Önskar Alla i bloggosfären ett riktigt GOTT NYTT ÅR 2010! –Samtidigt vill jag passa på att rikta Allas uppmärksamhet mot följade: Vi bevittnar alla skapandet av det ”Globala Elektroniska Koncentrationslägret” och kriser, konflikter och krig används för att motivera implementeringen!

”Människan tenderar att darra inför en tänkt fara, men är för lat för att se den riktiga faran”. – Douglas Reed.

Läs gärna Olga Chetverikovas artikel om den nya världsordningen (NWO).

Med stormsteg mot ett psykociviliserat samhälle! Nya teknologier implementeras för övervakning och social kontroll: Trådlösa teknologier riktas mot individens kropp för att uppnå specifika mål i hjärnans neuronfunktioner…

Av Dr. Kingsley Dennis

Teknik som trådlöst kan överföra information till och från kroppen är ett forskningsområde som har lockat olika intressenter efter andra världskriget. Sådan energi-information distribution och inriktning inom det elektromagnetiska spektrumet kan omväxlande användas för medicinska, industriella, militära och telekommunikation syften. Jag kommer nu att undersöka en del av den militär-industriell forskningen och användningen av trådlös teknik. Fortsättningen finns att läsa här: Global Research

Väderkrigsföring, USA:s militär använder vädermodifiering som ett vapen

Det ska vara svårt för statsledningsgrupper att transformera fakta om vädermodifieringar till Informations Operationer (propaganda) för att lyda under klimatförändringar!

Väderkrigsföring – Weather Warfare – the Invisible US Military Offensives in Weather Weaponry

Länkar till man-made jordbävningar, översvämningar och torka…

Intressant länk: Chemtrails – HAARP – Massmind-Control/Tanke-kontroll

Direct Human Brain – AI – Interface System Technologies

Direct Human Brain – AI – Interface System technologies

© by Gina Rydland
published: 29.11.08

Lack of factual information creates a naive conception of the development process of technologies sanctioned as safe to use, clouding the public debate and undermining sufficient grounds for government decision making. Securing human rights and safety when testing and implementing safe-to-use technologies demands access to more specialized and accurate knowledge than today’s global political, military and industrial climate permits.

Rigorous monitoring by government ministries and committees, human rights organizations, and the public is an essential tool to secure against abuse and violation of human rights. Brain and body (non) invasive technologies represents new opportunities for manipulation and control and should be addressed in proper foras. Foras inside the military and industry have long since been established, but little has been done to bring an accurate and deeper description of relevance out to the public. The industry mainly address the public as consumers, which is rooted in the very nature and goal of military-industrial research and development, failing to emphasize security issues involving public health and environment.

Moving into the area of direct human brain – AI – interface systems, information available is at best sketchy. However, obscure signals within public research and development shows that a variety of sponsors are making development of such technologies not only feasible but operational without public knowledge and debate. The schedule for releasing [less] advanced human brain – AI – interface technologies meant for the public market may seem uncertain. Examples include the following: Diagnostics and treatment of psychiatric disorders and diseases rooted in the brain or physical or mental trauma; the learning process, behavior, education and communication; and, enhancement of brain functions, intelligence and capacity.

The details of today’s practical applications and the liability of the direct human brain – AI – interface system in use for intelligence needs remain non-disclosed. The road to a global, fully operational and economically viable DHB – AI – IS (Direct Human Brain – AI – Interface System) is likely to be a continuing challenge for many decades. The discovered potentials outweigh the time and resources used for research and development, making it a high priority. An intelligence acquisition and surveillance system based on a fully operational direct human brain – AI – interface technology will reshape military warfare, intelligence communication and operations.

The precautionary principle will never be sufficient to protect individuals or society from harm when the military industry pushes for further development of DHB – AI – IS. The only reliable way to develop safe-to-use technologies is, unfortunately, to run full scale tests on place and in realtime situations.

Inside the military industry, monitoring of professional and technical aspects during a development process is highly organized. In contrast, control and mapping of the effects on environment, society, health, and individuals during full scale implementation is too complicated, demanding vast resources, leaving an incomplete overview.

The public means to supervise and control how law and ethics is practiced inside classified research and development projects involving human experimentation is non-existent. A broader cooperation and a more open dialogue between representatives from military industries and intelligence, government, human rights organizations and the public needs to be established to protect the individual and society from harm in the process of development.

The potential negative effects of the DHB – AI – IS on humans and environment demands trained personnel to provide advice and information on several levels of society. To the victims, psychological and medical help, economical support and the provision of a lawyer, is decisive. This type of specializing in regards to DHB – AI – IS technologies is yet to be established inside the public domain.

The present situation leaves no hope of an immediate solution where law is able to protect humans or society against experiments conducted in classified research projects.

IRPT works for a broader understanding and openness regarding these issues to, at least, be able to help and support victims of research and development of DHB – AI – IS technologies. Acknowledgement from government resulting in new legislations and drastic actions to ensure the safety of humans and the environment is of vital importance.

Updated: 11.12.2008

Direct Human Brain – AI – Interface System Technologies

Jonathan Livingston Seagull – Be

Space Preservation Treaty/Peace in Space/ICIS – en lite annorlunda stavning av ISIS, som enligt myten var Egyptisk Drottning.

Peace in Space

U.S. Space Preservation Act

——————————————————————————–

HR 3657 IH

108th CONGRESS
1st Session
H. R. 3657

To preserve the cooperative, peaceful uses of space for the benefit of all humankind by prohibiting the basing of weapons in space and the use of weapons to destroy or damage objects in space that are in orbit, and for other purposes.

IN THE HOUSE OF REPRESENTATIVES

December 8, 2003

Mr. KUCINICH (for himself, Mr. HOEFFEL, Mr. CONYERS, and Mr. HINCHEY) introduced the following bill; which was referred to the Committee on Science, and in addition to the Committees on Armed Services and International Relations, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned.

Article II

Definition of Terms in this Treaty

For purposes of this Treaty:

a) The terms ”space” and ”outer space” mean all space extending upward from an altitude greater that 100 kilometers above Earth’s sea level;

b) The term “outer space object” or “space-based object” means any device, designed for functioning in outer space, being launched into an orbit around any celestial body, or being in the orbit around any celestial body, or on any celestial body, or leaving the orbit around any celestial body towards this celestial body, or moving from any celestial body towards another celestial body, traveling or placed in outer space by any other means;

c) The “use of force” or “threat of force” means any hostile actions against

outer space objects or beings in outer space including, inter alia, those aimed at their destruction, damage, temporarily or permanently injuring, normal functioning, deliberate alteration of the parameters of their orbit, or the threat of these actions.

d) The term “space-base weapon” means and includes, without limitation:

(i) any device placed in outer space, based on any physical principle, specially produced or converted to eliminate, damage or disrupt normal function of objects in outer space, on the Earth or in its air, as well as to eliminate population, components of biosphere critical to human existence or any form of life or beings, or to inflict damage on them. A weapon will be considered as “placed” in outer space if it orbits the Earth at least once, or follows a section of such an orbit before leaving this orbit, or is stationed on a permanent basis somewhere in outer space.

(ii) any device in space that is capable of any of the following:

(1) damaging or destroying an object (whether in outer space, in the atmosphere, or on Earth) by–

(A) firing one or more projectiles to collide with that object;

(B) detonating one or more explosive devices in close proximity to that object;

(C) directing a source of energy against that object, including molecular or atomic energy, subatomic particle beams, electromagnetic radiation, directed energy, plasma, or extremely low frequency (ELF) or ultra low frequency (ULF) energy radiation or some other source;

(D) employing magnetic energy in any way, including to propel projectiles; or

(E) employing any other unacknowledged or as yet undeveloped means of damaging or destroying.

(iii) any device placed in space capable of, or intended for, inflicting death or injury on, or damaging or destroying, a being or a population, or the biological life, bodily health, mental health, or physical and economic well-being of a being or a population,

(1) through the use of space-based weapons systems using radiation, electromagnetic, sonic, laser, directed energy or other energies directed at individual beings or targeted populations for the purpose of electronic harassment, mood management, or mind control of beings or populations;

(2) by expelling chemical or biological agents in the vicinity of a person or being in space;

(3) through the use of any of the means described elsewhere in this Article I(d).

(iv) any device placed in space and intended or mandated as a weapon, including but not limited to the following:

(1) electronic, magnetic, electromagnetic, or information weapons;

(2) high altitude ultra low frequency weapons systems;

(3) plasma, electromagnetic, magnetic, sonic, or ultrasonic weapons;

(4) laser and directed energy weapons systems;

(5) strategic, theater, or tactical weapons or weapons;

(6) chemical, biological, environmental, climate, or tectonic weapons; and

(7) weapons originating from Off-planet cultures.

(e) Space-based environmental weapons – The term “space-based weapon” shall also include, and not be limited to:

(i) any weapons system which weaponizes a natural ecosystem in space;

(ii) any weapons system one of whose components is placed in space and one of whose components weaponizes a natural ecosystem such as the ionosphere, upper atmosphere, climate, weather or tectonic systems.

(iii) any weapons systems using ”scalar wave interferometry,” a technology where two or more longitudinal, ultra-low frequency waves are “aimed” at an intersecting point, at which time they interact in a unique way, using this scalar energy to weaponize the Ionosphere (60 – 800 km in altitude), which is in space. Such space-based ”scalar wave interferometry” weapons system weaponizes the Ionosphere in order to carry out the following types of space-based weapons attacks:

(1) SDI (Strategic Defense Initiative) space-based radiofrequency weapon;

(2) Space-based environmental weapon – Weather, climate & earthquake (tectonic) warfare;

(3) Space warfare weapons system;

(4) Space-based Missile defense system;

(5) Space-based scalar energy warfare against land and population targets, including cities, industrial sites, buildings, populations and beings;

(6) Space-based extremely low frequency (ELF) weapon for electromagnetic harassment and mood manipulation of target populations and beings;

(7) Space-based biological and binary weapons system against populations and beings;

(8) Damage or destruction upon a space object, a target population, being, municipality or region on land, air or in space.

(f) The term “being” shall include and not be limited to any human being, animal, and any living being on Earth or in Space.

Hjärna – Dator – Interaktion – ett sofistikerat osynligt krig med avancerade bio- och psykoteknologier pågår i de svenska folkhemmen!!

 

Start

HAR DU HJÄRNAN PÅ NÄTET?

MED ETT DATOR-HJÄRNA-GRÄNSSNITT I CLOUD/GRID COMPUTING” KAN PROGRAMVAROR LÄRA SIG LÄSA DINA TANKAR

start

Vetenskapsrådet kallar det

”EN NY INDUSTRIELL REVOLUTION”

Sveriges allmänna medvetande är obefintligt gällande datorns intrång i den mänskliga hjärnan. Hur länge det skall vara så är upp till media?

Bortom allmänhetens vetskap utvecklas morgondagens kvantdatorer med artificiell intelligens och dator-hjärna-gränssnitt i nanostorlek.

Nano-implantat med nätverksbaserad morfologisk informationsteknik och kvantbildbearbetning kan göra människan till en multimediamaskin. Tvärvetenskaplig forskning gör nu människan transparent. Ditt egna jag kan visualiseras via internet.

EU- forskning är världsledande inom ett flertal discipliner vilka möjliggör denna forskning och utveckling.

EU-prioriterad IKT och FET forskning kan sedan länge med nätverksbaserade  radiokameror lyssna och på människors tal oavsett miljö. I cloud/grid computing kan kameraprogram i datorn göra avbildningar med ljud ifrån insidan av byggnader.

I de nya forskarnäten kan forskare via ett injicerat  dator-hjärna-interface logga in på människor för att studera dem i sin naturliga miljö.

I Justitiedepartementet Ds Ju 1986:5 om”Forskning och integritet står att  läsa om forskarnas rätt att fritt välja metoder för att inhämta mätdara. Detta är en olycklig kpmbination med den nya informationstekniken.

Frågan är om regeringen känner till hur EU prioriterad IKT och FET forskning tillämpas på människor utan deras samtycke?

Fleråriga inspelningar med dator-hjärna-gränssnitt ger forskningen via den nya informationstekniken den mest avancerade högupplösta avbildningen av hjärnans kognitiva beteenden och perception någonsin. I automatiserade dygnet runt forskningsstudier med konstant hjärn stimulans visualiseras ”minnets motorväg”. Datorerna spelar in materialet och klonar ditt jag. Ditt egna jag blir offentlig.

Etiska debatter gällande dator-hjärna-interaktion med i Europas nya höghastighetsnät är obefintlig i Sverige och måste omedelbart tas upp i media!

Fakta om nano! Läs Vetenskapsrådets
DÄR GULD GLIMMAR BLÅTT -forskare om den lilla nanorevolutionen

2000-Talets Forskning skriver om ”Implantat för hälsa och mindcontrol” i nästkommande nummer! Klicka här för att prenumerera på tidningen.

————————————————————————————————-

”Nya metoder skapas som förändrar forskningen ”

Nedan följer ett utdrag ur EU-kommissionens uppmaning 2009 04 20 till Europa för investeringar inom det 7:e ramprogrammet. Dokumentet är en uppmuntring ifrån EU om forskning och utveckling av dator-hjärna-inteface och tillhörande kvantinformationsteknik.

”IKT” (Information and kommunication technologies)
”FET” (Future and Emerging Technologies)

”Kan man t.ex. förstå och utnyttja de sätt på vilka sociala och biologiska system organiserar sig och utvecklas, banas väg för utvecklingen av nya möjligheter för nästa generations programvara och nätverksteknik”

”Förståelsen av hur den mänskliga hjärnan fungerar leder inte bara till innovationer på medicinens område, utan skapar även nya modeller för energibesparande, feltolerant och anpassningsbar datateknik”

”FET-stödet har t.ex. varit avgörande för forskningen inom kvantinformationsteknik i Europa. Denna teknik utlovar en enorm datorkraft långt utöver den kapacitet som vanliga datorer har och dessutom fullständigt säker kommunikation. Genom tidiga investeringar har FET-programmet på ett avgörande sätt bidragit till att Europa nu är världsledande på området”

”På FET-området bedriver man dessutom pionjärarbete kring nya idéer som artificiella levande celler, syntetisk biologi, kemisk kommunikation, kollektiv intelligens och tvåvägsgränssnitt mellan hjärna och maskin”

”Inom Espritprogrammet tillhandahölls mycket tidigt stöd på FET-området för forskning om mikro-, nano- och optoelektronik, mikrosystem och fotonik. Avancerade forskningsområden som utforskats på 1990-talet blev allmänt utbredda inom den industridrivna IKT-forskningen”

”FET-forskningen om komplexa system har skapat ett nytt forskningsområde och banat ny väg för många vetenskapsområden. Genom att modellera komplexa tekno-sociala systems beteenden och utveckla IKT-verktyg för att styra hot som uppstår i sådana system (t.ex. finansmarknader eller spridning av smittsamma sjukdomar) bidrar denna forskning till bättre,vetenskapligt baserade politiska beslut och till helt nya modeller för emotionellt intelligenta och tillförlitliga IKT-system”

”Målet för initiativet om virtuell humanfysiologi är individuellt anpassad simulering av människans kropp och man väntar sig enorma framsteg när det gäller sjukdomsförebyggande hälso- och sjukvård.

Här kombineras insatser på flera områden inom ramprogrammet med globalt samarbete, i synnerhet med USA”

EU dokumentet finns i sin helhet under ”Arkiv” på Bionic Gate

————————————————————————————————–

Historik om implantat

Ledande svenska statliga företrädare, som Generaldirektör Stina Wahlström skrev i Datainspektionens årsbok redan 1989-1990 att det inte hörde hemma i ett demokratiskt samhälle att utnyttja människor i forskningsprojekt bortom deras vetskap eller emot deras vilja.

Statsrådet Alva Myrdal skrev redan 1972 i ”Sverige väljer framtid” att befolkningen skulle få svårt att skydda sig mot intrång i sina hjärnor med manipulerade beteenden.

Den svenske professorn Göran Hermerén är ordförande för EU-kommissionens etikråd, som utgav ett 30-sidigt dokument där de protesterade mot implantat för att styra människors vilja, injicerade i människor bortom deras egen vilja.

————————————————————————————————-

Detta pågår bortom allmänhetens vetskap

Multidiciplinär forskning har med injicerbara dator-hjärna-gränssnitt nu kommit så långt att man utvecklar datorer och informationssystem som kan 2-vägs distanskommunicera med människans nervceller och neuroner i cloud/grid computing. Utveckling av implantat startade redan på -70 talet, med nano och kvantinformationstekniken har teknologin nu fått ett genombrott. På samma sätt som det går att kopiera en hårddisk till ett webb hotell kan nanosensorer via cloud/grid miljö kopia hjärnan. En möjlighet till total distans visualisering av människan har uppstått.

Under fleråriga avbildningar med tekniken i automatiserade forskningsprocesser (lärande system) lär sig datorer med morfologiska avbildningssystem (avancerade mönstermachningsprogram) att avkoda och läsa mänskliga nervceller, neuroner och människans tankar.

För att förstå denna utveckling och dess potentialer, läs om University of Kalifornia Irvin vilka utvecklar syntetisk telepati och dator-hjärna-interface.

Läs även om UCI´s nero science. Klicka runt på UCI´s sidor för att förstå det enorma forskningsområde som öppnats i och med multidiciplinär forskning på hjärnan.
USA publicerar och klargör utveckling av syntetisk telepati. I Sverige tycks denna forskning vara sekretessbelagd.

Fleråriga distansavbildningar med dator-hjärna-gränssnitt ger forskare ovärderlig information om människans kognitiva beteenden så som minne, inlärning och känsloliv samt kan med algoritmer inom kvantinformationstekniken kartlägga mänsklig perception. Informationen ger datorforskningen enorma försprång i utveckling av morgondagens datorer, datorer som kommer att innehålla artificiell intelligens och kunna känna igen mönster och ansikten.

Flerårigt avbildningsmaterial kan med datorsimulering också användas för att ”bakåtkompilera” hjärnan och i efterhand identifiera embryot till ett sjukdomsförlopp.

Distansavbildningstekniken är oerhört viktig för att utveckla morgondagens hälsoövervakning samt morgondagens läkemedel. Datorer kommer via implantat att kunna lära sig att identifiera embryot till sjukdomar och slå larm om ett sjukdomsförlopp innan komplikationer uppträder, t ex stroke, infarkt, cancer mm. Beträffande läkemedel så pågår forskning med dator-hjärna-gränssnitt som kan stimulera hjärnan på olika sätt.

———————————————————————————————

Tyvärr pågår Forskning på människor utan informerat samtycke

Försvarslösa försöksobjekt, många med familjer och barn har inom IKT och FET forskning i flera fall fått sina liv slagna i spillror av en datoriserad orgie i misshandel och hjärntvätt med de ”nya” IKT teknologierna.

Forskningen försöker genom utmattning och konstruktiv psykisk nedbryting se om det går att vänja försöksmänniskan vid implantaten. Implantaten används också för att ge fysiska smärtor via Internetuppkopplingen.

Forskare i Sverige har i stort sätt fria händer att själva välja metodik för att inhämta mätdata. Detta är en olycklig situation med dagens multidiciplinära FET forskning och framgångar inom IKT forskning.

Utdrag ur Ds Ju 1986:5

Etisk prövning förekommer inte i fall gällande forskning som utförs på människor med icke vetenskapligt tillkännagivna teknologier. Informerat samtycke kommer av naturliga skäl aldrig att kunna erhållas för plågsam forskning.

Utan tillkännagivande om forskning på människan med nano implantat och kvantinformationsteknik är situationen för samhället hotande då grava missbruk sker.

Människor med ett dator-hjärna-gränssnitt där syntetisk telepati är utvecklat fungerar som noder för illegal inspelning av samtliga människor som noderna talar med.

Finns implanterade noder redan placerade inom politiken och finansvärlden? Hur vet vi vem som har eller inte har implantat i framtiden?

Multidiciplinär forskningen har lagt locket på information beträffande dator-hjärna-gränssnitt för att obehindrat kunna använda den till att vidareforska med.

Sverige har i brist på kontroll och insyn i dessa verksamheter utvecklats till ett webbhotell med hjärnuppkopplingar för olika forskningsområden.

Forskare försöker oskadliggöra försöksobjekt i on-line uppkopplingarna genom att med hjälp av artificiell intelligens driva dem till vansinne. På så sätt undgår denna typ av forskning upptäckt.

Effekten av forskningens utövande på människor blir att läkare diagnostiserar forskningsobjektens symtom efter hitintills tillkännagivna diagnoser, vilket är att försöksobjekten lider av psykos.

Denna typ av forskning är inget annat än ”dolt” människoslaveri, människohandel och grov människotortyr.

Hur länge skall regeringen stödja överlagda mordförsök med sin avsaknad av adekvat rättsinstans för multidiciplinär IKT och FET forskning?

————————————————————————————————-

Ett samarbete med BIONIC GATE

Det handlar om att med information skapa ett allmänt medvetande och en etisk debatt om denna forskning för att snarast få en lagstiftning mot missbruk av den.

Det handlar om att identifiera vem eller vilka i Sverige som illegalt utför forskning med IKT implantat och datorer på människor under tortyrformer.

Det handlar också om att skapa opinion för att omedelbart kunna stoppa pågående osynlig våldtäkt med on-line implantat på försökspersonerners hjärnor och kroppar.

BIONIC GATE samarbetar med media och offer för denna forskning.

Kontakta oss via kontaktformuläret.

 

The Mind Has No Firewall

”The Mind Has No Firewall”
Army article on psychotronic weapons

>>> The following article is from the US military publication Parameters, subtitled ”US Army War College Quarterly.” It describes itself as ”The United States Army’s Senior Professional Journal.” [Click here to read a crucial excerpt.]

 

”The Mind Has No Firewall” by Timothy L. Thomas. Parameters, Spring 1998, pp. 84-92.

The human body, much like a computer, contains myriad data processors. They include, but are not limited to, the chemical-electrical activity of the brain, heart, and peripheral nervous system, the signals sent from the cortex region of the brain to other parts of our body, the tiny hair cells in the inner ear that process auditory signals, and the light-sensitive retina and cornea of the eye that process visual activity.[2] We are on the threshold of an era in which these data processors of the human body may be manipulated or debilitated. Examples of unplanned attacks on the body’s data-processing capability are well-documented. Strobe lights have been known to cause epileptic seizures. Not long ago in Japan, children watching television cartoons were subjected to pulsating lights that caused seizures in some and made others very sick.

Defending friendly and targeting adversary data-processing capabilities of the body appears to be an area of weakness in the US approach to information warfare theory, a theory oriented heavily toward systems data-processing and designed to attain information dominance on the battlefield. Or so it would appear from information in the open, unclassified press. This US shortcoming may be a serious one, since the capabilities to alter the data- processing systems of the body already exist. A recent edition of U.S. News and World Report highlighted several of these ”wonder weapons” (acoustics, microwaves, lasers) and noted that scientists are ”searching the electromagnetic and sonic spectrums for wavelengths that can affect human behavior.”[3] A recent Russian military article offered a slightly different slant to the problem, declaring that ”humanity stands on the brink of a psychotronic war” with the mind and body as the focus. That article discussed Russian and international attempts to control the psycho-physical condition of man and his decisionmaking processes by the use of VHF-generators, ”noiseless cassettes,” and other technologies.

An entirely new arsenal of weapons, based on devices designed to introduce subliminal messages or to alter the body’s psychological and data-processing capabilities, might be used to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the various sensory and data-processing systems of the human organism. In both cases, the goal is to confuse or destroy the signals that normally keep the body in equilibrium.

This article examines energy-based weapons, psychotronic weapons, and other developments designed to alter the ability of the human body to process stimuli. One consequence of this assessment is that the way we commonly use the term ”information warfare” falls short when the individual soldier, not his equipment, becomes the target of attack.

 

Information Warfare Theory and the Data-Processing Element of Humans

In the United States the common conception of information warfare focuses primarily on the capabilities of hardware systems such as computers, satellites, and military equipment which process data in its various forms. According to Department of Defense Directive S-3600.1 of 9 December 1996, information warfare is defined as ”an information operation conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries.” An information operation is defined in the same directive as ”actions taken to affect adversary information and information systems while defending one’s own information and information systems.” These ”information systems” lie at the heart of the modernization effort of the US armed forces and other countries, and manifest themselves as hardware, software, communications capabilities, and highly trained individuals. Recently, the US Army conducted a mock battle that tested these systems under simulated combat conditions.

US Army Field Manual 101-5-1, Operational Terms and Graphics (released 30 September 1997), defines information warfare as ”actions taken to achieve information superiority by affecting a hostile’s information, information based-processes, and information systems, while defending one’s own information, information processes, and information systems.” The same manual defines information operations as a ”continuous military operation within the military information environment that enables, enhances, and protects friendly forces’ ability to collect, process, and act on information to achieve an advantage across the full range of military operations. [Information operations include] interacting with the Global Information Environment . . . and exploiting or denying an adversary’s information and decision capabilities.”[4]

This ”systems” approach to the study of information warfare emphasizes the use of data, referred to as information, to penetrate an adversary’s physical defenses that protect data (information) in order to obtain operational or strategic advantage. It has tended to ignore the role of the human body as an information- or data-processor in this quest for dominance except in those cases where an individual’s logic or rational thought may be upset via disinformation or deception. As a consequence little attention is directed toward protecting the mind and body with a firewall as we have done with hardware systems. Nor have any techniques for doing so been prescribed. Yet the body is capable not only of being deceived, manipulated, or misinformed but also shut down or destroyed–just as any other data-processing system. The ”data” the body receives from external sources–such as electromagnetic, vortex, or acoustic energy waves–or creates through its own electrical or chemical stimuli can be manipulated or changed just as the data (information) in any hardware system can be altered.

The only body-related information warfare element considered by the United States is psychological operations (PSYOP). In Joint Publication 3-13.1, for example, PSYOP is listed as one of the elements of command and control warfare. The publication notes that ”the ultimate target of [information warfare] is the information dependent process, whether human or automated . . . . Command and control warfare (C2W) is an application of information warfare in military operations. . . . C2W is the integrated use of PSYOP, military deception, operations security, electronic warfare and physical destruction.”[5]

One source defines information as a ”nonaccidental signal used as an input to a computer or communications system.”[6] The human body is a complex communication system constantly receiving nonaccidental and accidental signal inputs, both external and internal. If the ultimate target of information warfare is the information-dependent process, ”whether human or automated,” then the definition in the joint publication implies that human data-processing of internal and external signals can clearly be considered an aspect of information warfare. Foreign researchers have noted the link between humans as data processors and the conduct of information warfare. While some study only the PSYOP link, others go beyond it. As an example of the former, one recent Russian article described offensive information warfare as designed to ”use the Internet channels for the purpose of organizing PSYOP as well as for `early political warning’ of threats to American interests.”[7] The author’s assertion was based on the fact that ”all mass media are used for PSYOP . . . [and] today this must include the Internet.” The author asserted that the Pentagon wanted to use the Internet to ”reinforce psychological influences” during special operations conducted outside of US borders to enlist sympathizers, who would accomplish many of the tasks previously entrusted to special units of the US armed forces.

Others, however, look beyond simple PSYOP ties to consider other aspects of the body’s data-processing capability. One of the principal open source researchers on the relationship of information warfare to the body’s data-processing capability is Russian Dr. Victor Solntsev of the Baumann Technical Institute in Moscow. Solntsev is a young, well-intentioned researcher striving to point out to the world the potential dangers of the computer operator interface. Supported by a network of institutes and academies, Solntsev has produced some interesting concepts.[8] He insists that man must be viewed as an open system instead of simply as an organism or closed system. As an open system, man communicates with his environment through information flows and communications media. One’s physical environment, whether through electromagnetic, gravitational, acoustic, or other effects, can cause a change in the psycho-physiological condition of an organism, in Solntsev’s opinion. Change of this sort could directly affect the mental state and consciousness of a computer operator. This would not be electronic war or information warfare in the traditional sense, but rather in a nontraditional and non-US sense. It might encompass, for example, a computer modified to become a weapon by using its energy output to emit acoustics that debilitate the operator. It also might encompass, as indicated below, futuristic weapons aimed against man’s ”open system.”

Solntsev also examined the problem of ”information noise,” which creates a dense shield between a person and external reality. This noise may manifest itself in the form of signals, messages, images, or other items of information. The main target of this noise would be the consciousness of a person or a group of people. Behavior modification could be one objective of information noise; another could be to upset an individual’s mental capacity to such an extent as to prevent reaction to any stimulus. Solntsev concludes that all levels of a person’s psyche (subconscious, conscious, and ”superconscious”) are potential targets for destabilization.

According to Solntsev, one computer virus capable of affecting a person’s psyche is Russian Virus 666. It manifests itself in every 25th frame of a visual display, where it produces a combination of colors that allegedly put computer operators into a trance. The subconscious perception of the new pattern eventually results in arrhythmia of the heart. Other Russian computer specialists, not just Solntsev, talk openly about this ”25th frame effect” and its ability to subtly manage a computer user’s perceptions. The purpose of this technique is to inject a thought into the viewer’s subconscious. It may remind some of the subliminal advertising controversy in the United States in the late 1950s.

 

US Views on ”Wonder Weapons”: Altering the Data-Processing Ability of the Body

What technologies have been examined by the United States that possess the potential to disrupt the data-processing capabilities of the human organism? The 7 July 1997 issue of U.S. News and World Report described several of them designed, among other things, to vibrate the insides of humans, stun or nauseate them, put them to sleep, heat them up, or knock them down with a shock wave.[9] The technologies include dazzling lasers that can force the pupils to close; acoustic or sonic frequencies that cause the hair cells in the inner ear to vibrate and cause motion sickness, vertigo, and nausea, or frequencies that resonate the internal organs causing pain and spasms; and shock waves with the potential to knock down humans or airplanes and which can be mixed with pepper spray or chemicals.[10]

With modification, these technological applications can have many uses. Acoustic weapons, for example, could be adapted for use as acoustic rifles or as acoustic fields that, once established, might protect facilities, assist in hostage rescues, control riots, or clear paths for convoys. These waves, which can penetrate buildings, offer a host of opportunities for military and law enforcement officials. Microwave weapons, by stimulating the peripheral nervous system, can heat up the body, induce epileptic-like seizures, or cause cardiac arrest. Low-frequency radiation affects the electrical activity of the brain and can cause flu-like symptoms and nausea. Other projects sought to induce or prevent sleep, or to affect the signal from the motor cortex portion of the brain, overriding voluntary muscle movements. The latter are referred to as pulse wave weapons, and the Russian government has reportedly bought over 100,000 copies of the ”Black Widow” version of them.[11]

However, this view of ”wonder weapons” was contested by someone who should understand them. Brigadier General Larry Dodgen, Deputy Assistant to the Secretary of Defense for Policy and Missions, wrote a letter to the editor about the ”numerous inaccuracies” in the U.S. News and World Report article that ”misrepresent the Department of Defense’s views.”[12] Dodgen’s primary complaint seemed to have been that the magazine misrepresented the use of these technologies and their value to the armed forces. He also underscored the US intent to work within the scope of any international treaty concerning their application, as well as plans to abandon (or at least redesign) any weapon for which countermeasures are known. One is left with the feeling, however, that research in this area is intense. A concern not mentioned by Dodgen is that other countries or non-state actors may not be bound by the same constraints. It is hard to imagine someone with a greater desire than terrorists to get their hands on these technologies. ”Psycho-terrorism” could be the next buzzword.

 

Russian Views on ”Psychotronic War”

The term ”psycho-terrorism” was coined by Russian writer N. Anisimov of the Moscow Anti-Psychotronic Center. According to Anisimov, psychotronic weapons are those that act to ”take away a part of the information which is stored in a man’s brain. It is sent to a computer, which reworks it to the level needed for those who need to control the man, and the modified information is then reinserted into the brain.” These weapons are used against the mind to induce hallucinations, sickness, mutations in human cells, ”zombification,” or even death. Included in the arsenal are VHF generators, X-rays, ultrasound, and radio waves. Russian army Major I. Chernishev, writing in the military journal Orienteer in February 1997, asserted that ”psy” weapons are under development all over the globe. Specific types of weapons noted by Chernishev (not all of which have prototypes) were:

A psychotronic generator, which produces a powerful electromagnetic emanation capable of being sent through telephone lines, TV, radio networks, supply pipes, and incandescent lamps.

An autonomous generator, a device that operates in the 10-150 Hertz band, which at the 10-20 Hertz band forms an infrasonic oscillation that is destructive to all living creatures.

A nervous system generator, designed to paralyze the central nervous systems of insects, which could have the same applicability to humans.

Ultrasound emanations, which one institute claims to have developed. Devices using ultrasound emanations are supposedly capable of carrying out bloodless internal operations without leaving a mark on the skin. They can also, according to Chernishev, be used to kill.

Noiseless cassettes. Chernishev claims that the Japanese have developed the ability to place infra-low frequency voice patterns over music, patterns that are detected by the subconscious. Russians claim to be using similar ”bombardments” with computer programming to treat alcoholism or smoking.

The 25th-frame effect, alluded to above, a technique wherein each 25th frame of a movie reel or film footage contains a message that is picked up by the subconscious. This technique, if it works, could possibly be used to curb smoking and alcoholism, but it has wider, more sinister applications if used on a TV audience or a computer operator.

Psychotropics, defined as medical preparations used to induce a trance, euphoria, or depression. Referred to as ”slow-acting mines,” they could be slipped into the food of a politician or into the water supply of an entire city. Symptoms include headaches, noises, voices or commands in the brain, dizziness, pain in the abdominal cavities, cardiac arrhythmia, or even the destruction of the cardiovascular system.

There is confirmation from US researchers that this type of study is going on. Dr. Janet Morris, coauthor of The Warrior’s Edge, reportedly went to the Moscow Institute of Psychocorrelations in 1991. There she was shown a technique pioneered by the Russian Department of Psycho-Correction at Moscow Medical Academy in which researchers electronically analyze the human mind in order to influence it. They input subliminal command messages, using key words transmitted in ”white noise” or music. Using an infra-sound, very low frequency transmission, the acoustic psycho-correction message is transmitted via bone conduction.[13]

In summary, Chernishev noted that some of the militarily significant aspects of the ”psy” weaponry deserve closer research, including the following nontraditional methods for disrupting the psyche of an individual:

ESP research: determining the properties and condition of objects without ever making contact with them and ”reading” peoples’ thoughts

Clairvoyance research: observing objects that are located just beyond the world of the visible–used for intelligence purposes

Telepathy research: transmitting thoughts over a distance–used for covert operations

Telekinesis research: actions involving the manipulation of physical objects using thought power, causing them to move or break apart–used against command and control systems, or to disrupt the functioning of weapons of mass destruction

Psychokinesis research: interfering with the thoughts of individuals, on either the strategic or tactical level

While many US scientists undoubtedly question this research, it receives strong support in Moscow. The point to underscore is that individuals in Russia (and other countries as well) believe these means can be used to attack or steal from the data-processing unit of the human body.

Solntsev’s research, mentioned above, differs slightly from that of Chernishev. For example, Solntsev is more interested in hardware capabilities, specifically the study of the information-energy source associated with the computer-operator interface. He stresses that if these energy sources can be captured and integrated into the modern computer, the result will be a network worth more than ”a simple sum of its components.” Other researchers are studying high-frequency generators (those designed to stun the psyche with high frequency waves such as electromagnetic, acoustic, and gravitational); the manipulation or reconstruction of someone’s thinking through planned measures such as reflexive control processes; the use of psychotronics, parapsychology, bioenergy, bio fields, and psychoenergy;[14] and unspecified ”special operations” or anti-ESP training.

The last item is of particular interest. According to a Russian TV broadcast, the strategic rocket forces have begun anti-ESP training to ensure that no outside force can take over command and control functions of the force. That is, they are trying to construct a firewall around the heads of the operators.

 

Conclusions

At the end of July 1997, planners for Joint Warrior Interoperability Demonstration ’97 ”focused on technologies that enhance real-time collaborative planning in a multinational task force of the type used in Bosnia and in Operation Desert Storm. The JWID ’97 network, called the Coalition Wide-Area Network (CWAN), is the first military network that allows allied nations to participate as full and equal partners.”[15] The demonstration in effect was a trade fair for private companies to demonstrate their goods; defense ministries got to decide where and how to spend their money wiser, in many cases without incurring the cost of prototypes. It is a good example of doing business better with less. Technologies demonstrated included:[16]

Soldiers using laptop computers to drag cross-hairs over maps to call in airstrikes

Soldiers carrying beepers and mobile phones rather than guns

Generals tracking movements of every unit, counting the precise number of shells fired around the globe, and inspecting real-time damage inflicted on an enemy, all with multicolored graphics[17]

Every account of this exercise emphasized the ability of systems to process data and provide information feedback via the power invested in their microprocessors. The ability to affect or defend the data-processing capability of the human operators of these systems was never mentioned during the exercise; it has received only slight attention during countless exercises over the past several years. The time has come to ask why we appear to be ignoring the operators of our systems. Clearly the information operator, exposed before a vast array of potentially immobilizing weapons, is the weak spot in any nation’s military assets. There are few international agreements protecting the individual soldier, and these rely on the good will of the combatants. Some nations, and terrorists of every stripe, don’t care about such agreements.

This article has used the term data-processing to demonstrate its importance to ascertaining what so-called information warfare and information operations are all about. Data-processing is the action this nation and others need to protect. Information is nothing more than the output of this activity. As a result, the emphasis on information-related warfare terminology (”information dominance,” ”information carousel”) that has proliferated for a decade does not seem to fit the situation before us. In some cases the battle to affect or protect data-processing elements pits one mechanical system against another. In other cases, mechanical systems may be confronted by the human organism, or vice versa, since humans can usually shut down any mechanical system with the flip of a switch. In reality, the game is about protecting or affecting signals, waves, and impulses that can influence the data-processing elements of systems, computers, or people. We are potentially the biggest victims of information warfare, because we have neglected to protect ourselves.

Our obsession with a ”system of systems,” ”information dominance,” and other such terminology is most likely a leading cause of our neglect of the human factor in our theories of information warfare. It is time to change our terminology and our conceptual paradigm. Our terminology is confusing us and sending us in directions that deal primarily with the hardware, software, and communications components of the data-processing spectrum. We need to spend more time researching how to protect the humans in our data management structures. Nothing in those structures can be sustained if our operators have been debilitated by potential adversaries or terrorists who–right now–may be designing the means to disrupt the human component of our carefully constructed notion of a system of systems.

 

——————————————————————————–


NOTES

1. I. Chernishev, ”Can Rulers Make `Zombies’ and Control the World?” Orienteer, February 1997, pp. 58-62.

2. Douglas Pasternak, ”Wonder Weapons,” U.S. News and World Report, 7 July 1997, pp. 38-46.

3. Ibid., p. 38.

4. FM 101-5-1, Operational Terms and Graphics, 30 September 1997, p. 1-82.

5. Joint Pub 3-13.1, Joint Doctrine for Command and Control Warfare (C2W), 7 February 1996, p. v.

6. The American Heritage Dictionary (2d College Ed.; Boston: Houghton Mifflin, 1982), p. 660, definition 4.

7. Denis Snezhnyy, ”Cybernetic Battlefield & National Security,” Nezavisimoye Voyennoye Obozreniye, No. 10, 15-21 March 1997, p. 2.

8. Victor I. Solntsev, ”Information War and Some Aspects of a Computer Operator’s Defense,” talk given at an Infowar Conference in Washington, D.C., September 1996, sponsored by the National Computer Security Association. Information in this section is based on notes from Dr. Solntsev’s talk.

9. Pasternak, p. 40.

10. Ibid., pp. 40-46.

11. Ibid.

12. Larry Dodgen, ”Nonlethal Weapons,” U.S. News and World Report, 4 August 1997, p. 5.

13. ”Background on the Aviary,” Nexus Magazine, downloaded from the Internet on 13 July 1997 from http://www.execpc.com/vjentpr/nexusavi.html, p.7.

14. Aleksandr Cherkasov, ”The Front Where Shots Aren’t Fired,” Orienteer, May 1995, p. 45. This article was based on information in the foreign and Russian press, according to the author, making it impossible to pinpoint what his source was for this reference.

15. Bob Brewin, ”DOD looks for IT `golden nuggets,'” Federal Computer Week, 28 July 1997, p. 31, as taken from the Earlybird Supplement, 4 August 1997, p. B 17.

16. Oliver August, ”Zap! Hard day at the office for NATO’s laptop warriors,” The Times, 28 July 1997, as taken from the Earlybird Supplement, 4 August 1997, p. B 16.

17. Ibid.


——————————————————————————–


Lieutenant Colonel Timothy L. Thomas (USA Ret.) is an analyst at the Foreign Military Studies Office, Fort Leavenworth, Kansas. Recently he has written extensively on the Russian view of information operations and on current Russian military-political issues. During his military career he served in the 82d Airborne Division and was the Department Head of Soviet Military-Political Affairs at the US Army’s Russian Institute in Garmisch, Germany.

 

[see the article on the Parameters portion of the Army Website.]

Carl Bildt, Kungen och Drottningen på statsbesök i Italien

En statsbesöksdag som denna är alltid en blandning av ceremoni och substans. Så också denna första dag i Rom.

Att ceremonielet är ståtligt är knappast ägnat att förvåna. Quirinal-palatsets korridorer och prakt torde imponera på vem som helst. Rom är och förblir barockpraktens okrönta huvudstad.

Men det har också varit samtal med substans och av betydelse.

Med president Napolitano, som bl a hade utrikesminister Frattini med sig, diskuterade vi olika aspekter på den europeiska utvecklingen och hur Italien och Sverige kunde arbeta tillsammans.

Den 83-årige presidenten var en påtagligt vital och välinformerad samtalspartner också när det gäller aktuella delar av utrikessamarbetet inom Europeiska Unionen. Vi var ense om betydelsen såväl av Lissabon-fördraget som av en fortsatt utvidgning av vår gemensamma fredsunion.

Med oss har vi ju också Lars Leijonborg i egenskap av forskningsminister, och det ledde bl a till samtal om förhandlingarna just nu om var den stora neutronforskningsanläggningen European Spallation Source skall lokaliseras.

Här handlar det om en anläggning i kostnadsklassen ca 15 miljarder kronor och med mycket stor framtida betydelse, och från bl a svensk sida har vi föreslagit att den skall kunna läggas i Lund.

Ett beslut borde kunna komma före sommaren, och för oss är detta självfallet en viktig fråga. Sveriges anseende som forskningsnation förefaller dock att vara gott här i Italien.

Och sedan har vi fortsatt i senaten och i deputerandekammaren med diskussioner som också berört olika aspekter av den inrikespolitiska utvecklingen i våra respektive länder.

Själv hann jag ockspå smita in i en bokhandel och inhandla ett exemplar av den förkortade pocketversionen av Edward Gibbons med all rätt klassiska The Decline and Fall of the Roman Empire – utgiven 1776 men fortfarande oöverträffad i sin klass och alltid i sina olika delar lika läsvärd.

I kväll väntar så president Napolitanos statsbankett för Kungen och Drottningen uppe i Quirinal-palatset.

Min kommentar på Carl Bildts blogg:

“Sveriges anseende som forskningsnation förefaller dock vara gott här i Italien”.

Dock anser många av Sveriges medborgare att Sveriges regerings militanta forskningsprojekt är av värre dignitet än nazi-regimens. Många medborgare har också genom Sveriges regeringsmakts många olika så kallade forskningsprojekt (teknologisk krigsföring) bestulits på hälsa, arbete, ekonomi och livskvalite.

Vilken av alla lögner beskriver bäst “regeringens förklaring” till varför Sverige idag mest påminner om ett teknologiskt koncentrationsläger?

Länken under är från en av Sveriges regerings teknologiska tortyroffer:

Varning för Sveriges regerings oetiska forskningsprojekt /teknologisk krigsföring