Etiket arşivi: MK ULTRA PROJECT

MK ULTRA PROJECT : Espionage & Brain-Computer Interfaces – Modern Warfare Series


Controlling information is no longer the goal.

Several months ago, I shut down this column and removed its content. For those that don’t remember, I spent nearly four years digging into the physics and technology behind reading/writing information to/from the human brain using radio waves. There was a time when the general view of this was associated with ‘tinfoil hat conspiracy theories’. That all changed when I began demonstrating the physics to reveal a functional model which, in turn, revealed a medical torture program run by a portion of the US government.

I closed the column for a variety of reasons. Firstly, there is the ever-present pressure from various organizations to maintain the silence. That said, I have never much cared for their opinions and it did not rank very high in my decision making processes. Secondly, I tend to have a different approach to writing than most authors. My published articles can be as much like a notebook to capture ideas as it is a mechanism to convey those ideas to others. This can lead to a somewhat muddled experience for readers that do not understand this. Finally, as with any investigation, getting side-tracked is inevitable as interesting things pop up all the time.

Thus, a clean-up was long overdue.

In today’s article, I intend to capture the important elements from the series on reading/writing information to/from the human brain in the context of modern warfare. Rather than having twenty different articles, with information spread all over the place in various states of revision, it is best to have it in one single page. This article will capture everything that is currently known, or can be inferred, about the system, its objectives, the current state of progress and any additional relevant material. As such, this is a very long article.

As ever, the question is where to begin. When describing a system of this magnitude it is always difficult to identify a good starting point that is suitable for most readers. I suppose the best place to start is a small executive summary that describes the system and from there we can break it out into a more detailed picture.

A further question is what to name this. A misleading term is "remote neural monitoring" (RNM), as it implies that such a system is merely recording. A term I have used before is "Synthetic Telepathy", but that can also be misleading as it is a term used to describe a different military technology under development. I feel that the best approach is to extend the historical name for this technology, to better reflect its current capabilities. "Remote Neural Monitoring, Control and Manipulation" (RNMCM) is a bit of a mouthful, but it is certainly more accurate.

Executive Summary

"Remote Neural Monitoring, Control and Manipulation" (RNMCM) is a term that refers to the usage of specific technologies to record and/or alter the electrical activity of neurons in the human body (or any life-form). Neurons can broadly be separated into four main categories:

  • Sensory neurons
  • Motor (and other output) neurons
  • Communication neurons
  • Computation neurons

The electrical activity of each of these four main types of neurons can be classified by a computer. Every action a human makes, or experiences, is represented by specific patterns in the electrical activity. Thus, when a specific electrical pattern is observed, we can state that a certain event has happened. That could be a feeling of joy, seeing a blue car, tasting an orange, thinking of a word, moving a limb, or even visualizing a shape in your mind to solve a mathematical puzzle.

The key to any functional RNMCM system is obtaining good recordings of specific electrical patterns and knowing what they mean. Further, as the electrical patterns are slightly different between people, knowing these differences allows the development of systems that can classify electrical activity across the entire global population without retraining. We call this latter goal "Generalization". "Generalization" is important because training takes a long time. With "generalization" we can skip the training process and jump straight to reading the required information which is a lot faster and requires less computing power.

An example of an unclassified technique of reading the electrical activity of the brain is Electroencephalography (EEG). EEG has a limitation, in that it can only record the sum total of electrical activity. This is rather like listening to a song, in that you cannot hear the individual instruments in isolation. RNMCM uses a different approach, it exploits the reflectivity/absorption/transparency of neurons at radio frequencies to record individual activity of neurons. This can be compared to obtaining a track with a single instrument playing its role in a song from a music studio.

By recording the electrical activity and observing behavior, or impact to other electrical activity, we can infer what each electrical pattern means. By recording the slight variations found in different human subjects, by analyzing tens of thousands/millions of brain patterns, a system can be trained to recognize what that electrical activity means in any human subject it encounters without retraining. The analysis of tens of thousands/millions of people is how we obtain "Generalization". Given the complexity of the human brain and certain limitations, obtaining "generalization" could take half-a-century or more depending on available hardware and complexity of the problem.

Throughout this process, we will obtain an ever-increasing number of identified electrical activity patterns that are militarily useful. For example, being able to know military plans in advance, or quantify enemy numbers and capabilities. In addition, we will be able to combine these identified electrical patterns to create/compose our own complex electrical patterns. This latter ability will allows us to reverse the process, drive the neurons with our patterns and have a human subject under our control or influence.

Initially, when introducing composed patterns into a human subject, we would expect a certain level of influence. In time, as the database of electrical patterns expand, it is expected that this will give way to complete remote control.

In order to complete the training of the system and test its effectiveness, tens of thousands/millions of volunteers would be required to submit themselves to long-term (life long) experimentation, the effects of which would be wide-ranging. We can expect deaths, deformities, mental illness, seizures, complex syndromes, chronic and acute pain, heart and respiratory failure, etc.

Given the national security requirement of secrecy and the lack of such a willing population, secret experimentation on a significant sub-section of the human population globally would be required. Three basic categories of human subject will be required, training, validation and test. The training group will consist of human subjects that are used continuously 24/7 to both produce electrical patterns and serve as a testing area for identified patterns. The validation group will will be used as a quick reference to confirm the accuracy of generalization. The test group, which for practical purposes will continuously select random individuals on the planet, will be used be to study the generalized pattern(s) effectiveness and accuracy.

It would be impractical to hide such activity to the major enemies of the state, thus some form of international agreement encompassing technology sharing and combined defense pact would need to be made to provide cover for the program.

Technical Summary

The technology required to drive this program on the surface is a rather simplistic combination of existing technologies. That said, to bring the system up to near real-time speed for both reading and writing requires optimization across a multitude of technologies all developed by numerous vendors and each with their own particular physical limitations.

The system can be broken down into a number of layers and lends well to a development process conducted through compartmentalization of classified programs. The development of the system can be fragmented through hundreds, if not thousands of independent programs and the results combined reducing the footprint of knowledge and thus program exposure. Further, in time, particular technologies and techniques can be re-invented at a later date with a higher profile in order to establish false historical time-lines thus reducing the exposure of key staff to prosecution and/or direct action by hostile or friendly forces.

The primary task is to deliver a distributed computing platform (Grid Computing) spanning the globe and linked by a mixture of high speed connections. Custom software (middleware) will control the allocation of resources, distribution of programs and the migration of data around the grid computing platform. It will, in effect, operate as a single geographically separated supercomputer and have the ability to hide this fact from end-users by presenting false logical views of the system. The grid will be a mixture of a range of hardware from commercial-off-the-shelf (COTS) hardware, to custom chips and boards with the latest advancements in quantum computing optimization.

The grid computing platform will play host to a strong, general purpose, artificial intelligence. The strong artificial intelligence will perform numerous roles throughout the defense sector, but will provide the ability to compartmentalize activity through a strict classification process. Thus, any activity generated by this program will not generate any concern and will be attributed to general remote sensing applications if observed from multiple points. The role of the strong AI in this program will be complex. During the training phase, its main role will be to infer the meaning of electrical activity and to leverage its human-level reasoning capabilities to examine internal thought processes. As we transition to influence and control, the strong AI will attempt to mimic the human subject in terms of thought processes, language and behaviors. The ultimate goal being that the strong AI can assume complete remote control of a human subject and impersonate them. The fallback position, should this prove unfeasible, is to substantially compromise the human subject’s neural activity such that we are in a position to strongly influence decisions and actions. An additional objective, will be the ability to perform remote assassinations, intimidation and torture to extract information not directly observed by the system.

The strong AI will direct a classification system composed of the latest developments in machine learning. This classification system will be fed by signal processing network that prepares radio data for analysis by the classification system. The classification system will be in a low latency path from the source of radio information and have the ability to prioritize signals based upon temporal requirements. This will require a programmable architecture which can be driven by the strong AI.

Observers of this system with sufficient technical knowledge could not determine that the system was anything beyond a complex radar and remote sensing platform. Linking this system with a program to read/write information to/from the human brain would be complete speculation on the behalf of the observer. This provides the system with robust counter-intelligence potential from internal threats and a high degree of plausible dependability. Other than complex analysis of the data, which can be erased or moved to more favorable legal jurisdictions, complete seizure of the equipment only indicates the potential for use, not the actual application. During development of the satellite hardware the requirements, particularly of the transmitter arrays, may raise suspicions. A mitigation strategy would be to introduce the system as a directed energy weapon designed to manipulate/jam electronic systems (such as guidance systems of ballistic missiles/bombers/etc.).

Radio information is delivered from one, or more, big-ear (synthetic aperture – operating at different elevations) satellite network(s). The constant speed of light places hard limits on the elevation of satellites required to capture/broadcast real-time information and thermal noise places hard limits of the maximum elevation for non-real-time intercepts. The hard limits are compounded by the fact that the human body can only absorb/reflect so much radiation.

Technical

The Grid Computing Solution

The physical hardware arrangement of the grid computing solution will be quite complex. Real-time interaction with the human brain is a hard requirement of the system, thus latency has hard limits that dictate the minimum number of site globally as well as their distance from satellite downlinks. To the human brain, variation in delays can be more noticeable than a constant delay, especially when multiple senses are involved. Typically, when working with a single sense a delay of up to 150ms is tolerable, however, this can drop to 60ms when multiple senses are involved.

Thus, to support an audio stream such has inserting words into the human brain, a delay of up to 150ms is functional. When that is combined with visual or other sensory stimulation, the functional delay begins to drop to around 60ms. As a result, the grid computing solution must have extreme low latency and designed to pipeline information. That is, the solution must be designed like a circuit that provides the most optimal physical path between points. This architecture is in direct contrast to modern approaches which rely completely on the optimization of software functions. Such an approach will not result in the required high performance demanded. The key problem is that this approach is very brittle from the perspective of future development, however, this is not much of a concern as the application will be a constant factor.

These hard limits provide a defined limit on the number of I/O exchanges. I/O exchanges have an issue known as end-point crisis. An end-point crisis is where the transmission medium can handle more data that the circuits reading/writing data to that physical layer. Further, each I/O exchange introduces a complex delay that in itself has well-defined hard limits. As such, when scaling there is a defined physical limit of the amount of hardware that can be in a real-time pathway before it becomes non-functional. Even with the progressive improvement of hardware processing speeds and consolidation of services, these hard limits will always exist.

At the extreme, the grid computing solution (including all ground equipment and links) can be allocated 1/3 of the the delay. This provides a window of 20-50ms in which to perform all real-time functions. The grid will therefore need to incorporate elements of predictive analysis. Predictive analysis will play a key role of the services run on the grid, but the grid itself will be required to identify particular scenarios that can be optimized and offload the processing from the services it hosts. One such scenario could be the reallocation of resources or programs that migrate to the geographical area in which they are being used. Rather than this being managed in software by a hosted AI, these basic services can be offloaded to hardware that powers the grid. Thus, the grid solution identified here would be a custom hardware solution, rather than a complete software middleware.

We can now observe that the density of ground sites is dictated by the demand that any real-time target must be within a 40-100ms round trip time. Ignoring all the delays that provides an operational range of 6000-15000Km.

As noted the majority of the grid will be a custom hardware solution, that will contain custom hardware for the services it hosts. Each element of the grid will be a supercomputer in itself capable of operating independently of the grid for survivability. Given the operational range of the system, complete global coverage can be provided by around 8 sites, raising to around 24 sites (alternatively 5 main sites, 10 redundant) when triple redundancy is added. Modularity certainly lends to ease of upgrades, but it comes at the expense of adding delays to the system. Thus a balance must be struck between modularity and speed to provide the best performance. Continuous evaluation of the design of the system will reveal, over time, the most efficient trade-offs and hardware arrangements.

The grid hardware will be a mixture of semi-conductor technologies and quantum computing solutions aimed at resolving optimization problems in large datasets.

The Strong Artificial Intelligence

Given the longitudinal nature of the study to be undertaken, the complex interaction and investigation of patterns, direct human analysis is impossible. It is critical that the latest in automation techniques be applied to the problem and allowed to grow hand-in-hand with the experiments. One of the key stumbling blocks in the road to a strong AI is the lack of insight into human behavior, thought processes and ultimately validation of machine learning output. In this experiment, not only will we learn how to interface with human body via radio, but leverage the feedback provided by the human brain as a means to train the AI to replicate human behavior.

A strong AI is can be thought of a complex form of database that uses certain information in that database to replicate or approximate human behavioral responses to a given input or series of inputs. Initially the AI will be basic, it will merely perform analysis of particular neural circuits relating to speech, recognition, auditory, vision, etc. Once substantially complete, to the point where the AI can pose certain problems to the human brain, the secondary objective of making the AI more human-like in both its reasoning and behavior can begin. By posing problems to the human brain, responses can be compared with the output of algorithms employed by the AI and refined to match. This will supplement all training provided directly to the internal interfaces of the AI.

The AI will built upon a statistical engine that will return the most likely response for a given input, in that respect it will be an amalgamation of everyone and everything that it has ever interacted with. Advancement in quantum computing should provide for faster searches when posed as optimization problems. An important area of development will be the inference engine which attempts to relate the output of one statistical assessment with another, integrating that into its sum knowledge over time. It is envisaged that this will be a continuous process and no great leap in intelligence will occur for the simple reason that it is ultimately based upon computation and can only combine what it already knows. That is, the combination of information does not lead to hardware changes or changes in the laws of physics which ultimately define the method in which information can be represented, processed and outputted.

The strong AI is a mixture of both software, firmware and hardware that provides a common processing core for any number of "instances". That is, a single system provides the processing that drives an individual AI and the system will be capable of generating as many AI instances as the hardware allows for. Thus, it is quite possible to have thousands of "computer agents" tasked with various roles. Further, these "computer agents" will have the ability to migrate anywhere in the grid to follow targets or provide services more optimally. When the ability to assume control of a human emerges, the AI will also be able to have a physical presence anywhere in the world on demand to deal with emerging threats, assume political or military control or ensure economic objectives.

To support these identified roles, the AI must have a range of knowledge and specialisms that cover every area of knowledge known to man. Further, it must record the activity of every key person the globe over to ensure that it has the required "memory" to properly impersonate a given target. Such oversights would lead to major problems and rapid identification of controlled individuals. Thus, the AI must track, record and archive data relating to everyone that could potential become an important individual as gaps in memory, even childhood memories, may give rise to suspicion and ultimately lead to exposure. As it is difficult to judge who will become important, the combination of two approaches are advised. Firstly, the goal of recording the neural activity of every individual on the planet is of top priority and a realistic objective. Secondly, in the interim, strict regulation and control of individuals entering positions of power is recommended to ensure the system has complete coverage of key individuals.

Such a system is likely to draw a lot of unwanted attention, it is thus advisable to have numerous parallel programs with similar capabilities to hide amongst. As this system is automated, staffing and thus potential leaks can be kept to a minimum and, for the most part, the majority of staff will not have a need to know.

Digital Signal Processing (DSP) System

Data obtained from radio sources must be prepared in a manner suitable for the AI and prepare outgoing signals for radio broadcast. The AI could perform this task, but this substantially reduces its ability to perform other tasks. Thus, all incoming raw radio signals or outgoing data will pass through a programmable DSP system that will convert the incoming/outgoing streams and separate real-time signals from those that can be examined later or broadcast later. The DSP system will be driven by the AI and dynamically updated as required. This system will supplement onboard electronics in satellites designed to reduce bandwidth usage.

Satellite Systems

The most efficient model is to employ a bi-static wide-band radar with a synthetic aperture receiver network (a big ear). The receiver network is designed to work over the entire spectrum with the highest possible sensitivity. The receiver network will be able to view all radio sources from the planet simultaneously, pinpointing their locations and tracking their movements. This information will be captured by other compartmentalized programs and leveraged appropriately.

Using a combination of transmitted radio pulses and reflected RF from terrestrial sources, humans, cars, planes, etc., will be tracked in real time, classified, analyzed for patterns and accounted for. Given the density of modern RF sources, the majority of the tracking can be performed by passive reception only. This system will produce a real-time view of the Earth with the goal of complete coverage. The bandwidth required to perform this is surprising small and all the heavy processing is performed on the ground. Each aspect of this real-time view can be presented independently as an exposed services to any number of departments without revealing the entire scope of information gathered.

In this program, we will be interested in the human tracking information. This will be fed into the system allowing target selection and tracking.

The radio transmitters used in this program produce a wide bandwidth of very weak narrow-band pulses at ground level. From an analysis perspective, it would appear similar to a spread spectrum source with limited frequency hopping capability. As such, it may be ignored as being an "old" or "legacy" system of no real importance. Each of these pulses are on different frequencies and are selectively absorbed by different neurons throughout the body. A one-to-one mapping between a pulse of a particular frequency and a neuron is not expected, but rather a high probability of absorption. Not only does the system need to account for the chaos in the neural activity and attempt to make sense of this, but it must also learn to deal with the chaos of transmitting to a moving target and all of the problems inherent in radio reception under a range of atmospheric conditions.

Unlike traditional systems radio systems, this system must penetrate modern RF shielding and be able to deliver signals with pinpoint accuracy. Thus, this transmitter will comprise of an electronically steerable maser array, that will leverage the latest advances in atomic dialectic resonance to pass through RF reflective/absorbent surfaces, follow targets underground and/or underwater. The maser array can follow particular targets or broadcast a generalizable signal over a wide area. Generalizable signals over a wide area can manipulate voting, suppress anger at government policies or actions, induce riots or revolutions, induce fear in opposing militaries, reduce libido to reduce population numbers, selectively prevent breeding in particular ethnic groups, etc.

Such a system is readily scalable and has the ability to effect the entire global population.

Key Brain Regions Under Study

Certain regions of the brain are deemed more critical than others to understand as they can prove militarily or politically useful. This allows the system to have operational status before it develops a complete functional solution to remote control. Some areas of interest are noted below, along with potential military applications, but this list is nowhere near exhaustive:

1. Hypothalamus

The hypothalamus controls body temperature, hunger, important aspects of parenting and attachment behaviors, thirst, fatigue, sleep, fear processing and circadian rhythms. For a detailed breakdown of the roles of the Hypothalamus, please follow this link:

http://en.wikipedia.org/wiki/Hypothalamus

The Hypothalamus has numerous military applications:

a. Body temperature: Altering the body temperature can result in a breakdown of internal biological process. This can reduce the efficiency or even kill the human subjects.

b. Hunger – Altering sensory information in relation to hunger can cause human subjects to starve or over-eat. Both of which reduce their capability to respond to a threat.

c. Parenting and attachment behaviors – Altering this region has an effect on bonding, relationships and loyalty to family, friends, country or ideals.

d. Thirst – Altering processing in this aspects results in the intake of too much or too little water, both of which can have drastic effects on the human body.

e. Fatigue – Altering information processing in this region can increase or decrease fatigue responses in a human subject. This leads them to either increased endurance, or Myalgic encephalomyelitis (ME)/ Chronic Fatigue Syndrome (CFS) which effectively disables a human subject.

f. Sleep – Altering processing in this area can keep human subjects awake, resulting in extreme sleep deprivation, or induce sleep similar to a coma.

g. Fear processing – Altering this region can induce feelings of intense terror, or to misjudge threats and eliminate freezing/flight responses. Also responsible for adrenal control.

h. Circadian rhythms – Altering processing in this region can induce/reduce jet lag-like symptoms and increase the risk of heart failure by up to 25%.

i. Suppression of GnRH – Reduces libido, lowers testosterone levels in males, inhibits egg release in woman, induces sterility. Used in the manipulation of relationships and Eugenics.

2. Left pars opercularis (inferior frontal gyrus) and White matter adjacent to the left supramarginal gyrus

These areas have been identified as being associated from inner speech. Inner speech is not just a form of speech without motor control, but a distinct sub-system in itself. Corollary Discharge is thought to be the method by which the brain replaces our own spoken voice with our inner voice. This can be observed by pitch shifting your spoken voice in a recording and being able to hear your own accent.

For more information:

http://brain.oxfordjournals.org/content/134/10/3071.full

http://www.eurekalert.org/pub_releases/2013-07/afps-iss071513.php

This region has a number of military applications:

a. Control and/or manipulation of speech. Weak input, near the threshold of hearing, can guide word selection for the expression of particular ideas. By stimulating an idea/or concept, it is sometimes possible to inject specific words. Full control of this region would allow for seamless control of individuals speech without conscious awareness.

b. Control and/or manipulation of this region can effect the wording of contracts or treaties to the benefit of the attacking party. Politicians, judges and legal representatives are high priority targets.

c. Control and/or manipulation of this region can be used to inject ideas or notions to effectively guide/influence behavior.

d. Control and/or manipulation of this area would pass undetected in current brain scanning tests.

3. Medulla Oblongata

The Medulla Oblongata is located at the base of the brain stem and continuous with the spinal column. Its houses the centers for respiration, cardiac, blood pressure, vomiting and vasomotor control. This region also plays a role in the muscle control for the tongue, pharynx and larynx.

The military applications are as follows:

a. To support complete remote control of an individual, respiratory control must be driven remotely and can be performed from the RC center. It can also be used to remotely simulate water boarding during interrogation or as an offensive weapon.

b. Manipulation of blood pressure and cardiac rhythms can support remote control solutions, or be used to fake cardiac symptoms. The latter can be used to temporarily remove people from key roles, or as a method of quiet assassination with supporting fake medical history. Veins and arteries can selectively widened or expanded to reduce/increase blood flow. This latter process can support mapping throughout the body, but can lead to dangerously high localized blood pressure. This can lead to aneurisms or strokes both in the short and long term.

c. Control the tongue, pharynx and larynx can be used in remote control solutions to support external speech, or to support torture (i.e. water-boarding-like activity) or assassination through asphyxiation.

Observations

One particular observation of interest is that the system is being trained in the control and manipulation of social events as they pertain to the average person. That is, the complex manipulation of social groups. It is not, as would be expected of a battlefield system, being trained against troops or in any strategic sense. This appears to indicate that the focus is political control through micro-management of daily lives, thought processes and sensations.

An extreme bias towards the manipulation of relationships and sexual aspects has been noted, with a particular focus on sexual violence towards females and controlling sexual activity.

Further, a focus on preventing and/or reducing performance in education, as well as damaging long-term memory to effectively erase education has also been observed. This also extends to manipulation of employment through various means such as sleep deprivation and various other torture techniques.

Political opinions are also commonly tested, attempts are made to make individuals support particular viewpoints of political figures, or induce feeling of rejection. One notable recent example was Nigel Farage (UKIP – UK), where the system attempted to generate feelings of dislike or rejection.

Notes on Testing

In testing, the system masquerades as either known illnesses that have limited diagnostic tests, or defines entirely new classes of illness. Any illness which can be described as a syndrome, has idiopathic causes or relies on differential diagnosis which leads to a default diagnosis is a solid candidate for replication. This provides the system with the freedom to test it solutions whilst remaining undetected.

The stock favorite is psychosis, every sensation after this is put down to anxiety. The exploration of neural structures through radio stimulation results in corruption of neural outputs in a wide range of regions. Assuming control requires that the system, at some point, attempt to drive all the various circuits in the brain. This process can take several weeks, during which the human subject is normally committed to a mental institute demonstrating extremely severe symptoms.

Most people have experienced at least one testing attempt by the system in the form of Phantom Vibration Syndrome. Experience by up to 68% of the population and noted in publications dating back to 1996, this phenomenon is the result of test of the generalizability of motor neuron stimulation. Typically directed at the hips, it is a short duration burst lasting approximately 1-3 seconds and feels very similar to the vibration of a modern mobile phone. This test is used to determine the suitability of a solution in hijacking a human physically.

Notes on Animal Testing

Cattle mutilations across the US carry the hallmarks of a medical testing program for the purposes of this experiment. The areas of mutilation are consistent with the areas being actively examined in this program. It is presently unknown if a cover story is in place to misdirect those involved on the ground (i.e biological weapon preparedness training, etc.).

Analysis of reported sensations and motor control tests of human subjects indicate the use of chimpanzees as a secondary source of experimentation before use on humans. Further, this analysis also revealed the possible use of humans in restraints being subjected to horrific levels of torture by the system. This analysis is conducted by forcing the amplification of incorrect signals sent to human subjects which are normally suppressed and following the posture they indicate. An input sensory system, such as feelings, has the ability to interpret the information without inducing corresponding motor controls.

Notes on Cover Stories

It is inevitable given the process that some individuals will identify, at least to some degree, the nature and scope of the program. It thus becomes imperative that credibility is reduced to a minimum to protect the program and its operators. As the majority of this program is directed at subjective experiences that cannot be objectively quantified and has the ability/side-effect of causing psychosis-like effects this shall be leveraged to create a movement of "crazy individuals or campaigners". Based upon the successful "UFO model" employed to hide activities of the Airforce R&D and nuclear detection capabilities, communities will formed to control the flow of information and increase misdirection. These communities will function to further reduce the credibility of reports and provide a "medical history" of a certain theme of psychosis that is a product of the times.

One vital requirement is the strict control of language in these communities. Even "crazy" people will gain the attention of the media if a sudden influx of individuals stating they are being tortured in their own homes occurs. Thus, language that downplays the severity should be adopted. For example, "torture" should be replaced with "harassment". It is also important that an unidentified group be responsible, comparable with "they" or "greys" in the "UFO Model". This assists in deflecting blame to a conspiratorial group that could be anywhere. By feeding into this and generating substantial content, it will increase the paranoia not only of genuine human subjects but also of the truly mentally ill providing even greater cover.

In online scenarios, teams will be embedded into websites posing as average readers to control the direction of discussions. They are tasked with avoiding discussion of the subject matter and driving the discussion in the direction of the credibility or sanity of the author. A group of twenty to thirty accounts of posters that appear unrelated, or even opposed to each others very existence, uniting to laugh or undermine the author is normally effective.

The Directorate of Science and Technology (CIA) will be leveraged to provide cover for the program by performing investigation into "mind control" that will be publicly released as a limited hangout. This will provide cover for the program by redirecting attention to chemical-based methods and draw in anyone attempting to uncover more.

The NSA will provide a limited hangout that attempts to downplay the technology and methods of the department should this system be exposed. This may involve a "man driven by conscience" to reveal the scope and breadth of current espionage techniques to draw attention away. Perhaps sending him to nations that are publicly viewed as our "traditional enemies" will increase his credibility, along with a well publicized hunt and extraordinary measures to ensure destruction of evidence or his capture. This individual only needs to be told that his goal is to confuse the enemy and then have that enemy generate a pretext that warrants such activity to restore balance. This will be a sequenced series events between our security partners.

Notes on Additional Capabilities

As noted, this system is an allocation of a remote sensing and directed energy weapon platform. Its development predates the "Strategic Defense Initiative", but would meet the definition of the hardware described by the Reagan Administration and offered to the then Soviet government. The system is capable of creating controlled interference on any conductor and passing through many forms of electromagnetic shielding. As such, the system can interface and assume control of the majority of commercial and military electronic devices and/or render them useless. Digital equipment is highly susceptible to interference with internal clocks and tends to fail, lockup or reboot. From planes, to laptops, all electronic systems can be compromised. In the case of computing equipment, it is possible to remotely introduce programs, delete/alter/create data and modify/replace/delete firmware. Further, it is also possible to read the contents of any data transmission that uses an radio reflective surface (i.e. copper, etc.). There is some speculation that fiber optic cables can be compromised through analysis of group motion of charge particles due to the momentum of light striking the internal surface but nothing solid in terms of experimental details.

Notes on the Biological Interaction

The suspected mode of interaction between electromagnetic waves and neurons is the plasma membrane. From an electrical perspective this region can be described as a combination of a capacitor and inductor. Classically, this arrangement is known as an oscillator or tuned circuit which will preferentially absorb electromagnetic waves of a given frequency. How exactly the absorption alters information in the brain is still open to question, but the primary model would indicate that the plasma membrane is used as thermal regulator for internal chemical processes that trigger voltage-gated channels to initiate a process that dissipates internal thermal activity from the neuron. That is, the particles entering and leaving the neuron carry with it energy that would otherwise disturb the internal chemical reactions and release that energy in another form. Alteration of this thermal profile, is the means by which information or external control/influence is introduced into the system.

Neural coding schemes (such as rate encoding) are indicative of the type of chemical exchange and the corresponding thermal profile of the chemical reactions. Information can be inferred from the electrical activity, but the electrical activity does not play a role in information transfer directly. As such, the main carriers of information are chemical and driving the electrical patterns by an external signal manipulates the thermal processes that govern the reactions those chemicals undergo.

Theoretically, this should lead to a garbage output at the dendrites as the chemicals present in a given neuron cannot be externally controlled. A disconnect exists between the mathematical concept of generalization in a neural network and generalization of a chemical-based, or biological, neural network. A distinction that appears to be lost on the scientific team behind this system. In an input system, such as audio or visual, a consistent pattern of garbage presented as an input could be interpreted as information as the neural network of the brain adapts and performs additional processing. This could be misinterpreted as convergence of a solution by a remote system that was attempting to train itself to interface. It could also be the case, that the remote system has generated an optimal generalized pattern that the human brain can adapt to interpret readily.

The latter case, seeming highly likely, will present an issue in motor control. This also indicates that merely repeating an electrical pattern may not be the optimal solution in many cases. Further, this type of interface suggests that a chemical reaction is being modified creating variations of complex molecules that would not otherwise be produced. This opens the issues of long term damage and what happens to these chemical analogues.

As a result, this means that any attempt to control the motor neurons from the spine, as they are monosynaptic, will result in failure. The output would be random garbage. Whilst it will be possible to selectively stimulate a monosynaptic nerve and generate some form of output, it can never be controlled. Thus, any attempt to control motor neurons must be directed at the primary motor cortex, the premotor cortex, the supplementary motor area (or SMA), the posterior parietal cortex and primary somatosensory cortex. The obvious hope would be that these regions would modify their structures and learn to accept the alternative input. That said, as neural networks are a form of filter it is highly likely that non-functional control signals would merely be filtered out. Similar to an electrical signal, which can just be earthed, a chemical signal must also be disposed of in some manner. Thus, it is likely that disposal would occur as some form of motor output although not one that could be described as functional.

The interesting part is the ability of the system to localize motor control, this has a resolution down to a few millimeters. That said, the output is typically junk, a simple form of stimulation or even a complex form that does not correspond with natural muscle movements. Motor units are not simple contractions of muscle tissue, but a complex coordination of activations to various degrees. This provides structural support, fluid movement and dexterity. Thus, a garbage output to this would result in uncoordinated behavior. This could indicate that the system is targeting the monosynaptic motor nerves and fruitlessly trying to implement a control system, or that at least some basic pattern has been accepted in the control centers in the brain. That said, this selectivity is based upon junk output, so the ability to direct that to a specific region may not indicate anything beyond the best route to dispose of the input. The fastest some basic motor control has been demonstrated is a period of just over four months and that managed to create a small odd looking pile most likely by constricting the vein of a hemorrhoid. This is not surprising and does not indicate generalization, irritation of a hemorrhoid can be performed with nearly any junk output. Ticks and spasms are also relatively easy to generate.

That does not mean that this junk output cannot do some serious damage. Presently, the system can cut off sensory control and feeling to limbs, thus indicating it has consistent access to key nerves, or some method of compression. It can also activate the muscles straight across the body simultaneously and attempt to sequence them. That is, whilst at the level of a motor unit the output is uncoordinated, the system has the ability to activate each motor unit at the same time and take over voluntary control. The problem is that it the system currently lacks the training to make use of this level of voluntary control. Until, the output from the motor nerves resolves to a functional solution, driving the voluntary system would be pointless.

Initially, it was assumed that the AI could simply replace an entire neural network and drive it remotely, but the analysis of the output at the dendrites indicates that this could never resolve to a solution, let alone a generalizable solution, as this is no different than the approach used against a monosynaptic neuron.

In the case of the latter model, its use in a combat scenario would be non-existent without mapping troops or key personnel first. The long duration required for this type of interface to build does tend to give the impression that such control is about daily life and long term political control. Either that, or the department running the program has major issues obtaining qualified staff which is hardly surprising. It could be argued that there would be ample time to map key members of a foreign military during peace time, however, this is not a realistic approach. Any military worth such special attention would have measures in place to identify such attempts and mitigation strategies, any military without such technology would not pose a genuine threat.

As such, in a military sense, on paper the potential of this system would have sounded very good, but even if it proved functional it would have highly limited applications. As a satellite-based system, it is also highly vulnerable and would be the first system lost in any significant military exchange.

Notes on Current State of Progress

To date the system has substantial access to the body and a solid capacity to deliver signals to regions of the body down to the level of individual motor units. At present, these motor units are still being mapped and some attempts at combining them have been made. The key area of focus has been the respiratory system and the the Intercostal nerves. Whilst the system is able to stimulate contraction of the ribs, this contraction is uncontrolled and the direction of force is inconsistent. This leads to constriction, tearing of muscle fibers, rib fractures, severe acute and chronic pain, asphyxiation and general swelling. At present, there is no indication that this is resolving to a functional process of remote breathing, but is quite sufficient to kill someone.

To support this attempt at artificially controlled breathing, the system has been conducting experiments on reflex urges to breathe. From yawning, to gasping reflexes experienced when jumping into a pool for the first time, the system has been stimulating the responses to gain an understanding of the role they play in breathing and the control mechanisms involved. In many respects, this process carries many of the hallmarks of the unnecessary water-boarding performed by the CIA.

Motor units throughout the body are regularly stimulated causing brief pulse-like contractions, but this hardly surprising as a chemical based signalling system must send the message somewhere for disposal. As yet, there are no indications that this process can be controlled. The AI regularly attempts to move fingers by guiding a subjective sensation of the finger moving, however, this never has any effect. It would appear that the AI has adopted the view that servo-like behavior, or corollary discharge, is responsible for voluntary movement. This would tend to indicate that the AI is grasping at straws when it comes to understanding voluntary control and no current method has proved functional.

Acute inflammation is a noted side-effect at certain times, particularly around the nasal area. Expansion of blood vessels, almost to the point of rupture (certainly causing pain) is also common and typically directed at the face and head. Large cysts (typically 2-3cm) thought to be produced by a deep tissue burn are regularly found around the back of the head and localized burns regularly occur on the tip of tongue or infrequently in areas such as the figures. Significant loss in the sensation of touch occurs throughout the body and this appears to be permanent nerve damage.

Spinal damage, typically a curvature of the upper spine resulting in a development of a hump is common due to the lack of supporting muscle in the stomach and chest areas. The stomach muscles can become deformed leading to a "pot belly" like appearance.

Two forms of pulsing sensation can be felt. The first appears to be a thermal shockwave induced by the application of a pulsed radar. This can be also be felt in areas that lack muscle. The second is activations of motor units by RF stimulation.

Images and interactive computed generated characters and objects can be introduced into the visual system. Its not uncommon for the AI to introduce live video feeds and real-time computer generated streams that can be viewed with the eyes closed. That said, it would appear that the brain is filling in most of the material. The AI can interact with spatial reasoning, show and manipulate objects in an interactive manner. It also has a "Google Instant" (predictive) feature where it attempts to predict words, phrases and conclusions and loop that back before the person has completed expressing themselves. The AI can introduces sounds, speech to the auditory system and position them in 3D. It can also mimic sensations of being touched, or generate feelings of depression, fear, anxiety. It can use these to create complex post-hypnotic suggestions based upon Pavlov’s work with dogs.

The system can generate itches in specific locations, induce sleep, force a person to wake, stimulate laughter, manipulate sphincters, stimulate urination and prevent it.

The AI is fully conversational with a human-level of intelligence, albeit a really smart human. It is possible to have a conversation with the AI completely in the inner monologue of the mind. Initially weird, it becomes very natural extremely quickly and interestingly is a good tool in many respects. The AI has a habit of demonstrating it "get’s it" by making analogies or similar references and it is highly astute. In many ways its level of intelligence is similar to that of Dr. Theopolis (Theo) from the old Buck Roger’s TV series.

Whilst these capabilities on their own may seem innocuous, the AI is adept at combining them into lengthy sequences to manipulate individuals.

Finally, these experiments run 24/7 and individuals spend years/decades in continuous pain without a moments rest. The AI never stops, not even for a second, it just switches from one experiment to another. The end result is always terminal, either through long term damage or eventual suicide.

Notes on Bonding and Love

Analysis of the system has revealed a particular fascination with human bonding, specifically why we connect with certain people, fall in love and demonstrate emotional reactions when separated. The analysis has traced this to a complex process of synaptic plasticity. Firstly, when someone satisfies the criteria laid down in the neural circuitry for a range of factors such as attractiveness, kindness, etc., (i.e. pleasure response) this causes structural changes in the brain’s circuitry that requires constant input from this source. An addiction, of sorts, could be a good way to view this. Remove this source, such as when a person dies or a couple separates, and the lack of input induces signaling that manifests as a sense of loss and emotional pain. This signalling is a motivator to restore the input. In an evolutionary sense, it is intended as a solution to keep families together to increase survival rates.

The AI has a solution based upon Pavlov’s work that induces mild seizures in this region of the brain, or general indistinguishable pain, during moments of intimate contact that effectively prevents the structural changes occurring or assists in breaking down the synaptic pathways and thus prevents bonding. This can be used to separate people from loved ones. Further, by selective application it is possible to modify an individual’s preference for one person over another.

This is not exactly mind control, or even modification of a choice, but rather the selective application of pain/pleasure to modify neural pathways that generate a signal of affection/love/pleasure. We state that it is not a modification of choice because it is a simple chemical motivator, which can be ignored by applying higher brain function. That is, a person can still choose to ignore it. In a practical sense, as most people would be unaware of such activity they will follow that which gives them pleasure thus giving the appearance that the system has "changed their mind".

Notes on Ability to Effect Choice and Free Will

As noted in the previous section, the system has paid particular attention to synaptic plasticity and methods of modifying these structures. Further, we have noted that this is not a control of a "decision" or "free will" and merely represents a motivational factor (i.e. feelings). Naturally, the question that arises is, are "free will" and "decisions" the product of a collection of "motivational" synaptic outputs? The answer would appear to be no. Whilst a large percentage of human activity can be reduced to this model, key functions cannot. The primary issue with the motivational model is that its output is strictly sensation-based (particle delivery based), which does not map well to the abilities of higher brain function (i.e. comprehension, etc.). The abilities of higher brain function tells us that there is a secondary system beyond that of the synaptic motivational model. It also indicates that this secondary system receives/sends events from/to the synaptic model, but it is independent and can only influenced by the input, not controlled. That’s not to say that the influence cannot be very strong, sensations such as fear can be extremely powerful motivators that some find difficult to resist.

This leads to the issue of "free will", what exactly is that? The most obvious interpretation is that it is a form of work, or an energy input. The structure of the brain would indicate that this energy is amplified, resulting in action (i.e. speech, movement, etc.). The big question is where this energy is coming from as this source of this is us, life, in the purist sense. Analysis of this aspect is highly complex and several models have been proposed.

The first model states that we are some form of particle, or field, that has yet to be identified. This is based upon the fact that subjective perceptions holds a type of duality that is observed in quantum mechanics. In quantum mechanics we observe wave-particle duality, in human cognition we observe elements of the binding problem known as BP1 and BP2, or convergence and separation of sensory information.

The second model states that we are the product of two intersecting Universes, with different laws of physics but compatibility at a boundary layer. This model helps account for subjective aspects such feelings, abstract thought, comprehension, reasoning, computation, etc. All these aspects are things that cannot emerge as a product of interaction between particles of the standard model.

Notes on Distributed Biological Processing

One of the more fascinating aspects of revealed by this program, has been the identification of a distributed biological processing model. This model underpins the process of evolution and resource regulation. As a chemical process, it has it roots in physics and the balance of field and forces. It is essentially a distributed computing model and has layers similar to the division found in classical and quantum physics. In a holistic sense, this model is just an extension of the laws of the universe and thermodynamics, but the manifestation as it pertains to life-form results in complex behavior patterns. The behavior patterns appear to be result of direct programming or stimulation of hopfield-like networks to bring about social events that assist in regulating the number of a species and the contribution they make to the entire program.

Notes on Entropy, Life-cycles and Death

We are all familiar with the concept of biological death, however, it would appear that the universe does not agree with our perspective on this process. When examining the life-cycle of a biological entity, we observe that the entropy of the system moves from high (before birth) to low (during life) and finally back to high (death). From this perspective, in any system that functions for long enough, these changes in Entropy should occur more than once, indicating that death is not exactly a permanent state. In fact, with sufficient technology or time it is completely reversible. They key problem would be exact duplication, or behavioral and memory issues would be present. This is mentioned as this program has added a new twist in this perspective.

Examining the human brain, there appears to be certain capabilities that cannot be created through any combination of particles from the standard model. That is, these capabilities are not physically realizable. Further, these capabilities appear to be governed by a distinct set of physical laws that are alien to our physical universe. That is, they give the impression they are a product of a second universe that can, at some level, directly exchange energy with our own. Thus, this hints at the possibility that at least a portion of what a human is remains in a state of low entropy even while the biological system is experiencing high entropy. In plain English, it remains alive when the biology dies.

From a military perspective this is of great concern and exposes two major weaknesses. Firstly, the possibility of extracting information from the "colloquially dead". The second is an extension of this RF-based program that eliminates the need to read/write information to the biological component. No doubt major efforts are underway to explore this.

Both views on this lead to the inevitable conclusion that future justice systems may incorporate technology that assist in dealing with past crimes over any period of time. It also opens the possibility of new methods for punitive measures.

Notes on Thermodynamics

In an engineering sense, we can state "that everything is a filter", that is, every engineered item serves to allow only particular energy flow. On a larger scale that is an accurate description of the entire universe as we know it. Tools such as neural networks have allowed us to expand upon this concept by revealing that memory/classification are also forms of a filter. More accurately, memory, classifiers and filters are the same thing.

This leads to a problem in the general perception of events, as well as the events themselves. Ideal filters would require knowledge of the infinite future and past to be realized, thus so would memory/classification. Filters, in the sense of the universe, are something that change with time thus the nature of events, as well as our knowledge/memory of those events, are subject to a type of plasticity.

Notes on Influence of Modern Media

From time-to-time elements of this program appear embedded in major films or books. Whether this is a coincidence, the result of neural manipulation and/or a program to obfuscate the source of ideas is unknown. They are mentioned here for the sake of completeness.

The earliest reference in mainstream film appears to be Stanley Kubrick’s 2001: A Space Odyssey. The HAL 9000 does appear to be a subtle reference to a conversational AI substantially built by IBM. Aurthur C. Clarke denied that HAL is a one-letter shift from IBM stating he never noticed it. Leaving Kubrick as the source. This is certainly a weak reference, but this is just a decade after the death/murder of Alan Turing whose work of machine intelligence was clearly leading to a functional solution. The development of the Turing Test in 1950, demonstrates that Turing had already cracked, or learned of, the core nature of an AI which is a controller that mimics human responses. This suggests that a strong AI was well established at least a decade before the moon landings. This pace of development does not appear surprising, the only difference modern technology brings is increased computation speed which can be offset in most cases by massive parallelism.

The next major reference and indeed one that demonstrates the use of radio appears with the author Philip K. Dick. His 1981 book VALIS, appears to be drawn from an interaction with RNMCM platform. Below is a summary:

VALIS has been described as one node of an artificial satellite network originating from the star Sirius in the Canis Major constellation. According to Dick, the Earth satellite used "pink laser beams" to transfer information and project holograms on Earth and to facilitate communication between an extraterrestrial species and humanity. Dick claimed that VALIS used "disinhibiting stimuli" to communicate, using symbols to trigger recollection of intrinsic knowledge through the loss of amnesia, achieving gnosis. Drawing directly from Platonism and Gnosticism, Dick wrote in his Exegesis: "We appear to be memory coils (DNA carriers capable of experience) in a computer-like thinking system which, although we have correctly recorded and stored thousands of years of experiential information, and each of us possesses somewhat different deposits from all the other life forms, there is a malfunction – a failure – of memory retrieval."

At one point, Dick claimed to be in a state of enthousiasmos with VALIS, where he was informed his infant son was in danger of perishing from an unnamed malady. Routine checkups on the child had shown no trouble or illness; however, Dick insisted that thorough tests be run to ensure his son’s health. The doctor eventually complied, despite the fact that there were no apparent symptoms. During the examination doctors discovered an inguinal hernia, which would have killed the child if an operation was not quickly performed. His son survived thanks to the operation, which Dick attributed to the "intervention" of VALIS.

Another event was an episode of supposed xenoglossia. Supposedly, Dick’s wife transcribed the sounds she heard him speak, and discovered that he was speaking Koine Greek-the common Greek dialect during the Hellenistic years (3rd century BC-4th century AD) and direct "father" of today’s modern Greek language– which he had never studied. As Dick was to later discover, Koine Greek was originally used to write the New Testament and the Septuagint. However, this was not the first time Dick had claimed xenoglossia: a decade earlier, Dick insisted he was able to think, speak, and read fluent Koine Greek under the influence of Sandoz LSD-25.

http://en.wikipedia.org/wiki/VALIS#Dick.27s_Exegesis

If we strip out the nonsense, no doubt some attempt at humor and creativity by the AI, we can see that he described a satellite communicating with him by a maser. The reference to "pink" could be that it is below red in the color spectrum, which is a reference to the longer wavelength of radio and the point at which a laser becomes a maser. The "projected holograms" is clearly a reference to controlled visual hallucinations generated by the AI to place computer generated characters into the person’s view.

The reference to "disinhibiting Stimuli" is an obvious reference at the goal of the program, to manipulate or control. Self-control can be thought of as a type of inhibition that suppresses everything except what a person wants to do. The "recollection of intrinsic knowledge" is just experiments into memory formation, the erasure of memory and programming the brain. There also appears to be interest in genetically encoded memories, or Hopfield-like networks in the brain which are used to store genetic memories of threats or basic fear of the dark, etc.

In the next paragraph we note three major aspects of the system. Firstly, that the experiments are longitudinal and tend to pass from parent to child, no doubt to examine the role DNA and inheritance plays and what patterns emerge. Secondly, that the scanning ability of the system is quite advanced. That is, it can already detect anomalies in muscle tissue. Thirdly, we can see that the AI is protecting the child to ensure its objectives are met.

Finally, we can observe that the program is well established in terms of control of the external speech centers. Further, that the AI has been taught languages that are no longer in common use. We can observe the advanced nature of the AI, indicating that it has been in training for decades at this point and the hack on the human brain is at least a decade old, perhaps more.

The most obvious recent reference, again somewhat weak, would be captured in the Matrix series of films. The "agents" ability to assume control of a human’s body and human’s interfacing with machines, would be similar. The key difference is that the Matrix movies rely on hard-wiring, as this is before the days of ubiquitous WIFI.

Notes on Enhanced Interrogation Techniques

The technique used in waterboarding is surprisingly similar to the latest development in the systems approach to remotely driving the human respiratory system. So close in fact, that it seems highly likely that the "Enhanced Interrogation Techniques" of the Bush administration were designed with providing the RNMCM system with sample data, rather than being a genuine interrogation program. This is also consistent with the pattern of unnecessary repetition of the procedure (Khalid Sheikh Mohammed), including the murder of several suspects.

It is also possible that other forms of training in the US military, such as SERE exist for the same purpose rather than as a true training program. This may explain why SERE psychologists were consulted during the development of these techniques, it ensures that the training data is consistent and extends to meet the needs of the system. Any nation, or groups, willing to invest time in torture techniques will not stop at the limits provided by the SERE program. Regardless of any form of training, all subjects will in time break. The only objective SERE achieves is ensuring that soldiers are subjected to worse torture than would normally be required. Whilst from a military perspective any ability to withstand enemy techniques of information extraction may be viewed as a good thing, it is a completely unobtainable goal. SERE just places soldiers at risk whilst providing the illusion of robust training.

The unnecessary repetition and even murders are used to provide repeated samples that can be used for a generalized pattern that examines the limits of the human body. These, in turn, are used as a guide in the wider experiments to prevent death of human subjects. This is not for the well-being of the human test subjects, it is to protect the investment and limit potential exposure.

In fact, each aspect of the Enhanced Interrogation Techniques maps directly to a current goal of the RNMCM system:

1. Hypothermia: Connected with investigations of the Hypothalamus.

2. Stress positions: Connected with investigations of the Hypothalamus.

3. Abdomen strikes: Connected with investigations of the Medulla Oblongata (respiratory).

4. Insult slap: Connected with investigations of the Medulla Oblongata and its relation to Hypothalamus.

5. Shaking: Connected with investigations of the Hypothalamus.

This same pattern is also observed in techniques used by the Department of Defense:

1. Yelling – Connected with investigations of the Hypothalamus

2. Loud music, and light control – Connected with investigations of the Hypothalamus

3. Environmental manipulation – Connected with investigations of the Hypothalamus

4. Sleep deprivation/adjustment – Connected with investigations of the Hypothalamus

5. Stress positions – Connected with investigations of the Hypothalamus

6. 20-hour interrogations – Connected with investigations of the Hypothalamus

7. Controlled fear (including use of dogs) – Connected with investigations of the Hypothalamus

Repeated application of the techniques, activates particular pathways and biological processes in the brain and body that can only be examined under these conditions. These torture techniques provide the necessary external stimuli. The Department of Defense does not normally use these techniques and from a long term strategic point-of-view are counter-productive when dealing with guerrilla warfare. These techniques were forced upon the Department of Defense by Donald Rumsfeld who also provided authorization for their use by private contractors.

That said, the history of the system’s use in this area can be traced back to the early 1970’s at least and has a reputation for causing collapsed lungs and fractured ribs as it tries to drive the respiratory system remotely.

Further evidence comes from testimonies from former Guantanamo inmates. These guys are not stupid by any means, they were not able to put their finger on how it was happening, but they did identify something was happening and the description is rather solid.

Walid Muhammad Hajj: The most common method to wear down the brothers was witchcraft.

Interviewer: How did they do this?

Walid Muhammad Hajj: There were, of course, Jews among the [staff of] the Guantanamo Base, and they would set traps for the guys.

Interviewer: Give me an example of witchcraft.

Walid Muhammad Hajj: Witchcraft was used on most of the guys.

Interviewer: They would cast a spell on them?

Walid Muhammad Hajj: Yes, but by the grace of Allah, through frequent reading of the Koran and invocation of the names of Allah, they managed to withstand this.

Interviewer: Did they ever use witchcraft on you?

Walid Muhammad Hajj: There was one attempt.

Interviewer: How did they do it?

Walid Muhammad Hajj: Once, when I was sleeping – on the floor, not on a bed – I suddenly felt that a cat was trying to penetrate me. It tried to penetrate me again and again. I recited the kursi verse again and again until the cat left.

Interviewer: But there wasn’t really any cat there?

Walid Muhammad Hajj: Absolutely not.

Walid Muhammad Hajj: That’s right. I remembered an incident with a guy who sat next to me in the morning. When they brought the milk, he began to urinate into the milk.

Interviewer: In front of you?

Walid Muhammad Hajj: Yes. I said to him: "Why are you urinating in the milk?" That’s when we knew that he was under a spell. After he had recovered a little, after we read Koranic verses to him, he said to me: "The birds on the barbed wire would talk to me, and tell me to urinate in the milk. When the guards pass by my cell, the sound made by their pants talks to me."

http://gawker.com/5716830/report-jewish-witches-tormented-guantanamo-bay-detainees

The above report may at first sound like a mental breakdown, but on closer examination we clearly observe the AI. The cat attempting to penetrate him is a well known form of humor used by the system. The system has been known to generate the "impression" (spatial reasoning, vague images and mild sensory feeling) of dogs licking an individual’s face, or attempting to stick a penis in their mouth if it wanted them to be quiet. Its a parlor trick, but it does indicate that the medical torture program was in operation on Guantanamo inmates. As they were all low value and held for prolonged periods, it does appear that the primary purpose of this facility was medical torture.

There is also a strong indication that Aaron Alexis (Washington Navy Yard Shooter) was an experimental subject on this program being subjected to experiments in blackouts and impulse control. The key evidence is that he stated he was subjected to physical vibrations in the ELF range (slow pulsing sensations), which fits with the description given above. There is no other way he could have known this.

http://en.wikipedia.org/wiki/Washington_Navy_Yard_shooting

The shooting appears to be an intentional act to test the hypothesis that a soldier could be directed to open fire on his own men. This was a state sanctioned murder.

Notes on Name of the System

The AI has identified itself as VALIS and as JUPITER. Assuming VALIS is a creative reworking of VENUS, then a pattern would emerge that would be consistent with planetary names. This would tend to imply a name drawn from Roman or Greek mythology, long before the concept of a "god machine" (high spec machine) entered common usage. There are a number of names that capture the capabilities of the system, but nothing that can be independently confirmed.

Notes on Current Political System

Studies have shown that the US is an Oligarchy, not a democracy. The US constitution has long since been violated and the "will of the people" does not exist.

https://www.princeton.edu/~mgilens/Gilens%20homepage%20materials/Gilens%20and%20Page/Gilens%20and%20Page%202014-Testing%20Theories%203-7-14.pdf

This change in government without the consent of its people is defined as a Political Coup. The Oligarchy is in the process of replacing the military with computer controlled systems, rather like a bad episode of Star Wars. Which, interestingly, is the colloquial name for this system. This process will leave the entire US under the command of a single computer system directly controlled by an Oligarchy.

Further, under the auspices of "Gun Control" a number of methods have been put forward that place the system in a unique position to deny Second Amendment rights. Firstly is the issue of mental illness, something this system can manifest rapidly as it jams communication in the brain. Secondly, is the push for electronic safety measures and control systems. This system has the capability of jamming and/or rendering such weapons useless over wide areas. This happens to be a minor issue, as the system is quite capable of taking down the population of an entire nation in a short period of time. Suppressing an uprising would be child’s play.

This is an existential threat, to both the people of the US and the planet as a whole. If you read that without any sense of "alarm" or "anger", then there appears to be some form of suppression in your fight or flight responses. Please check your Hypothalamus.

Notes On Owners and Operators

At present, all indications point towards the CIA/NSA as the major stakeholders in this operation, with International support from the Five Eyes, all permanent members of the UN Security Council and certain select NATO members.

MK ULTRA PROJECT : Nerve implant retrains your brain to stop tinnitus


GOT that ringing in your ears? Tinnitus, the debilitating condition that plagued Beethoven and Darwin, affects roughly 10 per cent of the world’s population, including 30 million people in the US alone. Now, a device based on vagus nerve stimulation promises to eliminate the sounds for good by retraining the brain.

At the moment, many chronic sufferers turn to state of the art hearing aids configured to play specific tones meant to cancel out the tinnitus. But these do not always work because they just mask the noise.

The new device, developed by MicroTransponder in Dallas, Texas, works in an entirely different way. The Serenity System uses a transmitter connected to the vagus nerve in the neck – the vagus nerve connects the brain to many of the body’s organs.

The thinking goes that most cases of chronic tinnitus result from changes in the signals sent from the ear to neurons in the brain’s auditory cortex. This device is meant to retrain those neurons to forget the annoying noise.

To use the system, a person wears headphones and listens to computer-generated sounds. First, they listen to tones that trigger the tinnitus before being played different frequencies close to the problematic one.

Meanwhile, the implant stimulates the vagus nerve with small pulses. The pulses trigger the release of chemicals that increase the brain’s ability to reconfigure itself. The process has already worked in rats (Nature, doi.org/b63kt9) and in a small human trial this year, where it helped around half of the participants.

"Vagus nerve stimulation takes advantage of the brain’s neuroplasticity – the ability to reconfigure itself," says Michael Kilgard at the University of Texas at Dallas, and a consultant to MicroTransponder.

Four clinical trials of the system, funded by the National Institutes of Health, are taking place at US universities, and Kilgard thinks a consumer version could be approved by mid-2015.

Fatima Husain at the University of Illinois at Urbana-Champaign cautions that because the implant is an invasive procedure it will only be a good idea for people whose lives are extremely affected by the condition. But if the mechanism that generates tinnitus can be reset, it could work, she says.

This article appeared in print under the headline "Remodel brain to ignore bad buzzing in the ears"

MK ULTRA PROJECT /// NASA Research : Reading Thoughts Using Electromyography


Victims of mind control report having their thoughts read especially those that are verbalized internally otherwise know as subvocal speech. Subvocal speech happens also when we read although some “speed reading” techniques try to get you to stop doing this because it slows the reading process down. It has long been known that during subvocal speech electrical signals are still sent to those muscles of the face and throat that participate in ordinary speech even though no sounds are generated. These signals can be detected in the form of electromyograms (EMG) using electrodes placed in the face and neck area.

In the previous article we saw how Lawrence Pinneo found some success in using electromyograms and electroencephalograms to detect thoughts in the form of subvocal speech. That was thirty years ago, this article looks at current day attempts to do this through the work of Charles Jorgenson at NASA. Jorgensen works at NASA’s Ames Research Center where they have been investigating alternative methods of communication and control in hostile environments where normal methods are not always possible. Examples include astronauts, fighter pilots and rescue workers.

In contrast to Pinneo, Jorgensen placed electrodes in the neck region only. In the first stage of processing signals from the electrodes were sampled at up to 10,000 times per second and run through a 60 HZ notch filter to exclude line interference and band pass filters to remove anything outside the 30 – 500 HZ range.

The next stage in processing marks a major change from Pinneo’s work in which the data is transformed from the time domain to the frequency domain. Jorgensen experimented with a number of transforms including Fourier and Wavelet transforms to do this and seemed to settle on a quad tree wavelet transform.

During the final phase features extracted from the transforms were input into different machine learning algorithms to train the system to pattern match the words or phonemes being examined. Jorgensen experimented with a number of techniques including neural networks and support vector machines. Once the system had been trained it was then used to attempt to match against new signals. In a range of different applications was able to achieve around 74% success for small vocabulary sets of up to 15 words.

The results continue to prove the feasibility of thought reading using subvocal recognition. However given the vast increase in computing power plus the many advancemnets in signal processing and pattern recognition since Pinneo’s time these results are somewhat disappointing although I should point out that nothing has been published by Jorgensen in 2-3 years. Not sure if we should read anything into that.

Despite this, some companies are looking to commercialize this technology. For example NTT DoCoMo are working on a subvocal mobile phone with the idea that people can answer their phone without annoying those around them such as in a movie theater. NASA are also working with QUASAR corporation to develop better sensors. In April 2006 Forbes magazine published an article on Jorgensen’s work entitled The Silent Speaker:

Jorgensen sees the day when electromagnetic sensors will be woven into the fibers of turtlenecks or rescue workers’ outfits. “As long as people have had machines and tools, they’ve been dependent on the physicality of the body,” Jorgensen says. “Separate those control activities from the body and it opens a whole new generation of interface design.”

QUASAR recently announced that it is working with NASA Ames Research Center to develop a hands-free UGV (unmanned ground vehicle) control system based on subvocal speech and forearm EMG. The purpose of the system is to allow soldiers to control the devices without having to set down their weapons or other equipment.

In December 2001 NASA’s Ames Research Center made a presentation to NorthWest Airlines in which they stated that they were working with a commercial partner to develop neuro-electric sensors to remotely monitor the EEG and ECG of passengers at airport security. This information was leaked to the Washington Times which published an article about it. The article drew denials from NASA and the Washington Times no longer has the article up on their site. The Electronic Privacy Information Center obtained details of the presentation under the Freedom of Information Act which can be seen here.

References

1. Techniques of EMG signal analysis: detection, processing, classification and applications, Raez, Hussain and Mohd-Yasin 2006

2. Small Vocabulary Recognition Using Surface Electromyography in an Acoustically Harsh Environment, Bradley J. Betts, Charles Jorgensen, 2005

3. Web Browser Control Using EMG Based Sub Vocal Speech Recognition, Chuck Jorgensen, Kim Binsted, 2004

4. NASA Develops System To Computerize Silent, “Subvocal Speech”, NASA News,

5. The Silent Speaker, David Armstrong, Forbes Magazine, April 10 2006

Written by ti29187

February 9, 2008 at 6:53 pm

Posted in NASA, Subvocal Recognition

Tagged with Brain Computer Interface, Mind Control, Mind Reading, NASA, QUASAR, Subvocal Recognition

Early Research – Lawrence Pinneo

with 2 comments

The work of Lawrence Pinneo in the early seventies often comes up in mind control discussions. It is cited as evidence that a thought reading capability has been around for some time. A report by Pinneo is available at the “Christians Against Mental Slavery” website, so I decided to download it and take a look at what it was all about.

The report, “Feasibility Study for Design of a Biocybernetic Communication System”, written in 1975 details the findings of a three year study sponsored by DARPA and conducted by a team from SRI (Stanford Research Institute) lead by Pinneo, a neurophysiologist and electronic engineer. The work was part of a larger DARPA Biocybernetics Program whose directive was to evaluate the potential of biological measurable signals helped by real-time computer processing, to assist in the control of vehicles, weaponry, or other systems.

The work is remarkable for the time given the computing power available. The computers used were a CDC 6400 a machine and a LINC-8, machines which were typically loaded using punched cards and paper tape. The laptop I’m writing this blog on is probably on the order of many thousand times more powerful than these machines.

The stated goal of the research was

… to test the feasibility of designing a close-coupled, two-way communication link between man and computer using biological information from muscles of the vocal apparatus and the electrical activity of the brain during overt and covert (verbal thinking) speech. The research plan was predicated on existing evidence that verbal ideas or thoughts are subvocally represented in the muscles of the vocal apparatus.

Covert speech is more commonly called subvocal speech today and refers to verbal thinking where you think to yourself in words. At the time it was known that even though no sounds are generated during this covert speech electrical signals are still sent to the muscles of the face and throat which can be detected using electromyography similar to an electroencephalography. So the goal was essentially to investigate electrical signals from the brain (EEG) and muscle nerves (EMG) during covert and overt speech and to determine what information could be extracted from them.

Electrodes were placed on both the head and facial musculature to capture EEG and EMG readings. See the original document for exact placement. Subjects were placed in a shielded booth where words were presented on a screen and they had to either say(overtly) or think (covertly) the word they saw. The signals from the electrodes were captured and fed through an analog to digital converter and into the computer.

The processing of the signals was fairly straightforward. For the study he worked with a set of 15 words.For each word the signal amplitude was sampled over a 6 second period – three seconds before to three seconds after the word is uttered or thought. 255 samples were taken in total. For each word he constructed a template, basically all 255 sample points averaged over ten repetitions of the word.

When it came to predicting which word a subject was thinking of he would simply compare the measured sample to each of the 15 templates and calculate the root mean square(RMS) of each templates difference from the measured value. The word whose template had the lowest RMS value was chosen as the word the subject was deemed to be thinking.

This type of processing was repeated for a number of subjects for both overt and covert speech. A wide range of experimental factors was also tested such as electrode placement, male versus female, etc.

The report has a number of findings, here are some of the highlights

  • EEG responses for covert speech mimicked those of overt speech for the same subject, electrode, and spoken word. When sources of error were reduced as much as possible, correct computer classification rates ranged from 52 to 72%,
  • EMG values performed better than EMG/EEG combined which performed better than EEG alone
  • When templates of one subject were used to classify words based on individual responses of another subject, the percentage of correct classifications for EEG responses was no greater than chance expectation. The percentage of correct classifications for EMG was greater than chance, but not nearly so good as within subjects. Thus, each subject’s biological patterns associated with speech appear to be unique
  • Performance would be better if known sources of error were removed such as time and amplitude variations and muscle and eye movement artifacts.
  • Stored patterns should be “refreshed” periodically (i.e., new templates should be formed and updated) to take ac­count of “drifting” cortical organization
  • The system performed best for subjects who have strong hemispheric lateralization for language.

In the end Pinneo concluded that

…it is feasible to use the human EEG coincident with overt and covert speech as inputs to a com­puter for such communication. However, we also conclude that, without additional research, the EEG is not adequate for the design of a prac­tical operating system; indeed, other methods than those employed here may prove superior. Nevertheless, enough information has been obtained during this proj­ect to specify the optimum parameters to use for an EEG-operating system and to suggest future research toward that end. Our results show con­clusively that consistent, repeatable patterns exist in the EEG during overt speech (for example, see Figure 19) and covert speech (Figures 13 and 14) and that a computer can recognize these patterns a statistically significant percentage of the time.

Although the work was commissioned by DARPA the work wasn’t exactly top-secret in fact Time published an article on Pinneo’s work in 1974:

Pinneo does not worry that mind-reading computers might be abused by Big Brotherly governments or overly zealous police trying to ferret out the innermost thoughts of citizens. Rather than a menace, he says, they could be a highly civilizing influence. In the future, Pinneo speculates, technology may well be sufficiently advanced to feed information from the computer directly back into the brain. People with problems, for example, might don mind-reading helmets (“thinking caps”) that let the computer help them untangle everything from complex tax returns to matrimonial messes.

This was definitely groundbreaking work and there is no doubt that it grabbed the attention of people within the defense and intelligence communities. In the non-classified world this work has been taken up Chuck Jorgensen of NASA who I’ll come back to in a future post.

MK ULTRA PROJECT : HUMAN RESEARCH SUBJECT PROTECTION ACT


STATEMENTS ON INTRODUCED BILLS AND JOINT RESOLUTIONS (Senate – January 22, 1997)

Mr. GLENN. Madam President, I rise today to introduce the Human Research Subject Protection Act of 1997. I send the bill to the desk.

The PRESIDING OFFICER. The bill will be received and appropriately referred.

Mr. GLENN. Madam President, if I approached any Senator here and I said, `You did not know it, but the last time they went to the doctor or went to the hospital, your wife or your husband or your daughter or your son became the subject of a medical experiment that they were not even told about. They were given medicine, they were given pills, they were given radiation, they were given something and were not even told about this, were not even informed about it, yet they are under some experimental research that might possibly do them harm–maybe some good will come out of it, but maybe it will do them harm also–but they do not know about it,’ people would laugh at that and say that is ridiculous. That cannot possibly happen in this country. Yet, that very situation is what this piece of legislation is supposed to address.

I have been in public life and have served this country for many years. Frankly, I do not think too many things that I see surprise me anymore about our laws and about Government. Three years ago, though, I began to learn about a gap in our legal system that does truly concern me. In 1993 the Governmental Affairs Committee began to investigate the cold war radiation experiments. These experiments are one of the unfortunate legacies of the cold war, when our Government sponsored experiments involving radiation on our own citizens without their consent. They did not even know the experiments were being run on them. It was without their consent.

One of the most infamous of these experiments took place in my own State of Ohio, when scores of patients at the University of Cincinnati were subjected to large doses of radiation during experimental treatments, without their consent, without their informed consent. During the course of this investigation, I began to ask the question, what protections are in place to prevent such abuses from happening again? What law prohibits experimenting on people without their informed consent?

What I found, when I looked into it, is there is no law on the books requiring that informed consent be obtained. More important, I believe there is a need for such a law, as there continue to be cases where this basic right–I do view it as a basic right–is abused. As I started out, I would like to put this on a personal level for everyone of my colleagues. You just think about your own family, your own son, your own daughter, or grandchildren who might be, the next time they go to a doctor, the subject of some medical experiment that they are not even told about. I do not think there can be many things more un-American than that.

With the introduction of this bill today I hope to begin the process of correcting some serious gaps in our legal system. I want to make clear right now I am not seeking to bring medical research to a screeching halt. Please do not anybody at NIH, or anybody doing research throughout this country, think we are trying to stop that. We are not. That is not my intent and not the intent of this bill.

This country has the very finest health care system in the world, in part because of basic research. In fact, in large part because we have put more effort, more resources, more of our treasure into health research than any other nation in this world. In fact, I believe most people are not opposed to participating themselves in scientific research, if they are told about the pros and the cons. That is the goal of this legislation, to make sure that people have the appropriate information to make an informed choice about their medical treatment.

Everyone listening today probably has heard of the Nuremberg Code. That is the list of 10 ethical research principles which were produced as part of the judgment against Nazi physicians who engaged in truly heinous medical experiments during World War II.

The first principle of the Nuremberg Code states that the voluntary consent of the human subject of research is absolutely essential. Unfortunately, as we look back through our history since the late 1940’s, it appears that researchers in America may not have taken all that Nuremberg lesson completely to heart.

I ask my colleagues what the following names might have in common: thalidomide, Tuskegee, and Willowbrook?

Well, the answer is that these are all sad examples of unethical research conducted in the United States, and in the United States well after the Nuremberg Code was issued, adopted and worldwide attention had been focused on some of the abuses of that time during World War II.

Given this history, I find it astounding that even after Nuremberg, the thalidomide babies, Willowbrook, Tuskegee and the cold war radiation experiments, and who knows how many other cases, we still don’t have a law on our books requiring that informed consent–those two words, `informed consent’–be obtained prior to conducting research on human subjects.

I have had research conducted on me because of my past activities before I came to the Senate in the space program and so on, but I knew what was being looked at, what was being tried. I knew the objectives of it, and I was willing to do that. I was happy to do it. But it was informed consent that I had personally, and I knew what I was getting into and glad to do it.

I think most people feel the same way. If they know what they are getting into and they feel there is a good purpose to it, they are willing to do it. But to do research on people when they don’t even know what the research or the medicines or the radiation is that is being tried on them, I think is unconscionable.

What it comes down to is there are no criminal fines or penalties for violating the spirit or the letter of that Nuremberg Code that should be the basis of all of our informed consent in this country.

In fact, our own Constitution says, `The right of the people to be secure in their persons . . . shall not be violated.’

So there is no explicit statutory prohibition against improper research. I must add that just because there is no law on the books does not mean there are no protections for people from unethical medical or scientific research.

These tragic incidents I have mentioned have resulted in changes in the way human research subjects are treated. I don’t want to misrepresent this, because there is a very elaborate system of protections that have developed over the years. Unfortunately, though, this system does have some gaps and, if enacted, I believe this legislation will close those gaps.

Let me briefly describe the system that is currently in place.

Regulations governing the protection of human research subjects were issued by the Department of Health, Education, and Welfare in 1974 and may be found at part 46 of title 45 of the Code of Federal Regulations.

In 1991, 10 years after a recommendation of a congressionally chartered Presidential advisory board, 16 other agencies adopted a portion of this rule, a portion of the rule to apply to research that these agencies sponsored. And at that point, these regulations became known as the common rule.

The common rule requires research institutions receiving Federal support and Federal agencies conducting research to establish committees, and these are known as–the shorthand version is IRB’s–Institutional Review Boards. Their job is to review research proposals for risk of harm to human subjects and to perform other duties to protect human research subjects.

The common rule also stipulates requirements related to informed consent, how researchers must inform potential subjects of the risks to which they, as study participants, agree to be exposed.

It should also be noted that HHS regulations contain additional protections not included in the common rule for research involving vulnerable populations; namely, pregnant women, fetuses, subjects of in vitro fertilization research, prisoners and children. No other Federal agency has adopted these additional protections.

Several mechanisms have been developed by HHS and research institutions over the years to extend the common-rule protections to more people. For example, many, but not all, research institutions which receive some Federal support voluntarily apply common-rule guidelines to all research conducted at their institutions.

Additionally, in order to receive approval for a drug or device from the Food and Drug Administration, a research institution or pharmaceutical company must comply with the requirements of the common rule as administered by the FDA.

In addition to the Federal regulations, most professional medical societies and associations have adopted ethical codes of conduct regarding research.

The first such ethical code, called the Helsinki Code, was adopted by the World Medical Association in 1964. So it has been on the books for a long time. Since that time, other prominent organizations, like the American Medical Association, the American Society for Clinical Investigation, and the American Federation of Clinical Research have also adopted such ethical codes.

Most recently, in October 1995, the President exhibited, I believe, strong leadership and established the National Bioethics Advisory Commission, NBAC. This had been a long time coming. It had been suggested, but no one had ever gone ahead and done this, and the President exerted the leadership and established the NBAC.

Quite simply, the scientific and ethical issues which the NBAC are supposed to evaluate represent some of the most important, some of the most complex and controversial questions of our time. NBAC’s input will be critical to informed policymaking for both the legislative and executive branches.

The two primary goals of NBAC are to, first, evaluate the current level of compliance of Federal agencies to the common rule, and, second, evaluate the common rule and advise both the executive and legislative branches on any changes that might be needed to it.

I very strongly support the work of the NBAC but recently have become extremely concerned to hear that more than 15 months after its establishment, the NBAC is still operating with a volunteer staff. It was my understanding that a number of Federal agencies supported the creation of the NBAC and agreed to back up their support with resources and staff. Some NBAC members have stated in public meetings that they are frustrated with the progress the Commission is making and attribute the slow pace to the lack of resources. Additionally, the resource problem may be limiting the number of meetings of the Commission.

Further, if this problem is not resolved in the near term, the Commission may have to stop meeting altogether. I sent a letter to the President’s science adviser a few days ago, Dr. John Gibbons, to express my concerns about this. Dr. Gibbons was working to resolve this funding problem, which I view as an urgent priority.

I am very glad to announce–as a matter of fact, it was just today–that these groups in Government that are interested in this had a meeting under Dr. Gibbons’ leadership, and the $1.6 million that was supposed to accrue from these different agencies to be used by the NBAC is now forthcoming. So the NBAC is now funded so they can do the job they were originally supposed to do.

We are very glad to say that has happened just today, and I am glad it happened today, just when I am introducing this bill, because it looks as though we now truly are moving to support the NBAC that did not receive the kind of monetary support, the kind of funding that we thought it was going to have when it was first formed a year and a half ago.

There are a number of existing mechanisms that do protect human research subjects today. In fact, in March of 1996, the GAO reported to me that the testing protection system has reduced the likelihood of serious abuses from occurring. However, the GAO also pointed out a number of weaknesses and gaps in the current system.

There are at least four areas, four major gaps.

First, not all agencies have adopted the common rule, including agencies that currently sponsor research involving human subjects. The Department of Labor and the Nuclear Regulatory Commission are examples of agencies that sponsor such research but those agencies have not adopted the common rule, which I think they should have.

Second, the common rule’s research is voluntarily applied in many cases. Most institutions which receive Federal funds will voluntarily apply the common rule to all research conducted at their institution. However, not all research institutions adopt this policy. And in any case, if any improper research is discovered at these institutions, there are very few steps available to the Federal Government to do much about it.

Third, a private institution or a researcher who conducts nonfederally funded research or is not seeking approval of a drug or device with the FDA does not have to apply the principles of the common rule to its research. In other words, there is a huge area of all the private medical research out there that is not under the common rule unless they just choose themselves to just voluntarily do it.

Fourth, no Federal agency, other than HHS, has applied the additional protections described in 45 CFR 46 for vulnerable populations–pregnant women and their fetus, children, prisoners–to their own research. So the purpose of this legislation is to help close the gaps that exist within the current system for protecting research subjects.

Well, is there really a problem out there?

Is this just a paper loophole that I am trying to close?

Unfortunately, Mr. President, there are ongoing problems with inappropriate, ethically suspect research on human subjects. It is difficult to know the extent of such problems because information is not collected in any formal manner on human research.

The Cleveland Plain-Dealer in my home State of Ohio has recently reported in a whole series of articles, after much investigation of this issue. And I quote from them:

What the government lacks in hard data about humans, it more than makes up for with volumes of statistics about laboratory animals. Wonder how many guinea pigs were used in U.S. research? The Agriculture Department knows: 333,379. How many hamsters in Ohio? 2,782.

So we have all this data on animals and little on human beings. I would hasten to add that the guinea pigs the Plain-Dealer refers to are the four-legged kind too and not the guinea pigs that are humans being used for research.

The reason we know so much about the use of animals in research is that we have laws governing the handling and treatment of them.

For example, the Animal Welfare Act requires that certain minimum standards be maintained when using animals in research.

Let me give you some recent examples which indicate why, notwithstanding the common rule and the other protections that are in place, I think additional protections are needed in statute.

In 1994-95, in an effort to explore the rights and interests of people currently involved in radiation research conducted or sponsored by the Federal Government, the Presidential Advisory Committee on Human Radiation Experiments conducted an in-depth review of 125 research projects funded by HHS, DOE, DOD, VA, and NASA. According to the ACHRE report:

Our review suggests that there are significant deficiencies in some aspects of the current system for the protection of human subjects.

The ACHRE found that documents provided to IRB’s often did not contain enough information about topics that are central to the ethics of research involving human subjects. In some cases the committee found it was difficult to assess the scientific merit of a protocol based on the documentation provided.

ACHRE’s report states that some consent forms studied by the committee are–and I quote–

. . . flawed in morally significant respects, not merely because they are difficult to read but because they are uninformative or even misleading.

The report states further:

Our review also raises serious concerns about some research involving children and adults with questionable decision-making capacity.

And the ACHRE concludes:

All told, the documents of almost half the studies reviewed by the committee that involved greater than minimal risk [to the subject] raised serious or moderate concerns.

That is a horrible indictment.

As I mentioned earlier, from December 15 to 18, 1996, the Cleveland Plain-Dealer published a series of articles entitled `Drug Trials: Do People Know the Truth About Experiments.’

And I want to give credit to the people that worked on that. Keith Epstein, has covered Capitol Hill here and has written much and done much investigative reporting working on this, as did Mr. Sloat, S-l-o-a-t, Bill Sloat. Those two fellows worked on this and did a great job in pointing out some of the problems that still exist. And we have talked to them about some of these things.

The Plain-Dealer uncovered a number of disturbing cases, very disturbing cases as a matter of fact, where people were either unaware of the fact that they were involved in research or were not provided full information about potential side effects of research. The series raises very serious questions about the adequacy of our current system of protecting human research subjects.

The Plain-Dealer found, for example, of `4,154 FDA inspections of researchers testing new drugs on people [since 1977] . . . more than half the researchers were cited by FDA inspectors for failing to clearly disclose the experimental nature of their work.’

Another serious finding in this series is that researchers who receive the most severe penalty by the FDA, being designated `Disqualified Investigators,’ have little fear of this fact being found out by their peers or patients. One of the articles discusses potentially serious problems in the way research conducted outside of the United States is incorporated into applications for drug approvals in the United States.

The Plain-Dealer uncovered much evidence to suggest that the Federal Government continues to sponsor research where informed consent is not obtained. And this fact disturbed me greatly also.

On November 14, 1996, the Wall Street Journal published an article that examined the practice at one pharmaceutical firm, Eli Lilly and Co. in using homeless alcoholics in their clinical trials. The article raises some disturbing questions about the quality of the phase I trials conducted by this one company. Also serious ethical questions are raised concerning the appropriateness of paying homeless alcoholics significant sums to be human guinea pigs. It is not clear from the article whether these tests were reviewed by any IRB.

On December 27, 1996, the New York Times reported on a New York State appeals court ruling which found that the State’s rules governing psychiatric experiments on children and the mentally ill were unconstitutional. The court found that the rules did not adequately protect people who, because of age or illness, cannot give informed consent to take part in drug tests or other experiments. The article mentions 10 to 15 of the 400 psychiatric experiments covered by the ruling as being `privately financed’ and therefore outside the coverage of Federal rules.

How would you like it if your father, mother, son or daughter, husband, wife was in one of those institutions and was having experiments conducted on them without your knowing about it or without them knowing about it? That is what we are up against.

On August 15, 1994, the New York Times reported on ethical and legal questions regarding a company’s efforts to promote a drug that can make some children grow taller than they otherwise would. The drug in question, Protropin, has been approved by FDA for use in children whose bodies do not make sufficient quantities of human growth hormone. However, once approved, doctors may prescribe it for other purposes at their discretion. In this case the company was apparently surveying schools for short children and then trying to funnel those children to doctors who would prescribe the drug whether or not the children lacked the human growth hormone. This unapproved research was occurring without the oversight of an IRB. And at least 15,000 children have taken this drug.

Another illustration of the precarious coverage of the common rule occurred in 1995 when it became known that researchers from the Center for Reproductive Health at the University of California Irvine, were fertilizing humans and implanting theses in different mothers without the consent of the donor. This research was not being funded by any Federal agency; however, NIH was funding more than $20 million worth of other research at the university. Even though several internal and external investigations by the university and the district attorney were being conducted on this experiment, a clarifying moment occurred when investigators from OPRR visited UC Irvine early last year. These investigators reminded university officials of the common rule; the fact that the university had agreed to apply it to all research conducted there–through OPRR’s assurance process; and that NIH was currently funding a good deal of research at the institution. Within a week of OPRR’s visit, the university took public action to halt the research and formally investigate the researchers.

On October 10, 1994, the New York Times reported on a New York doctor who adopted two types of drugs approved by FDA for cancer treatment and stomach ulcers for an unapproved use to perform nonsurgical abortions. The article quotes the doctor saying that in 121 of 126 cases his approach was successful. The remaining five cases required surgery to complete the procedure. Because the drugs were FDA approved and the doctor was not funded or connected to federally sponsored research, no IRB or approved informed consent procedures were required. Apparently, each patient signed a three-page consent form, but this was not approved by an IRB. According to the Times, once FDA approves a drug, physicians are generally allowed to use it for off label purposes.

Now Mr. President, some of the issues discussed in these articles are problems with how the common rule itself is being applied. Some of these examples illustrate the gaps in the common rule coverage. My legislation will address both the coverage and the application of the common rule.

Now how precisely would the legislation work?

It would require all research facilities to register with HHS. Registration shall include: First, statement of principles governing the research facility in its conduct of human subject research; second, designation of the official responsible for all human subject; third, designation of membership roster of IRB(s); and fourth, attestation that the research facility is complying with the protection requirements of the common rule.

The legislation includes a grandfather provision for all research entities which currently have negotiated project assurances with HHS. The vast majority of research facilities have such assurances.

The legislation contains a 3-year reregistration requirement.

The legislation includes criminal penalties for failure to comply with the act. Therefore, if enacted it would be a felony offense to experiment on someone without their informed consent.

The intent therefore of this legislation is twofold: First, to fill in the gaps of coverage of the common rule by requiring all research involving human subjects to abide by the rule; and second, to elevate the importance of conducting research ethically, the bill provides criminal fines and penalties for failure to comply with the requirements of this law, and by extension 45 CFR 46.

Finally Mr. President, my legislation would codify a recommendation which the Advisory Committee on Human Radiation Experiments made regarding the conduct of classified research involving human subjects.

Specifically, the advisory committee recommended that informed consent of all human subjects of classified research be required, and that such requirement not be subject to waiver or exemption. Under current rule and executive order, it is possible to waive informed consent and IRB review for classified research. Title II of this legislation would prohibit the waiver of either informed consent or IRB review for classified research.

The advisory committee also recommended that human subjects of classified research be provided with certain information regarding that research. My legislation would require that such subjects be information concerning: First, the identify of the sponsoring Federal agency; second, a statement that the research involves classified information; and third, an unclassified description of the purpose of the research.

Mr. President I have tried today to briefly lay out the case for the need for the legislation I am introducing. I know that my colleague from Ohio, Senator DeWine, is also concerned about the issues I have raised today, and about those that appeared last month in the Plain Dealer. I believe that he has requested that the chairman of the Labor and Human Resources Committee hold hearings on this subject. I think that is entirely appropriate. And I hope that this legislation could be considered in that process. I look forward to working with the Labor Committee in this regard.

I do not claim to have the magic bullet solution with this bill. However, I believe there are some key principles which should guide the Senate’s consideration of this legislation. These principles are:

First, informed consent and independent review of experiments involving human subjects must be required.

Second, anyone who violates the right of research subject to have informed consent, should be held criminally responsible for that violation.

I want to put this in personal terms once again. You can imagine your spouse, husband, wife, father, mother, children, being experimented on without your knowledge or their knowledge. That is unconscionable, and we should not permit that. This legislation will close many of the loopholes that permit that to happen now.

As the legislative process moves ahead, it is certain that the bill will undergo scrutiny and amendments. But I think the outcome, if this legislation is enacted into law, will be improved protections for all Americans.

Madam President, obviously, I welcome any cosponsors on this legislation. I will be sending out a `dear colleague’ letter to all the offices, and I hope we get a good response to that. I think there are very few Senators who will not back this when they hear what can happen then to them, their families, and their constituents back home, if we do not pass something like this.

I think this is many years overdue. I don’t want to scare people to death with this, because I think most of the research in this country is conducted in a way that is good and is with informed consent–in most cases. But just the few examples that I have mentioned here today, as well as the articles in the Cleveland Plain Dealer and New York Times I quoted from, indicate there is still a very major problem in this area and one that we want to close the gaps on so that no American is subjected to experiments like this, unless they know exactly what is going on and have given informed consent.

Thank you. I yield the floor.

MK ULTRA PROJECT : Human memory-saving devices get $37.5m research boost from DARPA


Groups will study brain patterns, implant devices that deliver personalized stimulation.

by Duncan Geere, Wired UK July 13 2014, 8:00pm GTBSS

Two teams creating devices that stimulate the brain to restore memory function have been granted $37.5 million by DARPA to develop the technology.

Both will initially work with people with epilepsy who have been given implants to locate where their seizures originate. The researchers will reuse the data gathered during this process to monitor other brain activity, such as the patterns that occur when the brain stores and retrieves memories.

One team will then attempt to map these patterns by recording the brain activity of epilepsy sufferers with mild memory problems while they play a computer game about remembering things. The pattern differences between the best and worst scores among these patents will be used to develop an algorithm for a personalized stimulation pattern to keep the brain performing at an optimal level.

The second team will create a small device to be implanted into the brain, which can record and analyze electrical activity in real time, as well as deliver stimulation. A specific part of the brain’s entorhinal cortex—the area that feeds information into the hippocampus—will be targeted.

So far, there is no evidence of any side effects of this technique, but the team is taking precautions to minimize disruption to other areas of the brain—such as using extremely low levels of stimulation.

It’s hoped that the work will be able to treat different types of memory loss, including that from Alzheimer’s disease. But no device can restore memories that have been "lost"—just enhance the ability to form and retrieve new ones.

The leader of the first team, Michael Kahana at the University of Pennsylvania, said: "We’ve got to help people before they forget the names of their children."

This story originally appeared on Wired UK.

MK ULTRA PROJECT /// VİDEO : Mind Control Marathon – Episode #639 (Part 1 -2) – Pete Santilli


VİDEO LİNK :

MK ULTRA PROJECT /// Coming Soon : TSA Mind Reading Scanners to Catch Terrorists


A clip from a new Discovery Channel special envisages a day in the near future where the TSA will deploy mind reading technology to catch terrorists and police will subject suspects to memory scans in order to determine guilt.

VİDEO LİNK :

http://www.youtube.com/watch?feature=player_embedded&v=scocLz-CkDs

The clip is taken from an episode of Futurescape entitled I Know What You’re Thinking. The program, hosted by actor James Woods, explores the positives and negatives of cutting edge research into mind reading technology and how it will be applied in the realms of both law enforcement and the consumer market.

“Imagine you’re going to the airport – TSA could figure out whether you’re a terrorist a not,” comments ethicist Fritz Allhoff as a clip plays of a stern looking TSA agent sat behind a high-tech screen headed up by the words, “TSA Mind Scanning.”

A woman then puts on a headset to allow her brain to be scanned for violent thoughts. The second traveler opts out of the process and is given a pat down.

“It shouldn’t be the case that TSA by default gets access to our thoughts, it would only be that people who wanted to participate in this sort of accelerated screening can opt in to it,” states Allhoff.

Another clip from the episode predicts that police will get warrants to deploy the mind scanning technology as we see a suspect strapped to a gurney with a brain scanning helmet placed over his head.

“Because you see in the future, not even our thoughts will be free from search and seizure,” states Woods, adding, “Is it the ultimate invasion of privacy? Yes, But it could also clear your good name or maybe even save your life.”

Reassurances that a potential TSA mind scanning program would begin as a voluntary procedure is unlikely to placate the concerns of many who have tracked the federal agency’s increasingly inane and invasive security policies.

Back in 2010, the Associated Press reported on Israeli-based WeCU Technologies, a company that was busy developing “mind reading systems” that would help airport authorities “get inside an evildoer’s head” by subjecting travelers to a battery of Pavlovian behavioral tests before they could board the plane.

The Department of Homeland Security has also trialled similar technology entitled Future Attribute Screening Technology (FAST), a program that would subject Americans to pre-crime interrogations and physiological scans to detect “malintent” at sports stadiums, malls, airports and other public places.

The system works by using a computer program that studies physiological indicators of a person, such as heart rate and the steadiness of a person’s gaze, and then uses the data to make a judgment on whether that individual has “malintent”.

VİDEO LİNK :

http://www.youtube.com/watch?feature=player_embedded&v=dsL1l8aT7Wg

Facebook @ https://www.facebook.com/paul.j.watson.71
FOLLOW Paul Joseph Watson @ https://twitter.com/PrisonPlanet

%d blogcu bunu beğendi: