Essential Quotes

I have sworn on the altar of God eternal hostility against every form of tyranny over the mind of man.
Thomas Jefferson

Thursday, June 22, 2006

Electromagnetics and the Mind

???????? The ultimate goal of all psychological operations, has always been to capture the 'hearts and minds' of those of the enemy. Forms of PSYOP have existed for nearly as long as war itself, but with the advent of information warfare, PSYOP is seen as a manipulation of the processor of information ? the mind itself. Though these operations have traditionally been relegated to presenting information that produces a desired impact on the mind, only with recent advances in neuroscience have we begun to understand altering how that information processed. This alteration has come initially in hypnosis and psychoactive drugs, but more importantly, in certain forms of radiation and their interactions with the electrochemical brain. Where drugs and hypnosis can be considered 'invasive' techniques, requiring physical proximity, radiated energy can be applied over great distances, with less probability of detection.?

http://web.archive.org/web/20041108094123/www.geocities.com
/ResearchTriangle/Lab/6570/emr.html

Copy and edit the whole link, disregard the blue.

Thursday, June 15, 2006

ARTICLES OF IMPEACHMENT


Articles of Impeachment of President George W. BushandVice President Richard B. Cheney, Secretary of State Condoleezza Rice,Secretary of Defense Donald H. Rumsfeld, and Attorney General Alberto Gonzales.

The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors. - - ARTICLE II, SECTION 4 OF THE CONSTITUTION OF THE UNITED STATES OF AMERICA

http://www.impeachbush.org/site/News2?page=NewsArticle&id=5054&security=1&news_iv_ctrl=1061

Wednesday, June 14, 2006

Opinion: Why NSA spying puts the U.S. in danger

Excerpt: As a former NSA analyst, I'm dismayed by the continuing revelations of the National Security Agency's warrantless -- and therefore illegal -- spying. The case involves fundamental issues related to NSA’s missions and long-standing rules of engagement. What's even more dismaying is the lack of public reaction to this.

http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9000515

Surreptitious Acoustic Signal Modulation, Voice Projection, and Direct Brain Interface

This article deals with the technology to surreptitiously or overtly send "voices" to people. This is a longtime dream of psychological warfare and operations people, and much research and development has gone into it. Huge sums of money have been spent developing ways to send voices, in any and all ways, to targeted people. Many technologies are openly known to exist, and more sophisticated ones no doubt exist in secret. One name for this is synthetic telepathy; another is voice-to-skull (v2s) technology. I also discuss methods for sensing brainwaves and converting these to voice signals, i.e., brainwave-to-voice (b2v) devices.

http://web.archive.org/web/20050214103027
/www.datafilter.com/alb/acousticModulationAndBrainInterface.html

copy and paste complete link, ignore highlighted portion.

Young People of America…… Rise Up and Rebel!

http://www.informationclearinghouse.info/article13610.htm

Crimes Against Humanity

These pages contain documents, links, references, and commentary related to mind control. Mind control is the term in common usage to describe covert behavior modification techniques and the use of neuro-influencing technology. The main focus of these pages is mind control using electromagnetic and acoustic devices, though the use of drugs, hypnosis, and induced trauma also appears. Focusing too closely on one technique can obscure the fact that the methods may be used in concert with each other, and focusing too closely on the technology alone can obscure the tactics which employ the technology. The political aspect of mind control concerns its use in a "free" society: the testing of the technology on nonconsensual subjects, its use in political persuasion and in suppressing dissent, as well as how the very existence of the technology is covered up and concealed.

http://web.archive.org/web/20050308013158/www.datafilter.com/mc/

Pass it on.

Monday, June 12, 2006

Blast From The Past

FINAL REPORT OF THE SELECT COMMITTEE TO STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO INTELLIGENCE ACTIVITIES UNITED STATES SENATE. {APRIL 23 (under authority of the order of April 14), 1976}

NATIONAL SECURITY AGENCY SURVEILLANCE AFFECTING AMERICANS

This report describes the Committee's investigation into certain questionable activities of the National Security Agency (NSA). 1 The Committee's primary focus in this phase of its investigation was on NSA's electronic surveillance practices and capabilities, especially those involving American citizens, groups, and organizations.
NSA has intercepted and disseminated international communications of American citizens whose privacy ought to be protected under our Constitution. For example, from August 1945 to May 1975, NSA obtained copies of many international telegrams sent to, from, or through the United States from three telegraph companies. In addition, from the early 1960s until 1973, NSA targeted the international communications of certain American citizens by placing their names on a "watch list." Intercepted messages were disseminated to the FBI, CIA, Secret Service, Bureau of Narcotics and Dangerous Drugs (BNDD), and the Department of Defense. In neither program were warrants obtained.

The activities that were uncovered 30 years ago by this committe have not stopped, they are still going on with more secrecy and less oversight, all in the name/excuse of National Security. I guess when one hears these words we are all supposed to stop thinking and trust these criminals with whatever they want to do.

This link will take you to the official report written on these activities. Google can get you to the rest of the reports of the whole investigation.

http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIj.htm

THOUGHT READING CAPACITY

The Bible attributes to God the capacity to know the thoughts of men. Most scientists are unaware that thought reading by electroencephalogram (EEG) was reported as feasible in work begun over 30 years ago, which more recently a number of groups confirm. This review focuses on literature relating to technologic thought reading. The discrimination of more general cognitive states, brainwave capture methods, and evidence of covert thought reading development are also treated.

"Anyone who tells you that 'It Can't Happen Here' is whistling past
the graveyard of history. There is no 'house rule' that bars tyranny
coming to America. History is replete with republics whose people
grew complacent and descended into imperial butchery and chaos." --
Mike Vanderboegh : (1953- ) Alabama Minuteman

The following is an article about the capability of thought reading. This technology exists and is being used in this country by criminals in various intelligence and law enforcement agencies. Developments like these and there uses are kept secret and are created under what is called a SAP which stands for Special Access Program. Two famous SAP programs that were developed in this country and were undetected for years were the creation of the NSA and the NRO. So let us speak no longer of Conspiracy Theories and let's start talking in terms that make sense and are real like SAP's. If the language in the article is to technical then have somebody explain it to you. If the information is not plausible to you,then go back to watching American Idol. Thanks.

http://www.slavery.org.uk/ThoughtReadingCapacity.htm

Propaganda and Haditha

Propaganda and Haditha

In wartime, truth is so precious that she should always be attended by a bodyguard of lies. - Winston Churchill, British Prime Minister during World War II

This piece is a summary of five most commonly deployed crisis management propaganda tactics which the State and Media combine that we can expect to see in relation to the Haditha Massacre. Listed in a loose chronological order of their deployment, the tactics are: Delay, Distract, Discredit, Spotlight and Scapegoat. Each of the five public relations campaigns will here be discussed in the context of the Haditha Massacre.

http://www.informationclearinghouse.info/article13563.htm

Saturday, June 10, 2006

NSA Post Hypnotic Scripts

NSA's Subliminal Posthypnotic Scripts

Subliminal implanted posthypnotic suggestions and scripts using acoustically delivered and phonetically accelerated posthypnotic commands without somnambulistic preparation in the subject for intelligence and counterintelligence applications by the United States National Security Agency.

http://www.mindcontrolforums.com/subliminal-posthypnotic-scripts-nsa.htm

Wake up !!!!!!!!!!!!

Monday, June 05, 2006

Normalizing The Unthinkable

John Pilger, Robert Fisk, Charlie Glass, and Seymour Hersh on the failure of the world’s press.

http://www.informationclearinghouse.info/article13492.htm

Here we go again.