

Mind Games: Prozac, Depression, and the Mind

Peter R. Breggin, MD - Good Morning America 06-15-2009 -Risk of Sudden D...

Friday, May 7, 2010

I PICK UP MY KEYS TO GO OUT THE DOOR AND ...

THE CONTRACTORS WHO ARE WORKING ON THE WALLS IN THE BUILDING SHOWS UP OUTSIDE MY DOOR AND STARTED WORKING.

I HEARD LOUD SWEARING OUTSIDE MY WINDOW AND LOOKED - I SAW

THE BUILDING MANAGER TALKING TO A CONTRACTOR WHO HAD HIS RED PICK UP PARKED IN THE LOADING DOCK.

THERE WAS SWEARING AND LOUD TALKING FOR ABOUT 15 MINUTES - IT WAS 11.30 AM SO THIS MAN WAS ON THE JOB TALKING ABOUT PERSONAL TOPICS WITH HIS FRIEND THE CONTRACTOR. - (HE WAS TALKING SO LOUD IT WAS HARD NOT TO HEAR)

SWEARING LOUDLY OUTSIDE THE WINDOW WHEN THEY ARE OPEN IN SUMMER TIME IS NOT THE MOST PROFESSIONAL BEHAVIOUR FOR BUILDING MANAGERS.

"BIG BROTHER MAY BE WATCHING, BUT HE MAY NOT BE THE GOVERNMENT BUT YOUR NEIGHBOUR" QUOTE FROM A NEW BREED OF TERRORISM BY JOHN HALL

http://books.google.ca/books?id=vJmfadNsD0kC&printsec=frontcover&dq=BUY+SATELLITE+TERRORISM+IN+AMERICA&source=bl&ots=18g7roiOm6&sig=DD3fgbAkYzp_-tL2AGjQK3zx6pQ&hl=en&ei=aivjS4PJBsWBlAft8NyCAg&sa=X&oi=book_result&ct=result&resnum=10&ved=0CEQQ6AEwCQ#v=onepage&q&f=false

GO TO PAGE 7 READ AS MUCH AS THERE - YOU WILL FIND OUT HOW OPEN EVERYONE IS TO CRIMINALS

ps as I type this my right ear is being pulsed painfully

A FEW THINGS TO RECOUNT AFTER READING THIS ....

http://books.google.ca/books?id=vJmfadNsD0kC&printsec=frontcover&dq=BUY+SATELLITE+TERRORISM+IN+AMERICA&source=bl&ots=18g7roiOm6&sig=DD3fgbAkYzp_-tL2AGjQK3zx6pQ&hl=en&ei=aivjS4PJBsWBlAft8NyCAg&sa=X&oi=book_result&ct=result&resnum=10&ved=0CEQQ6AEwCQ#v=onepage&q&f=false

ONE OF THE EMPLOYEES IN THE CONDOMINIUM COMPLEX IN WHICH I LIVE STANDING OUTSIDE MY WINDOW AND RECOUNTING EVERY ACTION I HAD DONE IN MY BATHROOM THAT MORNING. HAVING THE CLEANERS DO THE SAME.

SITTING IN A JURY SELECTION ROOM, A WHITE MALE PASSING BY ME AND SAYING REALLY LOUDLY " I HAVE BEEN LOOKING AT THAT FOR 10 YEARS NOW"

(SEE UTUBE CHANNEL "helenkurdin" talking about CHINESE nationals trained in psychotronic torture (read the descriptions under her videos)

DOCTORS SWEARING WHEN VISITING THEM AND BEING GENERALLY RUDE AND SOMETIMES DOWNRIGHT NASTY.

BEING MOBBED EVERYWHERE.

A NEW BREED SATELLITE TERRORISM - (WOMEN RAPED!!!!)

http://books.google.ca/books?id=vJmfadNsD0kC&printsec=frontcover&dq=BUY+SATELLITE+TERRORISM+IN+AMERICA&source=bl&ots=18g7roiOm6&sig=DD3fgbAkYzp_-tL2AGjQK3zx6pQ&hl=en&ei=aivjS4PJBsWBlAft8NyCAg&sa=X&oi=book_result&ct=result&resnum=10&ved=0CEQQ6AEwCQ#v=onepage&q&f=false

I have been blogging and talking about this book to women that I meet to educate them as to what is happening and three days in a row I have been dreaming that I have my cut-off tongue in my hands. (INTERESTINGLY, DREAM MANIPULATION IS PART OF WHAT COULD BE ACCOMPLISHED REMOTELY)

PS. Last night it was a very busy night for plane flying low over my building - very noisy!!!

Thursday, May 6, 2010

CROWDS FORMING VERY QUICKLY..

I have noticed that when I go to a location and stay for any length of time, a lot of people show up and loiter.

Yesterday is a prime example - I went to the mall to get some pizza and sat down near the window. Outside was a the entrance to the mall. There was no one in the space on the opposite side of the glass to where I sat. After about 3 minutes there were about 15 people just loitering in the entrance. One black man came a sat in front of me with just the glass wall separating us. A group of brown skinned men driving a car exactly like mine loitered in front of the car parked just outside the entrance to the mall. IT DOOR WAS WIDE OPEN WHILE ONE MAN LEANED ON IT. I walked to my car parked at the end of the lane in the lot in front of the mall entrance and noticed a group of men in front of my car talking loudly, waving their hands about. They surrounded a black car. The same black man who sat in front of me while I was in the Pizza store broke from the group and ran in front of my car towards the mall as I entered my car and got prepared to drive off. As I drove off from my parking spot, a black honda with very loud muffler drove past me and an orange and green taxi was right behind him.

EARLIER THAT DAY THE CROWDING EFFECT ALSO HAPPENED IN THE TICKETING OFFICE DOWNTOWN WHERE I WAS LOOKING AFTER SOME PARKING TICKETS I GOT IN MY OWN CONDO PROPERTY.

AS IF PHYSICAL STALKING IS NOT BAD ENOUGH, NOW WE HAVE SATELLITE STALKING

http://books.google.ca/books?id=vJmfadNsD0kC&printsec=frontcover&dq=BUY+SATELLITE+TERRORISM+IN+AMERICA&source=bl&ots=18g7roiOm6&sig=DD3fgbAkYzp_-tL2AGjQK3zx6pQ&hl=en&ei=aivjS4PJBsWBlAft8NyCAg&sa=X&oi=book_result&ct=result&resnum=10&ved=0CEQQ6AEwCQ#v=onepage&q&f=false

THIS NEWS ARTICLE FINALLY RECOGNIZES THAT "TRIVIAL" ACTS OF HARASSMENT ARE WORTHY OF COURT ACTION!

http://www.creviews.net/cr000043.htm
EXCERPTED FROM ABOVE LINK:

Eleanor White rating: OKFebruary 21, 2009ARTICLE: Man jailed after harassing elderly neighbours by whistling Addams Family theme each time he saw themLINK: http://tinyurl.com/b7boz5THIS NEWS ARTICLE FINALLY RECOGNIZES THAT "TRIVIAL" ACTS OFHARASSMENT ARE WORTHY OF COURT ACTION!Note: For non-targets reading this, keep in mind that suchacts of harassment are *multiplied* for organized stalkingtargets, as the stalking groups have multiple perpetratorsacting to keep their target on edge throughout the day,every day.For decades now, targets of organized stalking have faced theproblem of justice system officials treating complaints of OSas trivial. This is accomplished easily when police insistthat each harassment incident be considered ALONE.Organized stalking harassment is an endless, daily chain of"small" harassment acts which by themselves are seen as trivial.People hearing a target complain of such incidents always refuseto hear the target explaining that these things go on DAILY,usually multiple times daily, in different forms. It is theCUMULATIVE effect of street harassment, together with "small"harassment acts committed inside the homes, cars and workplaces ofthe target that turn a life into an unending nightmare.Clearly this pattern of harassment has been chosen so as to makethe target appear mentally ill. This pattern of harassment alsomakes it easy for police to ignore complaints.The news story in this review is the first official acknowledgementI'm aware of the CUMULATIVE effect of a "trivial" act of harassment,that being breaking into a whistle every time a target approaches.This is an extremely common "trivial" form of harassment.Other such "trivial" forms of harassment are entering the home ofa target while the target is out and scattering dirt on the floor,tossing cigarette butts on the floor, leaving pennies around thehome, or just moving furniture out of place. Sabotage of target'spossessions, including clothing, also occurs.One police officer described this type of harassment activity as"micro-tampering."To those who think endless "trivial" harassment is rare, considerthe fact that the United Kingdom has instituted an "anti-socialcourt order" system, under which people committing "trivial" actsare ticketed. If this type of behaviour were very rare, wouldsuch a system have been established?Organized stalking targets everywhere cheer magistrate John Warrenfor actually awarding JAIL time to this harasser for his "trivial"acts!Here below is the quoted text of the article:QUOTE:Man jailed after harassing elderly neighbours by whistling AddamsFamily theme each time he saw themBy Daily Mail ReporterLast updated at 12:52 PM on 14th February 2009A nuisance neighbour who taunted an elderly couple by whistling thetheme from the Addams Family whenever he saw them has been jailed.Leopold Wrobel harassed the pensioners for more than four years,making them feel like prisoners in their home.His victims, Michael and Kathleen Sharpe, said Wrobel had 'nearlysucceeded' in destroying their lives.Michael and Kathleen Sharpe were harrassed by their neighbour forfour yearsWrobel, 51, had been handed an anti-social behaviour order lastDecember for harassing the couple.But a court heard his nuisance behaviour, which had already lastedfor four years, continued on the day the order was imposed.The court was shown CCTV footage from cameras on the Sharpes'property, which picked up Wrobel's repeated whistling when theyarrived at or left the house.Michael Treharne, prosecuting, said each incident taken in isolationwould probably seem silly or almost pathetic.Leopold Wrobel: He taunted the coupleBut he added: 'If something happens on an ongoing basis and goes onand on and on, eventually it reaches the stage of being absolutelyintolerable. 'Mr Sharpe, from Wingerworth in Derbyshire, told the court Wrobel'sbehaviour had made his wife ill and she had started losing her hair.'It's been devastating and it's done what he wanted to do, to try todestroy our lives,' the 68-year-old said. 'He very nearly succeeded.'His wife told magistrates they could not leave the house withoutWrobel being there.The 66-year-old added: 'He frightens me, I've not been able to live anormal life. I was a prisoner in my own home.'Wrobel denied breaching the Asbo and two further counts ofharassment, including watching the couple and their family andwhistling the theme from the 1960s horror comedy. But he was foundguilty by magistrates and sentenced to 20 weeks in prison .Julia Bosworth, defending, told Chesterfield Magistrates' Court herclient disputed he was the perpetrator of all the whistling, and saidhis whistles were directed at his dog, not the Sharpe family.Wrobel told the court: 'I couldn't care less what they do, it's of nointerest to me at all.'But John Warren, chairman of the magistrates' bench, said Wrobel'sversion of events was not credible.Passing sentence, he said: 'You pursued a course of conduct thatcaused great distress to the Sharpe family and have shown norecognition of the impact on that family.'Speaking after Wrobel was sentenced, Mrs Sharpe said: 'I'm sorelieved, it's been an absolute nightmare. It's affected our healthand all the family.'END QUOTEEleanor White

STRANGE OBSERVATIONS ON THE DAY...

Yesterday I went to City Hall to fight two parking tickets issued on the grounds of the condominium complex I live in. While sitting in the reception area waiting for my number to be called, the room got really busy. There was 3 people when I arrived. IN ABOUT 3 MINUTES, THERE WERE ABOUT 15 PEOPLE THERE. As I sat waiting, things got really LOUD at the front desk. THIS WENT OF FOR QUITE A FEW MINUTES WHILE PEOPLE WERE ARGUING THIER POINTS WITH THE ATTENDANTS. ONE YOUNG MAN CAME IN TALKING REALLY LOUDLY ON HIS CELL PHONE.
The one thing that really surprised me was to see A CHINESE MAN WALK IN WITH HIS VERY OLD AGED MOTHER, WALKING WITH THE HELP OF A CHAIR WALKER, LIMPING AND BENDING OVER. SHE LOOKED LIKE SHE COULD BARELY SEE AND HAD BIG BLACK MARKS ON HER FACE. She sat down facing me, so I could not help noticing these things.

Wow, was it not possible for this very able bodied man to come alone to PAY A PARKING TICKET??? WAS IT NECESSARY TO DRAG THIS REALLY SAD LOOKING OLD SICK WOMAN TO THE THIRD FLOOR OF AN OFFICE TOWER DOWNTOWN TO ACCOMPANY HIM TO PAY A PARKING TICKET. I AM SURE SHE WAS NOT DRIVING THE CAR!!!!

PS AS I START TYPING THIS, MY HEAD IS STARTING TO HURT JUST ON THE RIGHT SIDE. HMMMM.

To continue, when my number was called I went to the attendant behind the the counter. As I was filling out the ticket a Chinese woman came up without a number and said " EXCUSE ME, COULD I ASK YOU A VERY EASY QUESTION.......... (VERY LOUDLY)
THE ATTENDANT TOLD HER THAT SHE NEEDED A NUMBER, BUT SHE INSISTED ON BEING HEARD. ALL THIS WHILE I STOOD WAITING - EVEN THOUGH I WAS THE ONE BEING TAKEN CARE OFF AT THE TIME.

PEOPLE SHOULD REALLY LEARN TO WAIT IN LINE AND WAIT THEIR TURN.

THE CITY WORKER BY THE WAY, WAS VERY HELPFUL.

Monday, May 3, 2010

Against use of Psychotronic ( Mind Control ) Weapons. Lawsuit against To...

READ THE DESCRIPTION UNDER THIS VIDEO. CHINESE GANG STALKERS ARE NAMED. THIS IS IN MY AREA.

QUESTION: EXPERIMENTS??? RUN BY WHO??

DR. JOHN HALL ON "MSEYEOPENER" UTUBE CHANNEL TALKS ABOUT CHINESE TECHNOLOGY BEING AVAILABLE ON THE BLACK MARKET.

PS AS I TYPE THIS MY LEFT ARM AND BACK STARTED BURNING LIKE ON FIRE!!! I LIVE IN A MAINLY CHINESE NEIGHBOURHOOD.

WHAT IS DIGITAL ANGEL??

http://www.theforbiddenknowledge.com/hardtruth/digital_angel.htm

EXCERPTED FROM ABOVE LINK:

.Digital Angel: The New Eye in the SkySAVED FROM THIS SITEhttp://www.foxnews.com/vtech/101600/da.smlMonday, October 16, 2000
By Michael Della Bitta
Here's a story that will do the bar code on the back of Dark Angel star Jessica Alba's neck one better:
A network of satellites sends a positioning signal to a chip implanted beneath your skin. That chip, powered solely by body heat, relays the signal and your body's vital stats to a ground station.
The folks manning that ground station, as well as 'authorized' [WONDER WHO THAT COULD BE?] Internet users, can use that information for identifying you, tracking you and monitoring your health.
It's not sci-fi. Applied Digital Solutions (ADS) will, on Oct. 30, unveil and demonstrate Digital Angel, or DA, which is being touted for a number of uses.
There's the potential for the technology to monitor chronically-ill patients, track livestock to ensure food quality, track people who are at-risk for kidnapping, enforce the terms of a parole and identify people for security and ''e-commerce'' applications.
The Digital Angel system makes use of the Global Positioning System's network of satellites to figure out the chip's position. On-board biometric technology is capable of monitoring vital statistics such as body temperature, pulse rate and blood pressure. This information is then relayed via either another GPS signal or a wireless communications signal to a remote monitoring system.
The whole system is powered by body heat, so the chip doesn't have any batteries that need replacing. "The power source is building power all the time," says Richard Sullivan, Applied Digital Solutions' CEO.
"In drawing together the GPS and wireless capabilities and the first-ever integration of biosensor and heat-sensitive power regeneration," he says, "we should become the benchmark of the industry — we should become the industry leader in that area
."

Subdermal Silicon
While implantation under the skin in humans is an issue still pending with the Food and Drug Administration, that won't delay the release of Digital Angel. "I think that FDA approval is, in the interim, not necessary because DA can be a wristband or adhered to anywhere on your body via a patch," says Sullivan.
But make no mistake — implantation is on the way. According to Sullivan, the FDA is first interested in implanting livestock with the chip so the quality of meat can be ensured.
Digital Angel doesn't transmit a signal all the time. Ordinarily, the only way the chip would be activated would be by a controlling authority — a parent in the case of a kidnapping, an owner in the case of a theft, a doctor in the case of an ill patient.
"If you call upon it, it emits the appropriate information that's requested. And/or in the case of an emergency, it has low-line minimums that cause DA to turn on automatically," says Sullivan. These minimums would activate the chip in an emergency — a heart attack, for example.
Throw Away Your Credit Cards?
Since Applied Digital Solutions is 'primarily' an 'e-commerce solutions' company, one way the company wants to see the chip used is for identification and authentication for 'electronic commerce'.[Rev 13:17] so that no one could buy or sell except one who had the stamped image of the beast's name or the number that stood for its name.]As Sullivan puts it, "You want to access and go online with your MSN or AOL account, you'll have DA transmitting your profile at request."
The same could be true for Amazon and any other electronic retailer. One-click shopping is somewhat obsolete when competing against something that identifies you by your mere presence.
Saved for the Archives

WHAT IS A VIOLENT PERSON'S LIST

http://www.gangstalkingunited.com/2010/03/the-list/
EXCERPTED FROM ABOVE LINK:

The List
How do you get placed on a list?
There are a few ways.
*Someone reports you as a drug dealer, terrorist, pedophile, crazy. They report an incident. A community investigation is opened.
In a normal society this should go on for a few months and be over with, but in the case of Jiverly Wong, this went on for close to 20 years, and in the lives of many others it goes on for years as well, never ending, and it’s used to harass an innocent person.
http://gangstalkingworld.com/Media/2009/04/jiverly-wong/
*The workplace. Someone reports a violent incident. You create a harassment complaint, they decide that you are just delusional and decide that you might go violent. A report is filed.
I should add that based on what I have come across in the research, it seems as if workplaces and educational facilities are routinely using this as a retaliatory method. They use it to target people who file complaints. Most workers have no idea that such lists exist.
http://gangstalkingworld.com/Media/2007/03/leuren-moret/
[quote]My great-est gift was the discovery of my inner strength to be able to survive the retaliation, mobbing and harassment by the Livermore Lab, the University of California and the Oakland police department.[/quote]
[quote]I learned that more than 500 women and minorities had filed lawsuits against the University of California and had then experienced retaliation by the University of California apparatus of mobbing by employees, alumni and law enforcement.1The lawsuits were for denial of tenure, whistleblower retaliation and theft of intel-lectual property. These women had similar complaints about the destruction of their own lives and careers. The information gathered by the University of California is used to takeyour life apart; to destroy all that makes you feel safe; to bankrupt, isolate and alienate you from society and from yourself; and to attempt to make you look crazy.[/quote]
http://www.harassment101.com/Article5.html
[quote]Crosty and Murtagh don’t know each other. It is unlikely their worlds would ever intersect, but they have at least one thing in common. They both are victims of an increasingly popular employer weapon against whistleblowers: the psychiatric reprisal.
Across the United States, companies have seized upon concerns about workplace violence to quash dissent. Hundreds of large corporations have hired psychiatrists and psychologists as consultants to advise them on how to weed out “threatening” employees. They say they are only responding to a 1970 directive from the U.S. Occupational Safety and Health Administration that they maintain a “safe and secure work environment.” But by drawing the definition of “threatening” as broadly as possible, they are giving themselves a new club to bang over the heads of workers.[/quote]
This is not just happening in American workplaces either.
*Universities are also reporting people, and filing reports.
In the workplace and universities, from what I have seen quite a few outspoken females are getting targeted. Minorities, and other single individuals. Men that are smart outspoken, and ofcourse the whistle-blowers. Many I assume who are not aware of the system that is currently in place. If this is the case could informants be specifically targeting non informants for harassment, or using this program specifically to weed out from the universities, and workplaces, the outspoken, radicals, whistle-blowers, non compliant?
From previous research I know that colleges and universities have been infiltrated with these types of agents, along with the normal citizen informants. Could some be working an alternative agenda?
http://www.spying101.com/
[quote]Spying 101: The RCMP’s Secret Activities at Canadian Universities, 1917-1997
If you attended a Canadian university in the past eighty years, it’s possible that, unbeknownst to you, Canadian security agents were surveying you, your fellow students, and your professors for ’subversive’ tendencies and behaviour. Since the end of the First World War, members of the RCMP have infiltrated the campuses of Canada’s universities and colleges to spy, meet informants, gather information, and on occasion, to attend classes. Why they were there is the subject of a new book by Steve Hewitt.[/quote]
A lot of the targeting starts with mobbing, harassment, the target tries to file a complaint, get’s targeted more. Maybe they say something, lash out, or just seem angry due to the mobbing. This system is being used unfairly, just like we saw with some zero tolerance programs, that were used to specifically target minority children.
http://www.peoplesvoice.ca/articleprint12/02_BLACK-FOCUSED_SCHOOL_GOES_AHEAD_IN_TORONTO.htmlhttp://www.thestar.com/News/article/201456
[quote]While critics are holding their applause until they see the changes, the move is being hailed by some who say the Safe Schools Act unfairly targets black youth and drives them into gangs.[/quote]
Most of the targets seem to come from these three areas. Workplace, Educational outlets, and the community.
In Canada and the U.S. they have workplace safety and standards guidelines that are similar to what is in place in the U.K. Similar reporting systems to what the U.K. has in place.
As we saw in the Jane Clift case, once on a list, your name pops up if you call the police, ambulance, doctors, ect. Employers, Landlords and a variety of others are given similar information about you.
In the U.K. this marker can be something that the victim is made aware of, but in other instances they are not.
In the U.K. this is being abused. Jane Clift being one example.

http://www.dailymail.co.uk/news/article-1195399/Woman-branded-potentially-violent-council-complaining-damaged-flowerbed.html

[quote]Mrs Clift added: ‘What is terrifying is that there is almost no proof required and no hearing to determine the truth of the allegation. It could happen to anybody who gets into even the most minor disagreement with their council.’
[/quote]
http://www.dailymail.co.uk/news/article-1193210/Woman-sues-libel-council-labelled-potentially-violent-complaining-vandalised-flowerbed.html
[quote]She said that after the council acted, she sensed that everywhere she went, there was ‘whispering, collaboration, people scurrying about’.
‘One time I went to the contraceptive clinic and I felt that there were way too many people hovering about for me than should have been there, making me feel very insecure.
‘It did serve as a reminder that everywhere I went – hospitals, GPs, libraries – anywhere at all, even if I phoned the fire service, as soon as my name went on to that system, it flagged up ‘violent person marker, only to be seen in twos, medium risk’.’[/quote]
Canada and the U.S. have similar lists, that employers, schools must report.
Most communities as shown before have networks of informants. These informant networks are working with other community programs.
http://www.albionmonitor.com/9711b/policing.html
“Ruling the community with an iron fist. “Savvy law enforcement types realized that under the community policing rubric, cops, community groups, local companies, private foundations, citizen informants and federal agencies could form alliances without causing public outcry.” Covert Action Quarterly, summer 1997.”
blog.aclu.org/2009/04/30/mass-con-fusion/#more-5320
“You mean to tell me that it is legal for corporations from the private sector to team up with local law enforcement officials in efforts to spy on innocent members of our society? You also mean to tell me that the synthesis of law enforcement authority and the drive of for-profit companies operate under little to no guidelines or restrictions and it is unclear to whom they are responsible to?”
In addition to these newly formed alliances, as the ACLU has pointed out, they are openly spying on innocent members of our society.
Informants due to various police initiatives are in every community.
These networks operate and are in place, using the one handed sign language. The informants then feel empowered, they patrol the neighbourhoods, and other areas. Since these networks are already in place, it is therefore not necessary to hire hundreds of people to follow one person, they just go about their regular patrols, and once a target enters their place of employment, business, community, or other location, the citizens are placed on alert.
http://gangstalkingworld.com/Media/2010/02/informant-signals/
To the target it seems as if hundreds of people have been hired to follow just them, but the reality is, this informant network is and has been in place, and once you are on the radar, they just shift attention to you.
Eg. In Stasi Germany a large part of the state was devoted to spying, if the state added one more target, they did not need to hire hundreds of people, the network is already in place.
This can be done with phone calls, I have seen this happen, the community you are in is alerted that a pedophile, mentally disturbed person, drug dealer is in their area. They get phone calls as you pass through the area, thus some will go stand out on the porch to be visual look out, report back what you are doing.
The foot patrols alert the business, thus why we are followed into stores, they use the one handed sign language, maybe stay to see if there is an incident they can make themselves useful for and report. In other cases, they are around to create an incident, and report that.
Keep in mind that the very concept of being monitored and under this kind of surveillance 24/7 is enough to make any sane person act out. Add to this that the informants are told to circle you, sit near to you, follow you, and they don’t try to do it very subtly, a target is bound to notice.
Somewhere along the lines our societies were taken over. We helped. Without firing a bullet, or invasion, these countries have become what East Germany and other countries were.
The gaslighting of targets is illegal. Yet in WWII we saw a government create over 500 ways to mess with Nazi sympathisers. Similar tactics were used under VIK.
http://www.guardian.co.uk/uk/2006/aug/19/military.secondworldwar
[quote]BSC invented a game called “Vik”, described as “a fascinating new pastime for lovers of democracy”. Printed booklets described up to 500 ways of harassing and annoying Nazi sympathisers. Players of Vik were encouraged to ring up their targets at all hours of the night and hang up. Dead rats could be put in water tanks, air could be let out of the subject’s car tyres, anonymous deliveries could be made to his house and so on.[/quote]
If they had a game that consisted of 500 ways to harass and annoy, people then, what do you think they have now. Remember this game was invented by a UK government branch, to be used against innocent Americans.
The police, firefighters, community members are all in on it. Just like Nazi Germany, they have this false sense of community, that they are doing something good. Yeah we got that crazy drug dealer out of town. We protected our community. In reality you drove someone like Jiverly Wong to the point that the was capable of mass murdering lot’s of people. Yeah you, don’t you feel good about yourselves?
These programs are not all bad, back in the day, that is what you did. If a pedophile was in town, you took some community action to get rid of the pervert, and never gave it a second thought you were protect yours, and that was that.
It’s a not in my back yard mentality. Even if you move you are still flagged, so the same thing starts again. If each area is set up like this, which many are due to community Policing, and agenda 21, then we will see more of this in the future.
http://www.youtube.com/watch?v=TzEEgtOFFlM
http://www.nikiraapana.com/community_activism.html
[quote]What is alternative community activism?
When I first started going to my American neighborhood “meetings” I was a complete novice in Soviet style bureaucracy. I was confused and unsure about what was going on. I began by asking simple questions about the terms the leaders were using to descibe their “vision.” This opened Pandora’s Box, literally, because much to my suprise and dismay, my Seattle government representatives did not know what their terms meant either!
I was absolutely floored to find out somebody, somewhere had come up with this bizarre idea that a few of my neighbors should partner with the Pentagon, the KGB and the Mossad, and together they would form neighborhood policing “task teams.” These new neighborhood committees, led by “new” Community Policing Officers trained in communitarianism, were empowered to rewrite Seattle Municipal Code. They claimed revisions to the law were necessary to “balance” our constitutional rights against the “health and safety” of the community. Yet, these “experts” couldn’t tell me the definition for any of their terms, and couldn’t tell me where these new ideas had originated. It took me a year of intensive research to find their source: Dr. Amitai Etzioni.[/quote]
Though this might be still happening in some cases, the targets I come across are innocent. The lack of oversight of these programs, means that it’s being used to destroy innocent lives. The citizen informants never give it a second thought. Many never see the dirty under handed, smoke and mirrors used to set up targets to make them look crazy, like drug dealers, or pedophiles. They just unquestioningly believe what they are told.
I come across a lot of Woman that are single where this is being used to shut them up, rape them in other cases, and drive them to suicide or mental institutions in other.
I hear cases of abusive ex’s that got someone targeted. If you know how the system works you can manipulate it.
I come across minorities, who feel this is being used to target them. Lot’s of minority men and women.
I also come across whistle blowers. This is being used to target them.
The staged incidents and gaslighting are illegal, but since it’s crazies, pedophiles, drug dealers, who is going to believe them? The moment you call the cops too often, they also flag people. So it feels like you against the world literally. You know you are being harassed and followed, but most lawyers will not help, just like when McCarthyism was happening. The ACLU will not help. These programs do have a specific degree of secrecy, but not so that they outweigh the rule of law and justice.
Again this system is being used across the board, so I have come across people with extreme views, conspiracy views, where this was used. Anyone outspoken, who is not following the status quo, this can be used against. Just like it was in Russia.
I think legal is the best way to go.
Use the U.K. example, find a lawyer who will confirm that there is such a list in your area, and then try to find the procedure if you are on such a list for getting off. The woman in the U.K. spent four years, clearing her name, and that was with proof that she was on a list. Most don’t have such proof.
Remember each area does it’s own thing, each person feels individually empowered to monitor the target the way they see fit. In many cases this includes electronic monitoring/harassment.
In addition to that, these people try to play James Bond, and in addition to innocent citizens who are just trying to do a good job, and protect their communities from being taken over by bad elements, you also have complete morons, and psychopaths in others cases, who are given access to innocent individuals who in most cases have no idea what is going on.
Pushing for legislation that makes it mandatory to alert people that they are on such lists might help in some cases. This is close enough, that legally we should be looking into this channel.
Remember the ACLU has confirmed investigations of innocent individuals are happening. In the U.K. they have exposed how the anti-terror laws are being abused, to include full investigation of individuals.
http://www.guardian.co.uk/commentisfree/henryporter/2010/feb/01/ripa-act-surveillance-authorities
[quote]A freedom of information request by the Lancashire Evening Post has found that applications made by Lancashire county council under Ripa laws targeted cleaners who failed to show up for work and a care assistant who claimed too much on travel expenses. “A person in Chorley thought to be selling counterfeit goods via eBay, people pursuing false personal injury claims, and a retailer selling furniture not up to fire safety standards were among those investigated using powers granted under the act,” the paper reported.
In last year’s annual report, the surveillance commissioner, Sir Christopher Rose, raised concerns about direct surveillance such as the bugging of public places, taking photographs of suspects and the use of covert human intelligence such as informants and undercover agents. Of course this has always been part of police investigation into serious crime, but it is frightening to see these tactics routinely deployed in trivial circumstances.
His fears came to mind when I read a quote in the LEP from Jim Potts, a trading standards officer, who said: “We have simply recorded that a member of staff has seen another member of staff do something at work, in the way that managers can and do every day.” How easily that trips from Potts’s lips, but what of course he is unwittingly justifying is the informant society. In Staffordshire a FoI request made of the police by the Express and Star newspaper found that terror laws were being used to monitor drug dealers, people suspected of sex crimes, burglars and thieves. In 10 cases police tracked people suspected of minor public order offences.[/quote]
Many of our citizen informants that we encounter on the road, just think they are part of some great powerful network keeping dangerous people at bay. Then there are those who know the real game, those who set up targets. Also just like Germany, you have informants who bait targets, so they can act out. If they do it’s another marker, or jail, or a mental hospital, maybe even death. Remember the more crazy people, drug dealers, pedophiles, terrorists, the more funding, the bigger the network.
Employees and others have been using this practice for years, to destroy lives. Woman, minorities, whistle-blowers seem to be prime targets, but it’s not limited to them. If you read Leuren Mowet’s story, she knew 500 people, who had similar investigations opened on them, which was used to systemically destroy their lives.
If you look at the article make a stink see a shrink you will see that psychiatric reprisals is being heavily used in democratic countries.
If you visit the site Psychologist Ethics, you will see that psychiatrists were even willing to try to have one of their own declared as crazy, just because she blew the whistle.
http://www.PsychologistEthics.net http://gangstalkingworld.com/Forum/YaBB.pl?num=1205028541
[quote]MORE ABOUT POLITICAL PSYCHOLOGY § ^When one imagines using mental health professionals to target undesirable individuals, one almost always thinks of totalitarian governments such as the former USSR, China, and Cuba. There is a long and ugly precedent of using mental health professionals in those societies to target politically undesirable people and have them placed in mental institutions involuntarily. Human rights groups refer to this practice as “political psychiatry.”
Victims of political psychiatry are usually people who have filed grievances or complaints against employers or officials, or are union organizers, people who have publicly criticized officials, members of minority religions, and whistle-blowers.[/quote]
But this is now happening in democratic countries.
[quote]CASES OF POLITICAL PSYCHOLOGY § ^Southern Illinois University and the American Psychological Association (APA)
A Canadian Police Department and the Canadian College of Psychologists
Lisa Blakemore-Brown and the British Psychological Society (BPS) [/quote]
[quote]In this case, the psychologist made an unsubstantiated assessment of the faculty member based solely on what the faculty member’s “enemies” had said about her. The psychologist made no effort to verify any of the rumors she had heard and instead wrote them as fact in her reports and made recommendations based on them. As part of the counseling and conflict resolution process, the psychologist also carried on e-mail communication with the faculty member but forwarded this communication to the university’s administration without the faculty member’s knowledge or permission. The psychologist never told the faculty member that there would be any limits to confidentiality nor did she tell her what process she would be following or that she would be writing reports to the administration. Obviously, if there had been any legitimacy to the psychologist’s conclusions and report, the matter would have been handled privately and compassionately by the university’s human resources staff.[/quote]
http://scientific-misconduct.blogspot.com/2007/01/lisa-blakemore-brown-colleagues-weigh.html
In the case of Lisa Blakemore-Brown the damage could have been far worst had not some bloggers picked up on what was happening.
[quote]Dr Rita Pal has weighed-in on the scandal of Lisa Blakemore Brown and the British Psychological Society (backstory here and here). Dr Pal has become an expert on the bullying of individuals by professional regulatory bodies through the abuse of mental health diagnosis after she was subjected to a campaign of intimidation by the General Medical Council [Link to court judgment]. The concerns that Dr Pal raised that led to her abuse (about patient maltreatment in a Midlands hospital – Link) have not to this date been properly addressed. She subsequently brought proceedings against the GMC, leading to a landmark judgment in which the GMC was described as a totalitarian regime by Judge Charles Harris – “Anybody who criticises it is said to be prima facie mentally ill – what used to happen in Russia”.[/quote]
The system is now routinely being used to destroy enemies of the state, people with views and opinions that the state does not like and the destruction of these innocent lives are being done with the help in many cases of other unwitting citizens.
Years of research have been spent trying to expose these systemic misconducts. Others have noticed them in their areas of research, some noting that the best and brightest are beint targeted, and still nothing gets done.
http://gangstalkingworld.com/Forum/YaBB.pl?num=1205738832/0
I still believe that awareness and exposure are still key, in getting what is happening exposed. I do think when targets can afford to do so they should seek legal help, but in order to do so, they have to have an idea of what is being used against them.

I WENT INTO YAHOO AND CLICKED ON THE MAIL LINK AND INSTEAD OF MAIL I GOT...

A HEADLINE THAT SAID LYNN REDGRAVE DIED AT AGE 67. COINCIDENTALLY, MY BROTHER WHO HAS JUST HAD HIS FRIEND HAD A HEART ATTACK IN FRONT OF HIM LAST WEEK AND IS DYING, HAD A "STOMACH FLU" THAT THE DOCTORS COULD NOT FIND A CAUSE FOR (VOMITING, VERTIGO, DIARRHEA, HEADACHES) IS ALSO 67 YEARS OLD. NOTHING WRONG IN THE HEADLINE, BUT I HAD ACTUALLY CLICKED MAIL AND THE NEWS LINK WAS NOT EVEN NEAR THIS LINK.

THERE ARE EXTREMELY HIGH RADIATION LEVELS IN MY BROTHER'S HOME AND A VARIETY OF DISHES AND ANTENNAS ON THE HIGH RISE OLD AGE HOME DIRECTLY OPPOSITE HIS HOUSE. (I TESTED IT WITH A ZAP CHECKER-THIS WAS ALSO TRUE AROUND MY MOTHER WHO LIVED WITH MY BROTHER AND WHO DIED OF A HEART ATTACK TWO YEARS AGO)

THE NEXT DOOR NEIGHBOUR RECENTLY DIED OF LIVER CANCER, MY MOTHER DIED OF A HEART ATTACK, THE NEXT NEIGHBOUR HAD A BLOOD DISEASE, AND THE LIST GOES ON AND ON FOR RECENT DEATHS ON HIS STREET.

NOW SEE THIS VIDEO OF PEOPLE BEING RADIATED IN THEIR HOMES. (WE ARE HINDUS)

http://www.youtube.com/user/MsEYEOPENER#p/u

AS SOON AS I POSTED THE LAST ENTRY..

I HAD A REALLY PAINFUL HEAD ACHE RADIATING FROM THE RIGHT EAR AND TOP OF HEAD. I COVERED THE AREA WITH MICROWAVE SHEILDING AND AFTER AN HOUR THE HEAD ACHE SUBSIDED.

SEE
http://www.youtube.com/user/marsboy683#p/u/6/Py5RsmB3lSk

DOES GANGS HAVE THIS TYPE OF TECHNOLOGY IN THIS COUNTRY???

Issues of MindControl PART 2 - Dr. Rauni-Leena Luukanen Kilde - Nyhetssp...

LISTEN TO THIS DOCTOR TALK ABOUT MICROWAVE HARASSMENT. ALSO LISTEN TO THE OTHER PARTS OF THIS INTERVIEW.

LAST NIGHT THE RADIATION AROUND ME WAS SO HIGH, THAT MY BODY WAS LITERALLY ON FIRE. MY SKIN IS STILL BURNING THIS MORNING. THESE AREAS ARE SHOWING UP AS BLOOD RED IN THERMAL IMAGING IN MY NEW IPOD NANO THAT COMES WITH THIS FEATURE. MY RADIATION DETECTOR WENT NUTS BESIDE ME. THE SAME HAPPENED WHEN I WAS DRIVING YESTERDAY. AS I AM TYPING THIS MY BACK IS PULSING IN PAIN IN EXACT RYTHME WITH THE PULSES IN MY MICROWAVE DETECTOR.

HERE IS AS WHAT I LEARNED FROM MY BROTHER YESTERDAY. HIS FRIEND HAD FLU LIKE SYMPTOMS AND HAD A HEART ATTACK IN FRONT OF HIM.

MY FRIEND HAD 3 HEART ATTACK DEATHS IN A MATTER OF MONTHS IN HER FAMILY.

MY STOMACH CRAMPS UP WHENEVER THE RADIATION IS HIGH AROUND ME. THIS HAPPENS VERY FREQUENTLY WHEN IN BED - IN FACT EVERY NIGHT IN THE LAST MONTHS. MY NEPHEW HAVE BEEN HAVING STOMACH PROBLEM FOR A YEAR NOW.

NOW GO TO WWW.FREEDOMFCHS.COM AND UTUBE CHANNEL "helenkurdin" and "MsEYEOPENER"

Sunday, May 2, 2010

PSYCHOTRONIC WARFARE ON A GLOBAL BASIS

http://www.redicecreations.com/specialreports/2005/09sep/firewallbrain.html
EXCERTPED FROM ABOVE:

The human body, much like a computer, contains myriad data processors. They include, but are not limited to, the chemical-electrical activity of the brain, heart, and peripheral nervous system, the signals sent from the cortex region of the brain to other parts of our body, the tiny hair cells in the inner ear that process auditory signals, and the light-sensitive retina and cornea of the eye that process visual activity.[2] We are on the threshold of an era in which these data processors of the human body may be manipulated or debilitated. Examples of unplanned attacks on the body's data-processing capability are well-documented. Strobe lights have been known to cause epileptic seizures. Not long ago in Japan, children watching television cartoons were subjected to pulsating lights that caused seizures in some and made others very sick.
Defending friendly and targeting adversary data-processing capabilities of the body appears to be an area of weakness in the US approach to information warfare theory, a theory oriented heavily toward systems data-processing and designed to attain information dominance on the battlefield. Or so it would appear from information in the open, unclassified press. This US shortcoming may be a serious one, since the capabilities to alter the data- processing systems of the body already exist. A recent edition of U.S. News and World Report highlighted several of these "wonder weapons" (acoustics, microwaves, lasers) and noted that scientists are "searching the electromagnetic and sonic spectrums for wavelengths that can affect human behavior."[3] A recent Russian military article offered a slightly different slant to the problem, declaring that "humanity stands on the brink of a psychotronic war" with the mind and body as the focus. That article discussed Russian and international attempts to control the psycho-physical condition of man and his decisionmaking processes by the use of VHF-generators, "noiseless cassettes," and other technologies.
An entirely new arsenal of weapons, based on devices designed to introduce subliminal messages or to alter the body's psychological and data-processing capabilities, might be used to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the various sensory and data-processing systems of the human organism. In both cases, the goal is to confuse or destroy the signals that normally keep the body in equilibrium.
This article examines energy-based weapons, psychotronic weapons, and other developments designed to alter the ability of the human body to process stimuli. One consequence of this assessment is that the way we commonly use the term "information warfare" falls short when the individual soldier, not his equipment, becomes the target of attack.
Information Warfare Theory and the Data-Processing Element of Humans
In the United States the common conception of information warfare focuses primarily on the capabilities of hardware systems such as computers, satellites, and military equipment which process data in its various forms. According to Department of Defense Directive S-3600.1 of 9 December 1996, information warfare is defined as "an information operation conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries." An information operation is defined in the same directive as "actions taken to affect adversary information and information systems while defending one's own information and information systems." These "information systems" lie at the heart of the modernization effort of the US armed forces and other countries, and manifest themselves as hardware, software, communications capabilities, and highly trained individuals. Recently, the US Army conducted a mock battle that tested these systems under simulated combat conditions.
US Army Field Manual 101-5-1, Operational Terms and Graphics (released 30 September 1997), defines information warfare as "actions taken to achieve information superiority by affecting a hostile's information, information based-processes, and information systems, while defending one's own information, information processes, and information systems." The same manual defines information operations as a "continuous military operation within the military information environment that enables, enhances, and protects friendly forces' ability to collect, process, and act on information to achieve an advantage across the full range of military operations. [Information operations include] interacting with the Global Information Environment . . . and exploiting or denying an adversary's information and decision capabilities."[4]
This "systems" approach to the study of information warfare emphasizes the use of data, referred to as information, to penetrate an adversary's physical defenses that protect data (information) in order to obtain operational or strategic advantage. It has tended to ignore the role of the human body as an information- or data-processor in this quest for dominance except in those cases where an individual's logic or rational thought may be upset via disinformation or deception. As a consequence little attention is directed toward protecting the mind and body with a firewall as we have done with hardware systems. Nor have any techniques for doing so been prescribed. Yet the body is capable not only of being deceived, manipulated, or misinformed but also shut down or destroyed--just as any other data-processing system. The "data" the body receives from external sources--such as electromagnetic, vortex, or acoustic energy waves--or creates through its own electrical or chemical stimuli can be manipulated or changed just as the data (information) in any hardware system can be altered.
The only body-related information warfare element considered by the United States is psychological operations (PSYOP). In Joint Publication 3-13.1, for example, PSYOP is listed as one of the elements of command and control warfare. The publication notes that "the ultimate target of [information warfare] is the information dependent process, whether human or automated . . . . Command and control warfare (C2W) is an application of information warfare in military operations. . . . C2W is the integrated use of PSYOP, military deception, operations security, electronic warfare and physical destruction."[5]
One source defines information as a "nonaccidental signal used as an input to a computer or communications system."[6] The human body is a complex communication system constantly receiving nonaccidental and accidental signal inputs, both external and internal. If the ultimate target of information warfare is the information-dependent process, "whether human or automated," then the definition in the joint publication implies that human data-processing of internal and external signals can clearly be considered an aspect of information warfare. Foreign researchers have noted the link between humans as data processors and the conduct of information warfare. While some study only the PSYOP link, others go beyond it. As an example of the former, one recent Russian article described offensive information warfare as designed to "use the Internet channels for the purpose of organizing PSYOP as well as for `early political warning' of threats to American interests."[7] The author's assertion was based on the fact that "all mass media are used for PSYOP . . . [and] today this must include the Internet." The author asserted that the Pentagon wanted to use the Internet to "reinforce psychological influences" during special operations conducted outside of US borders to enlist sympathizers, who would accomplish many of the tasks previously entrusted to special units of the US armed forces.
Others, however, look beyond simple PSYOP ties to consider other aspects of the body's data-processing capability. One of the principal open source researchers on the relationship of information warfare to the body's data-processing capability is Russian Dr. Victor Solntsev of the Baumann Technical Institute in Moscow. Solntsev is a young, well-intentioned researcher striving to point out to the world the potential dangers of the computer operator interface. Supported by a network of institutes and academies, Solntsev has produced some interesting concepts.[8] He insists that man must be viewed as an open system instead of simply as an organism or closed system. As an open system, man communicates with his environment through information flows and communications media. One's physical environment, whether through electromagnetic, gravitational, acoustic, or other effects, can cause a change in the psycho-physiological condition of an organism, in Solntsev's opinion. Change of this sort could directly affect the mental state and consciousness of a computer operator. This would not be electronic war or information warfare in the traditional sense, but rather in a nontraditional and non-US sense. It might encompass, for example, a computer modified to become a weapon by using its energy output to emit acoustics that debilitate the operator. It also might encompass, as indicated below, futuristic weapons aimed against man's "open system."
Solntsev also examined the problem of "information noise," which creates a dense shield between a person and external reality. This noise may manifest itself in the form of signals, messages, images, or other items of information. The main target of this noise would be the consciousness of a person or a group of people. Behavior modification could be one objective of information noise; another could be to upset an individual's mental capacity to such an extent as to prevent reaction to any stimulus. Solntsev concludes that all levels of a person's psyche (subconscious, conscious, and "superconscious") are potential targets for destabilization.
According to Solntsev, one computer virus capable of affecting a person's psyche is Russian Virus 666. It manifests itself in every 25th frame of a visual display, where it produces a combination of colors that allegedly put computer operators into a trance. The subconscious perception of the new pattern eventually results in arrhythmia of the heart. Other Russian computer specialists, not just Solntsev, talk openly about this "25th frame effect" and its ability to subtly manage a computer user's perceptions. The purpose of this technique is to inject a thought into the viewer's subconscious. It may remind some of the subliminal advertising controversy in the United States in the late 1950s.
US Views on "Wonder Weapons": Altering the Data-Processing Ability of the Body
What technologies have been examined by the United States that possess the potential to disrupt the data-processing capabilities of the human organism? The 7 July 1997 issue of U.S. News and World Report described several of them designed, among other things, to vibrate the insides of humans, stun or nauseate them, put them to sleep, heat them up, or knock them down with a shock wave.[9] The technologies include dazzling lasers that can force the pupils to close; acoustic or sonic frequencies that cause the hair cells in the inner ear to vibrate and cause motion sickness, vertigo, and nausea, or frequencies that resonate the internal organs causing pain and spasms; and shock waves with the potential to knock down humans or airplanes and which can be mixed with pepper spray or chemicals.[10]
With modification, these technological applications can have many uses. Acoustic weapons, for example, could be adapted for use as acoustic rifles or as acoustic fields that, once established, might protect facilities, assist in hostage rescues, control riots, or clear paths for convoys. These waves, which can penetrate buildings, offer a host of opportunities for military and law enforcement officials. Microwave weapons, by stimulating the peripheral nervous system, can heat up the body, induce epileptic-like seizures, or cause cardiac arrest. Low-frequency radiation affects the electrical activity of the brain and can cause flu-like symptoms and nausea. Other projects sought to induce or prevent sleep, or to affect the signal from the motor cortex portion of the brain, overriding voluntary muscle movements. The latter are referred to as pulse wave weapons, and the Russian government has reportedly bought over 100,000 copies of the "Black Widow" version of them.[11]
However, this view of "wonder weapons" was contested by someone who should understand them. Brigadier General Larry Dodgen, Deputy Assistant to the Secretary of Defense for Policy and Missions, wrote a letter to the editor about the "numerous inaccuracies" in the U.S. News and World Report article that "misrepresent the Department of Defense's views."[12] Dodgen's primary complaint seemed to have been that the magazine misrepresented the use of these technologies and their value to the armed forces. He also underscored the US intent to work within the scope of any international treaty concerning their application, as well as plans to abandon (or at least redesign) any weapon for which countermeasures are known. One is left with the feeling, however, that research in this area is intense. A concern not mentioned by Dodgen is that other countries or non-state actors may not be bound by the same constraints. It is hard to imagine someone with a greater desire than terrorists to get their hands on these technologies. "Psycho-terrorism" could be the next buzzword.
Russian Views on "Psychotronic War"
The term "psycho-terrorism" was coined by Russian writer N. Anisimov of the Moscow Anti-Psychotronic Center. According to Anisimov, psychotronic weapons are those that act to "take away a part of the information which is stored in a man's brain. It is sent to a computer, which reworks it to the level needed for those who need to control the man, and the modified information is then reinserted into the brain." These weapons are used against the mind to induce hallucinations, sickness, mutations in human cells, "zombification," or even death. Included in the arsenal are VHF generators, X-rays, ultrasound, and radio waves. Russian army Major I. Chernishev, writing in the military journal Orienteer in February 1997, asserted that "psy" weapons are under development all over the globe. Specific types of weapons noted by Chernishev (not all of which have prototypes) were:
A psychotronic generator, which produces a powerful electromagnetic emanation capable of being sent through telephone lines, TV, radio networks, supply pipes, and incandescent lamps.
An autonomous generator, a device that operates in the 10-150 Hertz band, which at the 10-20 Hertz band forms an infrasonic oscillation that is destructive to all living creatures.
A nervous system generator, designed to paralyze the central nervous systems of insects, which could have the same applicability to humans.
Ultrasound emanations, which one institute claims to have developed. Devices using ultrasound emanations are supposedly capable of carrying out bloodless internal operations without leaving a mark on the skin. They can also, according to Chernishev, be used to kill.
Noiseless cassettes. Chernishev claims that the Japanese have developed the ability to place infra-low frequency voice patterns over music, patterns that are detected by the subconscious. Russians claim to be using similar "bombardments" with computer programming to treat alcoholism or smoking.
The 25th-frame effect, alluded to above, a technique wherein each 25th frame of a movie reel or film footage contains a message that is picked up by the subconscious. This technique, if it works, could possibly be used to curb smoking and alcoholism, but it has wider, more sinister applications if used on a TV audience or a computer operator.
Psychotropics, defined as medical preparations used to induce a trance, euphoria, or depression. Referred to as "slow-acting mines," they could be slipped into the food of a politician or into the water supply of an entire city. Symptoms include headaches, noises, voices or commands in the brain, dizziness, pain in the abdominal cavities, cardiac arrhythmia, or even the destruction of the cardiovascular system.
There is confirmation from US researchers that this type of study is going on. Dr. Janet Morris, coauthor of The Warrior's Edge, reportedly went to the Moscow Institute of Psychocorrelations in 1991. There she was shown a technique pioneered by the Russian Department of Psycho-Correction at Moscow Medical Academy in which researchers electronically analyze the human mind in order to influence it. They input subliminal command messages, using key words transmitted in "white noise" or music. Using an infra-sound, very low frequency transmission, the acoustic psycho-correction message is transmitted via bone conduction.[13]
In summary, Chernishev noted that some of the militarily significant aspects of the "psy" weaponry deserve closer research, including the following nontraditional methods for disrupting the psyche of an individual:
ESP research: determining the properties and condition of objects without ever making contact with them and "reading" peoples' thoughts
Clairvoyance research: observing objects that are located just beyond the world of the visible--used for intelligence purposes
Telepathy research: transmitting thoughts over a distance--used for covert operations
Telekinesis research: actions involving the manipulation of physical objects using thought power, causing them to move or break apart--used against command and control systems, or to disrupt the functioning of weapons of mass destruction
Psychokinesis research: interfering with the thoughts of individuals, on either the strategic or tactical level
While many US scientists undoubtedly question this research, it receives strong support in Moscow. The point to underscore is that individuals in Russia (and other countries as well) believe these means can be used to attack or steal from the data-processing unit of the human body.
Solntsev's research, mentioned above, differs slightly from that of Chernishev. For example, Solntsev is more interested in hardware capabilities, specifically the study of the information-energy source associated with the computer-operator interface. He stresses that if these energy sources can be captured and integrated into the modern computer, the result will be a network worth more than "a simple sum of its components." Other researchers are studying high-frequency generators (those designed to stun the psyche with high frequency waves such as electromagnetic, acoustic, and gravitational); the manipulation or reconstruction of someone's thinking through planned measures such as reflexive control processes; the use of psychotronics, parapsychology, bioenergy, bio fields, and psychoenergy;[14] and unspecified "special operations" or anti-ESP training.
The last item is of particular interest. According to a Russian TV broadcast, the strategic rocket forces have begun anti-ESP training to ensure that no outside force can take over command and control functions of the force. That is, they are trying to construct a firewall around the heads of the operators.
Conclusions
At the end of July 1997, planners for Joint Warrior Interoperability Demonstration '97 "focused on technologies that enhance real-time collaborative planning in a multinational task force of the type used in Bosnia and in Operation Desert Storm. The JWID '97 network, called the Coalition Wide-Area Network (CWAN), is the first military network that allows allied nations to participate as full and equal partners."[15] The demonstration in effect was a trade fair for private companies to demonstrate their goods; defense ministries got to decide where and how to spend their money wiser, in many cases without incurring the cost of prototypes. It is a good example of doing business better with less. Technologies demonstrated included:[16]
Soldiers using laptop computers to drag cross-hairs over maps to call in airstrikes
Soldiers carrying beepers and mobile phones rather than guns
Generals tracking movements of every unit, counting the precise number of shells fired around the globe, and inspecting real-time damage inflicted on an enemy, all with multicolored graphics[17]
Every account of this exercise emphasized the ability of systems to process data and provide information feedback via the power invested in their microprocessors. The ability to affect or defend the data-processing capability of the human operators of these systems was never mentioned during the exercise; it has received only slight attention during countless exercises over the past several years. The time has come to ask why we appear to be ignoring the operators of our systems. Clearly the information operator, exposed before a vast array of potentially immobilizing weapons, is the weak spot in any nation's military assets. There are few international agreements protecting the individual soldier, and these rely on the good will of the combatants. Some nations, and terrorists of every stripe, don't care about such agreements.
This article has used the term data-processing to demonstrate its importance to ascertaining what so-called information warfare and information operations are all about. Data-processing is the action this nation and others need to protect. Information is nothing more than the output of this activity. As a result, the emphasis on information-related warfare terminology ("information dominance," "information carousel") that has proliferated for a decade does not seem to fit the situation before us. In some cases the battle to affect or protect data-processing elements pits one mechanical system against another. In other cases, mechanical systems may be confronted by the human organism, or vice versa, since humans can usually shut down any mechanical system with the flip of a switch. In reality, the game is about protecting or affecting signals, waves, and impulses that can influence the data-processing elements of systems, computers, or people. We are potentially the biggest victims of information warfare, because we have neglected to protect ourselves.
Our obsession with a "system of systems," "information dominance," and other such terminology is most likely a leading cause of our neglect of the human factor in our theories of information warfare. It is time to change our terminology and our conceptual paradigm. Our terminology is confusing us and sending us in directions that deal primarily with the hardware, software, and communications components of the data-processing spectrum. We need to spend more time researching how to protect the humans in our data management structures. Nothing in those structures can be sustained if our operators have been debilitated by potential adversaries or terrorists who--right now--may be designing the means to disrupt the human component of our carefully constructed notion of a system of systems.

Followers