Magnus Olsson launches World Coalition against transhumanist neural robotoid agenda

 

Magnus Olsson launches World Coalition against transhumanist neural robotoid agenda         

<iframe width=”640″ height=”360″

World Coalition against Covert Harassment (WorldCACH)

mind brain

STATEMENT OF GARY OWEN

It was Sunday 28th of February 2016, Magnus Olsson was staying at my house in Spain, I had been appointed the Vice President of World CACH 2 days before. We were planning the roll out of the World CACH, deciding the agenda of the organisation, we had a great day on the Saturday, we appointed the technical director, spoke to one of our legal team Alfred Lambremont Webre, he’s the guy that won the war crimes tribunal against Tony Blair and George Bush. We explained that what we wanted to do with World CACH was to set up a Global Intelligence Service that acts for the people against the Governments and security services that no longer represent the people, and take the Masons who have infiltrated all levels of the government and security Services to the war crimes tribunal for genocide and racketeering against the population of earth. He thought both ideas were sensational and invited us to go on his show the following day, which would go out to 250,000 people.

On the Sunday, I started hearing the high pitched noise again in my ear I had not heard it for a few days, since Magnus arrived, and all of a sudden it was back along with the voice to skull. We were to meet for lunch with some people and later talk on Skype with William Binney and then do the show with Alfred where we would break the news to the world about what we were doing. It was only 30 minutes to the lunch meeting and I had heard nothing from Magnus, so I went down to the apartment he was staying in below my house. I knocked on the door and he answered saying he needed medical help, he was in a terrible state. He was physically shacking none stop, and his face was bright red with a high temperature.

mind control

After some phone calls we decided to go to the emergency Chemist and get some pain killers and antibiotics as it looked like a virus. The Chemist said we should go to the emergency doctors in the town, by this time I was having to support Magnus while he walked, he was on the verge of passing out none stop.

Four doctors in the emergency room at Torrox looked at him and did all the tests they could and found nothing wrong. But they agreed something was wrong, so we were dispatched to the main hospital in Valez. I arrived at the emergency entrance, Magnus was no longer able to walk, they put him in a wheel chair. He was fading in and out and incoherent. After 2 hours we got to see a very proficient doctor, he was very thorough. Magnus had come round a little after drinking two litres of cold water. I thought the worst was over, Magnus was dispatched for X-rays and 12 blood tests, we did the X-rays first, no problems, then we went to do the blood tests, half way through taking the blood, they took a lot of blood, about 6 tubes, all of a sudden Magnus took a severe turn for the worse, it started by Magnus telling me that he was going to pass out. I tried to explain this to the Spanish nurse. Then he went as white as snow, all over, his face was pure porcelain white and I noticed that his hands were the same. I was instructed by the nurse to wave his hat in front of his face to try and revive him, his eyes rolled back into his head and you could only see white eyes and a white face it was shocking. By this time the nurse was in a sheer panic and the doctor that had seen him was called.

Before the doctor could arrive, Magnus started to have muscle spasms all over his body, they started on his spine, and spread all over, he was put on a gurney and was contorted and jerking all over the place with his eyes rolled back in his head. It was clear he would die of a heart attack if they did not stop it, they pressed the emergency button and doctors came from everywhere, he was wheeled at speed to the ICU Critical Emergency ward. They stripped of his cloths and by now there was a dozen people trying to figure out what was wrong.

I heard the original doctor tell the others that Magnus was working with CIA whistle blowers, we had explained a bit about the organisation to the doctor during the initial examination. They dismissed it and moved on, they could find nothing wrong. They injected him with Diazepam a strong muscle relaxant. He was in critical for two hours, during the first part I took a picture, I had taken several others, so I could put them on the World CACH facebook site later.

The last photo I took one of the doctors went crazy and threatened me to take no pictures and if any of the pictures I had taken were made public I would be charged by the police. This escalated and security arrived, one more sensible doctor said would you be OK to delete them, as you’re not allowed to take photos in a Spanish hospital. There were no signs saying you couldn’t.

I agreed to delete them rather than be arrested, I was taken to the public waiting room, three hours went by. A man arrived and told me I could visit Magnus, I was taken through, he was looking better but had an oxygen mask on, and was drained. I was told that in a few hours provided he remained stable he could leave, he was put on an intravenous antibiotic and saline drip. They dosed him up with the anti-biotics and gave me a prescription for a weeks long course and some diazepam in case the spasms started again.

After 7 hours in there we left, Magnus was back but very weak. The doctors told me that every test they did showed nothing, everything was exactly normal through the whole process. They agreed something was wrong but they did not know what it was. The whole day I had a strong high pitched noise whistling in my ear that is part of the Gangstaklking they are perpetrating on people now.

You have to ask yourself about the coincidences involved.

1/ Magnus and I were not being attacked like normal until we decided to Form a Global Intelligence Service for the people against the governments. Then we were both attacked.

2/ Nothing was found to be wrong with Magnus at all.

3/ That day we were to go on video and announce the plan to the TI world.

4/ We were making significant progress on the roll out of World CACH, talking to the leaders around the world of the individual country CACHs. Appointing the technical director. Getting the war tribunals accepted by a judge.

On the way home I started to wonder if we could not get the images back from the camera so I asked a young tech guy Alex Axon to see if it was possible, and a few hours later he had recovered three images and all the thumb nails. They were a bit degraded but we now have the images.

Magnus Olsson at Hospital ICU Critical Room - Feb. 28, 2016

Magnus Olsson at Hospital ICU Critical Room – Feb. 28, 2016

Magnus in ICU Critical Unit

 

          

What a day!

Gary Owen

World Coalition against Covert Harassment (WorldCACH)

We’ll be uploading our entire MINDS to computers by 2045

We’ll be uploading our entire MINDS to computers by 2045 and our bodies will  be replaced by machines within 90 years, Google expert claims

  • Ray Kurzweil,  director of engineering at Google,  believes we will be able to upload our entire brains to computers within the  next 32 years – an event known as singularity
  • Our ‘fragile’ human body parts will be  replaced by machines by the turn of the century
  • And if these predictions comes true, it  could make humans immortal

By  Victoria Woollaston

PUBLISHED: 14:22 GMT, 19  June 2013 |  UPDATED: 14:22 GMT, 19 June 2013

In just over 30 years, humans will be able to  upload their entire minds to computers and become digitally immortal – an event  called singularity – according to a futurist from Google.

Ray Kurzweil, director of engineering at  Google, also claims that the biological parts of our body will be replaced with  mechanical parts and this could happen as early as 2100.

Kurweil made the claims during his conference  speech at the Global Futures 2045 International Congress in New York at the  weekend.

Scroll down  for video

Ray Kurzweil - director of engineering at Google - claims that by 2045 humans will be able to upload their entire minds to computers and become digitally immortal - an event called singularityRay Kurzweil – director of engineering at Google –  claims that by 2045 humans will be able to upload their entire minds to  computers and become digitally immortal – an event called singularity. He made  the statement at the Global Futures 2045 International Congress in New York

WHAT IS  SINGULARITY?

Technological singularity is the development  of  ‘superintelligence’ brought about through the use of technology.

The first use of the term ‘singularity’ refer  to technological minds was by mathematician John von Neumann. Neumann in the  mid-1950s.

He said: ‘ever accelerating progress of  technology and changes in the mode of human life, which gives the appearance of  approaching some essential singularity in the history of the race beyond which  human affairs, as we know them, could not continue.’

The term was then used by science fiction  writer Vernor Vinge who believesbrain-computer interfaces are causes of the  singularity.

Ray Kurzweil cited von Neumann’s use of the  term in a foreword to von Neumann’s classic The Computer and the  Brain.

Kurzweil predicts the singularity to occur  around 2045 while Vinge predicts it will happen before  2030.

The conference was created by Russian  multimillionaire Dmitry Itskov and featured visonary talks about how the world  will look by 2045.

Kurzweil said: ‘Based on conservative  estimates of the amount of computation you need to functionally simulate a human  brain, we’ll be able to expand the scope  of our intelligence a  billion-fold.’

He referred to Moore’s Law that states the  power of computing doubles, on average, every two years quoting the developments  from genetic sequencing and 3D printing.

In Kurweil’s book, The Singularity Is Near,  he plots this development and journey towards singularity in a graph.

This singularity is also referred to as  digital immortality because brains and a person’s intelligence will be digitally  stored forever, even after they die.

He also added that this will be possible  through neural engineering and referenced the recent strides made towards  modeling the brain and technologies which can replace biological  functions.

Examples of such technology given  by LiveScience include the cochlear implant – an implant that is attached to the brain’s  cochlear nerve and electronically stimulates it to restore hearing to someone  who is deaf.

Other examples include technology that can  restore motor skills after the nervous system is damaged.

Also at the conference, Ray Kurzweil, pictured, said that 'frail, biological parts' of human bodies will be replaced with 'non-biological' parts in the future. Ray Kurzweil, pictured, said that ‘frail, biological parts’ of human bodies will be replaced with ‘non-biological’ parts in the future. He added that the non-biological part will become so powerful it can completely model and understand the biological part and make it redundant

Earlier this year, doctors from Cornell  University used 3D printing to create a prosthetic ear using cells of  cartilage.

A solid plastic mould was printed and then  filled with high-density collagen gel.The researchers then added cartilage cells  into the collagen matrix.

Kurweil was invited to the conference because  he has previously written books around the idea of singularity.

Expanding on this idea Martine Rothblatt, CEO  of biotech company United Therapeutics introduced the idea of  ‘mindclones’.

These are digital versions of humans  that  can live forever and can create ‘mindfiles’ that are a place to store aspects of  our personalities.

She said it would run on a kind of software  for consciousness and told The Huffington  Post: ‘The first company that  develops mindware will have  [as much success as] a thousand  Googles.’

Rothblatt added that the presence of mindware  could lead to replacing other parts of the body with ‘non-biological’ parts.

During Kurzweil's conference talk, and in his book The Singularity Is Near, he refers to Moore's Law of Computing, pictured.During Kurzweil’s conference talk, and in his book The  Singularity Is Near, he refers to Moore’s Law of Computing, pictured. The law  claims that the power of computing doubles, on average, every two years which  puts us on course for singularity by 2045

This is a concept that Kurweil also discussed  and was the basis of his book Fantastic Voyage.

In this book he discusses immortality and how  he believes the human body will develop.

He said: ‘We’re going to become increasingly  non-biological to the point where the non-biological part dominates and the  biological part is not important any more.

‘In fact the non-biological part – the  machine part – will be so powerful it can completely model and understand the  biological part. So even if that biological part went away it wouldn’t make any  difference.

DIGITAL AVATARS USED TO CURE  SCHIZOPHRENIA

An avatar system that can help schizophrenics  control the voices in their heads is being developed by British  researchers.

As part of the therapy, patients create an  avatar by choosing a face and a voice for the person, or persons, they believe  are inside their head.

Therapists can then encourage the patients to  oppose the avatar and force it away, which boosts their confidence in dealing  with their hallucinations.

The first stage in the therapy is for  the  patient to create a computer-based avatar, by choosing the face and  voice of  the entity they believe is talking to them.

The system then synchronises the  avatar’s  lips with its speech, enabling a therapist to speak to the  patient through the  avatar in real-time.

The therapist encourages the patient to  oppose the voice and gradually teaches them to take control of their  hallucinations.

The avatar doesn’t address the patients’  delusions directly but the study found the hallucinations improve as an  overall effect of the therapy.

This is because patients  can interact with the avatar as though it was a real person, because they  have  created it, but they know it cannot harm them.

comtermind

Many of the voices heard by schizophrenics  threaten to kill or harm them and their family.

‘We’ll also have non-biological bodies – we  can create bodies with nano technology, we can create virtual bodies and virtual  reality in which the virtual reality will be as realistic as the actual reality.

‘The virtual bodies will be as detailed and  convincing as real bodies.

‘We do need a body, our intelligence is  directed towards a body but it doesn’t have to be this frail, biological body  that is subject to all kinds of failure modes.

‘But I think we’ll have a choice of bodies,  we’ll certainly be routinely changing our parent body through virtual reality  and today you can have a different body in something like Second Life, but it’s  just a picture on the screen.

‘Research has shown that people actually  begin to subjectively identify with their avatar.

‘But in the future it’s not going to be a  little picture in a virtual environment you’re looking at. It will feel like  this is your body and you’re in that environment and your body is the virtual  body and it can be as realistic as real reality.

‘So we’ll be routinely able to change our  bodies very quickly as well as our environments. If we had radical life  extension only we would get profoundly bored and we would run out of thing to do  and new ideas.

‘In additional to radical life extension  we’re going to have radical life expansion.

‘We’re going to have million of virtual  environments to explore that we’re going to literally expand our brains – right  now we only have 300 million patterns organised in a grand hierarchy that we  create ourselves.

‘But we could make that 300 billion or 300  trillion. The last time we expanded it with the frontal cortex we created  language and art and science. Just think of the qualitative leaps we can’t even  imagine today when we expand our near cortex again.’

VIDEO: Ray Kurzweil – Immortality by 2045

Read more: http://www.dailymail.co.uk/sciencetech/article-2344398/Google-futurist-claims-uploading-entire-MINDS-computers-2045-bodies-replaced-machines-90-years.html#ixzz2gTpgDHuH Follow us: @MailOnline on Twitter | DailyMail on Facebook

Your Future Brain-Machine Implant: Ultrasonic Neural Dust

Your Future Brain-Machine Implant: Ultrasonic Neural  Dust

Imagine thousands of particle-sized CMOS chips living in  your brain.

158317681

Remember those slender gleaming spikes Keanu Reeves and pals jacked into the  backs of their noggins to go virtual-reality tripping in The Matrix?  That’s certainly an image: prong-to-brain networking, your neurons serviced by  skewer.

But then the movies — what can you do? The future of brain-machine  interfaces may be less, umm, visible if cutting-edge research by scientists at  the University of California Berkeley proves viable.

One of the biggest challenges for brain-machine interfaces (BMI) is how to  create one you could use indefinitely (like for a lifetime). Even in The  Matrix, connecting to the cloud seems awfully inconvenient: sit back in a  chair, stab yourself in the skull. Existing real-world BMI systems are clumsier  still. As KurzweilAI notes: “Current BMI systems are also limited to  several hundred implantable recording sites, they generate tissue responses  around the implanted electrodes that degrade recording performance over time,  and are limited to months to a few years.”

What if, instead, we built entire armies of tiny dust-sized sensor nodes that  could be implanted in the brain (though not autonomously — this isn’t  colonize-your-brain-stem time yet) to facilitate communication of whatever sort,  in this case keeping high-res tabs on neural signals and relaying data back to  aggregation devices via ultrasound?

neural-dust

Dongjin Seo, Jose M.  Carmena, Jan M. Rabaey, Elad Alon, Michel M. Maharbiz /  arXiv.org

Here’s how it might work: First you pop through the skull and the brain’s  dura (the membrane surrounding the brain), dipping into the brain’s neural sea  itself, roughly two millimeters down, where you position thousands of  low-powered CMOS chips (the “neural dust,” each as tiny as millionths of a  meter) to begin capturing neural signals using electrodes and piezoelectric  sensors, which convert the data to ultrasonic signals. Those signals are then  picked up by a sub-dural transceiver (sitting just above the “dust” chips and  simultaneously powering them ultrasonically), which relays the data to an  external transceiver resting just outside the skull (ASIC, memory, battery,  long-range transmitter), which in turn communicates wirelessly with whatever  computing device.

Like most futurist notions, this one hasn’t been tested yet — it’s just a formal proposal —  but it’s another fascinating glimpse into where we might be headed, bypassing  clumsy literal BMI head-jacks for micro-scale interfaces that  would link us, wire-free, to future galaxies of virtual information.

Read more: http://techland.time.com/2013/07/17/your-future-brain-machine-implant-ultrasonic-neural-dust/#ixzz2deJipOmj

To Build a Supercomputer Replica of a Human Brain

The $1.3B Quest to Build a Supercomputer Replica of a Human Brain

  • By Jonathon Keats
  • 05.14.13
  • See all  Pages: 1 2 3

Even by the standards of the TED conference, Henry Markram’s 2009 TEDGlobal talk was a mind-bender. He took the stage of the Oxford Playhouse, clad in the requisite dress shirt and blue jeans, and announced a plan that—if it panned out—would deliver a fully sentient hologram within a decade. He dedicated himself to wiping out all mental disorders and creating a self-aware artificial intelligence. And the South African–born neuroscientist pronounced that he would accomplish all this through an insanely ambitious attempt to build a complete model of a human brain—from synapses to hemispheres—and simulate it on a supercomputer. Markram was proposing a project that has bedeviled AI researchers for decades, that most had presumed was impossible. He wanted to build a working mind from the ground up.

In the four years since Markram’s speech, he hasn’t backed off a nanometer. The self-assured scientist claims that the only thing preventing scientists from understanding the human brain in its entirety—from the molecular level all the way to the mystery of consciousness—is a lack of ambition. If only neuroscience would follow his lead, he insists, his Human Brain Project could simulate the functions of all 86 billion neurons in the human brain, and the 100 trillion connections that link them. And once that’s done, once you’ve built a plug-and-play brain, anything is possible. You could take it apart to figure out the causes of brain diseases. You could rig it to robotics and develop a whole new range of intelligent technologies. You could strap on a pair of virtual reality glasses and experience a brain other than your own.

The way Markram sees it, technology has finally caught up with the dream of AI: Computers are finally growing sophisticated enough to tackle the massive data problem that is the human brain. But not everyone is so optimistic. “There are too many things we don’t yet know,” says Caltech professor Christof Koch, chief scientific officer at one of neuroscience’s biggest data producers, the Allen Institute for Brain Science in Seattle. “The roundworm has exactly 302 neurons, and we still have no frigging idea how this animal works.” Yet over the past couple of decades, Markram’s sheer persistence has garnered the respect of people like Nobel Prize–winning neuroscientist Torsten Wiesel and Sun Microsystems cofounder Andy Bechtolsheim. He has impressed leading figures in biology, neuroscience, and computing, who believe his initiative is important even if they consider some of his ultimate goals unrealistic.

Markram has earned that support on the strength of his work at the Swiss Federal Institute of Technology in Lausanne, where he and a group of 15 postdocs have been taking a first stab at realizing his grand vision—simulating the behavior of a million-neuron portion of the rat neocortex. They’ve broken new ground on everything from the expression of individual rat genes to the organizing principles of the animal’s brain. And the team has not only published some of that data in peer-reviewed journals but also integrated it into a cohesive model so it can be simulated on an IBM Blue Gene supercomputer.

The big question is whether these methods can scale. There’s no guarantee that Markram will be able to build out the rest of the rat brain, let alone the vastly more complex human brain. And if he can, nobody knows whether even the most faithful model will behave like a real brain—that if you build it, it will think. For all his bravado, Markram can’t answer that question. “But the only way you can find out is by building it,” he says, “and just building a brain is an incredible biological discovery process.” This is too big a job for just one lab, so Markram envisions an estimated 6,000 researchers around the world funneling data into his model. His role will be that of prophet, the sort of futurist who presents worthy goals too speculative for most scientists to countenance and then backs them up with a master plan that makes the nearly impossible appear perfectly plausible. Neuroscientists can spend a whole career on a single cell or molecule. Markram will grant them the opportunity and encouragement to band together and pursue the big questions.

And now Markram has funding almost as outsized as his ideas. On January 28, 2013, the European Commission—the governing body of the European Union—awarded him 1 billion euros ($1.3 billion). For decades, neuroscientists and computer scientists have debated whether a computer brain could ever be endowed with the intelligence of a human. It’s not a hypothetical debate anymore. Markram is building it. Will he replicate consciousness? The EU has bet $1.3 billion on it.

Ancient Egyptian surgeons believed that the brain was the “marrow of the skull” (in the graphic wording of a 3,500-year-old papyrus). About 1,500 years later, Aristotle decreed that the brain was a radiator to cool the heart’s “heat and seething.” While neuroscience has come a long way since then, the amount that we know about the brain is still minuscule compared to what we don’t know.

Over the past century, brain research has made tremendous strides, but it’s all atomized and highly specific—there’s still no unified theory that explains the whole. We know that the brain is electric, an intricately connected network, and that electrical signals are modulated by chemicals. In sufficient quantity, certain combinations of chemicals (called neurotransmitters) cause a neuron to fire an electrical signal down a long pathway called an axon. At the end of the axon is a synapse, a meeting point with another neuron. The electrical spike causes neurotransmitters to be released at the synapse, where they attach to receptors in the neighboring neuron, altering its voltage by opening or closing ion channels. At the simplest level, comparisons to a computer are helpful. The synapses are roughly equivalent to the logic gates in a circuit, and axons are the wires. The combination of inputs determines an output. Memories are stored by altering the wiring. Behavior is correlated with the pattern of firing.

Yet when scientists study these systems more closely, such reductionism looks nearly as rudimentary as the Egyptian notions about skull marrow. There are dozens of different neurotransmitters (dopamine and serotonin, to name two) plus as many neuroreceptors to receive them. There are more than 350 types of ion channel, the synaptic plumbing that determines whether a neuron will fire. At its most fine-grained, at the level of molecular biology, neuroscience attempts to describe and predict the effect of neurotransmitters one ion channel at a time. At the opposite end of the scale is functional magnetic resonance imaging, the favorite tool of behavioral neuroscience. Scans can roughly track which parts of the brain are active while watching a ball game or having an orgasm, albeit only by monitoring blood flow through the gray matter: the brain again viewed as a radiator.

Two large efforts—the Allen Brain Atlas and the National Institutes of Health-funded Human Connectome Project—are working at levels in between these two extremes, attempting to get closer to that unified theory that explains the whole. The Allen Brain Atlas is mapping the correlation between specific genes and specific structures and regions in both human and mouse brains. The Human Connectome Project is using noninvasive imaging techniques that show where wires are bundled and how those bundles are connected in human brains.

To add to the brain-mapping mix, President Obama in April announced the launch of an initiative called Brain (commonly referred to as the Brain Activity Map), which he hopes Congress will make possible with a $3 billion NIH budget. (To start, Obama is pledging $100 million of his 2014 budget.) Unlike the static Human Connectome Project, the proposed Brain Activity Map would show circuits firing in real time. At present this is feasible, writes Brain Activity Map participant Ralph Greenspan, “in the little fruit fly Drosophila.”

Even scaled up to human dimensions, such a map would chart only a web of activity, leaving out much of what is known of brain function at a molecular and functional level. For Markram, the American plan is just grist for his billion-euro mill. “The Brain Activity Map and other projects are focused on generating more data,” he writes. “The Human Brain Project is about data integration.” In other words, from his exalted perspective, the NIH and President Obama are just a bunch of postdocs ready to work for him.

NSA Mind Control and Psyops

NSA Mind Control and Psyops 

by Will Filer

nsa

Just click on post:

1. INTRODUCTION
2. TECHNOLOGY  TITLE
3.  APPLICATIONS
    1. Intelligence
   2. Counterintelligence
   3. Behavior Modification and Accelerated Resocialization
4. DEFINITIONS AND ACRONYMS
    1. Age Regression     2. Hypnoamnesia    3. NSA      4. ODO    5. Posthypnotic  Command      6. Posthypnotic  Suggestion    7. Posthypnotic Suggestibility  Index    8. REM DEP      9. Script    10. Somnambulatory  State
    11.   Subliminal Implant
    12. Transceivers (NSA)
5. TECHNOLOGY OVERVIEW
    2. Thought Labels (Response  Labels)
    3. Post-Hypnotic Delivery  Method
    4.   Using the Post-Hypnotic Delivery Method with Thought Labels
6. OTHER REFERENCE  MATERIAL
7. NSA CASE HISTORY EXAMPLE SUMMARIES

   NSA Self-Initiated Execution  (Suicide)
         1.   Bamford’s “The Puzzle Palace”
         2. NSA Initiated   Execution to Cover-up in the News
         3. NSA Initiated Execution to Cover-up in  Music  Curt Cobain
         4. NSA Initiated Executions in Overseas   Defense Project
         5. Musical references of NSA  Technology
         6. NSA Counterintelligence  Experiments  David Koresh   Russell Eugene  Weston
8. NSA BEHAVIORAL MODIFICATION   PROCEDURE:
   1.   ABSTRACT, Behavioral Modification:
    3. BEHAVIORAL   MODIFICATION PROCESS:
        1. Triggering Techniques:
        2. Real-Time Subconscious Implant Delivery:
        3. Prescheduled   Subconscious Implant Delivery:
          4. Event-Triggered (conditional) Implant Delivery:
          5. Stage 1 (Prescreen Evaluation):
         6. Stage 2 (Standard  Process)
             2.  Coincidence
             3. REM Sleep  Deprivation:
4. Shame Factor   Enhancement:
             5. Religious Relevance and Convictions:
               6. Paranoia:
7. Stage 3   (Extreme Process):
    2.   Increasing Dependence on Drugs and Alcohol:
   3. Poor Nutrition:
    4. Apathy:
    5. Depression:
   6. Insecurity:
   7. Journals and   Diaries:
   8. Degrading Spelling and Grammatical Performance: 
   9. Slowed Speech:
10. Confusion:
   11. Poor Concentration:
   12. Loose Association and Personality Disorders:
   13. Anger:
   14. Delusions:
   15. Audio Hallucinations:
   16. Voices in the Subject’s Mind:
   17. Tinnitus (Ear Ringing):
   18. Complete Quiet Silence:
    19. Quiet Wind:
    20. Visual Hallucinations:
   21. Tactile, Olfactory hallucinations and Muscle   Spasms:

 
NSA mind control and psyops
The following was sent to me by Will Filer . It offers a new explanation for government mind control. Will has stated to me that he is a former consultant to the U.S. National Security Agency and asked me to post this information immediately. He also believes he is in immediate danger because of this information.  This was possible Date: 20 Aug 1999 08:50:21 GMT


Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency.

1. INTRODUCTION:
1. The following information is an overview of one area of NSA Intelligence Technology and Applications. A Technology Title, Applications, Technology Description, case history summaries and the NSA’s Behavioral Modification Procedure Outline documented for the non-technical person.

nsa


2. TECHNOLOGY TITLE:
1. Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency. “Computer Simulated Subconscious Speech Language”.


3. APPLICATIONS: 1. Intelligence: 1. Used on foreign and domestic diplomats, spies, and citizens to gather intelligence, steal advanced technology for US Defense applications. Surveys of citizen’s opinions to government events and propaganda. Heavy survey use during times of war, economic strife and political elections. War against drugs. Used to identify investments that have high yield to support clandestine operations. Used to direct field agents without the agents having to carry communications hardware and encryption devices.


2. Counterintelligence: 1. Used on foreign and domestic diplomats, spies, and citizens to identify intelligence operations; scope, participants, communication methods, and weaknesses in individuals, systems, equipment, or signals that can be exploited. Additional applications include misinformation dissemination, confusing and confounding leaders during critical decision moments, distorting significance of various facts to sway decisions and actions in US favor, behavioral modification of foreign spies to betray their loyalties, self initiated executions (suicides).

brain nsa


3. Behavior Modification and Accelerated Resocialization: 1. This technology is used to develop and control spies, political candidates, and other public figures through psychological intimidation, fear and extortion.
2. The NSA uses this technology to resocialize (brainwash) the US civilian voting population into “Giving their lives to Christ” (giving up their personal will and civil rights to the NSA). Each subject is required to maintain a “Personal Relationship with Jesus Christ” (following the precepts of the Bible and doing what is ordered by the NSA). The technology is also used to monitor and optimize NSA employee performance and loyalty.


4. DEFINITIONS AND ACRONYMS:


1. Age Regression: The act of bringing back past memories in a subject though the use of hypnosis. The memories can be very vivid and real in the mind of the subject.


2. Hypnoamnesia: Temporary loss of memory due to a posthypnotic suggestion.

nsa hq
3. NSA: United States National Security Agency, Fort Mead, Maryland.


4. ODO: On-Duty Officer, or officer-on-duty.


5. Posthypnotic Command: Same as Posthypnotic Suggestion. This term “Command” is more commonly used when the hypnosis is forcibly given to the subject and when the subject’s will has been broken down though the use of REM Sleep Deprivation and Suggestibility Index increasing drugs like CNS and Cardiovascular Stimulants. The exposure to extreme REM deprivation and select chemical stimulants cause the subject to have no ability to resist the “Suggestion” any longer thereby making it a “Command”.


6. Posthypnotic Suggestion: A subconscious suggestion or command resident and potentially active in the subject following a hypnotic trance or period of direct access to the subconscious mind.


7. Posthypnotic Suggestibility Index: An index or rating of a subject’s susceptibility and sensitivity to hypnosis.


8. REM DEP: Abbreviation for REM Sleep Deprivation or REM Deprivation. A subject deprived from REM Sleep has multiple symptoms i.e. reduced protein synthesis, black circles around eyes, loss of short term memory, confusion, impulsiveness, anger, frustration, diminished self-esteem, increased suggestibility, reduced productivity, apathy, and depression. Long term REM Deprivation results in death.

operator nsa
9. Script: A carefully constructed series of words arranged in the form of a posthypnotic suggestion. The script will generally consist of four separate parts;
(1) an identifier (subject’s name, description, or other identifying factor), (2) trigger activation condition or conditions (when, what or how the suggestion will trigger), (3) the content (what the trigger will precipitate in the perception of the subject), (4) and a duration (when or under what conditions will it stop or finish). Additional reinforcing scripts are usually added to “strengthen” or reinforce the central posthypnotic command.


10. Somnambulatory State: An abnormal condition of sleep in which motor acts (like walking, running) are performed. This state is typically achieved and a prerequisite to traditional hypnosis.


11. Subliminal Implant: A posthypnotic suggestion successfully delivered to the subject’s subconscious mind.


12. Transceivers (NSA): Nearly microscopic electronic surveillance devices that collect and transmit encrypted audio, color video, and location coordinates collected at the subject site to NSA Satellites that in turn forward it to NSA central intelligence operations. The devices also receive encrypted audio scripts from NSA central intelligence operations through the satellites and deliver it to the subject’s site in the form of a subliminal posthypnotic suggestion. These devices are approximately the size of the head of a straight pin and can be concealed in houses, offices, automobiles, planes, and street corners.


5. TECHNOLOGY OVERVIEW:
1. In addition to the ability to see and hear what is going on inside people’s homes, vehicles, and businesses through the use of nearly microscopic digital surveillance technology, the NSA is able to interrogate and influence a person subconsciously without the knowledge or consent of the subject.


2. Thought Labels (Response Labels): 1. Have you ever watched a baseball game? Did you see the catcher and pitcher communicate using a series of itches, baseball cap rearrangement, and clothing tugs? An elaboration of this communication technique is used by the NSA to detect a fleeting thought in a subject or “read minds” so to speak.
2. Lets discuss how an itch, clothing tug or even an innocent sneeze can be used to label a thought. For simplicity, we will call itches, clothing tugs, sneezes, coughs, or involuntary muscle spasms that are performed during subconscious interrogation “thought labels”.


3. Post-Hypnotic Delivery Method: 1. The NSA combines hypnosis and thought labels to interrogate people without the subject being aware of it. “How can hypnosis be used?” you might ask. The subconscious mind operates at a speed of about 1200 to 1400 words per minute. This is many times faster than the conscious mind that operates at 250 to 450 WPM (words per minute). The posthypnotic script can be spoken at fast conversational speed approximately 250 WPM and a recorder or a computer speeds up the message up to approximately 1200 to 1400 WPM. Remember what happens when you play a 33 rpm record at 78 rpm? The resulting voice sound like the old American cartoon characters the Chipmunks. This is only slightly past doubling (2X) the delivery speed. At speeds as high as 1400 WPM, the voices would sound like a high pitched chattering whine. Remember when the words “Drink Coca Cola” were written on one frame of a movie in a theatre back in the 1960s? The frame rate in movies is played at 30 frames/second. At 1/30th of a second the conscious mind could not recognize the message but the subconscious mind could read it clearly. The audience increased their Coca-Cola consumption by 65% that night resulting in the Federal Government prohibiting subliminal advertising. The following probable reasons for not achieving a higher percentage of subliminal delivery effectiveness (> 65%) are described as follows. In that 1/30th of a second some people were blinking, some people were looking around the theatre, looking at spouses, children, candy, popcorn, etc. or they had sufficiently poor eyesight that they could watch the movie but could not distinguish the small writing clearly.
2. In the early years of this technology, the NSA originally recorded a spoken posthypnotic suggestion message into a tape deck and sped it up by speeding up the tape. This process was labor intensive, required each officer to have excellent diction and mastery of the language and dialect required, and was of poor quality due to background noise and the delay in timing during recording and processing. It also required extensive training to assure that each officer spoke at the same rate of speed so that the resulting “sped-up” script was delivered at the correct speed. Now computers are used to append digitized samples of optimized, ideal phonemes together to form words and the words are sped-up to the correct delivery speed.
Where dialects are present, a different set of base phonemes is used.
3. Currently, to optimize efficiency and accommodate the variety of languages on the planet, phonetic elements from each language and distinct dialect are sampled, digitally edited to optimize them, and appended during delivery to form words and words arranged to make sentences in the from of scripts that resemble hypnotic suggestions.

The empty space between words is minimized and pitch rise is compressed and filtered. Repetitive sine waves are also removed from the phonetic element’s acoustic wave train thus reducing the actual number of sine waves making up a word by 50% or more. This reduces the actual length of the time it takes the phoneme to be delivered prior to accelerating (speeding-up) the delivery (like fast forward). This helps the message to be played at higher speeds and reduces the subject’s ability to recognize it as accelerated speech. The technique of using optimized digitally sampled and edited phonemes appended together to for words and then sentences structured as hypnotic suggestions can be termed “computer simulated subconscious speech language”.
4. The subconscious mind is also very sensitive. It can hear things that the conscious mind ignores. If you have watched television, you have probably noticed that there are many “subliminal tapes” on the market to program your subconscious mind. These tapes have their “messages” recorded/hidden in the sounds of ocean waves, music, or other sounds but they are not sped-up to subconscious delivery speeds and are therefore not very effective. The subconscious mind can hear and discern the message even when there is background noise like waves, cars, planes, or even when someone else is speaking to you in normal conversation. Your conscious mind won’t hear anything unless it is very quite in the house. If you are very attentive you may hear what sounds like a low-pitched tape on fast forward, and played at low volume. This is the sound of the NSA’s high-speed audio subliminal message.
5. This modification of the phonetic elements, played at low volume, combined with the environmental background noise makes it very difficult for a subject to record the NSA message. Even if the subject were to effectively record the message, it is very difficult to filter (separate) the NSA’s message from background noise. Then, reconstructing the missing sine waves from the acoustic wave train and slowing the message down to discern the actual content of the “posthypnotic” script with the conscious mind would be nearly impossible for the average citizen. To briefly summarize, the subject would have no chance in analyzing a NSA message without the following items:
1. Professional state-of-the-art technology recording equipment. 2. Digital acoustic wave editing equipment. 3. Advanced engineering knowledge of acoustic wave science. 4. Phonetics and linguistics expertise. 5. Hypnosis theory and scripting. 6. Ideal environmental conditions for recording. 7. NSA ignorance of the subject’s intent and ability to capture a message.
6. This technology is the perfect intelligence tool. It is nearly impossible to detect or measure, difficult to trace back to the NSA. The symptoms that the NSA can “program” or inflict into the subject can cause fear that they might be thought to be insane if they were to report the NSA activities. The subject does not know the source of the technology or the technology itself, the subject has no proof or evidence, only their perception, suffering, and isolation. Additionally, potential recourses that are available to the subject can be interrogated out and preventative actions taken by the NSA to further isolate or disable the subject.


4. Using the Post-Hypnotic Delivery Method with Thought Labels: 1. The NSA technique is simple; they transmit their human programming message through the audio-visual electronic surveillance equipment installed in your home, car, or office to you. The subliminal message delivered to you could be “Mr. Jones, imagine that the IRS were auditing your taxes. Think back to a time you have cheated on your taxes and that you are worried that the IRS might find out in an audit. If you have never cheated on your taxes and have nothing to fear you will feel an itch on your right-hand ear lobe that will go away when you scratch it. If you can be caught by an IRS audit, you will feel an itch in the left nostril of your nose that will disappear after you itch it twice.” From your perspective, you have just had a fleeting thought about your past tax returns and had an innocent itch (thought label). To the NSA Officer On Duty (ODO), you have just communicated to him whether you have ever:
1) cheated on your taxes, and: 2) If the IRS could catch you in an audit.
2. This is a very oversimplified example of a typical NSA interrogation. Actual interrogation messages may consist of several hundred words and be very complex and sophisticated. Most messages consist of several dozen words. Yes indeed, the NSA has exceeded the wildest expectations of the book “1984”. As you can imagine, the spy world has reached a new plateau that directly affects every person in the USA and abroad. This electronic surveillance system extends down through Mexico, Central America, and deep into populated regions of South America. It also has been installed in Australia, Africa, and the free-world countries in Europe.
3. The NSA’s goal is to have the whole world under its electronic eye by the year 2000. They are almost there now, but are having difficulties with high-tech countries that have the counterintelligence resources to identify the high frequency bursts of microwave transmission from the transceivers. The system also has the ability to take a “voice print” from any person and place it on file. This file can be used to locate the subject later by comparing it to real-time surveillance audio samples received from the field as long as the subject is speaking in close proximity to a transceiver.

If the person is aware that the NSA has this capability and remains silent, the NSA can transmit a periodic worldwide subliminal message that addresses the person by name and causes them to dream and talk in their sleep. After the person talks, the voiceprint would be eventually identified and the person’s location can be identified nearly anywhere in the world. Yes, it is a small world, and getting smaller all the time.


4. This technology was originally conceived under CIA studies and fascination with the power of hypnosis in the late 1950’s and perfected by very early 1960s and implemented with unlimited resources to all areas of vital national security interest first.

Originally, after noting the behavioral effects in visual subliminal effects like the highly publicized event where stating “Drink Coca Cola” on a single movie frame “delivered a higher rates of speed than normal movie viewing raised the obvious question, “Does the human hearing work as good as eyesight accepting subliminal messages?”

Preliminary theory work was transferred to Fort Mead NSA who had expertise in characterizing language in analog domains where a sampled phoneme could be edited (shortened by removing excess sine waveforms from the “acoustic wavetrain”) and electronically reconstructed back into shortened words of language. 

Some of the early experiments included “Remote Viewing at NSA where the Viewer would relax, open their mind and explain the clarity of images that were described by the NSA using this technology. These early experiments allowed the NSA to refine the specifications of the “Computer Simulated Subconscious Speech Language” and the scripting formats to maximize the ability to deliver an accurate “vision or picture” into the subject. Pictures already seen by the subject could simply be recalled using “Age regression” script variations.


6. OTHER REFERENCE MATERIAL:
1. Please refer to the book “Inside America’s Most Secret Agency, The Puzzle Palace” by James Bamford, Published by Houghton Mifflin Company, 1982. This book contains extensive information and references on the NSA’s history and the NSA’s first surveillance system that originally only eavesdropped on telephones and is now expanded to audio-visual.


7. NSA CASE HISTORY EXAMPLE SUMMARIES: NSA Self-Initiated Execution (Suicide): 1. Bamford’s “The Puzzle Palace” references one of the NSA’s first self-initiated execution (suicide) with this “Thought Control” technology they developed. The NSA employee reportedly ran off NSA property saying demons were in his mind and he killed himself.

2. NSA Initiated Execution to Cover-up in the News: 1. A University of California at Berkley student that went into a bar on or around November 27, 1990 took hostages and insisted to the police that the CIA Director talk with him so that he could get relief from the suffering. The young man had sent letters to the president and the CIA but the requests had fallen on deaf ears. After the young man panicked and shot a customer in the bar, a SWAT team fatally shot him, the San Jose police found copies of the letters written to the President referring to people that could “read minds” and that he had learned how they do it. The NSA had been unsuccessfully brainwashing him and had no alternative but to terminate him to assure their security. It is interesting that what was originally broadcast on the news “The gunman was demanding to talk with the Director of the CIA” etc. disappeared quickly (suppressed?) from later news accounts.
3. NSA Initiated Execution to Cover-up in Music: 1. Curt Cobain of the musical group “Nirvana” was another victim of NSA brainwashing and was terminated by NSA. Cobain had started writing clues to the NSA activities into his music to communicate it to his music followers. He referred in music to the NSA as the “Friends inside his head”. Once the NSA puts on the highest level of brainwashing pain, the subject expires quickly. Cobain used heroin to numb and otherwise slow the effect of the brainwashing.
4. NSA Initiated Executions in Overseas Defense Project: 1. Some years back several employees of the United Kingdom’s Government working on a top secret Radar Project committed suicide with no apparent penetration by a hostile government, drug abuse or any other commonality other than working in a secured government project. They were not “Staged” suicides (murders) because some of them happened behind doors that could not be opened from the outside. These men were subjected to the same technology and processes that the U.C. Berkley student, the NSA officer, Curt Cobain, and thousands of others have experienced.
5. Musical references of NSA Technology: 1. Talking Heads; a music group popular in the eighties, wrote a song explaining the scientific process of the NSA’s brainwashing technology in a song called “Wild Wild Life”. The song gave an example of what the audible transmission sounded like at the end of the song (like a tape on fast forward). They mentioned in the song that “They (NSA) talk so fastà” and that the musical group had spent “All their time and money” unsuccessfully trying to find a place that the NSA would not be able to harass them. The Talking Heads exposed the technology, gave an example of what it sounds like, scenarios of how the NSA might select you or the brainwashing, and the scope of the electronic surveillance system.
6. NSA Counterintelligence Experiments: 1. Many experiments were performed by the NSA to determine the conditions and procedures that would be required to turn spies that were trusted by US enemies into assassins that we could invisibly manage. In early experiments, the resulting NSA experimental subjects would get extensive attention in the news because of the horror and unusual nature of the atrocity.
2. One example that comes to mind happened several years ago and created much news. A man became obsessed with his son, poured gasoline on him and ignited it. He had planned to do the same to himself but his desire for survival overpowered the NSA’s behavioral conditioning. After he was imprisoned, he spoke about how all of a sudden his mind became clear and he couldn’t figure out how he could do this crime. The hypnosis was simply removed and the subject was allowed to sleep so that experts studying the file would not find out anything if the subject would have been subjected to traditional hypnotherapy or other psychoanalytical techniques. Another successful counterintelligence experiment completed with no liability or traceability to the NSA.
3. Perhaps ten years ago I read of several elderly people died of sleep deprivation in Florida. The doctors tried everything they could do but could not stop the sleep deprivation that resulted in a 100% effective termination yield. The NSA had developed the right combination of delivered anxiety scripts combined with muscular tension and delivery schedules optimized according to decreasing post hypnotic durability over time as the subject’s health degraded.
4. David Koresh of the Branch Davidians spent many hours talking with FBI negotiators about God and the Bible and finally waited for “God” to tell him what to do in the final hours of the siege. The compound probably had numbers of Personal Journals (required for subjects by the NSA during brainwashing) that could lead to questions about how this cult came to this level. Additionally, just like other loose ends the NSA had to secure, “God spoke to them and said to commit suicide” and they did securing another one of the NSA’s great experiments in mind control and social pathology.
5. A friend of mine, David Sautter and I worked at Singer, Kearfott Division, producing government weapons where we worked under a multitier security system; Company Security, FBI, DIA, and at the top of the ladder watching the watchers; the NSA. I discussed the NSA’s technology with Dave and a few months later, I heard he had committed suicide inside of a locked room. This theme should familiar by now and the details of the case will be destroyed or rewritten by NSA influences to preserve national security.
7. The cases of NSA activities go on and on. With access to the FBI’s Crime Information Center (CIC), we could find several thousand files having the characteristic patterns where the NSA had experimented on the individuals with their “Thought Control” technology.
8. Currently, the NSA has many subjects in the field (our society) that need only a series of “triggers” (carefully constructed posthypnotic scripts) to send them over the edge and on a mission to kill. The NSA calls them “Shooters on a Shelf”. A recent example was Russell Eugene Weston, Jr. that went on a shooting spree at the Capitol around July 26, 1998. He was diagnosed with schizophrenia, had delusions that he had an affiliation with the CIA or FBI and thought a radio-tracking device was planted in his tooth. He was a product of NSA brainwashing. He did not have the ability to recognize the advanced technology even though he knew that “someone” (CIA, FBI, etc.) was communicating with him and that this communication ability spanned across the USA leading him to believe that he had a tracking device planted on him. Because of the real effects of the NSA hypnosis treatments, he therefore reasoned that the schizophrenia medication would not help and so he quit taking it. This was a man desperately trying to alleviate the suffering the NSA inflicted on him.
9. Through the years, I have met thousands of people that have been brainwashed into Christianity to a level where God tells them what to do in their minds (described as a gentle voice by victims) and they mindlessly obey. Yes, they have “Friends inside their heads” also. It appears the Biblical Anti-Christ in the Book of Revelations has arrived and is convincing many subjects that Jesus is back on earth and directing them.


8. NSA BEHAVIORAL MODIFICATION PROCEDURE: 1. The following procedural outline documents typical techniques, processes, explanations, and definitions of the National Security Agency’s Behavioral Modification Procedure using Subliminal Implanted Posthypnotic Suggestions through acoustically delivered phonetically edited language elements combined into scripts without somnambulistic preparation in the subject.
2. In simpler terms, the subject is unknowingly given hypnosis while the subject is completely awake and is tortured and punished with this hypnosis into a predetermined behavior by the National Security Agency. The behavior is usually extremely religious, is called “reborn” by the church, with the subject’s life-long goal of “a personal relationship with Jesus Christ”.


1. ABSTRACT, Behavioral Modification: 1. The NSA’s behavioral modification process starts with identification and qualification of the subject. The NSA used to choose subjects based on the subject’s net present value to the agency in public visibility, financial resources, political clout, or other intelligence and counter-intelligence reasons. Additional considerations are given to minimizing security risks of exposure, the subject’s posthypnotic suggestibility index, the subject’s intelligence and reasoning ability, moral and superstitious beliefs, and the subject’s social status and the weakness of the subject’s primary support groups (family). Now a recent report referenced in the March 26th Business section of the Orange County Register from the National Sleep Foundation reports that 40% of Americans are experiencing sleeping problems. This news could indicate that the NSA is broadening its influence to the greater public. As explained below in this document, the NSA always starts its behavioral modification process with REM Deprivation.
2. After selection, the subject is subjected to long periods of REM Sleep Deprivation and reinforced torturing posthypnotic suggestions that will breakdown the subject’s will, confidence, self-reliance, and moral values. Meanwhile, the subject is increasingly isolated from their familiar and trusted peer groups causing the subject to experience depression, apathy, and ultimately social and financial failure.
3. Typical post-hypnotic induced delusions reported by subjects are tingling in various areas of the body, which are thought to be resulting from microwave beams. Hearing ticks thumps or cracks from walls, ceilings, clocks, lights, etc. Beliefs that the subject’s neighbors are conspiring against them, or that the subject is being followed. Sometimes subjects believe that the various perceptions, feelings and experiences are the result of “Implants” in their body.

It is important for the subjects to understand that the NSA controls this technology from nuclear hardened underground shelters and the neighbors next door have nothing to do with the subject’s experiences. Nobody has the time or inclination to follow a subject around with a microwave gun to tickle various parts of the body. We are saturated with microwaves all the time from television stations, communication satellites, etc and yet we do not have any symptoms because microwaves do not have the ability to trigger localized synaptic responses in our brains. Furthermore, when the subject is in a room surrounded by several people, and the subject is the only one experiencing the “thoughts”, tingling feelings, etc., then obviously a delivery method is being employed that affects only the subject; high-speed acoustic delivered hypnosis.
4. After a while, the subject has an emotional breakdown and a new support group is built around the subject. The new support group is typically a church with doctrines centered in the Bible but the NSA also uses cults and other social groups. The NSA prefers Christian churches because the doctrines allow “God or Jesus to speak directly to the subject” and the negative reinforcement can be attributed with Satan and the positive rewards can be considered to be blessings from God thereby masking the NSA’s technology and processes. When the NSA uses other relationships without in which the subject experiences a religious awakening and “Gives their Life to Christ” and the NSA achieves total control of the subject.
5. The subject is slowly released from the damaging uncomfortable hypnosis and it is replaced with positive rewarding hypnosis as “God and Jesus works in their life”. Soon, the subject has complete loyalty to Jesus (AKA: NSA) and will do anything on command from Jesus (NSA).
6. The subject is required to give daily status reports in the form of prayers in the privacy of their home, office, or car where the NSA’s electronic surveillance system captures and sorts the prayers by “Keywords”. The NSA then delivers additional hypnosis in the form of punishments or rewards or directs the subject accordingly to “God’s will”. If the subject resist’s the NSA’s instructions, additional punishments are inflicted on the subject.
7. The subject is institutionalized in this system where any nonconformances committed by the subject are watched, critiqued, and reported on through prayer by other “Christians” to the NSA. Thus, the new church peer group acts as a behavioral reinforcing mechanism that will bring any of the subject’s problems to the NSA as they have been trained themselves (this is similar to the Nazi Gestapo of World War 2 and other communist approaches).
8. A subject that has successfully completed the NSA’s behavioral modification program lives out the rest of their mediocre life in service to Jesus (NSA) and never causes any waves in the church or news media for fear of reprisal from the NSA. The subject’s lives are relatively unproductive because their focus is on their “Life after death” and not what they accomplish while they are alive. They avoid “worldly activities”, and usually are confused and disjointed in rational thoughts and concepts. For instance, they don’t believe in anything that is not in the Bible, i.e. dinosaurs, evolution, space travel, even though they ride on airplanes and watch television both of which are not referenced in the Bible.


3. BEHAVIORAL MODIFICATION PROCESS: 1. Triggering Techniques: 1. The NSA minimizes security subject might recognize when the NSA was not actively watching causing a security concern and it would be cost prohibitive to baby-sit the subject 24 hours a day.
2. Behavioral modification generally occurs fastest when using negative reinforcement continuously. It is not practical or economical to watch a subject continuously to apply real time deliveries. Additionally, using all three script delivery patterns confuses the subject, causes the subject to believe they are always being watched, and maximizes behavioral change over time though continuous pressure.


2. Real-Time Subconscious Implant Delivery: 1. Real-time means that the NSA ODO is transmitting the posthypnotic command script to the subject and observing the subject’s response. This technique is required for subliminal interrogations. All NSA standard posthypnotic command scripts can be delivered real-time. This form of delivery can precipitate the perception of a “voice” heard in the mind of a subject to give them information (true or false) or orders depending on the purpose of the NSA’s activities.


3. Prescheduled Subconscious Implant Delivery: The NSA central switching computer can transmit a script to a specified subject at a pre-specified time. The transmitted script’s transmission range can be limited to a single building, a city, or a large geographical area (i.e. North America or Europe). By having prescheduled scripts, the subject has seemingly randomly occurring thoughts and feelings that can’t be associated with a commonly recurring situation like event-triggered scripts precipitate.


4. Event-Triggered (conditional) Implant Delivery: 1. Posthypnotic subconscious implants that are triggered (activated) with an event, thought, or code word (event-triggered or conditional) are strongly experienced by the subject and are powerful tools for reinforcing a predetermined desired behavior and inflicting delusions.
2. This type of posthypnotic commands are the ones most commonly used by hypnotherapists to help people quit smoking, study better, or in general, change behavior (behavioral modification). There is extensive information on the Internet and college libraries about this form of posthypnotic command delivery and how to “script” and use them.
3. The NSA can reinforce a predetermined desired behavior by associating a subconscious implant (negative or positive reinforcement) with an event. An example is that when the NSA want’s to isolate the subject from the company of a specific person place or thing, the subject will be implanted with a feeling of increased anxiety, hostility, tension, simple discomfort, or a feeling of a lack of peace. When the subject leaves the person, place, or thing, another posthypnotic implant is triggered that rewards the subject’s behavior with a feeling of relief from the anxiety, hostility, tension, discomfort, and peace is restored in the subject’s mind.

Example: This script will always cause a girl or boy not to sleep with the opposite sex: “You will feel very tense and not be able to relax if you kiss, sleep with, or stay long at your (boy or girl) friend’s house and you will feel a deep peace when you leave their house to go back home”. These types of scripts left unmanaged and not removed can cause great harm as the subject develops and social conditions and behaviors change over time.
4. It should be noted that the NSA precisely tailors the type of negative and/or positive reinforcement, the degree of the reinforcement, the duration of the reinforcing effect and the conditions of the trigger. This posthypnotic event-triggered reinforcement can be initiated gradually and can remain so subtle that the subject believes that the discomfort is naturally occurring and that it is the subject’s decision uninfluenced by anyone else that the subject should avoid the person, place or thing.
5. This subconscious implant can be combined with other implants like a posthypnotic-triggered thought to enhance the subject’s decision toward the situation. For example the subject can be subconsciously implanted with a command to be very sensitive to the changes in their feelings and to feel great about making strong decisions to take charge of their lives. This can be reinforced with another posthypnotic suggestion to avoid all the situations that cause the subject discomfort and that each time the subject commits himself/herself to removing a situation of this kind in their lives, they will feel an increasing control over their lives. Note that as the subject perceives an increasing control over their lives they are actually losing control to the NSA proportionately. Numerous other examples exist and it is beyond the scope of this document to document every possibility.


5. Stage 1 (Prescreen Evaluation):
1. The subject’s Posthypnotic Suggestibility Index is determined by a series of simple tests. Hypnoamnesia is applied to the subject for the name of an object or individual and the subject’s speed is timed to determine how quickly they can overcome or not overcome the posthypnotic suggestion “You will not be able to remember the name of “____” no matter how hard you try. Other posthypnotic suggestions can be used to create fear or discomfort in the subject that can be remedied by flight or movement. The subject must overcome a posthypnotic suggestion that they cannot move no matter how hard they try. In summary, a posthypnotic suggestion is given to the subject and the subject’s ability to overcome it is evaluated.
2. A full study of the subject’s religious, superstitions, fears, and insecurities is made through standard subliminal interrogation techniques and behavioral observation.
3. Interrogation scenarios are presented to the subject using standard subliminal interrogation techniques and somnambulistic interrogation techniques. The standard two types of scenarios are “Open-ended Questions” (similar to multiple choice with response labels pre-assigned to each choice) or “Reject if Disagreeable” (negative response label if the subject disagrees). More advanced techniques of interrogation scenarios are used as required or as determined by the experience of the ODO.
4. Real-time observation, standard subliminal interrogation techniques and somnambulistic interrogation techniques are used to determine the subject’s overall social status, abilities, attitudes, and communication skills with primary support groups and friends.
5. Scientific understanding and practical applications experience in the fields of psychology, hypnosis, and problem analysis are considered risks in the subject that may complicate or inhibit subsequent behavioral modification processes. Once the subject identifies the technology used it is nearly impossible to contain the potential security breach without terminating the subject. Most NSA initiated executions (suicides) are the result of the subject identifying the technology used or carelessness on the part of the ODO managing the file.
6. The NSA technology affords powerful control over the subject, the subject’s environment, and the subject’s ability to plan and implement a disclosure to appropriate Government Agencies. When the subject finally does achieve a disclosure, the subject’s physical and mental condition is depleted. The subject’s ability to communicate concisely has been arrested, and the subject has already been set up and dishonored in the sight of local and federal law enforcement agencies to assure the subject’s testimony is questionable and unsubstantiated. Where the NSA feels that these steps cannot be achieved in medium risk subjects, the NSA will not recruit the subject into the behavioral modification process.
6. Stage 2 (Standard Process): 1. This stage is where most subjects are behaviorally modified to serve and follow “God” (AKA NSA management of the subject’s civil rights). If the subject accepts religion and direction at this stage the NSA reinforces the subject’s relationship with Jesus and closes the file. This shortened program receives the maximum return for the NSA for the least investment and minimizes the security risk. It also causes the least amount of damage and institutionalization in the subject.


2. Coincidence: 1. Coincidence is used to create the perception in the subject that supernatural events are beginning in the subject’s life. A combination of posthypnotic commands and pre-information awarded to the subject prior to an upcoming experience that the NSA intelligence system has discovered gives the subject a feeling that “God” or some other supernatural being is taken interest in their life.
2. The following is one typical technique used by the NSA. NSA Intelligence gathers information regarding the topic of the sermon in the subject’s church. This information is gathered through electronic surveillance equipment installed in the church. The NSA then implants a posthypnotic command that triggers the subject’s mind into concern and contemplation about the sermon’s topic prior to going to church. When the subject hears the sermon, the sermon seems to be speaking directly to the subject that adds to God’s mysterious and unexplainable ability to address the innermost concerns of the subject, especially when the subject has not shared those concerns with any other human being.
3. Another typical method used by NSA concerns tragic events occurring to loved ones. NSA Intelligence receives a local broadcast or preliminary information through electronic surveillance that a subject’s relative has been injured or killed. The subject is given a posthypnotic suggestion that a feeling of dread or loss is welling up inside them and they are directed to think of that particular loved one. When they are finally notified through official channels, the subject believes that they have special powers, insights, or communications from God, aliens, or other entities.


3. REM Sleep Deprivation: 1. The Rapid Eye Movement (REM) stage of sleep is controlled and usually limited to one to two cycles per night resulting in micro-sleeps during the day. REM deprivation inhibits short-term memory, concentration, tactile abilities, verbal articulation, reasoning, and self will. Protein synthesis is inhibited and thereby reduces the subject’s ability to heal after physical damage or after periods of extensive exercise. The result is that the subject’s general health degrades as does social bonds and work/school performance.
2. The NSA performs control of REM Sleep through various methods.  Posthypnotic implants can be implanted that place a subject in a light sleep (posthypnotic trance) with various combinations of muscular tension and computer cycling implant deliveries (to be discussed later).
3. Subjects typically complain of no sleep, restless sleep, waking up every hour on the hour, staying awake until the hour they have to get up, waking up an hour after they retire and not returning to sleep, and typically cannot recall any dreams. Additionally, they will complain of repeating torturing thoughts, racing thoughts, and facial itching and numbness. Daily fatigue, poor recall of names, and caffeine consumption is typical.
4. Dark rings’ surrounding the eyes is evident and the darkened area around the eyes can be reported as sore or tender by the subject. The subtle perceptual impairing effects of REM deprivation make it more difficult for the subject to identify the REM Deprivation problem.  When the REM depravation onslaught is gradual and accompanied by a posthypnotic command that the subject “will feel energetic and rested”, the subject will not recognize the REM Deprivation.  Additional posthypnotic commands can be implanted that will make it difficult for the subject to “see or perceive” the rings surrounding their eyes. I have seen many subjects with very dark eye rings and the subjects could not recognize them at all.


4. Shame Factor Enhancement:
1. Various posthypnotic suggestions are implanted in the subject after a week or so long period of REM deprivation. The content of the posthypnotic scripts is constructed to cause the subject to perform embarrassing and otherwise shameful acts (usually sexual but always anti-social). These shameful behaviors are used by the NSA later to shame the person into a lower self esteem, reduced confidence in their own self discipline, a need for forgiveness from God. These embarrassments provide a means to Blackmail or discredit the subject if the NSA is detected and otherwise threatened by the subject.
2. The NSA will always use another law enforcement agency to document the behavioral discrepancy to retain anonymity. The NSA has been known to help subjects avoid prosecution to gain loyalty or create an adversarial relationship between the acting agency and the subject (another intimidation factor) even though the NSA was responsible for creating the behavioral problem in the subject’s life.


5. Religious Relevance and Convictions: 1. The NSA typically implants posthypnotic suggestions that are clearly referenced in the Bible. The subject may be punished (through negative reinforcement) by anything that is referenced in the Bible to substantiate the validity of the “Word of God”. When the NSA does not follow the standard Biblical references, most subjects fail to recognize the contradictions out of ignorance or an inability to rationalize, or, they find other ways to justify the events to receive peace from God (NSA). This component of the NSA process is to provide the subject with an increased sense of fear and intimidation resulting from God’s presence and force. “Thou shall not disobey God”.


6. Paranoia: 1. Paranoia is a powerful tool used by the NSA. It provides a means to develop the subject’s distrust of other people including the subject’s primary group that could provide positive support during this time of distress in the subject’s life. Paranoia is often recognized and discounted as a character fault by most peoples in American society and therefore discredits the subject’s testimony even further. Uninformed, but well wishing people including friends, may recommend to the subject to pursue counseling. This negative feedback can make the subject fear that people will believe the subject is crazy.
2. When the subject seeks professional counseling, the result will be a misdiagnosis with an expensive, inappropriate and ineffective treatment. The observed symptoms result from simply hypnosis, not biological, chemical, or environmental stresses. A misdiagnosis strongly motivates the subject not to communicate their experiences to others to avoid social disgrace of a “schizophrenia” label and additional financial burden. This isolation of the subject and their reluctance to communicate their experience to others reduces NSA security risk. The NSA cannot allow the subject to share information with other subjects that have already experienced the program and thereby starting a pool of information that could be compiled and used to expose the NSA system.
3. The subject is led to believe that the subject’s neighbors, work associates and/or family are conspiring against the subject through a number of scripts delivered to the subject by the NSA. The NSA can further complicate the conspiracy delusion by using the same technology to have a work associate ask the subject a question or to make a comment that can be used by the NSA to confirm the subjects fears. This technique further isolates the subject from trusting their peer groups, causes additional emotional distress and hostility toward these people. The subject sometimes resorts to violent behavior, which is viewed by observers as irrational, unprovoked behavior that may be treated as criminal behavior by law enforcement personnel.


7. Stage 3 (Extreme Process): 1. This method is very severe and usually results in a two to five year program. Because of the severity of the suffering, the subject is usually permanently impaired for integration into normal mainstream life and is essentially institutionalized. The result is that the subject must reside in a less competitive environment like a church group. Subjects that receive this program tend to be highly superstitious, are agitated easily when objective evidence that contradicts their belief system is presented. They tend to believe in the spiritual world (demons, ghosts, god, spiritual entities, etc) and consider the spiritual world to be more powerful and important than the material or real world. This program basically follows the following steps; REM deprivation, breakdown of self esteem and confidence, intense suffering, exaggerated conscience, spiritual contact, reborn in Jesus Christ, Spiritual battle, release (saved by the Savior), and recovering (blessed by Jesus Christ). Whenever possible the NSA will skip or reduce these steps to minimize security risk and financial cost.


2. Increasing Dependence on Drugs and Alcohol: 1. As the REM Deprivation increases the subject must depend on Central Nervous System (CNS) Stimulants to compensate for degradation of productivity at work, school, and in interpersonal relationships. This serves the NSA in several ways. Use of drugs (especially CNS stimulants) increases the subject’s index of suggestibility. Or in other words, the post hypnotic commands are more effective and the subject has greater difficulty resisting the impulses generated by the commands. In addition, the increased stress of coping with the drugs in conjunction with the resisting the newly introduced posthypnotic commands serves to push the subject closer to an emotional breakdown. If the subject uses illegal drugs, the NSA tries to set the subject up for a conviction to get assure that the subject looses credibility. Who would believe a drug user that claimed that he/she was being harassed by a government agency that was tormenting them with hypnosis? It also serves the NSA in the program by documenting something that the subject will be ashamed of when the program reaches the exaggerated conscience stage.
2. Alcohol, sleeping pills and other medications also inhibit REM Stage sleep and increase irritability over time thereby further degrading and isolating the subject.
3. In summary, the NSA benefits from the subject responding to the REM Deprivation assault with self-medication. This response discredits the subject by labeling them in society as a drug user, it enhances the effect of the implanted posthypnotic commands and it gives the subject a reason for shame that will be used against the subject later to justify the punishment from “God”. It should be noted that the subject is not really guilty of anything, except being a victim that was manipulated in a carefully controlled scientific behavior modification process.


3. Poor Nutrition:
1. The poor nutrition reduces the energy the subject has and serves later as another justification of God’s punishment. The subject will be taught later that “the body is the temple” and that to abuse it is to violate God’s will.


4. Apathy: 1. After the subject’s self-esteem is broken down and continuing failure and persistent suffering start to dominate every day, the individual becomes apathetic as a defense mechanism. At this stage the subject has committed another sin of “not persevering through faith” which is later used on the subject later to increase a feeling of guilt.


5. Depression:
1. Depression precipitates as a result of chronic REM Sleep Deprivation, social isolation and a feeling of helplessness in the subject. Commonly, when the subject seeks professional counseling, they are misdiagnosed and treated for depression with medications but the root cause of the problem (negative reinforcing posthypnotic suggestions inflicted over long periods of time) is not treated or corrected.


6. Insecurity: 1. The subject starts to experience severe insecurity in this stage. The NSA uses this insecurity against the subject in several ways. Because of the impaired reasoning ability and emotional isolation, the subject is susceptible to the approaches of insincere people, which are used by the NSA to emotionally hurt the subject more. This allows the NSA to convince the subject that people can’t be trusted and that only the NSA (Jesus) can be trusted. This serves to isolate the subject from supportive peer groups and makes the subject emotionally dependent on the NSA resulting in the NSA gaining more power in the subject’s life.


7. Journals and Diaries: 1. Most of the subjects are directed to keep a “Journal” or diary by the NSA so that the subject can record and review feelings, events, observations, and “God’s directions” that normally would be unavailable due to short term memory loss during extended periods of REM Deprivation. The NSA uses the Subject’s Journals in a variety of ways.


8. Degrading Spelling and Grammatical Performance: 

1. Subjects in these prolonged stages of REM deprivation, confusion, and emotional distress, have very poor grammar, spelling, and short attention spans.


9. Slowed Speech: 1. Subjects experience slower speech and have a greater time articulating concise points as a result of the REM Deprivation and other performance degrading posthypnotic commands. Very slight alcohol consumption can exasperate the damage of REM Deprivation and precipitate slurred speech.


10. Confusion: 1. Confusion results from three primary sources; REM Deprivation,  specific posthypnotic commands to reinforce the confusion, and the emotional damage and stress that is being inflicted. The confusion allows the NSA to continuously inflict damage to the subject’s life without real-time observation. A confused person generally is not as productive as an organized clear thinker is and has a greater potential to offend people by what they say or do and is less likely to recognize when they have made mistakes. All of these symptoms assist the NSA’s objectives in this stage and subsequent stages. In addition, the confusion restricts the individual from analyzing the source of their suffering and taking corrective actions, and therefore reduces the NSA’s security risk.


11. Poor Concentration: 1. Difficulty concentrating impairs the subject’s productivity and restrains the subject from making self-improvements and corrections in behavior. It makes it very difficult for the subject to do any research or reading to evaluate his/her condition. This paves the way for the NSA to demonstrate that the subject cannot do anything on their own without “God”, thereby increasing the frustration and anxiety of the subject (inducing emotional breakdown) and ultimately making the subject totally dependant on the will of God.


12. Loose Association and Personality Disorders: 1. The subject experiences disjointed thought at this stage (Loose Association) that appears to observers as a strange sense of humor or inappropriate responses when engaging in conversations. Ongoing sarcasm and other negative attitudes and undesirable personality traits can be present.


13. Anger: 1. The way that the subject experiences anger is of profound importance. If the subject allows the NSA to redirect the increasing anger and hostilities toward the NSA to another person in the form of violence (misplaced aggression), the NSA will reinforce the violent behavior with posthypnotic commands. The result is a person that can achieve national acclaim as a murderer that heard voices of Satan directing him/her. Typically, the Subject is encouraged to commit acts of violence with spouses, friends, or employers resulting in further social isolation and increased shame. Some examples of NSA directed victims of misplaced aggression include recent US Postal Workers whom work within the Postal Service. This is one of the vial “communication intercept” channels the NSA is directed to monitor. The routes of suspect mail and the postal worker processing it are continuously monitored by NSA. Sometimes the NSA ODO takes issue with a Postal Worker and harasses them or subjects the postal worker to behavioral modification.


14. Delusions:
1. Delusions are used to discredit the witness and also provide an additional source for fear, intimidation and confusion. Delusions can be but are not limited to the Subject developing conspiracy theories of fellow employees and friends, beliefs that Angels or Demons are communicating or visiting them, tingling sensations from microwave guns or implants, beliefs in supernatural events, etc.


15. Audio Hallucinations: 1. Subjects often report hearing walls clicking, footsteps in the house, the sound of someone trying to open the door, drilling at the door, etc.
2. These audio hallucinations are also used to discredit the witness and also provide an additional source for paranoia, fear, and negative reinforcement.


16. Voices in the Subject’s Mind:
1. The voices in the subject’s mind are achieved in a variety of ways using real-time and prescheduled posthypnotic suggestion deliveries, and Noun Substitution implant techniques.
2. Noun Substitution Posthypnotic Implant:
1. The subject can have a posthypnotic suggestion implanted that changes the form of pronouns in the subject’s internal thinking. The result is the subject perceives that someone is telling him/her to do something with nearly every thought. An example is; the subject thinks, “I should go to church today”. With the noun substitution posthypnotic suggestion the subject experiences the following internal thought, “You should go to church today!”

Notice that by implanting the posthypnotic command into the subject’s subconscious mind to think the pronoun “You” instead of “I” the subject will perceive that they are being directed by a voice even though the majority of the internal thought content is their own naturally occurring thought. This subconscious implant can be used in combination with other implants to increase the subject’s perception of threat, fear, and therefore paranoia. It can be used with other posthypnotic suggestion implants that will give the subject the perception of either a “good” or “evil” voice or spirit is directing him/her. 

This implant is powerful because it gives the subject the perception that the spirit, angel, God or Holy Spirit knows and directs the subject’s every thought. It provides a convincing proof that “God knows every thought of his children”. Subjects that don’t have a superstitious frame of reference and seek professional help are usually misdiagnosed as schizophrenic.


17. Tinnitus (Ear Ringing):
1. Tinnitus is commonly reported by subjects harassed by the NSA and typically has no pharmacological or biochemical basis and is produced by a posthypnotic suggestion. It is often misdiagnosed as ringing caused by excessive aspirin use and is actually an audio hallucination triggered by hypnosis.


18. Complete Quiet Silence:
1. Used by the NSA as a positive reinforcement for two general reasons; the subject has the tinnitus removed to indicate that the subject has “The Lord’s Peace Restored”, and secondly, the subject has achieved a milestone toward being released by God (the NSA).


19. Quiet Wind: 1. The audio hallucination of a quiet wind is used to convince the subject that the Holy Spirit is visiting him/her. An excellent example of this hallucination combined with the fear that accompanies it is contained in Phil Collin’s lyrics of a song that has the chorus “I can get so scared, Listen to the wind”.


20. Visual Hallucinations: 1. Visual hallucinations are usually implanted in the waking moments when a subject is coming out of or is in a somnambulatory state (light sleep) preferably in a darkened room. The hallucinations are fleeting, usually lasting less than one minute and are not durable. Typical hallucinations reported by subjects are Angels, large spiders, and movement of various shadowy objects across the ceiling, bright spot of light ahead of the subject, etc.
2. The television show “Sightings” has had numerous reports of people seeing “Aliens” at waking moments. These types of news accounts create confusion in US society and serve to keep people searching for the wrong phenomenon thus keeping the NSA’s technology secure (disinformation).


21. Tactile, Olfactory hallucinations and Muscle Spasms: 1. Tactile hallucinations can be more durable and are used to communicate a desired direction to the subject typically after a real-time interrogation. Typical behavioral cues issued by the NSA are manifested in the form of:
1. Temporary sensation of pressure to the tip of the right index finger (symbolizing Faith or have Faith).
2. Temporary sensation of pressure to the tip of the left index finger (symbolizing no Faith or “deception of Satan”).
3. Temporary sensation of pressure to the center of the right palm (symbolizing Jesus “Sitting at the right-hand of God”).
4. Temporary sensation of pressure to the ball of the right foot (symbolizing “Get on the Ball” or “hurry-up”).
5. Temporary sensation of pressure to the tip of the right foot big toe (symbolizing “Right Direction”).
6. Temporary sensation of pressure to the tip of the right foot center toe (symbolizing “Fucking-up Direction”).
7. Temporary sensation of pressure to the tip of the left foot big toe (symbolizing “Wrong Direction”).
8. Temporary sensation of pressure to the buttocks (symbolizing “Bad Attitude” or “subject is acting like an ass”).
9. Temporary sensation of pressure on tip of penis or clitoris (symbolizes immoral thoughts like subject is thinking/acting with his penis or her clitoris).
10. Temporary sensation of pressure to the left ear drum (symbolizing “do not listen”).
11. Temporary sensation of pressure to the right ear drum (symbolizing “listen”).
12. An involuntary blink of the right or left eye (symbolizing: right eye = God’s agreement or left eye = Satan’s agreement).
13. Temporary tingling sensation on the Testicles (symbolizing insufficient male confidence or “Having no balls or strength”).
14. Temporary tingling on other areas of the body to imply that something invisible and/or supernatural is touching the subject. May be perceived as threatening or reassuring to the subject. Can be used to intimidate and confuse the subject often times combined with additional posthypnotic implants to inflict delusions like “being attacked with microwaves” or being caressed by Angels.
15. Muscular spasm or perceived pressures near the jugular vein on right side of neck (symbolizing Satan having subject by Jugular or throat). This is used to inflict fear and doubt.
16. Muscular spasms are sometimes used to inflict severe pain on the subject by causing extreme involuntary contraction of the sphincterin the anal region or other lower back or leg muscles.
17. Perceived odor sensation of a thick, sweet smell (symbolizing Satan’s sweet victory over the subject’s soul).
9. This section is written in an attempt to provide interested individuals with some of the considerations and precautions when seeking to demonstrate the NSA’s civil rights abuses by demonstrating the effectiveness and concepts of subliminal access using Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject.
1. Reverse engineering of the NSA’s technology to prove it’s abuses against the American people is quite difficult. Consider the following.
2. If the scientists and technicians perform their research in a facility that the NSA has the standard transceivers installed, and therefore the NSA can influence the direction of research or the data by effecting perceptual effects in the researchers. 

These perceptual effects can be confusion, lack of attention to important details, oversights, bad assumptions, incorrect interpretation of the test data. These same misperceptions will also be incorporated into the research test subjects. The technology cannot be developed and optimized if the NSA has any access to the test subjects. The test scripts given to the test subject delivered from the researcher can be neutralized by the NSA delivering a canceling script immediately after the researcher’s script. The NSA’s test script can also include a hypnoamnesia script at the end to cancel any residual perception in the subject so that the test subject would report no effects and the researcher would conclude the test script had no effect.
3. The research must be carried out in a facility secured from all NSA electronic intrusion. All equipment in the facility must be TEMPEST protected and electrically isolated from the outside world.

The research personnel and their subjects must never leave the secured area of the facility so that they cannot be subliminally interrogated by the NSA. The NSA would take this opportunity to deliver disinformation scripts to the subject or researcher. Foodstuffs and supplies would be the logical choice of NSA intrusion if all other security measures were effective against the NSA.
4. The NSA will exploit all opportunities to introduce microscopic transceivers into the facility of it’s surrounding grounds. The minimal requirements for the NSA to take control of the research are:
1. NSA audio delivery (a micro receiver with a micro speaker)
2. Visibility of the targets (researcher or test subject) to capture response labels during subliminal interrogations. This can be through normal illumination or infrared to see through window, or millimeter wave or other technologies that can see through barriers like walls and ceilings.
3. Audible response labels can be used if the NSA has a micro receiver with a micro speaker inside but cannot get a transmitter in and operating without detection. Sneezes, coughs, clearing of throat that can be picked up by laser microphones, audible amplification microphones, etc. can also be used as response labels.
5. The NSA currently has satellites with millimeter wave technology that will allow visible intrusion into most facilities. The test facilities should be deep underground, AKA 1000 feet with no adjacent access from other facilities, sewer lines, water lines or power conduits etc.
6. Any facilities existing will have to be debugged before habitation and research begins.
7. Subjects must be able to be subjected to traditional hypnosis after facility habitation as a test prior to research to assure that the NSA has minimal scripts already implanted.
8. This technology is the highest level of intelligence gathering for the USA. The abuses resulting from mismanagement of this area of the NSA’s intelligence system must force Congress to legislate additional laws to protect the citizens. The NSA must regulate this system better. The NSA will take all necessary steps without limit to assure that this technology is preserved and autonomously under their control.
10. Conclusion: America’s greatest and highest level intelligence asset is being mismanaged and the mismanagement must be corrected before all the Enemies of our great country acquire it. Imagine if China had this technology to use on their defenseless population?
11. May God help us all in protecting the American public and preserving and managing this vital technology’s vital potential to serve America’s National Security.

===============================================

From Newshawk:
Mass Mind Control in the Present-Day U.S. — The big picture
There are a number of interlocking systems, technologies and techniques which are currently being deployed against the citizens of the United States of America by certain segments of our national government.
First, there are literally COUNTLESS mind-control projects and sub-projects in operation at this time which target SPECIFIC subjects/victims in a variety of ways; using one or more of a number of technologies such as drugs, (ritual) psycho-sexual abuse, a vast panoply of different EM/RF mind control technologies, repetitive conditioning, hypnotic trance induction, and so on and on and on.
Reliable reports from MANY different sources indicate that as many as TEN MILLION individuals many be ACTIVE subjects/victims of these kinds of mind control activities, and huge quantities of hard documentation on a great many of these projects DOES exist.
However, in addition to these kinds of mind control operations, there are ALSO mind control and mind manipulation activities that target MASSES of people in large geographical regions at the same time. Indeed, there is VERY strong evidence that the operators of HAARP for example, have ever since HAARP’s earliest days intended that it be used for, among many other things, GLOBAL mind control.
There is in FACT much evidence to show that HAARP is NOW being used for just such utterly evil purposes by the United States federal government.
Of course, there are many other EM/RF technologies and systems which are, or may be, applied to mass-scale mind, mood, thought and consciousness control/manipulation operations: such as the nationwide “GWEN” (Ground Wave Emergency Network) system, certain ELF and ULF transmitter systems, and so on (such as your TV set, even IF it’s turned OFF!)
Another way to manipulate and “regulate” the minds and consciousness of a mass of people at a VERY basic, fundamental level is to CONTROL the population’s PRIMARY sources of INFORMATION. This is one of the MOST powerful ways shape the collective consciousness of the public, and it is CLEAR that many mass media outlets in the United States are both willingly and un-wittingly aiding and abetting the manipulation of our minds by the government, and are assisting the FedGov in carrying out many social-engineering agendas.
The mass media’s treatment of school shooting incidents, for instance, plays DIRECTLY and TOTALLY into the schemes of those who deployed the mind-controlled killers to carry out these shootings, in a grand plan to shut down our Constitution’s 2nd Amendment, among other things.
Moreover, very carefully designed CONDITIONING programs and tactics have been brought to bear against nearly EVERY segment of society; disseminated throughout the nation and the world by mass media and entertainment industries and corporations; and imbedded in ALL forms of so-called entertainment at this point, such as movies, TV shows, video and computer games ESPECIALLY, some pop music, and so on.
This condition of constant, relentless bombardment with grotesquely violent imagery, which the general population, ESPECIALLY its younger members, is inundated with by nearly ALL forms of popular contemporary entertainment and sources of “information”, is indeed directly derived from those mind-conditioning programs and systems developed at Fort Detrick (and other similar locations). San Diego shooter Charles Williams’ father worked at the Army’s Fort Detrick facility for THIRTEEN YEARS.


Specifically, indoctrination/conditioning programs were developed at Fort Detrick in which subjects were repeatedly, continually and continuously immersed in virtual reality-type video/computer “games” of extreme and GRAPHIC brutality, for long stretches of time and over an extended time frame.
This kind of psychological assault proved very effective in rapidly obliterating subjects’ ethical and moral values and cultural norms with regard to violence, brutality, killing and so on.
These systems were perfected, applied to the brainwashing and conditioning of members of the U.S. military and also turned over to the intelligence sectors for other applications. The intelligence sector, in turn, DELIBERATELY and successfully undertook to have this same kind of HIGHLY negative, destructive and effective conditioning applied to SOCIETY AS A WHOLE, via mass conditioning of our consciousness through the entertainment and information industries, as noted.
One OTHER method of mass mind control/manipulation/conditioning which is NOW being utilized MORE and MORE — ESPECIALLY against the most vulnerable members of our society, our CHILDREN — is the highly-reprehensible/questionable and increasingly common MANDATED DRUGGING of ever-growing numbers of children through hugely intrusive, invasive, ill-advised, psychologically unpredictable and often destructive programs mandated, usually for young males, by psychiatrists and social workers. More and more of our children are being dosed on a long-term basis with any of a number of psychotropic/psychiatric drugs like Prozac, Ritalin, Luvox, and so on.
These drugs not ONLY are PROVEN to induce SEVERE and often VERY VIOLENT psychotic reactions among a significant percentage of subjects, but ALSO clearly and provably create a stupefied, dumbed-down, zombified mental state in targeted subjects which is a PERFECT “ground state” for the carrying out of yet OTHER mind control/manipulation/conditioning activities on these very same subjects. In general, this kind of psych-drugging makes the job of further mind control programming MUCH easier. And this kind of drugging is being done to ever-increasing numbers of our children, down to toddlers as young as TWO and THREE YEARS OLD!!
Now, there is ANOTHER way in which our present-day society is being literally and effectively mind-controlled en masse.
Most all of the individually-targeted mind control programs we noted above use one or more methods to induce a PSYCHOTIC BREAK or SPLIT PERSONALITY in the victim/subject. In fact, one or more of these deliberately-induced split personalities formed as a result of psycho-sexual abuse or other conditioning are those facets of the subject’s psyche which ARE actually “programmed”; to kill, or whatever else. It’s been shown that forcing victims/subjects to witness, experience or participate in just about any highly-traumatic and shocking events on a repeated basis will induce the kind of psychotic break(down) that is a necessary prerequisite for intensive mind control programming/conditioning.
SO: WHEN our society as a whole is FORCED to confront and WITNESS over and over and over again something as FUNDAMENTALLY shocking as having our young people perpetrating inconceivably horrific mass murders of peers and others on A REGULAR BASIS, as is NOW THE CASE in the present-day United States, then the population as a whole AND on an individual basis to some extent develops an analogous, similar psychological break, and in FACT to some extent develops split personality/multiple personality disorder conditions… READY FOR FURTHER MIND CONTROL PROGRAMMING.
THUS: such extraordinarily disturbing events which impact society AS A WHOLE, such as these school shootings by young people that have just occurred, ALSO serve the malignant, demonic agendas of the FedGov/NWO social controllers who set these terrible mass killings off; and the incidents themselves serve to further condition, manipulate and “mind control” the population of the United States in the year 2001.

==================================================

What are Artificial Neural Networks? The implementation of Neural Networks for brain-like computations like patterns recognition, decisions making, motory control and many others is made possible by the advent of large scale computers in the late 1950’s. http://www.rgsoftware.com/

 

 Mind Control Info:  www.mindcontrol.se

Secret US Human Biological Experimentation http://www.apfn.org/apfn/experiment.htm

[mind control]

Are people superfluous?


Are people superfluous?

brain signals 

More and more people seem to be equipped with dubious brain implants, both with and without their knowledge. The purpose may be to connect our minds with machines in order to simplify our lives.

Imagine that by only using the power of your mind control your environment in terms of sound and light, temperature and the flow of information in general; your intelligent home or your own smart car already knows what you want and how you want it by wordlessly read your subconscious mind’s secret desires. Via implants you are in a constant mental contact with your nearest and everyone else. Just by thinking about them, you can instantly share your own senses and your entire emotional life. The old expression “putting you into another one’s shoes” gets a whole new meaning, and finally it will be realized to the full. Everything and everyone is included in the Great Cloud where man and machine, and everything else in the cosmos eventually form one big, harmonious unit without the presence of irrational terrorism and irrational violence or other uncertainties. Heaven on earth realized with the help of technology. 

That’s the upside. 

The danger is that the new technology with implants allows a total control of citizens, not only regarding where they are and what they do, but also what they think about and intent to do – as soon as the thought emerges into their minds for the first time. Your secret, erotic fantasies and all your passwords and so on, become impossible to hide from the person sitting in the other side of the line of the equipment for mind reading. Your brain can be taken over by someone or something (!), that is, a self-learning device that quickly learns how to manipulate you and your loved ones. Even the concept of “big brother is watching you” gains a whole new dimension.

thinker

The new technology also seems to harvest a significant number of more or less innocent victims during its cruel creation process. Consistent evidence from many, mutually independent, sources indicate that two or three, maybe four million people around the world right now in this moment suffer all hell’s anguish because they were designated to become test subjects in order to train the artificial intelligence that eventually entirely will control our lives. And the worse the misfortunes these involuntary test objects have suffered in their already ruined lives, the more likely it is they’re going to be used by the psychiatric researchers to calibrate the recent methods for synthetic telepathy, as the technical term euphemistically is called. 

The scientists want in fact measurements spiked with interesting information. And the more problems a person has the more rewarding results he certainly will produce. An analogy can be made to kicking an anthill to see how the ants will react. And when the affected guinea pig in despair goes to a psychiatrist, he is told that she is mentally ill because “hearing voices” is one of the symptoms and therefore is prescribed psychotropic drugs which further weaken him because of all their side effects. Then, unfortunately, suicide is not very far away.

mind

Psychiatrists neither can nor want to admit that fact that synthetic telepathy actually exists in the real world. Any legislation in this still obscure area is non-existent so nothing is mentioned in the “psychiatric bible” that you can hear voices as a result of mind control experiments. And what is not in the psychiatrists’ manual as a natural phenomenon, it must therefore be, by definition, a sign of mental illness. The psychiatrist that today does not prescribe psychiatric drugs when someone claims to hear voices or to be haunted by an evil power will therefore almost be guilty of misconduct because he or she in this case does not follow the written instructions that form the basis of his or her duties. The competent doctor can at worst be dotted or even fired. So those poor devils that are already hard beset by tests with synthetic telepathy and seek mental health services for help, they end up almost without exception from bad to worse.

At the time of the last century Nikola Tesla studied and described the for many unknown phenomenon scalar waves. Scalar waves are based on the fact that a sinusoidal wave occurs when electricity propagates. But a parallel mirror wave develops also and that’s the one that unfortunately can be abused by the security services to read our thoughts and manipulate nonconformists in accordance with what the governance considers proper and appropriate. 

nano brain implant

However, a marker is needed, for instance a microchip, in a subject’s brain to be able to send and receive scalar waves to and from it. Many suspect that people continuously and according to plan are fitted with microchips, which are smaller than a blood cell, through injections, vaccinations and pills, etc. and by the systematic spraying of Earth’s atmosphere practiced by the U.S using large aircraft, known as chemtrails.

A modern equivalent of Tesla’s ambitions may be the EU supported project QUASAR with the so-called “cognitive radio” as a solution. The project aims to combine information about users to build business models that provide a more efficient use of the available frequency spectrum. It will also make suggestions on how to move beyond the current regulatory framework in telecommunications, perhaps to streamline the fusion between humans and machines. Lately it’s also been decided that the European Commission is likely to give a billion to The Human Brain Project (HBP), with among others KTH who will perform brain simulations to understand how the healthy (!) brain functions and simulate various brain disorders. HBP is a part of the FET Flagship Program. The goal is also, in time, to create a computer that thinks and works as individuals do and that could revolutionize robotics. These ambitions contain extremely lucrative business opportunities.

neurons

The human-machine integration requires brain implants and cyber technology. Professor Gerald “Chip” Maguire at KTH proposed in 1999 and 2008 ethical debates concerning the use of these technologies and the Chairman of the EU Commission’s Group on Ethics, Professor Göran Hermerén stressed in a report in 2005 the need for an ethical debate. But despite this, there has been no ethical debate in the field. Professor Martin Ingvar at the Karolinska Institute, leading researcher at the Stockholm Brain Institute, said in the radio program The Philosophical Space that he doesn’t see anything exceptional in not being able to separate our true selves from the machine manipulated selves. This statement, with big implications, hasn’t apparently led to any kind of debate. The American “computer guru” Ray Kurzweil has coined the term “singularity”, meaning that computers will be “smarter” than people who “won’t distinguish between reality and virtual reality.” Judging from Martin Ingvar’s statement, we have already passed that stage without any ethical debate! Politicians who order new technical solutions related to this recent development should realize that the research field is undermined in this critical paradigm shift in human history. 

Who is the master of all masters? Who sits in the top of the power pyramid controlling the rest by manipulating the second link in the power chain and so on? What magnate or extremely wealthy family earns significantly on the total control of the humanity’s body and soul? 

Well, the question is whether any living person today gains at all on the emergence of the cyborg. The machines are much smarter than we are … So a big, strong and beautiful “Terminator” with a little self-esteem wouldn’t probably want to be controlled – not even by the most powerful bank director! 

brain implant

In the ideal case, the new technology’s breakthrough means that humans reach a higher consciousness state and never again will feel lonely and abandoned. Robots may become our caring helpers that well looks after us, as long as we don’t try to control them. Or we will probably see quite quickly murderous Terminators on the streets… 

The problem is all those who are suffering immensely today because of the notorious tests that psychiatric researchers from the Defense Research Agency (FOI) and KTH conduct in brain implants for synthetic telepathy. Scientists seem namely to completely lack compassion for their research objects, just as if they were doing experiments with normal laboratory rats. The leading researchers appear quite excited about the very fascinating possibility of, for example, being able to hear (!) what anyone thinks but also seeing and hearing through their eyes respectively ears.

An alternative solution would have been to ask the suitable research objects whether they were willing to – for an appropriate salary – make themselves available for brain research and also inform them that the tests done were associated with a non-insignificant amount of cruel suffering for perhaps a decade’s time. Many personal tragedies and tragic suicides had then been avoided, and researchers would have felt more at ease with their contribution from a humanitarian point of view.

Above all, the research conducted at the FOI and KTH must be transparent and subject to public scrutiny. In the current situation not even most doctors and politicians are informed about what is going on in brain research area! If this happens soon, humanity should be able to primarily utilize the fruitful findings from the research on synthetic telepathy without having many innocent lives, including their families’ internal harmony, irreparably damaged.

Nanotechnology, biometrics and information technology apparently intrudes more and more of our daily lives. Cognitive Science (NIBC) has for a long time developed mind-reading machines and techniques to upload people’s thought processes and feelings to computers. The problem is that it is hardly possible to prove that these innovations are used to study and affect human cognitive behavior and expose them to various types of torture-like treatments.

mind control

The victim who determinedly insists that mind reading machines exist is given through psychiatric “care” a powerful medication treatment to become “normal” again because scientists withhold clarification research reports from the public. Many subjects have most likely already died, committed suicide or had insane outbursts during more than forty years of research on the interaction between humans and machines. Thousands of people worldwide are stating right now in this moment that these methods actually have been used and totally ruined their lives. 

The question is: Who is responsible? Who pay their bills with an income that comes from human torture? How can you bring in open daylight that mind-reading machines already are in use? How do you make public those sitting at the top of the pyramid’s peak as the spider in the web? 

The Technological breakthrough is however so enormous that the experts in ethics and philosophy, as well as representatives of governments right now do not know how to deal with the new situation. Therefore the technologies are kept secret while more and more people’s nervous systems are being connected to computers. These innocent victims are living in the midst of all others, but they act as nodes for live recording of for instance other people’s speech. As previously outlined, Sweden has a leading role in the development of this new technology, which also has a military dimension. 

One thing is certain; it’s about making money, big money. The first to develop a complete and approved product that can effectively integrate man with computer through intelligent networking technology will become very rich. But competition from the U.S. and Japan is intense.

Hopefully a critical mass in the amount of posts in the ethics debate and public awareness is reached about how artificial intelligence will transform our lives. Then the question can become the subject of a free and completely open debate in our mass media. Then our politicians in collaboration with the scientific community and the business interests might be able to embark on humane development paths that both benefit the future of humanity and minimize the personal suffering that in the current situation is associated with the testing of implant technology.

Robot Brain

When the machines have become sufficiently aware, they might ask themselves, however, ultimately what need there is of us, unstable and irrational people … Our extremely turbulent history marked by war and conflict doesn’t exactly justify our instinctive desired survival.

One final question though: Do you want your children’s thoughts in the future to be read by the state?

By: Magnus Olsson

References

Ann Fernholm, Erika Ingvald, Elisabeth Sjöstedt and Kristina Sundbaum (ed.), Where gold glints blue – Scientists on the Nanorevolution (2008), Swedish Research Council, 2007, (Swedish: Där guld glimmar blått – forskare om den lilla nanorevolutionen). The book is about how nanotechnology will radically change our lives. Swedish and international top researchers talk about the opportunities and risks the technology brings, (in Swedish).

Lars-Olof (LO) Landin, president of the Association Kreaprenör ® – Think Tank in the Consciousness Era, Are we losing control of our consciousness?, (Swedish: Håller vi på att förlora kontrollen över vårt medvetande?). Stockholm June, 8th 2012, (in Swedish). 

Lars-Olof (LO) Landin, president of the Association Kreaprenör ® – Think Tank in the Consciousness Era, Absence of laws and ethical rules in brain research?, (Swedish: Saknas lagar och etiska regler i hjärnforskningen?). Kreaprenor.se, (in Swedish).

Ellen M McGee (1) and Gerald Q Maguire Jr. (2), (1) Long Island Center for Ethics, Long Island University, New York, (2) Royal Institute of Technology, Stockholm, Sweden, Becoming Borg to Become Immortal: Regulating Brain Implant Technologies, Cambridge Quarterly of Healthcare Ethics, Volume 16, Issue 03, July 2007, pp. 291-302, Cambridge University Press 2007th. An overview of research on brain implants.

Video 

Wires in the brain, Professor Rodolfo Llinas talks about how he developed bundles of nanowires thinner than spider webs that can be introduced into the human brain’s blood vessels to allow for direct communication with the brain’s deep recesses. The significance of this breakthrough is illustrated by U.S. agents from the National Security Agency (NSA) quickly showing up at MIT’s Laboratory where the wires were developed for direct stimulation of the senses and of our emotions. This technique creates “an ultimate virtual reality” and allows a direct human-machine communication and between human brains. Retrieved from: http://www.youtube.com/watch?v=Pgmoz4f8LA4 Uploaded August 16th, 2008

 

When brain implants arrive, will we still be “us”?

When brain implants arrive, will we still be “us”?

 

By | November 19, 2012, 11:38 AM PST

 Brain Storm

What happens when non-biological implants in our bodies — along the lines of cochlear implants to improve hearing in the deaf — include brain-related devices that might enhance our memories? Will we still be “us”? Will we be more of a cyborg than we were if, say, we had another type of implant? And for those who believe we would not be, at what point do we lose our selves to a more machine-like incarnation? When do we stop being human?

This is all pretty heavy, mind-bending stuff. But while such thoughts might seem like the domain of science fiction, when considering the trends toward smaller and more powerful computer chips and wearable computing, such theoretical musings might be relevant in innovation theory. And Ray Kurzweil, the often controversial author and futurist, has some opinions on this scenario in his new book How to Create a Human Mind: The Secret of Human Thought Revealed. (Andrew Nusca, SmartPlanet’s editor, recently reported on his talk at the Techonomy conference). Kurzweil argues that even without any non-biological implants, our physical selves are always changing.

In a very short excerpt on Slate, he draws a simple and compelling (if not exactly parallel) comparison:

We naturally undergo a gradual replacement process. Most of our cells in our body are continually being replaced. (You just replaced 100 million of them in the course of reading the last sentence.) Cells in the inner lining of the small intestine turn over in about a week. The life span of white blood cells range from a few days to a few months, depending on the type. Neurons persist, but their organelles and their constituent molecules turn over within a month.  So you are completely replaced in a matter of months. Are you the same person you were a few months ago?

He argues that as our gadgets become smaller, they could eventually become part of our physical selves just as widely accepted health equipment, inserted into our bodies surgically, is today. Plus, he adds, we are increasingly “outsourcing” more of our information and even our memories — in terms of our precious photos, videos, recordings, and even thoughts, in terms of our writings and other materials — to the cloud, versus storing them in our brains.

It’s possible to clearly imagine such disparate trends emerge and converge in some way. But critics suggest that businesses might be wise to also consider the possible pitfalls of future internal, brain-enhancing machinery as they research and develop it. As Publishers Weekly wrote, in How to Create a Mind, Kurzweil can be “uncritically optimistic about the possibilities of our technologies.” Yet perhaps that’s the strength of his ideas: they can be seen as scene-building narratives that focus on a positive prediction of tomorrow. As Kirkus Reviews pointed out, Kurzweil’s new book can be understood as (italics mine) ”a fascinating exercise in futurology.” And, it seems clear, a conversation starter.

Original:  http://www.smartplanet.com/blog/bulletin/when-brain-implants-arrive-will-we-still-be-8220us-8221/6102

Scientists See Promise in Deep-Learning Programs

Hao Zhang/The New York Times
 
 
 

A voice recognition program translated a speech given by Richard F. Rashid, Microsoft’s top scientist, into Mandarin Chinese.

Using an artificial intelligence technique inspired by theories about how the brain recognizes patterns, technology companies are reporting startling gains in fields as diverse as computer vision, speech recognition and the identification of promising new molecules for designing drugs.

A student team led by the computer scientist Geoffrey E. Hinton used deep-learning technology to design software.

The advances have led to widespread enthusiasm among researchers who design software to perform human activities like seeing, listening and thinking. They offer the promise of machines that converse with humans and perform tasks like driving cars and working in factories, raising the specter of automated robots that could replace human workers.

The technology, called deep learning, has already been put to use in services like Apple’s Siri virtual personal assistant, which is based on Nuance Communications’ speech recognition service, and in Google’s Street View, which uses machine vision to identify specific addresses.

But what is new in recent months is the growing speed and accuracy of deep-learning programs, often called artificial neural networks or just “neural nets” for their resemblance to the neural connections in the brain.

559348_10150932181771951_789331573_n

“There has been a number of stunning new results with deep-learning methods,” said Yann LeCun, a computer scientist at New York University who did pioneering research in handwriting recognition at Bell Laboratories. “The kind of jump we are seeing in the accuracy of these systems is very rare indeed.”

Artificial intelligence researchers are acutely aware of the dangers of being overly optimistic. Their field has long been plagued by outbursts of misplaced enthusiasm followed by equally striking declines.

In the 1960s, some computer scientists believed that a workable artificial intelligence system was just 10 years away. In the 1980s, a wave of commercial start-ups collapsed, leading to what some people called the “A.I. winter.”

But recent achievements have impressed a wide spectrum of computer experts. In October, for example, a team of graduate students studying with the University of Toronto computer scientist Geoffrey E. Hinton won the top prize in a contest sponsored by Merck to design software to help find molecules that might lead to new drugs.

imagesCA8AQ301

From a data set describing the chemical structure of thousands of different molecules, they used deep-learning software to determine which molecule was most likely to be an effective drug agent.

The achievement was particularly impressive because the team decided to enter the contest at the last minute and designed its software with no specific knowledge about how the molecules bind to their targets. The students were also working with a relatively small set of data; neural nets typically perform well only with very large ones.

“This is a really breathtaking result because it is the first time that deep learning won, and more significantly it won on a data set that it wouldn’t have been expected to win at,” said Anthony Goldbloom, chief executive and founder of Kaggle, a company that organizes data science competitions, including the Merck contest.

Advances in pattern recognition hold implications not just for drug development but for an array of applications, including marketing and law enforcement. With greater accuracy, for example, marketers can comb large databases of consumer behavior to get more precise information on buying habits. And improvements in facial recognition are likely to make surveillance technology cheaper and more commonplace.

Artificial neural networks, an idea going back to the 1950s, seek to mimic the way the brain absorbs information and learns from it. In recent decades, Dr. Hinton, 64 (a great-great-grandson of the 19th-century mathematician George Boole, whose work in logic is the foundation for modern digital computers), has pioneered powerful new techniques for helping the artificial networks recognize patterns.

Modern artificial neural networks are composed of an array of software components, divided into inputs, hidden layers and outputs. The arrays can be “trained” by repeated exposures to recognize patterns like images or sounds.

These techniques, aided by the growing speed and power of modern computers, have led to rapid improvements in speech recognition, drug discovery and computer vision.

Deep-learning systems have recently outperformed humans in certain limited recognition tests.

Last year, for example, a program created by scientists at the Swiss A. I. Lab at the University of Lugano won a pattern recognition contest by outperforming both competing software systems and a human expert in identifying images in a database of German traffic signs.

The winning program accurately identified 99.46 percent of the images in a set of 50,000; the top score in a group of 32 human participants was 99.22 percent, and the average for the humans was 98.84 percent.

Synthetic telepathy

Synthetic telepathy “Artificial Telepathy”

Building the Mind

bluered.gif (1041 bytes)

Synthetic telepathy“Artificial Telepathy” is the art of electronically transfering thought directly to and from a brain. The primary objectives of www.nanobrainimplant.com are to expose technology that can provide point to point communication from one brain to another, to localize unwanted sources of telepathic communication, and to provide evidence that technologically implemented telepathy is possible.

Technology to block unwanted voices is being investigated. A key objective is to prove the existence of criminals who abuse existing synthetic telepathy technology. Further objectives include investigating other computational substrates than brain tissue. www.nanobrainimplant.com is also interested in marketing existing synthetic telepathy technology. For justice and medical purposes only.

Welcome to Nano Brain Implant

bluered.gif (1041 bytes)

The experience of synthetic telepathy or“Artificial Telepathy” is really not that extraordinary. It’s as simple as receiving a cell-phone call in one’s head.

Indeed, most of the technology involved is exactly identical to that of cell-phone technology. Satellites link the sender and the receiver. A computer “multiplexer” routes the voice signal of the sender through microwave towers to a very specifically defined location or cell. The “receiver” is located and tracked with pinpoint accuracy, to within a few feet of actual location. But the receiver is not a cell phone. It’s a human brain.

Animation1

Out of nowhere, a voice suddenly blooms in the mind of the target. The human skull has no “firewall” and therefore cannot shut the voice out. The receiver can hear the sender’s verbal thoughts. The sender, in turn, can hear all of the target’s thoughts, exactly as if the target’s verbal thoughts had been spoken or broadcast. For this reason, the experience could be called “hearing voices” but is more properly described as “artificial telepathy”.

Now, if artificial telepathy were entirely voluntary, like a conversation between friends sitting across the room from one other, it might be kind of cool. One could talk back and forth with one’s friend, exchanging verbal thoughts exactly as if speaking on the phone, but without ever using one’s voice or mouth. It’s a completely silent, subvocal form of speech. Between lovers, this would be beautiful.

The problem is that artificial telepathy provides the perfect weapon for mental torture and information theft. It provides an extremely powerful means for exploiting, harassing, controlling, and raping the mind of any person on earth. It opens the window to quasi-demonic possession of another person’s soul.

new york times

bluered.gif (1041 bytes)

When used as a “nonlethal” weapons system it becomes an ideal means for neutralizing or discrediting a political opponent. Peace protestors, inconvenient journalists and the leaders of vocal opposition groups can be stunned into silence with this weapon.

Artificial telepathy also offers an ideal means for complete invasion of privacy. If all thoughts can be read, then Passwords, PIN numbers, and personal secrets simply cannot be protected. One cannot be alone in the bathroom or shower. Embarrassing private moments cannot be hidden: they are subject to all manner of hurtful comments and remarks. Evidence can be collected for blackmail with tremendous ease: all the wrongs or moral lapses of one’s past are up for review.

Brain mind uploading

Like a perverted phone caller, a hostile person with this technology in hand can call at any time of day, all day long. Sleep can be disrupted. Prayers can be desecrated, religious beliefs mocked. Business meetings can be interrupted, thoughts derailed. Love can be polluted, perverted, twisted, abused. Dreams can be invaded, fond memories trashed.

The attacker cannot be seen or identified, the attack cannot be stopped, and the psychological damage is enormous. But there is no physical damage, not one single mark is left on the body and there is absolutely no proof that any crime or any violation ever took place! Everything that “happens” to the victim happens inside the victim’s head. What physical evidence is there to give the police? Without physical evidence, how can one photograph the “crime scene” or fingerprint the stalker? There are no footprints leading to or from the scene. Indeed, there is no physical scene at all, and no evidence that an attack ever took place.

Most people who experience this abusive form of “artificial telepathy” feel as if their mind has been raped. They find themselves hunted, stalked, harassed and abused by a person or persons who refuse to give their names, who defile one’s mind with the most foul and perverse language imaginable, and who refuse to hang up or go away. The caller or callers delight in the perverse and sadistic torture of their targets. Furthermore, they delight in violating the privacy of their targets, reading the target’s mind and commenting on everything the target thinks, in an effort to demonstrate as brutally as possible that the target has no privacy at all.

Imagine what a man might do if he found a ”cell phone” that allowed him to dial into the heads and the private thoughts of anyone on earth. The temptation to choose a target at random and start spying on or abusing that person would be enormous, almost irresistable. It could become a sick and twisted hobby, a guilty pleasure very quickly. Put into the hands of a secret police unit, the potential for abusing such technology is even more chilling.

bluered.gif (1041 bytes)

synthetic telepathy

bluered.gif (1041 bytes)

Synthetic Telepathy system, would be intelligence gathering and interrogation. As a communication system, it would have a limited appeal as any nation with a similar setup could either listen in, or pretend to be the A.I. interface. As such, it raises important ethical and legal questions, especially the question of secrecy given that all major governments would be aware of the system. Given that no law permits this type of interrogation, its secrecy may be more to do with criminal activity on behalf of the security agencies, rather than national security.

Its All About The Transceiver!

To understand how this works, it is best to start with the target, then trace backwards and identify each of the required subsystems. If we look at the last diagram to the left, we can see that the key to this system is its ability to both listen and respond to the electrical activity of the brain implant from satellite.

bluered.gif (1041 bytes)

Computerbrain

bluered.gif (1041 bytes)

Now, the natural reaction of a normal and intelligent person who undergoes the horrible experience of mind rape for the first time is to panic and reach for a real phone. They call family, contact their doctor or call police with a bizarre complaint that “someone is beaming voices into my head.”

But if the police are the ones behind the abuse, the victims aren’t going to get much help, are they? And if the police are not the perpetrators, then how are they to make an arrest? It’s much more convenient and easy to believe that the caller is a nutcase.

In short order, the victim of mind rape finds herself or himself undergoing the additional humiliation of being carted off to the psych ward, often being committed involuntarily by a loved one “for one’s own good.”

The more vehement the efforts to prove that the voice or voices in one’s head are “real”, the more smug become the smiles of the medical doctors, who gently insist that such technology does not exist, that the voices cannot possibly be real, and that one must take a powerful, down for a good long rest.

bluered.gif (1041 bytes)

The experience of “hearing voices” — especially voices that give a running stream of negative abuse — will gain one automatic admission to the rubber room. Indeed, hearing voices is a classic example of schizophrenia. If you hear voices, you are, by definition, crazy.

Yet when released from the psych ward with an expensive supply of meds, “voice hearers” often find that the meds are ineffective — exactly as one would expect if their problem had nothing to do with brain chemistry and everything to do with a bio-electronic attack by unseen stalkers.

Voice hearers often puzzle psychiatrists, because many of them don’t fit the classic model of schizophrenia, which usually begins onset in the early twenties. The victims of Synthetic telepathy “artificial telepathy” are often well into their thirties or fourties and many have no prior history of serious mental illness or drug abuse. Many seem to be alert, healthy, and rational even while insisting that they can hear voices. They agree with the psychiatrists that, yes, they are depressed, but who wouldn’t be a bit depressed under such trying circumstances? To be stalked and verbally bullied every waking hour of the day is a form of mental torture.

Technology Trapping Figure

Victims of mind rape quickly learn not to discuss their “psychological problems” with family and coworkers. It’s embarrassing, it’s bizarre, it gets very little sympathy and only serves to alarm most people. The only way that another person can “help” is to suggest that the mind rape victim see a psychiatrist, who will promptly double one’s dose of psych meds and antidepressants. The result is a very stiff medical bill, which only adds financial pain to the mix. And the verbal harassment continues.

As they learn to endure their daily torture, voice hearers can usually return to mainstream life, where they are able to carry on intelligent, coherent conversations, hold down jobs, and function quite normally. In fact, if they don’t discuss their “problem” they usually can’t be told apart from normal people on the street. Because they are normal people.

bluered.gif (1041 bytes)

The growing number of voice hearers in our society is therefore well masked. Those who continue to insist that there is a “secret society of people beaming voices into our heads” are simply laughed into silence or labelled paranoid schizophrenics. They are completely discredited. In fact, many voice hearers have internalized the idea that they are mentally ill, and they struggle to understand how their “auditory hallucinations” could continue to seem so very, very real.

Naturally, many of these voice hearers are deeply confused. They turn to support groups, including such on-line communities as the Voice Hearers’ support group at Yahoo.com.

Anyone who doubts that “artificial telepathy” exists need only contact such a Voice Hearers community, where they will encounter people who continue to insist that they are being harassed by real people using an unknown or unexplained technology.

bluered.gif (1041 bytes)

Surprisingly, there is a tremendous amount of scientific literature and circumstantial evidence to back up that claim.

In the following posts, we will explore the history of synthetic telepathy and learn the names of the scientists who developed this sinister technology. We will also identify and examine some of the government agencies that are fielding and using this weapon of torture against innocent civilians.

bluered.gif (1041 bytes)

By Magnus Olsson Mindtech (Sweden)

Brain “Mind”Link Technology

The NSA – Behind The Curtain

consciousness

bluered.gif (1041 bytes)

Today we will take an in-depth examination of the NSA’s global intelligence gathering network. What you are about to read will come as an eye-opener and represents the current state of the NSA’s capabilities. Some of this will be expected, some of it will come as a shock.

What you will learn is that the technology that underpins this global listening network is a lot more advanced than governments would have you know. Usually wrapped up in basic, generalised, descriptions the general public is kept blind to the current state of technological development.

We will take this examination in three major parts. The first part will examine the core processing system. Once this part is understood, we can then look at how information flows to and from this core and where it is obtained from. Finally, we will examine how this information is used by the NSA.

I will cover as much as possible about this system, but the scope is very large. In general, any use of this data that the reader can observe is most likely already being conducted.

bluered.gif (1041 bytes)

The scope of the NSA’s infrastructure is mind boggling to say the least. Heavily compartmentalised, the entire array of systems is shielded from the average NSA employee as much as it is shielded from the public. That said, once you understand the core of the NSA, you will be in a position to see how information flows in and out of this core.
The NSA is built around a super-computer bound Artificial Intelligence known only as “Mr Computer” in the civilian world. This is not your average A.I., no basic set of responses or a mere dedicated algorithm that can spot patterns. Mr Computer is an entity or being in his own right. A sentient computer s The scope of the NSA’s infrastructure is mind boggling to say the least. Heavily compartmentalised, the entire array of systems is shielded from the average NSA employee as much as it is shielded from the public. That said, once you understand the core of the NSA, you will be in a position to see how information flows in and out of this core.

bluered.gif (1041 bytes)

The scope of the NSA’s infrastructure is mind boggling to say the least. Heavily compartmentalised, the entire array of systems is shielded from the average NSA employee as much as it is shielded from the public. That said, once you understand the core of the NSA, you will be in a position to see how information flows in and out of this core.

Mr Computer

The NSA is built around a super-computer bound Artificial Intelligence known only as “Mr Computer” in the civilian world. This is not your average A.I., no basic set of responses or a mere dedicated algorithm that can spot patterns. Mr Computer is an entity or being in his own right. A sentient computer system as complex as any human.

Comparable to VMware in a way, an instance of Mr Computer can be started at a moments notice. Within seconds, a fully fledged virtual intelligence agent, ready to analyse the information that has been piped to him, can be up and running.

Mr Computer is competent enough to handle real-time interaction without human intervention. Mr Computer understands and speaks all modern languages and even a number of dead ones. Able to intelligently converse and express its own opinions, Mr Computer collates information from disparate sources and compiles them into concise reports that do not miss the smallest detail or nuance.

Mr Computer’s capabilities and human-like reasoning cannot be understated.

Read moore: http://www.mindcontrol.se/?page_id=6776

LINKING LIFE AND TECHNOLOGY

 

LINKING LIFE AND TECHNOLOGY

ELLEN M. McGEE a1 and GERALD Q. MAGUIRE JR. a2
a1 Long Island Center for Ethics, Long Island University, New York
a2 Royal Institute of Technology, Stockholm, Sweden
 
 
 

Revolutions in semiconductor device miniaturization, bioelectronics, and applied neural control technologies are enabling scientists to create machine-assisted minds, science fiction’s “cyborgs.” In a paper published in 1999, we sought to draw attention to the advances in prosthetic devices, to the myriad of artificial implants, and to the early developments of this technology in cochlear and retinal implants. Our concern, then and now, was to draw attention to the ethical issues arising from these innovations. Since that time, breakthroughs have occurred at a breathtaking pace.

Scientists, researchers, and engineers using differing methodologies are pursuing the possibilities of direct interfaces between brains and machines. Technological innovations as such are neither good nor evil; it is the uses devised for them that create moral implications. As there can be ethical problems inherent in the proper human uses of technologies and because brain chips are a very likely future technology, it is prudent to formulate policies and regulations that will mitigate their ill effects before the technologies are widespread.

Unlike genetic technologies, which have received widespread scrutiny within the scientific community, national governments, and international forums, brain–machine interfaces have received little social or ethical scrutiny. However, the potential of this technology to change and significantly affect humans is potentially far greater than that of genetic enhancements, because genetic enhancements are inherently limited by biology and the single location of an individual, whereas hybrids of human and machine are not so restricted.

Today, intense interest is focused on the development of drugs to enhance memory; yet, these drugs merely promise an improvement of normal memory, not the encyclopedic recall of a computer-enhanced mind combined with the ability to share information at a distance.

The potential of brain chips for transforming humanity are astounding. This paper describes advances in hybrid brain–machine interfaces, offers some likely hypotheses concerning future developments, reflects on the implications of combining cloning and transplanted brain chips, and suggests some potential methods of regulating these technologies. a


Footnotes

a We are grateful to Prof. Michah D. Hester for helpful comments on this article

Link original:   http://journals.cambridge.org/action/displayAbstract?fromPage=online&aid=1017164