UN Starts Investigation to Ban Cyber Torture

.

UN Starts Investigation to Ban Cyber Torture

Magnus Olsson, Geneva 8 March 2020                                                                                                

UN Human Rights Council (HRC) Special Rapporteur on torture revealed during the 43rd HRC that Cyber technology is not only used for internet and 5G. It is also used to target individuals remotely – through intimidation, harassment and public shaming. 

On the 28th of February in Geneva, Professor Nils Melzer, UN Special Rapporteur on Torture and other Cruel Inhuman Degrading Treatment and Punishment, has officially confirmed that cyber torture exists and investigation is now underway on how to tackle it legally.

Electromagnetic radiation, radar, and surveillance technology are used to transfer sounds and thoughts into people’s brain. UN started their investigation after receiving thousands of testimonies from so-called “targeted individuals” (TIs).

Professor Nils Melzer is an expert in international law and since 2016 he holds the Human Rights Chair at the Geneva Academy of International Humanitarian Law and Human Rights. His team has found evidence that Cyber technology is used to inflict severe mental and physical sufferings.

“Judges think that physical torture is more serious than cruel, inhuman or degrading treatment,” he told the Guardian on 21 February. “Torture is simply the deliberate instrumentalization of pain and suffering.” These psychological torture methods are often used “to circumvent the ban on torture because they don’t leave any visible marks”. (1)

Cyber psychological systems like cognitive radio are used to interrupt human perceptions and memory. They can also be used to spy on people violating personal integrity which could lead to corruption and slavery in society. Cyber torture is also called no-touch torture or brain-machine interface.

One way to handle this situation is to regulate new technologies and use AI control mechanisms by independent and impartial investigators. The evidence gathered could then be used to convict criminals easier and quicker in the future.

Professor Meltzer and his team is now underway to create an international legal framework covering cyber technologies that can cause torture which previously was hard to prove. In the future it may be necessary to establish Radio Frequency Spectrum police in order to protect humanity from cyber terrorism. Nils Meltzer also revealed to me personally that the HRC will release several reports on this subject soon in the future.

  1. Owen Bowcott, ‘UN warns of rise of ‘cybertorture’ to bypass physical ban’ (The Guardian, March 2020)      https://www.theguardian.com/law/2020/feb/21/un-rapporteur-warns-of-rise-of-cybertorture-to-bypass-physical-ban?fbclid=IwAR0mIvFNEpODW8KspG0XulW8MqkmzSSiO2gskQOgHicfxRjCTgKWV3vjlh0

On February 28, 2020, the UN Special Rapporteur on Torture, Professor Nils Melzer, issued his World Report on “Torture and other cruel, inhuman or degrading treatment or punishment.” This report included a definition of “Cybertorture,” the Crime Against Humanity where millions of targeted victims worldwide are remotely assaulted with Electromagnetic Weapons in actions directed via computer, often from Supercomputers.

(A/HRC/43/49) Cybertorture:

1. A particular area of concern, which does not appear to have received sufficient attention, is the possible use of various forms of information and communication technology (“cybertechnology”) for the purposes of torture. Although the promotion, protection and enjoyment of human rights on the internet has been repeatedly addressed by the Human Rights Council (A/HRC/32/L.20; A/HRC/38/L.10/Rev.1), torture has been understood primarily as a tool used to obstruct the exercise of the right to freedom of expression on the internet, and not as a violation of human rights that could be committed through the use of cybertechnology.

2. This seems surprising given that some of the characteristics of cyber-space make it an environment highly conducive to abuse and exploitation, most notably a vast power asymmetry, virtually guaranteed anonymity, and almost complete impunity. States, corporate actors and organized criminals not only have the capacity to conduct cyberoperations inflicting severe suffering on countless individuals, but may well decide to do so for any of the purposes of torture. It is therefore necessary to briefly explore, in a preliminary manner, the conceivability and basic contours of what could be described as “cybertorture”.

3. In practice, cybertechnology already plays the role of an “enabler” in the perpetration of both physical and psychological forms of torture, most notably through the collection and transmission of surveillance information and instructions to interrogators, through the dissemination of audio or video recordings of torture or murder for the purposes of intimidation, or even live streaming of child sexual abuse “on demand” of voyeuristic clients (A/HRC/28/56, para.71), and increasingly also through the remote control or manipulation of stun belts (A/72/178, para.51), medical implants and, conceivably, nanotechnological or neurotechnological devices.1 Cybertechnology can also be used to inflict, or contribute to, severe mental suffering while avoiding the conduit of the physical body, most notably through intimidation, harassment, surveillance, public shaming and defamation, as well as appropriation, deletion or manipulation of information.

4. The delivery of serious threats through anonymous phone calls has long been a widespread method of remotely inflicting fear. With the advent of the internet, State security services in particular have been reported to use cybertechnology, both in their own territory and abroad, for the systematic surveillance of a wide range of individuals and/or for direct interference with their unhindered access to cyber technology.2 Electronic communication services, social media platforms and search engines provide an ideal environment both for the anonymous delivery of targeted threats, sexual harassment and extortion and for the mass dissemination of intimidating, defamatory, degrading, deceptive or discriminatory narratives.

5. Individuals or groups systematically targeted by cybersurveillance and cyberharassment are generally left without any effective means of defence, escape, or self-protection and, at least in this respect, often find themselves in a situation of “powerlessness” comparable to physical custody. Depending on the circumstances, the physical absence and anonymity of the perpetrator may even exacerbate the victim’s emotions of helplessness, loss of control, and vulnerability, not unlike the stress-augmenting effect of blindfolding or hooding during physical torture. Likewise, the generalized shame inflicted by public exposure, defamation and degradation can be just as traumatic as direct humiliation by perpetrators in a closed environment.3 As various studies on cyber-bullying have shown, already harassment in comparatively limited environments can expose targeted individuals to extremely elevated and prolonged levels of anxiety, stress, social isolation and depression, and significantly increases the risk of suicide.4 Arguably, therefore, much more systematic, government-sponsored threats and harassment delivered through cybertechnologies not only entail a situation of effective powerlessness, but may well inflict levels of anxiety, stress, shame and guilt amounting to “severe mental suffering” as required for a finding of torture.5

6. More generally, in order to ensure the adequate implementation of the prohibition of torture and related legal obligations in present and future circumstances, its interpretation should evolve in line with new challenges and capabilities arising in relation to emerging technologies not only in cyberspace, but also in areas such as artificial intelligence, robotics, nanotechnology and neurotechnology, or pharmaceutical and biomedical sciences, including so-called “human enhancement”.

1. Al Elmondi, “Next-generation nonsurgical neurotechnology”, Defense Advanced Research Projects Agency, available at www.darpa.mil/p…/next-generation-nonsurgical-neurotechnology.

2 See Human Rights Council resolutions 32/13 and 38/7. See, most notably, the 2013 disclosures by Edward Snowden of the global surveillance activities conducted by the United States National Security Agency and its international partners, see Ewan Macaskill and Gabriel Dance, “NSA files: decoded – what the revelations mean for you”, The Guardian, 1 November 2013.

3 Pau Pérez-Sales, “Internet and torture” (forthcoming).

4 Ann John and others, “Self-harm, suicidal behaviours, and cyberbullying in children and young people: systematic review”, Journal of Medical Internet Research, vol. 20, No. 4 (2018); Rosario Ortega and others, “The emotional impact of bullying and cyberbullying on victims: a European cross-national study”, Aggressive Behavior, vol. 38, No. 5 (September/October 2012).

5 Samantha Newbery and Ali Dehghantanha, “A torture-free cyber space: a human right”, 2017.

European Human Brain Project, and Pentagon ADVISOR REVEALS CONSCIOUS A.I. SUPERCOMPUTERS USED FOR MIND CONTROL

European Human Brain Project

 ADVISOR REVEALS CONSCIOUS A.I. SUPERCOMPUTERS USED FOR MIND CONTROL 

DARPA, European Human Brain Project, and Pentagon advisor Dr. James Giordano describes neuronanorobotic Brain to computer interface mind control weapons for remote monitoring and manipulation of brains neural circuitry. This allows an individuals consciousness to be cloned.

This allows an individuals consciousness to be cloned onto a their very own digital avatar in a Sentient World Simulation on a supercomputer. A direct link between a targeted individual and their digital avatar exists so that everything done in the real world occurs in the computer simulation. By manipulating the digital avatar in the computer simulation a persons thoughts, beliefs, perceptions, and behavior are manipulated in the real world. This is remote mind control. 21st Century MK ULTRA. This is not a conspiracy theory. This is not a joke. This is the real life matrix! For more of my videos on this topic click the links below: Enter the matrix: They Control Your Mind Through Your Virtual Avatar In The Sentient World Simulation.

https://youtu.be/Hn_kb6b6_F4 THE SENTIENT WORLD BRAIN SIMULATION OF HUMAN CONSCIOUSNESS https://youtu.be/LheNcnuEbng MK ULTRA 2019 REMOTE MIND CONTROL THROUGH AMAZON CIA CLOUD COMPUTING ELECTRONIC BRAIN LINK https://youtu.be/6L8pwVcNwQk SOURCES 1. BRAIN TO CLOUD COMPUTER INTERFACE USING NEURALNANOROBOTICS: https://www.frontiersin.org/articles/… 2. Human Systems Roadmap Review https://defenseinnovationmarketplace…. 3. Sentient World Simulation (SWS): A Continuously Running Model of the Real World https://krannert.purdue.edu/academics… 4. DETERRENCE IN THE 21st CENTURY: AN EFFECTS-BASED APPROACH IN AN INTERCONNECTED WORLD: http://nsiteam.com/social/wp-content/… 5. UNMANNED SYSTEMS INTEGRATED 2017-2042 DEFENSE RESEARCH AND ENGINEERING: https://www.defensedaily.com/wp-conte… 6. Official US defence and NATO documents confirm that autonomous weapon systems will kill targets, including civilians https://www.blacklistednews.com/The_P… 7. Big Data, Analytics & Artificial Intelligence The Future of Health Care is Here http://newsroom.gehealthcare.com/wp-c…

Znalezione obrazy dla zapytania weapons 5 g

Invited presentation by Magnus Olsson at the 2017 First Annual Unity and Hope Conference

Invited presentation by Magnus Olsson

“Invited presentation by Magnus Olsson, at the 2017 First Annual Unity and Hope Conference” This event was for targeted individuals and those concerned about the growing crimes of electronic harassment.

The conference was held from October 20-22 at the Mass Audubon Blue Hills Trailside Museum: 1904 Canton Ave., Milton, MA 02186, USA. This presentation was co-produced by Mårten Hernebring. The speaker, Magnus Olsson, can be reached at bionicgate@live.se Event Description from the Conference Web Site: “Our goal is to bring together as many support groups, media shows, activism groups, and organizations of targeted individuals, so we can work together and learn from each other and strategize on solutions to bring about change and end the suffering of hundreds of thousands of victims nationwide.

The number of people experiencing electronic harassment and gang-stalking is growing exponentially daily. Our hope is to come together, to build, empower, and educate the community on technology, resources, and support, and as a unified front attempt to educate the public. As a result of this conference, we will be able to strategically fight for freedom and justice for the victims of targeted crimes.

The goal of this conference is to unify all the groups worldwide and provide a knowledge and understanding of the program and the technology. We also strongly encourage targeted individuals to bring friends and family for support and to educate the ones around them on what invisible crimes are being committed against them.”

Brain Invaders (Jesse Ventura)

Jesse Ventura Brain Invaders

Ventura interviews a group of so-called “targeted individuals” (or “TIs”) – people who claim that they are being manipulated and tortured by mind-control signals after they have spoken out against the government.

He further looks into the technology that could be behind these attacks, such as microwave transmitting GWEN towers, and meets with insiders who claim to have worked on and developed the technology for the government that began with Project MKUltra.

military brain

 –