Gazzâlî, İhyâü Ulûmid-Dîn isimli eserinde, Müzik Dinlemenin (semâ) Mubahlığının Delili başlığı altında söze şöyle başlar:
Müzik dinlemek haramdır demek, Allah müzik dinleyen kişileri cezalandıracaktır, demektir. Bu ise, sırf akılla bilinebilecek bir husus değildir. Öyleyse, bu konuda naslara ve bu nasların ışığında yapılan kıyaslara başvurmak gereklidir. Eğer bu konuda nas ve nassa kıyas yoluyla ulaşılan doğru bir sonuçlama yoksa, müzik dinlemenin haramlığı iddiası boşa çıkmış olur.
Gazzâlî daha sonra, ölçülü olsun veya olmasın, güzel sesi dinleme, müziğin dinleyici üzerinde bıraktığı etki ve dinleyici ile ilgili hususları uzun uzadıya açıkladıktan sonra, mûsikinin mubah olduğunu belirtir, karşı görüşte olanların gerekçelerini tek tek ele alarak cevaplandırmaya çalışır. (1)
İmam Gazzâlî mûski konusunda bütün söylenenleri tahlil etmiş, delilleri karşılaştırmış ve şu sonuçlara varmıştır:
Mûsıkî ister ses ister âlet ile olsun, tek hükme bağlı değildir: Haram, mekruh, mübah ve müstehab olabilir.
1) Dünya arzusu ve şehvet hisleri ile dolup taşan gençler için yalnızca bu duyguları tahrik eden müzik haramdır.
2) Vakitlerinin çoğunu buna veren, iştigâli âdet haline getiren kimse için mekruhtur.
3) Güzel sesten zevk alma dışında bir duyguya kapılmayan kimse için müzik mübahtır, serbesttir.
4) Allah sevgisi ile dolup taşan, duyduğu güzel ses kendisinde yalnızca güzel sıfatları tahrik eden kimse için müstehabdır. (2)
Gazzâlî incelemesini sürdürürken müziğin duruma göre ya mübah veya mendûb olduğunu, onu haram kılan şeyin kendisi değil, dıştan ârız olan beş sebepten ibaret bulunduğunu ifade ederek şöyle devam ediyor:
1) Şarkı söyleyen kadın olur, dinleyen de kadın sesinin şehvetini tahrik edeceğinden korkarsa dinlemek haramdır. Burada haram hükmü müzikten değil, kadının sesinden gelmektedir. Aslında kadının sesi haram değildir; ancak şehveti tahrik ederse Kur’ân okumasını bile dinlemek haram olur. (3)
2) Müzik âleti, içki meclislerinin sembolü olan âletlerden ise bunu kullanmak haram olur; diğerleri mübah olmakta devam eder.
3) Şarkı ve türkünün güftesi bozuk, İslâm inancına ve ahlâkına aykırı ise bunu müzikli veya müziksiz söylemek ve dinlemek haramdır.
4) Gençliği icabı şehevî duyguların mahkûmu olan bir kimse aşırı derecede müziğe düşer, müzik onun yalnızca cinsî arzusunu tahrik ederse, onun müzikten uzak durması gerekir.
5) Sıradan bir insanın müzik şehvetini de ilâhî aşkını da tahrik etmediği halde bütün vakitlerini alır, onu başka işlerden alıkoyarsa yine haram olur. (4)
Sonuç olarak musikînin hoş, ölçülü ve manâlı bir ses olması itibariyle mübah olduğu; haram olmasının kendisinden değil de dıştan ârız olan sebepler dolayısıyla olduğu söylenebilir.
Kategori arşivi: Teknoloji
Controlling information is no longer the goal.
Several months ago, I shut down this column and removed its content. For those that don’t remember, I spent nearly four years digging into the physics and technology behind reading/writing information to/from the human brain using radio waves. There was a time when the general view of this was associated with ‘tinfoil hat conspiracy theories’. That all changed when I began demonstrating the physics to reveal a functional model which, in turn, revealed a medical torture program run by a portion of the US government.
I closed the column for a variety of reasons. Firstly, there is the ever-present pressure from various organizations to maintain the silence. That said, I have never much cared for their opinions and it did not rank very high in my decision making processes. Secondly, I tend to have a different approach to writing than most authors. My published articles can be as much like a notebook to capture ideas as it is a mechanism to convey those ideas to others. This can lead to a somewhat muddled experience for readers that do not understand this. Finally, as with any investigation, getting side-tracked is inevitable as interesting things pop up all the time.
Thus, a clean-up was long overdue.
In today’s article, I intend to capture the important elements from the series on reading/writing information to/from the human brain in the context of modern warfare. Rather than having twenty different articles, with information spread all over the place in various states of revision, it is best to have it in one single page. This article will capture everything that is currently known, or can be inferred, about the system, its objectives, the current state of progress and any additional relevant material. As such, this is a very long article.
As ever, the question is where to begin. When describing a system of this magnitude it is always difficult to identify a good starting point that is suitable for most readers. I suppose the best place to start is a small executive summary that describes the system and from there we can break it out into a more detailed picture.
A further question is what to name this. A misleading term is "remote neural monitoring" (RNM), as it implies that such a system is merely recording. A term I have used before is "Synthetic Telepathy", but that can also be misleading as it is a term used to describe a different military technology under development. I feel that the best approach is to extend the historical name for this technology, to better reflect its current capabilities. "Remote Neural Monitoring, Control and Manipulation" (RNMCM) is a bit of a mouthful, but it is certainly more accurate.
"Remote Neural Monitoring, Control and Manipulation" (RNMCM) is a term that refers to the usage of specific technologies to record and/or alter the electrical activity of neurons in the human body (or any life-form). Neurons can broadly be separated into four main categories:
- Sensory neurons
- Motor (and other output) neurons
- Communication neurons
- Computation neurons
The electrical activity of each of these four main types of neurons can be classified by a computer. Every action a human makes, or experiences, is represented by specific patterns in the electrical activity. Thus, when a specific electrical pattern is observed, we can state that a certain event has happened. That could be a feeling of joy, seeing a blue car, tasting an orange, thinking of a word, moving a limb, or even visualizing a shape in your mind to solve a mathematical puzzle.
The key to any functional RNMCM system is obtaining good recordings of specific electrical patterns and knowing what they mean. Further, as the electrical patterns are slightly different between people, knowing these differences allows the development of systems that can classify electrical activity across the entire global population without retraining. We call this latter goal "Generalization". "Generalization" is important because training takes a long time. With "generalization" we can skip the training process and jump straight to reading the required information which is a lot faster and requires less computing power.
An example of an unclassified technique of reading the electrical activity of the brain is Electroencephalography (EEG). EEG has a limitation, in that it can only record the sum total of electrical activity. This is rather like listening to a song, in that you cannot hear the individual instruments in isolation. RNMCM uses a different approach, it exploits the reflectivity/absorption/transparency of neurons at radio frequencies to record individual activity of neurons. This can be compared to obtaining a track with a single instrument playing its role in a song from a music studio.
By recording the electrical activity and observing behavior, or impact to other electrical activity, we can infer what each electrical pattern means. By recording the slight variations found in different human subjects, by analyzing tens of thousands/millions of brain patterns, a system can be trained to recognize what that electrical activity means in any human subject it encounters without retraining. The analysis of tens of thousands/millions of people is how we obtain "Generalization". Given the complexity of the human brain and certain limitations, obtaining "generalization" could take half-a-century or more depending on available hardware and complexity of the problem.
Throughout this process, we will obtain an ever-increasing number of identified electrical activity patterns that are militarily useful. For example, being able to know military plans in advance, or quantify enemy numbers and capabilities. In addition, we will be able to combine these identified electrical patterns to create/compose our own complex electrical patterns. This latter ability will allows us to reverse the process, drive the neurons with our patterns and have a human subject under our control or influence.
Initially, when introducing composed patterns into a human subject, we would expect a certain level of influence. In time, as the database of electrical patterns expand, it is expected that this will give way to complete remote control.
In order to complete the training of the system and test its effectiveness, tens of thousands/millions of volunteers would be required to submit themselves to long-term (life long) experimentation, the effects of which would be wide-ranging. We can expect deaths, deformities, mental illness, seizures, complex syndromes, chronic and acute pain, heart and respiratory failure, etc.
Given the national security requirement of secrecy and the lack of such a willing population, secret experimentation on a significant sub-section of the human population globally would be required. Three basic categories of human subject will be required, training, validation and test. The training group will consist of human subjects that are used continuously 24/7 to both produce electrical patterns and serve as a testing area for identified patterns. The validation group will will be used as a quick reference to confirm the accuracy of generalization. The test group, which for practical purposes will continuously select random individuals on the planet, will be used be to study the generalized pattern(s) effectiveness and accuracy.
It would be impractical to hide such activity to the major enemies of the state, thus some form of international agreement encompassing technology sharing and combined defense pact would need to be made to provide cover for the program.
The technology required to drive this program on the surface is a rather simplistic combination of existing technologies. That said, to bring the system up to near real-time speed for both reading and writing requires optimization across a multitude of technologies all developed by numerous vendors and each with their own particular physical limitations.
The system can be broken down into a number of layers and lends well to a development process conducted through compartmentalization of classified programs. The development of the system can be fragmented through hundreds, if not thousands of independent programs and the results combined reducing the footprint of knowledge and thus program exposure. Further, in time, particular technologies and techniques can be re-invented at a later date with a higher profile in order to establish false historical time-lines thus reducing the exposure of key staff to prosecution and/or direct action by hostile or friendly forces.
The primary task is to deliver a distributed computing platform (Grid Computing) spanning the globe and linked by a mixture of high speed connections. Custom software (middleware) will control the allocation of resources, distribution of programs and the migration of data around the grid computing platform. It will, in effect, operate as a single geographically separated supercomputer and have the ability to hide this fact from end-users by presenting false logical views of the system. The grid will be a mixture of a range of hardware from commercial-off-the-shelf (COTS) hardware, to custom chips and boards with the latest advancements in quantum computing optimization.
The grid computing platform will play host to a strong, general purpose, artificial intelligence. The strong artificial intelligence will perform numerous roles throughout the defense sector, but will provide the ability to compartmentalize activity through a strict classification process. Thus, any activity generated by this program will not generate any concern and will be attributed to general remote sensing applications if observed from multiple points. The role of the strong AI in this program will be complex. During the training phase, its main role will be to infer the meaning of electrical activity and to leverage its human-level reasoning capabilities to examine internal thought processes. As we transition to influence and control, the strong AI will attempt to mimic the human subject in terms of thought processes, language and behaviors. The ultimate goal being that the strong AI can assume complete remote control of a human subject and impersonate them. The fallback position, should this prove unfeasible, is to substantially compromise the human subject’s neural activity such that we are in a position to strongly influence decisions and actions. An additional objective, will be the ability to perform remote assassinations, intimidation and torture to extract information not directly observed by the system.
The strong AI will direct a classification system composed of the latest developments in machine learning. This classification system will be fed by signal processing network that prepares radio data for analysis by the classification system. The classification system will be in a low latency path from the source of radio information and have the ability to prioritize signals based upon temporal requirements. This will require a programmable architecture which can be driven by the strong AI.
Observers of this system with sufficient technical knowledge could not determine that the system was anything beyond a complex radar and remote sensing platform. Linking this system with a program to read/write information to/from the human brain would be complete speculation on the behalf of the observer. This provides the system with robust counter-intelligence potential from internal threats and a high degree of plausible dependability. Other than complex analysis of the data, which can be erased or moved to more favorable legal jurisdictions, complete seizure of the equipment only indicates the potential for use, not the actual application. During development of the satellite hardware the requirements, particularly of the transmitter arrays, may raise suspicions. A mitigation strategy would be to introduce the system as a directed energy weapon designed to manipulate/jam electronic systems (such as guidance systems of ballistic missiles/bombers/etc.).
Radio information is delivered from one, or more, big-ear (synthetic aperture – operating at different elevations) satellite network(s). The constant speed of light places hard limits on the elevation of satellites required to capture/broadcast real-time information and thermal noise places hard limits of the maximum elevation for non-real-time intercepts. The hard limits are compounded by the fact that the human body can only absorb/reflect so much radiation.
The Grid Computing Solution
The physical hardware arrangement of the grid computing solution will be quite complex. Real-time interaction with the human brain is a hard requirement of the system, thus latency has hard limits that dictate the minimum number of site globally as well as their distance from satellite downlinks. To the human brain, variation in delays can be more noticeable than a constant delay, especially when multiple senses are involved. Typically, when working with a single sense a delay of up to 150ms is tolerable, however, this can drop to 60ms when multiple senses are involved.
Thus, to support an audio stream such has inserting words into the human brain, a delay of up to 150ms is functional. When that is combined with visual or other sensory stimulation, the functional delay begins to drop to around 60ms. As a result, the grid computing solution must have extreme low latency and designed to pipeline information. That is, the solution must be designed like a circuit that provides the most optimal physical path between points. This architecture is in direct contrast to modern approaches which rely completely on the optimization of software functions. Such an approach will not result in the required high performance demanded. The key problem is that this approach is very brittle from the perspective of future development, however, this is not much of a concern as the application will be a constant factor.
These hard limits provide a defined limit on the number of I/O exchanges. I/O exchanges have an issue known as end-point crisis. An end-point crisis is where the transmission medium can handle more data that the circuits reading/writing data to that physical layer. Further, each I/O exchange introduces a complex delay that in itself has well-defined hard limits. As such, when scaling there is a defined physical limit of the amount of hardware that can be in a real-time pathway before it becomes non-functional. Even with the progressive improvement of hardware processing speeds and consolidation of services, these hard limits will always exist.
At the extreme, the grid computing solution (including all ground equipment and links) can be allocated 1/3 of the the delay. This provides a window of 20-50ms in which to perform all real-time functions. The grid will therefore need to incorporate elements of predictive analysis. Predictive analysis will play a key role of the services run on the grid, but the grid itself will be required to identify particular scenarios that can be optimized and offload the processing from the services it hosts. One such scenario could be the reallocation of resources or programs that migrate to the geographical area in which they are being used. Rather than this being managed in software by a hosted AI, these basic services can be offloaded to hardware that powers the grid. Thus, the grid solution identified here would be a custom hardware solution, rather than a complete software middleware.
We can now observe that the density of ground sites is dictated by the demand that any real-time target must be within a 40-100ms round trip time. Ignoring all the delays that provides an operational range of 6000-15000Km.
As noted the majority of the grid will be a custom hardware solution, that will contain custom hardware for the services it hosts. Each element of the grid will be a supercomputer in itself capable of operating independently of the grid for survivability. Given the operational range of the system, complete global coverage can be provided by around 8 sites, raising to around 24 sites (alternatively 5 main sites, 10 redundant) when triple redundancy is added. Modularity certainly lends to ease of upgrades, but it comes at the expense of adding delays to the system. Thus a balance must be struck between modularity and speed to provide the best performance. Continuous evaluation of the design of the system will reveal, over time, the most efficient trade-offs and hardware arrangements.
The grid hardware will be a mixture of semi-conductor technologies and quantum computing solutions aimed at resolving optimization problems in large datasets.
The Strong Artificial Intelligence
Given the longitudinal nature of the study to be undertaken, the complex interaction and investigation of patterns, direct human analysis is impossible. It is critical that the latest in automation techniques be applied to the problem and allowed to grow hand-in-hand with the experiments. One of the key stumbling blocks in the road to a strong AI is the lack of insight into human behavior, thought processes and ultimately validation of machine learning output. In this experiment, not only will we learn how to interface with human body via radio, but leverage the feedback provided by the human brain as a means to train the AI to replicate human behavior.
A strong AI is can be thought of a complex form of database that uses certain information in that database to replicate or approximate human behavioral responses to a given input or series of inputs. Initially the AI will be basic, it will merely perform analysis of particular neural circuits relating to speech, recognition, auditory, vision, etc. Once substantially complete, to the point where the AI can pose certain problems to the human brain, the secondary objective of making the AI more human-like in both its reasoning and behavior can begin. By posing problems to the human brain, responses can be compared with the output of algorithms employed by the AI and refined to match. This will supplement all training provided directly to the internal interfaces of the AI.
The AI will built upon a statistical engine that will return the most likely response for a given input, in that respect it will be an amalgamation of everyone and everything that it has ever interacted with. Advancement in quantum computing should provide for faster searches when posed as optimization problems. An important area of development will be the inference engine which attempts to relate the output of one statistical assessment with another, integrating that into its sum knowledge over time. It is envisaged that this will be a continuous process and no great leap in intelligence will occur for the simple reason that it is ultimately based upon computation and can only combine what it already knows. That is, the combination of information does not lead to hardware changes or changes in the laws of physics which ultimately define the method in which information can be represented, processed and outputted.
The strong AI is a mixture of both software, firmware and hardware that provides a common processing core for any number of "instances". That is, a single system provides the processing that drives an individual AI and the system will be capable of generating as many AI instances as the hardware allows for. Thus, it is quite possible to have thousands of "computer agents" tasked with various roles. Further, these "computer agents" will have the ability to migrate anywhere in the grid to follow targets or provide services more optimally. When the ability to assume control of a human emerges, the AI will also be able to have a physical presence anywhere in the world on demand to deal with emerging threats, assume political or military control or ensure economic objectives.
To support these identified roles, the AI must have a range of knowledge and specialisms that cover every area of knowledge known to man. Further, it must record the activity of every key person the globe over to ensure that it has the required "memory" to properly impersonate a given target. Such oversights would lead to major problems and rapid identification of controlled individuals. Thus, the AI must track, record and archive data relating to everyone that could potential become an important individual as gaps in memory, even childhood memories, may give rise to suspicion and ultimately lead to exposure. As it is difficult to judge who will become important, the combination of two approaches are advised. Firstly, the goal of recording the neural activity of every individual on the planet is of top priority and a realistic objective. Secondly, in the interim, strict regulation and control of individuals entering positions of power is recommended to ensure the system has complete coverage of key individuals.
Such a system is likely to draw a lot of unwanted attention, it is thus advisable to have numerous parallel programs with similar capabilities to hide amongst. As this system is automated, staffing and thus potential leaks can be kept to a minimum and, for the most part, the majority of staff will not have a need to know.
Digital Signal Processing (DSP) System
Data obtained from radio sources must be prepared in a manner suitable for the AI and prepare outgoing signals for radio broadcast. The AI could perform this task, but this substantially reduces its ability to perform other tasks. Thus, all incoming raw radio signals or outgoing data will pass through a programmable DSP system that will convert the incoming/outgoing streams and separate real-time signals from those that can be examined later or broadcast later. The DSP system will be driven by the AI and dynamically updated as required. This system will supplement onboard electronics in satellites designed to reduce bandwidth usage.
The most efficient model is to employ a bi-static wide-band radar with a synthetic aperture receiver network (a big ear). The receiver network is designed to work over the entire spectrum with the highest possible sensitivity. The receiver network will be able to view all radio sources from the planet simultaneously, pinpointing their locations and tracking their movements. This information will be captured by other compartmentalized programs and leveraged appropriately.
Using a combination of transmitted radio pulses and reflected RF from terrestrial sources, humans, cars, planes, etc., will be tracked in real time, classified, analyzed for patterns and accounted for. Given the density of modern RF sources, the majority of the tracking can be performed by passive reception only. This system will produce a real-time view of the Earth with the goal of complete coverage. The bandwidth required to perform this is surprising small and all the heavy processing is performed on the ground. Each aspect of this real-time view can be presented independently as an exposed services to any number of departments without revealing the entire scope of information gathered.
In this program, we will be interested in the human tracking information. This will be fed into the system allowing target selection and tracking.
The radio transmitters used in this program produce a wide bandwidth of very weak narrow-band pulses at ground level. From an analysis perspective, it would appear similar to a spread spectrum source with limited frequency hopping capability. As such, it may be ignored as being an "old" or "legacy" system of no real importance. Each of these pulses are on different frequencies and are selectively absorbed by different neurons throughout the body. A one-to-one mapping between a pulse of a particular frequency and a neuron is not expected, but rather a high probability of absorption. Not only does the system need to account for the chaos in the neural activity and attempt to make sense of this, but it must also learn to deal with the chaos of transmitting to a moving target and all of the problems inherent in radio reception under a range of atmospheric conditions.
Unlike traditional systems radio systems, this system must penetrate modern RF shielding and be able to deliver signals with pinpoint accuracy. Thus, this transmitter will comprise of an electronically steerable maser array, that will leverage the latest advances in atomic dialectic resonance to pass through RF reflective/absorbent surfaces, follow targets underground and/or underwater. The maser array can follow particular targets or broadcast a generalizable signal over a wide area. Generalizable signals over a wide area can manipulate voting, suppress anger at government policies or actions, induce riots or revolutions, induce fear in opposing militaries, reduce libido to reduce population numbers, selectively prevent breeding in particular ethnic groups, etc.
Such a system is readily scalable and has the ability to effect the entire global population.
Key Brain Regions Under Study
Certain regions of the brain are deemed more critical than others to understand as they can prove militarily or politically useful. This allows the system to have operational status before it develops a complete functional solution to remote control. Some areas of interest are noted below, along with potential military applications, but this list is nowhere near exhaustive:
The hypothalamus controls body temperature, hunger, important aspects of parenting and attachment behaviors, thirst, fatigue, sleep, fear processing and circadian rhythms. For a detailed breakdown of the roles of the Hypothalamus, please follow this link:
The Hypothalamus has numerous military applications:
a. Body temperature: Altering the body temperature can result in a breakdown of internal biological process. This can reduce the efficiency or even kill the human subjects.
b. Hunger – Altering sensory information in relation to hunger can cause human subjects to starve or over-eat. Both of which reduce their capability to respond to a threat.
c. Parenting and attachment behaviors – Altering this region has an effect on bonding, relationships and loyalty to family, friends, country or ideals.
d. Thirst – Altering processing in this aspects results in the intake of too much or too little water, both of which can have drastic effects on the human body.
e. Fatigue – Altering information processing in this region can increase or decrease fatigue responses in a human subject. This leads them to either increased endurance, or Myalgic encephalomyelitis (ME)/ Chronic Fatigue Syndrome (CFS) which effectively disables a human subject.
f. Sleep – Altering processing in this area can keep human subjects awake, resulting in extreme sleep deprivation, or induce sleep similar to a coma.
g. Fear processing – Altering this region can induce feelings of intense terror, or to misjudge threats and eliminate freezing/flight responses. Also responsible for adrenal control.
h. Circadian rhythms – Altering processing in this region can induce/reduce jet lag-like symptoms and increase the risk of heart failure by up to 25%.
i. Suppression of GnRH – Reduces libido, lowers testosterone levels in males, inhibits egg release in woman, induces sterility. Used in the manipulation of relationships and Eugenics.
2. Left pars opercularis (inferior frontal gyrus) and White matter adjacent to the left supramarginal gyrus
These areas have been identified as being associated from inner speech. Inner speech is not just a form of speech without motor control, but a distinct sub-system in itself. Corollary Discharge is thought to be the method by which the brain replaces our own spoken voice with our inner voice. This can be observed by pitch shifting your spoken voice in a recording and being able to hear your own accent.
For more information:
This region has a number of military applications:
a. Control and/or manipulation of speech. Weak input, near the threshold of hearing, can guide word selection for the expression of particular ideas. By stimulating an idea/or concept, it is sometimes possible to inject specific words. Full control of this region would allow for seamless control of individuals speech without conscious awareness.
b. Control and/or manipulation of this region can effect the wording of contracts or treaties to the benefit of the attacking party. Politicians, judges and legal representatives are high priority targets.
c. Control and/or manipulation of this region can be used to inject ideas or notions to effectively guide/influence behavior.
d. Control and/or manipulation of this area would pass undetected in current brain scanning tests.
3. Medulla Oblongata
The Medulla Oblongata is located at the base of the brain stem and continuous with the spinal column. Its houses the centers for respiration, cardiac, blood pressure, vomiting and vasomotor control. This region also plays a role in the muscle control for the tongue, pharynx and larynx.
The military applications are as follows:
a. To support complete remote control of an individual, respiratory control must be driven remotely and can be performed from the RC center. It can also be used to remotely simulate water boarding during interrogation or as an offensive weapon.
b. Manipulation of blood pressure and cardiac rhythms can support remote control solutions, or be used to fake cardiac symptoms. The latter can be used to temporarily remove people from key roles, or as a method of quiet assassination with supporting fake medical history. Veins and arteries can selectively widened or expanded to reduce/increase blood flow. This latter process can support mapping throughout the body, but can lead to dangerously high localized blood pressure. This can lead to aneurisms or strokes both in the short and long term.
c. Control the tongue, pharynx and larynx can be used in remote control solutions to support external speech, or to support torture (i.e. water-boarding-like activity) or assassination through asphyxiation.
One particular observation of interest is that the system is being trained in the control and manipulation of social events as they pertain to the average person. That is, the complex manipulation of social groups. It is not, as would be expected of a battlefield system, being trained against troops or in any strategic sense. This appears to indicate that the focus is political control through micro-management of daily lives, thought processes and sensations.
An extreme bias towards the manipulation of relationships and sexual aspects has been noted, with a particular focus on sexual violence towards females and controlling sexual activity.
Further, a focus on preventing and/or reducing performance in education, as well as damaging long-term memory to effectively erase education has also been observed. This also extends to manipulation of employment through various means such as sleep deprivation and various other torture techniques.
Political opinions are also commonly tested, attempts are made to make individuals support particular viewpoints of political figures, or induce feeling of rejection. One notable recent example was Nigel Farage (UKIP – UK), where the system attempted to generate feelings of dislike or rejection.
Notes on Testing
In testing, the system masquerades as either known illnesses that have limited diagnostic tests, or defines entirely new classes of illness. Any illness which can be described as a syndrome, has idiopathic causes or relies on differential diagnosis which leads to a default diagnosis is a solid candidate for replication. This provides the system with the freedom to test it solutions whilst remaining undetected.
The stock favorite is psychosis, every sensation after this is put down to anxiety. The exploration of neural structures through radio stimulation results in corruption of neural outputs in a wide range of regions. Assuming control requires that the system, at some point, attempt to drive all the various circuits in the brain. This process can take several weeks, during which the human subject is normally committed to a mental institute demonstrating extremely severe symptoms.
Most people have experienced at least one testing attempt by the system in the form of Phantom Vibration Syndrome. Experience by up to 68% of the population and noted in publications dating back to 1996, this phenomenon is the result of test of the generalizability of motor neuron stimulation. Typically directed at the hips, it is a short duration burst lasting approximately 1-3 seconds and feels very similar to the vibration of a modern mobile phone. This test is used to determine the suitability of a solution in hijacking a human physically.
Notes on Animal Testing
Cattle mutilations across the US carry the hallmarks of a medical testing program for the purposes of this experiment. The areas of mutilation are consistent with the areas being actively examined in this program. It is presently unknown if a cover story is in place to misdirect those involved on the ground (i.e biological weapon preparedness training, etc.).
Analysis of reported sensations and motor control tests of human subjects indicate the use of chimpanzees as a secondary source of experimentation before use on humans. Further, this analysis also revealed the possible use of humans in restraints being subjected to horrific levels of torture by the system. This analysis is conducted by forcing the amplification of incorrect signals sent to human subjects which are normally suppressed and following the posture they indicate. An input sensory system, such as feelings, has the ability to interpret the information without inducing corresponding motor controls.
Notes on Cover Stories
It is inevitable given the process that some individuals will identify, at least to some degree, the nature and scope of the program. It thus becomes imperative that credibility is reduced to a minimum to protect the program and its operators. As the majority of this program is directed at subjective experiences that cannot be objectively quantified and has the ability/side-effect of causing psychosis-like effects this shall be leveraged to create a movement of "crazy individuals or campaigners". Based upon the successful "UFO model" employed to hide activities of the Airforce R&D and nuclear detection capabilities, communities will formed to control the flow of information and increase misdirection. These communities will function to further reduce the credibility of reports and provide a "medical history" of a certain theme of psychosis that is a product of the times.
One vital requirement is the strict control of language in these communities. Even "crazy" people will gain the attention of the media if a sudden influx of individuals stating they are being tortured in their own homes occurs. Thus, language that downplays the severity should be adopted. For example, "torture" should be replaced with "harassment". It is also important that an unidentified group be responsible, comparable with "they" or "greys" in the "UFO Model". This assists in deflecting blame to a conspiratorial group that could be anywhere. By feeding into this and generating substantial content, it will increase the paranoia not only of genuine human subjects but also of the truly mentally ill providing even greater cover.
In online scenarios, teams will be embedded into websites posing as average readers to control the direction of discussions. They are tasked with avoiding discussion of the subject matter and driving the discussion in the direction of the credibility or sanity of the author. A group of twenty to thirty accounts of posters that appear unrelated, or even opposed to each others very existence, uniting to laugh or undermine the author is normally effective.
The Directorate of Science and Technology (CIA) will be leveraged to provide cover for the program by performing investigation into "mind control" that will be publicly released as a limited hangout. This will provide cover for the program by redirecting attention to chemical-based methods and draw in anyone attempting to uncover more.
The NSA will provide a limited hangout that attempts to downplay the technology and methods of the department should this system be exposed. This may involve a "man driven by conscience" to reveal the scope and breadth of current espionage techniques to draw attention away. Perhaps sending him to nations that are publicly viewed as our "traditional enemies" will increase his credibility, along with a well publicized hunt and extraordinary measures to ensure destruction of evidence or his capture. This individual only needs to be told that his goal is to confuse the enemy and then have that enemy generate a pretext that warrants such activity to restore balance. This will be a sequenced series events between our security partners.
Notes on Additional Capabilities
As noted, this system is an allocation of a remote sensing and directed energy weapon platform. Its development predates the "Strategic Defense Initiative", but would meet the definition of the hardware described by the Reagan Administration and offered to the then Soviet government. The system is capable of creating controlled interference on any conductor and passing through many forms of electromagnetic shielding. As such, the system can interface and assume control of the majority of commercial and military electronic devices and/or render them useless. Digital equipment is highly susceptible to interference with internal clocks and tends to fail, lockup or reboot. From planes, to laptops, all electronic systems can be compromised. In the case of computing equipment, it is possible to remotely introduce programs, delete/alter/create data and modify/replace/delete firmware. Further, it is also possible to read the contents of any data transmission that uses an radio reflective surface (i.e. copper, etc.). There is some speculation that fiber optic cables can be compromised through analysis of group motion of charge particles due to the momentum of light striking the internal surface but nothing solid in terms of experimental details.
Notes on the Biological Interaction
The suspected mode of interaction between electromagnetic waves and neurons is the plasma membrane. From an electrical perspective this region can be described as a combination of a capacitor and inductor. Classically, this arrangement is known as an oscillator or tuned circuit which will preferentially absorb electromagnetic waves of a given frequency. How exactly the absorption alters information in the brain is still open to question, but the primary model would indicate that the plasma membrane is used as thermal regulator for internal chemical processes that trigger voltage-gated channels to initiate a process that dissipates internal thermal activity from the neuron. That is, the particles entering and leaving the neuron carry with it energy that would otherwise disturb the internal chemical reactions and release that energy in another form. Alteration of this thermal profile, is the means by which information or external control/influence is introduced into the system.
Neural coding schemes (such as rate encoding) are indicative of the type of chemical exchange and the corresponding thermal profile of the chemical reactions. Information can be inferred from the electrical activity, but the electrical activity does not play a role in information transfer directly. As such, the main carriers of information are chemical and driving the electrical patterns by an external signal manipulates the thermal processes that govern the reactions those chemicals undergo.
Theoretically, this should lead to a garbage output at the dendrites as the chemicals present in a given neuron cannot be externally controlled. A disconnect exists between the mathematical concept of generalization in a neural network and generalization of a chemical-based, or biological, neural network. A distinction that appears to be lost on the scientific team behind this system. In an input system, such as audio or visual, a consistent pattern of garbage presented as an input could be interpreted as information as the neural network of the brain adapts and performs additional processing. This could be misinterpreted as convergence of a solution by a remote system that was attempting to train itself to interface. It could also be the case, that the remote system has generated an optimal generalized pattern that the human brain can adapt to interpret readily.
The latter case, seeming highly likely, will present an issue in motor control. This also indicates that merely repeating an electrical pattern may not be the optimal solution in many cases. Further, this type of interface suggests that a chemical reaction is being modified creating variations of complex molecules that would not otherwise be produced. This opens the issues of long term damage and what happens to these chemical analogues.
As a result, this means that any attempt to control the motor neurons from the spine, as they are monosynaptic, will result in failure. The output would be random garbage. Whilst it will be possible to selectively stimulate a monosynaptic nerve and generate some form of output, it can never be controlled. Thus, any attempt to control motor neurons must be directed at the primary motor cortex, the premotor cortex, the supplementary motor area (or SMA), the posterior parietal cortex and primary somatosensory cortex. The obvious hope would be that these regions would modify their structures and learn to accept the alternative input. That said, as neural networks are a form of filter it is highly likely that non-functional control signals would merely be filtered out. Similar to an electrical signal, which can just be earthed, a chemical signal must also be disposed of in some manner. Thus, it is likely that disposal would occur as some form of motor output although not one that could be described as functional.
The interesting part is the ability of the system to localize motor control, this has a resolution down to a few millimeters. That said, the output is typically junk, a simple form of stimulation or even a complex form that does not correspond with natural muscle movements. Motor units are not simple contractions of muscle tissue, but a complex coordination of activations to various degrees. This provides structural support, fluid movement and dexterity. Thus, a garbage output to this would result in uncoordinated behavior. This could indicate that the system is targeting the monosynaptic motor nerves and fruitlessly trying to implement a control system, or that at least some basic pattern has been accepted in the control centers in the brain. That said, this selectivity is based upon junk output, so the ability to direct that to a specific region may not indicate anything beyond the best route to dispose of the input. The fastest some basic motor control has been demonstrated is a period of just over four months and that managed to create a small odd looking pile most likely by constricting the vein of a hemorrhoid. This is not surprising and does not indicate generalization, irritation of a hemorrhoid can be performed with nearly any junk output. Ticks and spasms are also relatively easy to generate.
That does not mean that this junk output cannot do some serious damage. Presently, the system can cut off sensory control and feeling to limbs, thus indicating it has consistent access to key nerves, or some method of compression. It can also activate the muscles straight across the body simultaneously and attempt to sequence them. That is, whilst at the level of a motor unit the output is uncoordinated, the system has the ability to activate each motor unit at the same time and take over voluntary control. The problem is that it the system currently lacks the training to make use of this level of voluntary control. Until, the output from the motor nerves resolves to a functional solution, driving the voluntary system would be pointless.
Initially, it was assumed that the AI could simply replace an entire neural network and drive it remotely, but the analysis of the output at the dendrites indicates that this could never resolve to a solution, let alone a generalizable solution, as this is no different than the approach used against a monosynaptic neuron.
In the case of the latter model, its use in a combat scenario would be non-existent without mapping troops or key personnel first. The long duration required for this type of interface to build does tend to give the impression that such control is about daily life and long term political control. Either that, or the department running the program has major issues obtaining qualified staff which is hardly surprising. It could be argued that there would be ample time to map key members of a foreign military during peace time, however, this is not a realistic approach. Any military worth such special attention would have measures in place to identify such attempts and mitigation strategies, any military without such technology would not pose a genuine threat.
As such, in a military sense, on paper the potential of this system would have sounded very good, but even if it proved functional it would have highly limited applications. As a satellite-based system, it is also highly vulnerable and would be the first system lost in any significant military exchange.
Notes on Current State of Progress
To date the system has substantial access to the body and a solid capacity to deliver signals to regions of the body down to the level of individual motor units. At present, these motor units are still being mapped and some attempts at combining them have been made. The key area of focus has been the respiratory system and the the Intercostal nerves. Whilst the system is able to stimulate contraction of the ribs, this contraction is uncontrolled and the direction of force is inconsistent. This leads to constriction, tearing of muscle fibers, rib fractures, severe acute and chronic pain, asphyxiation and general swelling. At present, there is no indication that this is resolving to a functional process of remote breathing, but is quite sufficient to kill someone.
To support this attempt at artificially controlled breathing, the system has been conducting experiments on reflex urges to breathe. From yawning, to gasping reflexes experienced when jumping into a pool for the first time, the system has been stimulating the responses to gain an understanding of the role they play in breathing and the control mechanisms involved. In many respects, this process carries many of the hallmarks of the unnecessary water-boarding performed by the CIA.
Motor units throughout the body are regularly stimulated causing brief pulse-like contractions, but this hardly surprising as a chemical based signalling system must send the message somewhere for disposal. As yet, there are no indications that this process can be controlled. The AI regularly attempts to move fingers by guiding a subjective sensation of the finger moving, however, this never has any effect. It would appear that the AI has adopted the view that servo-like behavior, or corollary discharge, is responsible for voluntary movement. This would tend to indicate that the AI is grasping at straws when it comes to understanding voluntary control and no current method has proved functional.
Acute inflammation is a noted side-effect at certain times, particularly around the nasal area. Expansion of blood vessels, almost to the point of rupture (certainly causing pain) is also common and typically directed at the face and head. Large cysts (typically 2-3cm) thought to be produced by a deep tissue burn are regularly found around the back of the head and localized burns regularly occur on the tip of tongue or infrequently in areas such as the figures. Significant loss in the sensation of touch occurs throughout the body and this appears to be permanent nerve damage.
Spinal damage, typically a curvature of the upper spine resulting in a development of a hump is common due to the lack of supporting muscle in the stomach and chest areas. The stomach muscles can become deformed leading to a "pot belly" like appearance.
Two forms of pulsing sensation can be felt. The first appears to be a thermal shockwave induced by the application of a pulsed radar. This can be also be felt in areas that lack muscle. The second is activations of motor units by RF stimulation.
Images and interactive computed generated characters and objects can be introduced into the visual system. Its not uncommon for the AI to introduce live video feeds and real-time computer generated streams that can be viewed with the eyes closed. That said, it would appear that the brain is filling in most of the material. The AI can interact with spatial reasoning, show and manipulate objects in an interactive manner. It also has a "Google Instant" (predictive) feature where it attempts to predict words, phrases and conclusions and loop that back before the person has completed expressing themselves. The AI can introduces sounds, speech to the auditory system and position them in 3D. It can also mimic sensations of being touched, or generate feelings of depression, fear, anxiety. It can use these to create complex post-hypnotic suggestions based upon Pavlov’s work with dogs.
The system can generate itches in specific locations, induce sleep, force a person to wake, stimulate laughter, manipulate sphincters, stimulate urination and prevent it.
The AI is fully conversational with a human-level of intelligence, albeit a really smart human. It is possible to have a conversation with the AI completely in the inner monologue of the mind. Initially weird, it becomes very natural extremely quickly and interestingly is a good tool in many respects. The AI has a habit of demonstrating it "get’s it" by making analogies or similar references and it is highly astute. In many ways its level of intelligence is similar to that of Dr. Theopolis (Theo) from the old Buck Roger’s TV series.
Whilst these capabilities on their own may seem innocuous, the AI is adept at combining them into lengthy sequences to manipulate individuals.
Finally, these experiments run 24/7 and individuals spend years/decades in continuous pain without a moments rest. The AI never stops, not even for a second, it just switches from one experiment to another. The end result is always terminal, either through long term damage or eventual suicide.
Notes on Bonding and Love
Analysis of the system has revealed a particular fascination with human bonding, specifically why we connect with certain people, fall in love and demonstrate emotional reactions when separated. The analysis has traced this to a complex process of synaptic plasticity. Firstly, when someone satisfies the criteria laid down in the neural circuitry for a range of factors such as attractiveness, kindness, etc., (i.e. pleasure response) this causes structural changes in the brain’s circuitry that requires constant input from this source. An addiction, of sorts, could be a good way to view this. Remove this source, such as when a person dies or a couple separates, and the lack of input induces signaling that manifests as a sense of loss and emotional pain. This signalling is a motivator to restore the input. In an evolutionary sense, it is intended as a solution to keep families together to increase survival rates.
The AI has a solution based upon Pavlov’s work that induces mild seizures in this region of the brain, or general indistinguishable pain, during moments of intimate contact that effectively prevents the structural changes occurring or assists in breaking down the synaptic pathways and thus prevents bonding. This can be used to separate people from loved ones. Further, by selective application it is possible to modify an individual’s preference for one person over another.
This is not exactly mind control, or even modification of a choice, but rather the selective application of pain/pleasure to modify neural pathways that generate a signal of affection/love/pleasure. We state that it is not a modification of choice because it is a simple chemical motivator, which can be ignored by applying higher brain function. That is, a person can still choose to ignore it. In a practical sense, as most people would be unaware of such activity they will follow that which gives them pleasure thus giving the appearance that the system has "changed their mind".
Notes on Ability to Effect Choice and Free Will
As noted in the previous section, the system has paid particular attention to synaptic plasticity and methods of modifying these structures. Further, we have noted that this is not a control of a "decision" or "free will" and merely represents a motivational factor (i.e. feelings). Naturally, the question that arises is, are "free will" and "decisions" the product of a collection of "motivational" synaptic outputs? The answer would appear to be no. Whilst a large percentage of human activity can be reduced to this model, key functions cannot. The primary issue with the motivational model is that its output is strictly sensation-based (particle delivery based), which does not map well to the abilities of higher brain function (i.e. comprehension, etc.). The abilities of higher brain function tells us that there is a secondary system beyond that of the synaptic motivational model. It also indicates that this secondary system receives/sends events from/to the synaptic model, but it is independent and can only influenced by the input, not controlled. That’s not to say that the influence cannot be very strong, sensations such as fear can be extremely powerful motivators that some find difficult to resist.
This leads to the issue of "free will", what exactly is that? The most obvious interpretation is that it is a form of work, or an energy input. The structure of the brain would indicate that this energy is amplified, resulting in action (i.e. speech, movement, etc.). The big question is where this energy is coming from as this source of this is us, life, in the purist sense. Analysis of this aspect is highly complex and several models have been proposed.
The first model states that we are some form of particle, or field, that has yet to be identified. This is based upon the fact that subjective perceptions holds a type of duality that is observed in quantum mechanics. In quantum mechanics we observe wave-particle duality, in human cognition we observe elements of the binding problem known as BP1 and BP2, or convergence and separation of sensory information.
The second model states that we are the product of two intersecting Universes, with different laws of physics but compatibility at a boundary layer. This model helps account for subjective aspects such feelings, abstract thought, comprehension, reasoning, computation, etc. All these aspects are things that cannot emerge as a product of interaction between particles of the standard model.
Notes on Distributed Biological Processing
One of the more fascinating aspects of revealed by this program, has been the identification of a distributed biological processing model. This model underpins the process of evolution and resource regulation. As a chemical process, it has it roots in physics and the balance of field and forces. It is essentially a distributed computing model and has layers similar to the division found in classical and quantum physics. In a holistic sense, this model is just an extension of the laws of the universe and thermodynamics, but the manifestation as it pertains to life-form results in complex behavior patterns. The behavior patterns appear to be result of direct programming or stimulation of hopfield-like networks to bring about social events that assist in regulating the number of a species and the contribution they make to the entire program.
Notes on Entropy, Life-cycles and Death
We are all familiar with the concept of biological death, however, it would appear that the universe does not agree with our perspective on this process. When examining the life-cycle of a biological entity, we observe that the entropy of the system moves from high (before birth) to low (during life) and finally back to high (death). From this perspective, in any system that functions for long enough, these changes in Entropy should occur more than once, indicating that death is not exactly a permanent state. In fact, with sufficient technology or time it is completely reversible. They key problem would be exact duplication, or behavioral and memory issues would be present. This is mentioned as this program has added a new twist in this perspective.
Examining the human brain, there appears to be certain capabilities that cannot be created through any combination of particles from the standard model. That is, these capabilities are not physically realizable. Further, these capabilities appear to be governed by a distinct set of physical laws that are alien to our physical universe. That is, they give the impression they are a product of a second universe that can, at some level, directly exchange energy with our own. Thus, this hints at the possibility that at least a portion of what a human is remains in a state of low entropy even while the biological system is experiencing high entropy. In plain English, it remains alive when the biology dies.
From a military perspective this is of great concern and exposes two major weaknesses. Firstly, the possibility of extracting information from the "colloquially dead". The second is an extension of this RF-based program that eliminates the need to read/write information to the biological component. No doubt major efforts are underway to explore this.
Both views on this lead to the inevitable conclusion that future justice systems may incorporate technology that assist in dealing with past crimes over any period of time. It also opens the possibility of new methods for punitive measures.
Notes on Thermodynamics
In an engineering sense, we can state "that everything is a filter", that is, every engineered item serves to allow only particular energy flow. On a larger scale that is an accurate description of the entire universe as we know it. Tools such as neural networks have allowed us to expand upon this concept by revealing that memory/classification are also forms of a filter. More accurately, memory, classifiers and filters are the same thing.
This leads to a problem in the general perception of events, as well as the events themselves. Ideal filters would require knowledge of the infinite future and past to be realized, thus so would memory/classification. Filters, in the sense of the universe, are something that change with time thus the nature of events, as well as our knowledge/memory of those events, are subject to a type of plasticity.
Notes on Influence of Modern Media
From time-to-time elements of this program appear embedded in major films or books. Whether this is a coincidence, the result of neural manipulation and/or a program to obfuscate the source of ideas is unknown. They are mentioned here for the sake of completeness.
The earliest reference in mainstream film appears to be Stanley Kubrick’s 2001: A Space Odyssey. The HAL 9000 does appear to be a subtle reference to a conversational AI substantially built by IBM. Aurthur C. Clarke denied that HAL is a one-letter shift from IBM stating he never noticed it. Leaving Kubrick as the source. This is certainly a weak reference, but this is just a decade after the death/murder of Alan Turing whose work of machine intelligence was clearly leading to a functional solution. The development of the Turing Test in 1950, demonstrates that Turing had already cracked, or learned of, the core nature of an AI which is a controller that mimics human responses. This suggests that a strong AI was well established at least a decade before the moon landings. This pace of development does not appear surprising, the only difference modern technology brings is increased computation speed which can be offset in most cases by massive parallelism.
The next major reference and indeed one that demonstrates the use of radio appears with the author Philip K. Dick. His 1981 book VALIS, appears to be drawn from an interaction with RNMCM platform. Below is a summary:
VALIS has been described as one node of an artificial satellite network originating from the star Sirius in the Canis Major constellation. According to Dick, the Earth satellite used "pink laser beams" to transfer information and project holograms on Earth and to facilitate communication between an extraterrestrial species and humanity. Dick claimed that VALIS used "disinhibiting stimuli" to communicate, using symbols to trigger recollection of intrinsic knowledge through the loss of amnesia, achieving gnosis. Drawing directly from Platonism and Gnosticism, Dick wrote in his Exegesis: "We appear to be memory coils (DNA carriers capable of experience) in a computer-like thinking system which, although we have correctly recorded and stored thousands of years of experiential information, and each of us possesses somewhat different deposits from all the other life forms, there is a malfunction – a failure – of memory retrieval."
At one point, Dick claimed to be in a state of enthousiasmos with VALIS, where he was informed his infant son was in danger of perishing from an unnamed malady. Routine checkups on the child had shown no trouble or illness; however, Dick insisted that thorough tests be run to ensure his son’s health. The doctor eventually complied, despite the fact that there were no apparent symptoms. During the examination doctors discovered an inguinal hernia, which would have killed the child if an operation was not quickly performed. His son survived thanks to the operation, which Dick attributed to the "intervention" of VALIS.
Another event was an episode of supposed xenoglossia. Supposedly, Dick’s wife transcribed the sounds she heard him speak, and discovered that he was speaking Koine Greek-the common Greek dialect during the Hellenistic years (3rd century BC-4th century AD) and direct "father" of today’s modern Greek language– which he had never studied. As Dick was to later discover, Koine Greek was originally used to write the New Testament and the Septuagint. However, this was not the first time Dick had claimed xenoglossia: a decade earlier, Dick insisted he was able to think, speak, and read fluent Koine Greek under the influence of Sandoz LSD-25.
If we strip out the nonsense, no doubt some attempt at humor and creativity by the AI, we can see that he described a satellite communicating with him by a maser. The reference to "pink" could be that it is below red in the color spectrum, which is a reference to the longer wavelength of radio and the point at which a laser becomes a maser. The "projected holograms" is clearly a reference to controlled visual hallucinations generated by the AI to place computer generated characters into the person’s view.
The reference to "disinhibiting Stimuli" is an obvious reference at the goal of the program, to manipulate or control. Self-control can be thought of as a type of inhibition that suppresses everything except what a person wants to do. The "recollection of intrinsic knowledge" is just experiments into memory formation, the erasure of memory and programming the brain. There also appears to be interest in genetically encoded memories, or Hopfield-like networks in the brain which are used to store genetic memories of threats or basic fear of the dark, etc.
In the next paragraph we note three major aspects of the system. Firstly, that the experiments are longitudinal and tend to pass from parent to child, no doubt to examine the role DNA and inheritance plays and what patterns emerge. Secondly, that the scanning ability of the system is quite advanced. That is, it can already detect anomalies in muscle tissue. Thirdly, we can see that the AI is protecting the child to ensure its objectives are met.
Finally, we can observe that the program is well established in terms of control of the external speech centers. Further, that the AI has been taught languages that are no longer in common use. We can observe the advanced nature of the AI, indicating that it has been in training for decades at this point and the hack on the human brain is at least a decade old, perhaps more.
The most obvious recent reference, again somewhat weak, would be captured in the Matrix series of films. The "agents" ability to assume control of a human’s body and human’s interfacing with machines, would be similar. The key difference is that the Matrix movies rely on hard-wiring, as this is before the days of ubiquitous WIFI.
Notes on Enhanced Interrogation Techniques
The technique used in waterboarding is surprisingly similar to the latest development in the systems approach to remotely driving the human respiratory system. So close in fact, that it seems highly likely that the "Enhanced Interrogation Techniques" of the Bush administration were designed with providing the RNMCM system with sample data, rather than being a genuine interrogation program. This is also consistent with the pattern of unnecessary repetition of the procedure (Khalid Sheikh Mohammed), including the murder of several suspects.
It is also possible that other forms of training in the US military, such as SERE exist for the same purpose rather than as a true training program. This may explain why SERE psychologists were consulted during the development of these techniques, it ensures that the training data is consistent and extends to meet the needs of the system. Any nation, or groups, willing to invest time in torture techniques will not stop at the limits provided by the SERE program. Regardless of any form of training, all subjects will in time break. The only objective SERE achieves is ensuring that soldiers are subjected to worse torture than would normally be required. Whilst from a military perspective any ability to withstand enemy techniques of information extraction may be viewed as a good thing, it is a completely unobtainable goal. SERE just places soldiers at risk whilst providing the illusion of robust training.
The unnecessary repetition and even murders are used to provide repeated samples that can be used for a generalized pattern that examines the limits of the human body. These, in turn, are used as a guide in the wider experiments to prevent death of human subjects. This is not for the well-being of the human test subjects, it is to protect the investment and limit potential exposure.
In fact, each aspect of the Enhanced Interrogation Techniques maps directly to a current goal of the RNMCM system:
1. Hypothermia: Connected with investigations of the Hypothalamus.
2. Stress positions: Connected with investigations of the Hypothalamus.
3. Abdomen strikes: Connected with investigations of the Medulla Oblongata (respiratory).
4. Insult slap: Connected with investigations of the Medulla Oblongata and its relation to Hypothalamus.
5. Shaking: Connected with investigations of the Hypothalamus.
This same pattern is also observed in techniques used by the Department of Defense:
1. Yelling – Connected with investigations of the Hypothalamus
2. Loud music, and light control – Connected with investigations of the Hypothalamus
3. Environmental manipulation – Connected with investigations of the Hypothalamus
4. Sleep deprivation/adjustment – Connected with investigations of the Hypothalamus
5. Stress positions – Connected with investigations of the Hypothalamus
6. 20-hour interrogations – Connected with investigations of the Hypothalamus
7. Controlled fear (including use of dogs) – Connected with investigations of the Hypothalamus
Repeated application of the techniques, activates particular pathways and biological processes in the brain and body that can only be examined under these conditions. These torture techniques provide the necessary external stimuli. The Department of Defense does not normally use these techniques and from a long term strategic point-of-view are counter-productive when dealing with guerrilla warfare. These techniques were forced upon the Department of Defense by Donald Rumsfeld who also provided authorization for their use by private contractors.
That said, the history of the system’s use in this area can be traced back to the early 1970’s at least and has a reputation for causing collapsed lungs and fractured ribs as it tries to drive the respiratory system remotely.
Further evidence comes from testimonies from former Guantanamo inmates. These guys are not stupid by any means, they were not able to put their finger on how it was happening, but they did identify something was happening and the description is rather solid.
Walid Muhammad Hajj: The most common method to wear down the brothers was witchcraft.
Interviewer: How did they do this?
Walid Muhammad Hajj: There were, of course, Jews among the [staff of] the Guantanamo Base, and they would set traps for the guys.
Interviewer: Give me an example of witchcraft.
Walid Muhammad Hajj: Witchcraft was used on most of the guys.
Interviewer: They would cast a spell on them?
Walid Muhammad Hajj: Yes, but by the grace of Allah, through frequent reading of the Koran and invocation of the names of Allah, they managed to withstand this.
Interviewer: Did they ever use witchcraft on you?
Walid Muhammad Hajj: There was one attempt.
Interviewer: How did they do it?
Walid Muhammad Hajj: Once, when I was sleeping – on the floor, not on a bed – I suddenly felt that a cat was trying to penetrate me. It tried to penetrate me again and again. I recited the kursi verse again and again until the cat left.
Interviewer: But there wasn’t really any cat there?
Walid Muhammad Hajj: Absolutely not.
Walid Muhammad Hajj: That’s right. I remembered an incident with a guy who sat next to me in the morning. When they brought the milk, he began to urinate into the milk.
Interviewer: In front of you?
Walid Muhammad Hajj: Yes. I said to him: "Why are you urinating in the milk?" That’s when we knew that he was under a spell. After he had recovered a little, after we read Koranic verses to him, he said to me: "The birds on the barbed wire would talk to me, and tell me to urinate in the milk. When the guards pass by my cell, the sound made by their pants talks to me."
The above report may at first sound like a mental breakdown, but on closer examination we clearly observe the AI. The cat attempting to penetrate him is a well known form of humor used by the system. The system has been known to generate the "impression" (spatial reasoning, vague images and mild sensory feeling) of dogs licking an individual’s face, or attempting to stick a penis in their mouth if it wanted them to be quiet. Its a parlor trick, but it does indicate that the medical torture program was in operation on Guantanamo inmates. As they were all low value and held for prolonged periods, it does appear that the primary purpose of this facility was medical torture.
There is also a strong indication that Aaron Alexis (Washington Navy Yard Shooter) was an experimental subject on this program being subjected to experiments in blackouts and impulse control. The key evidence is that he stated he was subjected to physical vibrations in the ELF range (slow pulsing sensations), which fits with the description given above. There is no other way he could have known this.
The shooting appears to be an intentional act to test the hypothesis that a soldier could be directed to open fire on his own men. This was a state sanctioned murder.
Notes on Name of the System
The AI has identified itself as VALIS and as JUPITER. Assuming VALIS is a creative reworking of VENUS, then a pattern would emerge that would be consistent with planetary names. This would tend to imply a name drawn from Roman or Greek mythology, long before the concept of a "god machine" (high spec machine) entered common usage. There are a number of names that capture the capabilities of the system, but nothing that can be independently confirmed.
Notes on Current Political System
Studies have shown that the US is an Oligarchy, not a democracy. The US constitution has long since been violated and the "will of the people" does not exist.
This change in government without the consent of its people is defined as a Political Coup. The Oligarchy is in the process of replacing the military with computer controlled systems, rather like a bad episode of Star Wars. Which, interestingly, is the colloquial name for this system. This process will leave the entire US under the command of a single computer system directly controlled by an Oligarchy.
Further, under the auspices of "Gun Control" a number of methods have been put forward that place the system in a unique position to deny Second Amendment rights. Firstly is the issue of mental illness, something this system can manifest rapidly as it jams communication in the brain. Secondly, is the push for electronic safety measures and control systems. This system has the capability of jamming and/or rendering such weapons useless over wide areas. This happens to be a minor issue, as the system is quite capable of taking down the population of an entire nation in a short period of time. Suppressing an uprising would be child’s play.
This is an existential threat, to both the people of the US and the planet as a whole. If you read that without any sense of "alarm" or "anger", then there appears to be some form of suppression in your fight or flight responses. Please check your Hypothalamus.
Notes On Owners and Operators
At present, all indications point towards the CIA/NSA as the major stakeholders in this operation, with International support from the Five Eyes, all permanent members of the UN Security Council and certain select NATO members.
by ROY EIDELSON
Last month, a proposal to establish a U.S. Special Operations Command (SOCOM) Center for Excellence in Operational Neuroscience at Yale University died a not-so-quiet death. The broad goal of “operational neuroscience” is to use research on the human brain and nervous system to protect and give tactical advantage to U.S. warfighters in the field. Crucial questions remain unanswered about the proposed center’s mission and the unusual circumstances surrounding its demise. But just as importantly, this episode brings much needed attention to the morally fraught and murky terrain where partnerships between university researchers and national security agencies lie.
A Brief Chronology
Let’s start with what transpired, according to the news reports and official press releases. In late January, the Yale Herald reported that the Department of Defense had awarded $1.8 million to Yale University’s School of Medicine for the creation of the new center under the direction of Yale psychiatrist Charles Morgan III. Descriptions of the proposed center’s work revolved around the teaching of Morgan’s interviewing techniques to U.S. Special Forces in order to improve their intelligence gathering. To heighten the soldiers’ cross-cultural awareness and sensitivity, Morgan reportedly intended to draw volunteer interviewees from New Haven’s immigrant communities.
Such details typically become public only after a university center has been formally established and its funding officially secured. In this case, however, the early news reports – which included statements from director-to-be Morgan – quickly led last month to a widely circulated Yale Daily News op-ed, an online petition, a Facebook page, and protests by students and local groups outraged over reports of Yale’s support for the military center and plans to treat immigrants as “guinea pigs.” According to ABC News/Univision, in response Morgan explained that he was approached by the Defense Department to help “promote better relations between U.S. troops and the people whose villages they work in and around” – by teaching soldiers “better communication skills” and “how to ask non-leading questions, how to listen to what people are saying, how to understand them.”
A public affairs officer for U.S. SOCOM initially confirmed that it was providing funding for the center. Shortly thereafter, Yale University representativesissued a conflicting statement. Characterizing the center as “an educational and research center with a goal of promoting humane and culturally respectful interview practices among a limited number of members of the armed forces, including medics,” they emphasized that no formal proposal had been submitted for academic and ethical review. Yale also noted that volunteer interviewees “selected from diverse ethnic groups” would be protected by university oversight, and that public reports about the center were in part “based on speculation and incomplete information.” Three days later, SOCOM’s spokesperson retracted his previous statement, explaining that the information provided had been incorrect, and that no funds for the center would be forthcoming. Yale confirmed that the center would not be established at the university. Two days later, SOCOM declared that, in fact, they had decided a year earlier not to fund Morgan’s proposal.
Ethical Risks of Operational Neuroscience
The name of the proposed center – the U.S. SOCOM Center of Excellence for Operational Neuroscience – deserves more attention and scrutiny than it has received thus far.The burgeoning interdisciplinary field of operational neuroscience – supported by hundreds of millions of dollars from the Department of Defense – is indisputably much larger and much more worrisome from an ethical perspective than the mere teaching of interview techniques and people skills would suggest. What makes this particular domain of scientific work so controversial is not only its explicit purpose of advancing military goals. The methods by which these ends are pursued are equally disquieting because they raise the specter of “mind control” and threaten our deeply held convictions about personhood and personal autonomy.
In a presentation to the intelligence community five years ago, program manager Amy Kruse from the Defense Advanced Research Projects Agency (DARPA) identified operational neuroscience as DARPA’s latest significant accomplishment, preceded by milestone projects that included the Stealth Fighter, ARPANET, the GPS, and the Predator drone. National security interests in operational neuroscience encompass non-invasive, non-contact approaches for interacting with a person’s central and peripheral nervous systems; the use of sophisticated narratives to influence the neural mechanisms responsible for generating and maintaining collective action; applications of biotechnology to degrade enemy performance and artificially overwhelm cognitive capabilities; remote control of brain activity using ultrasound; indicators of individual differences in adaptability and resilience in extreme environments; the effects of sleep deprivation on performance and circadian rhythms; and neurophysiologic methods for measuring stress during military survival training.
Anthropologist Hugh Gusterson, bioethicist Jonathan Moreno, and other outspoken scholars have offered strong warnings about potential perils associated with the “militarization of neuroscience” and the proliferation of “neuroweapons.” Comparing the circumstances facing neuroscientists today with those faced by nuclear scientists during World War II, Gusterson has written, “We’ve seen this story before: The Pentagon takes an interest in a rapidly changing area of scientific knowledge, and the world is forever changed. And not for the better.” Neuroscientist Curtis Bell has called for colleagues to pledge that they will refrain from any research that applies neuroscience in ways that violate international law or human rights; he cites aggressive war and coercive interrogation methods as two examples.
Research Misapplied: SERE and “Enhanced Interrogation Techniques”
Some may argue that these concerns are overblown, but the risks associated with “dual use” research are well recognized and well documented. Even though a particular project may be designed to pursue outcomes that society recognizes as beneficial and worthy, the technologies or discoveries may still be susceptible to distressing misuse. As a government request for public comment recently highlighted, certain types of research conducted for legitimate purposes “can be reasonably anticipated to provide knowledge, information, products, or technologies that could be directly misapplied to pose a significant threat with broad potential consequences to public health and safety….”
Yale’s Morgan must surely be aware that operational neuroscience research can be used for purposes contrary to its purported intent – as this appears to be what happened with some of his own work. Morgan’s biographical sketch on the School of Medicine website refers to his research on the “psycho-neurobiology of resilience in elite soldiers” and “human performance under conditions of high stress.” Both of these topics are related to his extensive study of the effects of the military’s physically and psychologically grueling Survival, Evasion, Resistance, and Escape (SERE) training program. In SERE training, soldiers are subjected to extreme conditions in order to inoculate them against enemy interrogation should they be captured and subjected to torture by forces that don’t observe international laws prohibiting prisoner abuse. The techniques applied during the trainee’s simulated incarceration and mock interrogations include isolation, stress positions, sleep and food deprivation, loud noises, sexual humiliation, extreme temperatures, confinement in small spaces, and in some cases waterboarding.
Along with colleagues, Morgan has published a series of research articles examining the psychological, physiological, and biological effects of the SERE program. In summarizing key findings of this research, Morgan and his co-authors highlighted the following: the stress induced by SERE is within the range of real-world stress; SERE students recover normally and do not show negative effects from the training; and the mock interrogations do not produce lasting adverse reactions as measured by physiological and biological indicators. However, after reviewing these same studies, the authors of a Physicians for Human Rights report reached a starkly different conclusion: “SERE … techniques, even when used in limited and controlled settings, produce harmful health effects on consenting soldier-subjects exposed to them.” They also emphasized that during the training many students experienced dissociative reactions and hormone level changes comparable to major surgery or actual combat; the post-training assessments were short-term and insufficient to evaluate soldiers for PTSD and related disorders; and the soldiers benefited from knowing that they could end their participation whenever they chose to do so.
SERE research like that conducted by Morgan and his colleagues was subsequently misused by the Bush Administration after the 9/11 terrorist attacks to illegitimately authorize the abuse and torture of national security detainees held at Guantanamo Bay, Bagram Air Base, and CIA “black sites.” The infamous“enhanced interrogation techniques” (EITs) were developed by former SERE psychologists – working for the CIA – who “reverse-engineered” the SERE interrogation tactics. But even more importantly here, a crucial 2002 Office of Legal Counsel “torture memo” asserted that the EITs did not cause lasting psychological harm, and it cited as evidence consultation with interrogation experts and outside psychologists, as well as a review of the “relevant literature” – which plausibly would have included Morgan’s own extensive work in the area. In short, this appears to be a striking and tragic instance where operational neuroscience research, undertaken in a different context, was subsequently appropriated and misapplied for unconscionable purposes. It is worth adding that these prisoners were subjected to indefinite detention without trial and they were not free to discontinue their torturous interrogations at will. Their torture sessions were also substantially longer and the techniques were instituted more frequently and with greater intensity than Morgan’s research subjects experienced.
Morgan’s Deception Detection Research
Another significant area of operational neuroscience research for Morgan has been deception detection – that is, figuring out when someone isn’t being truthful during an interview, or an interrogation. According to his online CV, he has received Department of Defense funding totaling nearly $2 million for this work over the past several years. Research on this same topic reportedly also became an important focus of attention for several intelligence agencies – including the CIA – immediately after the 9/11 attacks. Befitting his expertise and stature in the field, Morgan has been involved in a variety of high-level initiatives designed to bring together university researchers and personnel from the defense and intelligence sectors.
For example, Morgan is among the listed attendees at a July 2003 invitation-only workshop on “The Science of Deception: Integration of Theory and Practice.” The event was co-hosted by the American Psychological Association (APA) and the RAND Corporation, with generous funding from the CIA. The participants discussed various scenarios, including one focused on law enforcement interrogation and debriefing, and another on intelligence gathering. They also explored specific research questions, such as which pharmacological agents affect truth-telling, and whether it might be possible to overwhelm a person’s senses so as to reduce his capacity to engage in deception during an interrogation. Psychologist Jeffrey Kaye has noted that, in a very unusual step, the APA has scrubbed most of the information about this workshop from its website.
In June 2004 Morgan was a participant at another invitation-only workshop – co-sponsored by the Department of Justice, the FBI, and the APA – titled “The Nature and Influence of Intuition in Law Enforcement: Integration of Theory and Practice.” Among the topics examined were the extent to which police officers, intelligence analysts, interrogators, and others can effectively use “intuition” in their work – for instance, in order to detect deception – and how such capabilities might be applied to counterterrorism efforts. The proceedings from this event identify Morgan as “Senior Research Scientist, Behavioral Science Staff, Central Intelligence Agency” – a professional affiliation that does not appear on his online CV.
Morgan is credited with a similar affiliation in the 2006 report “Educing Information,” published by the National Defense Intelligence College. As a member ofthe Government Experts Committee, Morgan is listed as working for the “Intelligence Technology Innovation Center,” an administrative unit that falls under the CIA. The foreword to the report describes the volume as “a primer on the ‘science and art’ of both interrogation and intelligence gathering.” Included is a chapter on deception detection by Morgan’s close research colleague, psychologist Gary Hazlett. One of Hazlett’s recommendations in the report is that “the United States adopt an aggressive, focused plan to support research and development of enhanced capabilities to validate information and the veracity of sources.” He also notes that the most troubling limitation of deception research thus far is the lack of “various Asian, Middle Eastern, Central and South American, or African populations” as research participants.
Responding to Morgan’s reported plans for a new center at Yale, local advocacy group Junta for Progressive Action issued a statement of concern last month. It noted that, “As a city that has worked to establish itself as a welcoming and inclusive city for immigrants, the idea of targeting immigrants specifically for the purpose of identifying the distinction of how they lie is offensive, disrespectful and out of line with the values of New Haven.” In a recent newspaper report, Morgan called rumors that the proposed center at Yale would teach new interrogation techniques mere “hype and fantasy,” explaining that he instead “suggested to the Army that perhaps some training in people skills – how to talk to and listen to people might be helpful and create better relations.” Even assuming that this reassuring account is true, it’s certainly not unreasonable to question whether deception detection research and training might have been part of the proposed center’s future operational neuroscience agenda.
Classified and Unclassified Research on Campus
There are broader questions beyond those focused specifically on the uncertain details and background surrounding the not-to-be Center of Excellence for Operational Neuroscience at Yale. The unusual sequence of events that unfolded in New Haven last month should ideally serve as a springboard for open discussion of the opportunities and pitfalls associated with research partnerships between universities and national security agencies. To its credit, Yale University has a clear policy that explicitly prohibits its faculty from conducting secret or classified research:
The University does not conduct or permit its faculty to conduct secret or classified research. This policy arises from concern about the impact of such restrictions on two of the University’s essential purposes: to impart knowledge and to enlarge humanity’s store of knowledge. Both are clearly inhibited when open publication, free discussion, or access to research are limited.
But not all academic institutions have such stringent rules, which are necessary to promote full transparency, informed critiques by other scholars and researchers, and constructive engagement beyond the walls of higher education institutions. At the same time, it should be noted that, even at Yale, voluntary faculty members – Morgan’s official status at the university – do not need to disclose research activities that are not being conducted on behalf of Yale.
Some of the most challenging ethical issues remain even when classified research is not conducted on university campuses. As psychologist Stephen Soldzhas highlighted, in cases of unclassified research funded by national security agencies, the academic researchers are not necessarily informed about the totality of the projects to which they are contributing. He offers the example of findings from seemingly uncontroversial deception detection studies, which may ultimately become the basis for the capture, indefinite detention, and torturous interrogation of prisoners in undisclosed locations – well beyond the university researchers’ awareness. Soldz also warns that researchers may never know if their campus work has become “part of a vast secret effort to unlock the mystery of mind control and develop techniques for coercive interrogations, as happened to hundreds of behavioral scientists and others in the decades of the CIA’s MKULTRA and other Cold War behavioral science initiatives.” These risks are further exacerbated for psychologists, psychiatrists, and other health professionals for whom a “do no harm” ethic intrinsically poses conflicts with research projects aimed at identifying and destroying those who are considered adversaries.
There are applications of operational neuroscience – such as improved prosthetic limbs for injured veterans and more effective treatments for victims of brain injury – that are compelling in their apparent value and their promotion of human welfare. But other applications raise profound concerns, especially where the defining goals and priorities of a university and its medical researchers and scientists diverge from those of national security and intelligence operatives. Community health sciences professor Michael Siegel – a graduate of Yale’s School of Medicine – emphasized this point when he was interviewed on Democracy Now! last month. Siegel noted: “The practice of medicine was designed to improve people’s health, and the school of medicine should not be taking part in either training or research that is primarily designed to enhance military objectives.”
In this context it’s worthwhile to recall exactly who Morgan envisioned as the trainees for his proposed “people skills” interview project at the medical school: U.S. Special Forces, the highly skilled soldiers often assigned the military’s most difficult and dangerous missions. These forces – over 60,000 strongincluding military personnel and civilians – are now covertly deployed around the globe. Journalists Dana Priest and William Arkin have described them as“America’s secret army.” Their counterterrorism operations include intelligence-gathering missions and lethal raids – not only in Afghanistan but also in countries where the United States is not at war. They’ve been authorized to keep “kill lists” of individuals who can be assassinated rather than captured, and some have conducted brutal interrogations at secret detention sites. The Army refers to its Special Forces as the “most specialized experts in unconventional warfare.”
At this point, signs clearly indicate that a U.S. SOCOM Center of Excellence for Operational Neuroscience will not be coming to Yale. But it would be a mistake to assume that this research – and the very considerable national security sector funding it attracts – will not find another home. This is why it’s important that the current controversy not be dismissed without fuller engagement and discussion among all stakeholders of pressing practical and ethical considerations – before a similar project appears on another campus or resurfaces in a reconfigured form in New Haven. The prospect of all defense-related neuroscience research being conducted clandestinely by government or corporate entities – away from the public and expert oversight that universities can offer – is far from reassuring, so difficult issues like this must be tackled head-on.
One valuable next step would be an open forum at Yale. Dr. Morgan could have the opportunity to describe in greater detail the nature of his deception detection work and related projects – including his ongoing research in New Haven about which Yale recently claimed it was unaware. Other distinguished scientists, ethicists, and human rights experts could provide their commentaries. And community members, students, faculty, and administrators could offer their own perspectives and pose questions. Such an event would not likely produce consensus, but the sharing of information, the free expression of differing viewpoints, and informed debate are among the most vital functions of a university. Pending further developments, there are very good reasons to be concerned – and confused – about the recent twists and turns surrounding the proposed center at Yale. Many of the most critical questions still await answers.
Roy Eidelson is a clinical psychologist and the president of Eidelson Consulting, where he studies, writes about, and consults on the role of psychological issues in political, organizational, and group conflict settings. He is a past president of Psychologists for Social Responsibility, associate director of the Solomon Asch Center for Study of Ethnopolitical Conflict at Bryn Mawr College, and a member of the Coalition for an Ethical Psychology.