More on Project Blue Beam
Jesus is Coming-Kill the Enemies of God
Feb. 1, 1999
When Seeing and Hearing Isn't Believing
By William M. Arkin Special to washingtonpost.com
Monday, Feb. 1, 1999
'Gentlemen! We have called you together to inform you that we are going to overthrow the United States government.' So begins a statement being delivered by Gen. Carl W. Steiner, former Commander-in-chief, U.S. Special Operations Command. At least the voice sounds amazingly like him. But it is not Steiner. It is the result of voice 'morphing' technology developed at the Los Alamos National Laboratory in New Mexico.
By taking just a 10-minute digital recording of Steiner's voice, scientist George Papcun is able, in near real time, to clone speech patterns and develop an accurate facsimile. Steiner was so impressed, he asked for a copy of the tape. Steiner was hardly the first or last victim to be spoofed by Papcun's team members. To refine their method, they took various high quality recordings of generals and experimented with creating fake statements. One of the most memorable is Colin Powell stating 'I am being treated well by my captors.' 'They chose to have him say something he would never otherwise have said,' chuckled one of Papcun's colleagues.
A Box of Chocolates is Like War
Most Americans were introduced to the tricks of the digital age in the movie Forrest Gump, when thecharacter played by Tom Hanks appeared to shake hands with President Kennedy. For Hollywood, it is special effects. For covert operators in the U.S. military and intelligence agencies, it is a weapon of the future. [ A weapon to be used against ANYONE who is considered ENEMY OF THE STATE ]
'Once you can take any kind of information and reduce it into ones and zeros, you can do some pretty interesting things,' says Daniel T. Kuehl, chairman of the Information Operations department of the National Defense University in Washington, the military's school for information warfare. Digital morphing - voice, video, and photo - has come of age, available for use in psychological operations. PSYOPS, as the military calls it, seek to exploit human vulnerabilities in enemy governments, militaries and populations to pursue national and battlefield objectives.
To some, PSYOPS is a backwater military discipline of leaflet dropping and radio propaganda. To a growing group of information war technologists, it is the nexus of fantasy and reality. Being able to manufacture convincing audio or video, they say, might be the difference in a successful military operation or coup.ÊÊ [Your head on Lee Harvey Oswald's body - you ARE guilty and a jury of YOUR PEERS will convict YOU 'for them'!] --------------------------------------------------------------------------------
Allah on the Holodeck
Pentagon planners started to discuss digital morphing after Iraq's invasion of Kuwait in 1990.
Covert operators kicked around the idea of creating a computer-faked videotape of Saddam Hussein crying or showing other such manly weaknesses, or in some sexually compromising situation. The nascent plan was for the tapes to be flooded into Iraq and the Arab world.[NO - they did it DURING DESERT STORM - see DSWCC 'The voice of God'] The tape war never proceeded, killed, participants say, by bureaucratic fights over jurisdiction,
skepticism over the technology, and concerns raised by Arab coalition partners. [ BUZZZ - it proceeded, tested - perfected. ] But the 'strategic' PSYOPS scheming didn't die. What if the U.S. projected a holographic image of Allah floating over Baghdad urging the Iraqi people and Army to rise up against Saddam, a senior Air Force officer asked in 1990? According to a military physicist given the task of looking into the hologram idea, the feasibility had been established of projecting large, three-dimensional objects that appeared to float in the air. But doing so over the skies of Iraq? To project such a hologram over Baghdad on the order of several hundred feet, they calculated, would take a mirror more than a mile square in space, as well as huge projectors and power sources. And besides, investigators came back, what does Allah look like?
The Gulf War hologram story might be dismissed were it not the case that washingtonpost.com has learned that a super secret program was established in 1994 to pursue the very technology for PSYOPS application. The 'Holographic Projector' is described in a classified Air Force document as a system to 'project information power from space ... for special operations deception missions.'
War is Like a Box of Chocolates
Voice-morphing? Fake video? Holographic projection? They sound more like Mission Impossible and Star Trek gimmicks than weapons. Yet for each, there are corresponding and growing research efforts as the technologies improve and offensive information warfare expands. Whereas early voice morphing required cutting and pasting speech to put letters or words together to make a composite, Papcun's software developed at Los Alamos can far more accurately replicate the way one actually speaks. Eliminated are the robotic intonations. The irony is that after Papcun finished his speech cloning research, there were no takers in the military. Luckily for him, Hollywood is interested: The promise of creating a virtual Clark Gable is mightier than the sword. Video and photo manipulation has already raised profound questions of authenticity for the journalistic world. With audio joining the mix, it is not only journalists but also privacy advocates and the conspiracy-minded who will no doubt ponder the worrisome mischief that lurks in the not too distant
future. 'We already know that seeing isn't necessarily believing,' says Dan Kuehl, 'now I guess hearing isn't either.' William M. Arkin, author of 'The U.S. Military Online,' is a leading expert on national security and the Internet. He lectures and writes on nuclear weapons, military matters and information warfare. An Army intelligence analyst from 1974-1978, Arkin currently consults for Washingtonpost.Newsweek Interactive, MSNBC and the Natural Resources Defense Council.ÊÊ
GET READY: Emails re-arranged to seem like a death or bomb threat, your telephone conversations re-arranged after you use words to describe a movie you saw and over 'time' with ECHELON recording your conversations, they will have your vocabulary of words in YOUR VOICE and now when they want to prosecute you of a crime THEY COMMIT - suddenly they can have audio recordings and video footage of you being in some location and
the jury hear you say what your enemies want them to hear. GUILTY - OFF WITH HIS HEAD, DEATH! A jury of your peers will believe and convict you. We are coming full in this civilization where all deception will become the way of life, all lies will become truth, and truth will no longer exist. IT WILL BE TOTAL ILLUSION NOW OVERT based on Evil. DSWCC > http://www.nonwo.com/dswcc/
Introducing Project Blue Beam Patrol
In cooperation with TRW Space and Technology, NASA and other world space agencies, the Bilderberg group has developed a series of three stationary satellites with advanced laser technology that enable them to project holographic images onto the earth's surface from outer space!
This amazing technology allows Project Blue Beam Patrol to create holographic decoys of Police Officers that will patrol our city streets along with and among our own finest. The criminals will not be able to tell which are the real officers and which are the holograms.
BLUE BEAM PROJECT
by Jim Seabourn (email@example.com)
This is an article from CONTACT! [August 11, 1998-page 8-9]
WHAT IS THE 'BLUE BEAM PROJECT'?
From the INTERNET, courtesy of Calvin Burgin, firstname.lastname@example.org>
It involves two things. A technologically simulated 'second coming' and the re-emergence of the new 'MONTAUK'-type projects that have the ability to take up a whole bunch of people as in a 'rapture' type of situation and whisk the whole bunch into never-never land. Ironically, portions of the holographic projections have the potential for changing the planet into oneness with God. Unfortunately, this operates on the premise that Man shall somehow become God in human form and control other Men and dictate all actions and thoughts.
The calculated resistance to the new religion, the New World Order and the new 'Messiah' will entail human loss on a massive scale in the ensuing 'holy wars'. The 'BLUE BEAM PROJECT' will pretend to be the universal fulfillment of the prophecies of old; as major an event as that which took place 2000 years ago. In principle, it will make use of the sky as a holographic projection screen for space-based laser-generating satellites [star wars]. These projectors will project simultaneous images to the four corners of the planet, in every language by region. It deals with the religious aspect of the New World Order. The system has already been tested. Holographic projections of the 'Christ Image' have already been seen in some remote desert areas. These have only been reported in tabloid papers, so they are instantly rendered moot. They can also project images of aliens, monsters, angels - you name it. Computers will coordinate the satellites and software will run the show-and-tell. Holography is based on very nearly identical signals combining to produce image, or hologram, with depth perception. This is equally applicable to acoustic [ELF, VLF, LF] waves as it is optical phenomena. Specifically, the 'show' will consist of laser projections of multiple holographic images to different parts of the planet, each receiving different images according to the predominating regional religious faith. Not a single area will be excluded. With computer animation and sound effects appearing to come from the depths of space, astonished followers of the various creeds will witness their own returned Messiah in spectacularly convincing lifelike realness.
The various images of Christ, Mohammed, Buddha, Krishna, etc., will merge into ONE after 'correct explanation' of the mysteries, prophecies and revelations are disclosed. This 'ONE GOD' will in fact function as the Anti-Christ', who will 'explain' that the various scriptures 'have been misunderstood' - that the religious of old are responsible for turning brother against brother, nation against nation - that the religions of the world must be abolished to make way for the GOLDEN AGE [NEW AGE] of the One World Religion, representing the One God they see before them.
Naturally, this superbly staged, full-scale production will result in social and religious disorder on a massive scale. Wonder what the television transmitters of religious networks will be doing on that day? But before all this, they have to go through four different steps in order to get to Project Blue Beam.
1: The first step concerns the breakdown of all archaeological knowledge. It deals with staging earthquakes at certain precise locations around the planet where supposed new 'discoveries' will finally explain [for them] that the meaning of the basic doctrines of all the world's major religions are 'wrong'. This falsification will be used to make the population believe that all religious doctrine has been misunderstood and misinterpreted. The falsification started with the film 2001: A Space Odyssey, the TV-series STAR TREK, the INDEPENDENCE DAY film, E.T., all of which deal with space 'invasion' and 'protection'. JURASSIC PARK was to push the theory of evolution.
2: The second step deals with the gigantic space show: 3D optical holograms and sounds, laser projections of multiple holographic images in different parts of the world, each receiving a different image, according to its predetermined original national religious faith. This new 'god' image will talk in all languages. As an example, the Soviets have manufactured the advanced computers and have programmed them with the minute psychological particles based upon their studies of the anatomy and biology of the human body, as well as their studies on the anatomy, chemistry and electricity of the human brain. These computers have also been fed with the different languages of the world.
3: The third step deals with the telepathic electronic two-way communications, where ELF [Extra Low Frequency], VLF [Low Frequency] waves will reach the people of the Earth through the insides of their brains, making each person believe that his own God is speaking to him from within his own soul. Such rays, from satellites, are fed from the memory of computers that store much data about the human being and his languages. These rays will then interlace and interweave with the natural thinking processes to form what we call the ARTIFICIAL TALK.
4: The fourth step involves universal supernatural manifestations using electronic means. This step contains three different orientations:
The first one is to make mankind believe that an alien invasion is about to occur upon every major city on the Earth. This is to push each major nation into using its nuclear capability to strike back. In this manner, it would put each of these nations in a state of full disarmament before the United Nations after the false attack.
The second is to make the 'Christian' believe that a major rapture is occurring, with a simple 'played' divine intervention of an alleged 'good' alien force coming to save the good people from a brutal satanic attack. Its goal is to get rid of all significant opposition to the NEW WORLD ORDER.
The third orientation is a mixture of electronic and supernatural forces. The waves [frequencies] used at that time will allow supernatural forces through fiber optics cable, coaxial cable, electric and telephone lines in order to penetrate all electronic equipment and appliances that will by then all have a special microchip installed. The goal of this step deals with the materialization of satanic ghosts, spectres, and poltergiests all across the globe in order to push all populations to the edge of a wave of suicide, killing and permanent psychological disorder.
After that night of the THOUSAND STARS, HUMANITY IS BELIEVED TO BE READY FOR THEM TO ENTER IN A 'NEW MESSIAH' TO REESTABLISH PEACE EVERYWHERE AT ANY COST, EVEN AT THE COST OF FREEDOM.
NOTICE FROM WILLIAM KERN: The report above was pirated from Serge Monast who was killed while researching Project Blue Beam. Any copyright of this material belongs to Serge Monast or his family, NOT Cornell University. See Blue Beam Part 1.
'David Esur' - a military soldier who actually released secrets from the NSA (it is believed). Last reported as 'he is worried for his life' because of releasing it, he has disappeared from my email list. But then again, I never really was able to contact him to begin with - he contacted me, once. He released: 'Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency.' I think he disappeared....like Ross Adey.... and I think that the writer of the article below, Timothy Thomas, may have too. But who knows? Foreign Military Studies Office 101 Meade Ave Fort Leavenworth, KS 66027-1351
WARNING! The views expressed in FMSO publications and reports are those of the authors and do not necessarily represent the official policy or position of the Department of the Army, Department of Defense, or the U.S. Government.
The Mind Has No Firewall
Mr. Timothy L. Thomas Foreign Military Studies Office,
Fort Leavenworth, KS.
This article first appeared in the Spring 1998 issue of Parameters
'It is completely clear that the state which is first to create such weapons will achieve incomparable superiority.' -Major I. Chernishev, Russian Army.
1 The human body, much like a computer, contains myriad data processors. They include, but are not limited to, the chemical-electrical activity of the brain, heart, and peripheral nervous-system, the signals sent from the cortex region of the brain to other parts of our body, the tiny hair-cells in the inner ear that process auditory signals, and the light-sensitive retina and cornea of the eye that process visual activity.
2 We are on the threshold of an era in which these data processors of the human body may be manipulated or debilitated. Examples of unplanned attacks on the body's data-processing capability are well-documented. Strobe-lights have been known to cause epileptic seizures. Not long ago in Japan, children watching television cartoons were subjected to pulsating lights that caused seizures in some and made others very sick.
Defending friendly and targeting adversary data-processing capabilities of the body appears to be an area of weakness in the US approach to information warfare theory, a theory oriented heavily toward systems data processing and designed to attain information dominance on the battlefield. Or so it would appear from information in the open, unclassified press. This US shortcoming may be a serious one, since the capabilities to alter the data processing systems of the body already exist. A recent edition of U.S. News and World Report highlighted several of these 'wonder weapons' (acoustics, microwaves, lasers) and noted that scientists are 'searching the electromagnetic and sonic spectrums for wavelengths that can affect human behavior.'
3 A recent Russian military article offered a slightly different slant to the problem, declaring that 'humanity stands on the brink of a psychotropic war' with the mind and body as the focus. That article discussed Russian and international attempts to control the psycho-physical condition of man and his decision making processes by the use of VHF-generators, 'noiseless cassettes,' and other technologies. An entirely new arsenal of weapons, based on devices designed to introduce subliminal messages or to alter the body's psychological and data processing capabilities, might be used to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the various sensory and data-processing systems of the human organism. In both cases, the goal is to confuse or destroy the signals that normally keep the body in equilibrium. This article examines energy-based weapons, psychotropic weapons, and other developments designed to alter the ability of the human body to process stimuli. One consequence of this assessment is that the way we commonly use the term 'information warfare' falls short when the individual soldier, not his equipment, becomes the target of attack.
Information Warfare Theory and the Data-Processing Element of Humans
In the United States the common conception of information warfare focuses primarily on the capabilities of hardware systems such as computers, satellites, and military equipment which process data in its various forms. According to Department of Defense Directive S-3600. 1 of 9 December 1996, information warfare is defined as 'an information operation conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries.' An information operation is defined in the same directive as 'actions taken to affect adversary information and information systems while defending one's own information and information systems.' These 'information systems' lie at the heart of the modernization effort of the US armed forces and other countries, and manifest themselves as hardware, software, communications capabilities, and highly trained individuals.
Recently, the US Army conducted a mock battle that tested these systems under simulated combat conditions. US Army Field Manual 101-5-1, Operational Terms and Graphics (released 30 September 1997), defines information warfare as 'actions taken to achieve information superiority by affecting a hostile's information, information based-processes, and information systems, while defending one's own information, information processes, and information systems.' The same manual defines information operations as a 'continuous military operation within the military information environment that enables, enhances, and protects friendly forces' ability to collect, process, and act on information to achieve an advantage across the full range of military operations. [Information operations include] interacting with the Global Information Environment . . . and exploiting or denying an adversary's information and decision capabilities.'
4 This 'systems' approach to the study of information warfare emphasizes the use of data, referred to as information, to penetrate an adversary's physical defenses that protect data (information) in order to obtain operational or strategic advantage. It has tended to ignore the role of the human body as an information- or data-processor in this quest for dominance except in those cases where an individual's logic or rational thought may be upset via disinformation or deception. As a consequence little attention is directed toward protecting the mind and body with a firewall as we have done with hardware systems. Nor have any techniques for doing so been prescribed. Yet the body is capable not only of being deceived, manipulated, or misinformed but also shut down or destroyed - just as any other data-processing system. The 'data' the body receives from external sources - such as electromagnetic, vortex, or acoustic energy waves - or creates through its own electrical or chemical stimuli can be manipulated or changed just as the data (information) in any hardware system can be altered. The only body-related information warfare element considered by the United States is psychological operations (PSYOP). In Joint Publication 3-13. 1, for example, PSYOP is listed as one of the elements of command and control warfare. The publication notes that 'the ultimate target of [information warfare] is the information dependent process, whether human or automated .... Command and control warfare (C2W) is an application of information warfare in military operations.... C2W is the integrated use of PSYOP, military deception, operations security, electronic warfare and physical destruction.'
5 One source defines information as a 'non-accidental signal used as an input to a computer or communications system.'
6 The human body is a complex communication system constantly receiving non-accidental and accidental signal inputs, both external and internal. If the ultimate target of information warfare is the information-dependent process, 'whether human or automated,' then the definition in the joint publication implies that human data-processing of internal and external signals can clearly be considered an aspect of information warfare. Foreign researchers have noted the link between humans as data processors and the conduct of information warfare. While some study only the PSYOP link, others go beyond it. As an example of the former, one recent Russian article described offensive information warfare as designed to 'use the Internet channels for the purpose of organizing PSYOP as well as for 'early political warning' of threats to American interests.'
7 The author's assertion was based on the fact that 'all mass media (especially TV "programming" - JAH) are used for PSYOP . . . [and] today this must include the Internet.' The author asserted that the Pentagon wanted to use the Internet to 'reinforce psychological influences' during special operations conducted outside of US borders to enlist sympathizers, who would accomplish many of the tasks previously entrusted to special units of the US armed forces. Others, however, look beyond simple PSYOP ties to consider other aspects of the body's data-processing capability. One of the principal open source researchers on the relationship of information warfare to the body's data-processing capability is Russian Dr. Victor Solntsev of the Baumann Technical Institute in Moscow. Solntsev is a young, well-intentioned researcher striving to point out to the world the potential dangers of the computer operator interface. Supported by a network of institutes and academies, Solntsev has produced some interesting concepts.
8 He insists that man must be viewed as an open system instead of simply as an organism or closed system. As an open system, man communicates with his environment through information flows and communications media. One's physical environment, whether through electromagnetic, gravitational, acoustic, or other effects, can cause a change in the psycho-physiological condition of an organism, in Solntsev's opinion. Change of this sort could directly affect the mental state and consciousness of a computer operator. This would not be electronic war or information warfare in the traditional sense, but rather in a non-traditional and non-US sense. It might encompass, for example, a computer modified to become a weapon by using its energy output to emit acoustics that debilitate the operator. It also might encompass, as indicated below, futuristic weapons aimed against man's 'open system.' Solntsev also examined the problem of 'information noise,' which creates a dense shield between a person and external reality. This noise may manifest itself in the form of signals, messages, images, or other items of information.
The main target of this noise would be the consciousness of a person or a group of people. Behavior modification could be one objective of information noise; another could be to upset an individual's mental capacity to such an extent as to prevent reaction to any stimulus. Solntsev concludes that all levels of a person's psyche (subconscious, conscious, and 'super-conscious') are potential targets for destabilization. According to Solntsev, one computer virus capable of affecting a person's psyche is Russian Virus 666. It manifests itself in every 25th frame of a visual display, where it produces a combination of colors that allegedly put computer operators into a trance. The subconscious perception of the new pattern eventually results in arrhythmia of the heart. Other Russian computer specialists, not just Solntsev, talk openly about this '25th frame effect' and its ability to subtly manage a computer user's perceptions. The purpose of this technique is to inject a thought into the viewer's subconscious. It may remind some of the subliminal advertising controversy in the United States in the late 1950s.
US Views on 'Wonder Weapons': Altering the Data-Processing Ability of the Body
What technologies have been examined by the United States that possess the potential to disrupt the data-processing capabilities of the human organism? The 7 July 1997 issue of U.S. News and World Report described several of them designed, among other things, to vibrate the insides of humans, stun or nauseate them, put them to sleep, heat them up, or knock them down with a shock wave. 9 The technologies include dazzling lasers that can force the pupils to close; acoustic or sonic frequencies that cause the hair-cells in the inner ear to vibrate and cause motion-sickness, vertigo, and nausea, or frequencies that resonate the internal organs causing pain and spasms; and shock-waves with the potential to knock down humans or airplanes and which can be mixed with pepper-spray or chemicals.
10 With modification, these technological applications can have many uses. Acoustic weapons, for example, could be adapted for use as acoustic rifles or as acoustic fields that, once established, might protect facilities, assist in hostage rescues, control riots, or clear paths for convoys. These waves, which can penetrate buildings, offer a host of opportunities for military and law enforcement officials. Microwave weapons, by stimulating the peripheral nervous-system, can heat up the body, induce epileptic-like seizures, or cause cardiac-arrest. Low-frequency radiation affects the electrical activity of the brain and can cause flu-like symptoms and nausea. Other projects sought to induce or prevent sleep, or to affect the signal from the motor cortex portion of the brain, overriding voluntary muscle movements. The latter are referred to as pulse-wave weapons, and the Russian government has reportedly bought over 100,000 copies of the 'Black Widow' version of them.
11 However, this view of 'wonder weapons' was contested by someone who should understand them. Brigadier General Larry Dodgen, Deputy Assistant to the Secretary of Defense for Policy and Missions, wrote a letter to the editor about the 'numerous inaccuracies' in the U.S. News and World Report article that 'misrepresent the Department of Defense's views.'
12 Dodgen's primary complaint seemed to have been that the magazine misrepresented the use of these technologies and their value to the armed forces. He also underscored the US intent to work within the scope of any international treaty concerning their application, as well as plans to abandon (or at least redesign) any weapon for which countermeasures are known. One is left with the feeling, however, that research in this area is intense. A concern not mentioned by Dodgen is that other countries or non-state actors may not be bound by the same constraints. It is hard to imagine someone with a greater desire than terrorists to get their hands on these technologies. 'Psycho-terrorism' could be the next buzzword.
Russian Views on 'Psychotropic War'
The term 'psycho-terrorism' was coined by Russian writer N. Anisimov of the Moscow Anti-Psychotronic Center. According to Anisimov, psychotropic weapons are those that act to 'take away a part of the information which is stored in a man's brain. It is sent to a computer, which reworks it to the level needed for those who need to control the man, and the modified information is then reinserted into the brain.' These weapons are used against the mind to induce hallucinations, sickness, mutations in human cells, 'zombification,' or even death. Included in the arsenal are VHF generators, X-rays, ultrasound, and radio waves. Russian army Major I. Chernishev, writing in the military journal Orienteer in February 1997, asserted that 'psy' weapons are under development all over the globe. Specific types of weapons noted by Chernishev (not all of which have prototypes) were: A psychotropic generator, which produces a powerful electromagnetic emanation capable of being sent through telephone lines, TV, radio networks, supply pipes, and incandescent lamps. An autonomous generator, a device that operates in the 10-150 Hertz band, which at the 10-20 Hertz band forms an infrasonic oscillation that is destructive to all living creatures. A nervous system generator, designed to paralyze the central nervous systems of insects, which could have the same applicability to humans. Ultrasound emanations, which one institute claims to have developed. Devices using ultrasound emanations are supposedly capable of carrying out bloodless internal operations without leaving a mark on the skin. They can also, according to Chernishev, be used to kill.
Chernishev claims that the Japanese have developed the ability to place infra-low frequency voice patterns over music, patterns that are detected by the subconscious. Russians claim to be using similar 'bombardments' with computer programming to treat alcoholism or smoking.
The 25th-frame effect, alluded to above, a technique wherein each 25th frame of a movie reel or film footage contains a message that is picked up by the subconscious. This technique, if it works, could possibly be used to curb smoking and alcoholism, but it has wider, more sinister applications if used on a TV audience or a computer operator. Psychotropics, defined as medical preparations used to induce a trance, euphoria, or depression. Referred to as 'slow-acting mines,' they could be slipped into the food of a politician or into the water supply of an entire city. Symptoms include headaches, noises, voices or commands in the brain, dizziness, pain in the abdominal cavities, cardiac arrhythmia, or even the destruction of the cardiovascular system.
There is confirmation from US researchers that this type of study is going on. Dr. Janet Morris, co-author of The Warrior's Edge, reportedly went to the Moscow Institute of Psycho correlations in 1991. There she was shown a technique pioneered by the Russian Department of Psycho-Correction at Moscow Medical Academy in which researchers electronically analyze the human mind in order to influence it. They input subliminal command messages, using key words transmitted in 'white noise' or music. Using an infra-sound, very low frequency transmission, the acoustic psycho-correction message is transmitted via bone conduction.
13 In summary, Chernishev noted that some of the militarily significant aspects of the 'psy' weaponry deserve closer research, including the following non-traditional methods for disrupting the psyche of an individual: ESP research: determining the properties and condition of objects without ever making contact with them and 'reading' peoples' thoughts Clairvoyance research: observing objects that are located just beyond the world of the visible - used
for intelligence purposes Telepathy research: transmitting thoughts over a distance - used for covert operations Telekinesis research: actions involving the manipulation of physical objects using thought power, causing them to move or break apart - used against command and control systems, or to disrupt the functioning of weapons of mass destruction Psychokinesis research: interfering with the thoughts of individuals, on either the strategic or tactical level
While many US scientists undoubtedly question this research, it receives strong support in Moscow. The point to underscore is that individuals in Russia (and other countries as well) believe these means can be used to attack or steal from the data-processing unit of the human body. Solntsev's research, mentioned above, differs slightly from that of Chernishev. For example, Solntsev is more interested in hardware capabilities, specifically the study of the information-energy source associated with the computer-operator interface. He stresses that if these energy sources can be captured and integrated into the modern computer, the result will be a network worth more than 'a simple sum of its components.' Other researchers are studying high-frequency generators (those designed to stun the psyche with high frequency waves such as electromagnetic, acoustic, and gravitational); the manipulation or reconstruction of someone's thinking through planned measures such as reflexive control processes; the use of psychotronics, parapsychology, bioenergy, bio fields, and psycho energy;
14 and unspecified 'special operations' or anti-ESP training. The last item is of particular interest. According to a Russian TV broadcast, the strategic rocket forces have begun anti-ESP training to ensure that no outside force can take over command and control functions of the force. That is, they are trying to construct a firewall around the heads of the operators.
At the end of July 1997, planners for Joint Warrior Interoperability Demonstration '97 'focused on technologies that enhance real-time collaborative planning in a multinational task force of the type used in Bosnia and in Operation Desert Storm.
The JWID '97 network, called the Coalition Wide Area Network (CWAN), is the first military network that allows allied nations to participate as full and equal partners.'
15 The demonstration in effect was a trade fair for private companies to demonstrate their goods; defense ministries got to decide where and how to spend their money wiser, in many cases without incurring the cost of prototypes. It is a good exampleof doing business better with less. Technologies demonstrated included:
16 Soldiers using laptop computers to drag cross-hairs over maps to call in air strikes Soldiers carrying beepers and mobile phones rather than guns Generals tracking movements of every unit, counting the precise number of shells fired around the globe,and inspecting real-time damage inflicted on an enemy, all with multicolored graphics
17 Every account of this exercise emphasized the ability of systems to process data and provide information feedback via the power invested in their microprocessors. The ability to affect or defend the data-processing capability of the human operators of these systems was never mentioned during the exercise; it has received only slight attention during countless exercises over the past several years. The time has come to ask why we appear to be ignoring the operators of our systems. Clearly the information operator, exposed before a vast array of potentially immobilizing weapons, is the weak spot in any nation's military assets. There are few international agreements protecting the individual soldier, and these rely on the good will of the combatants. Some nations, and terrorists of every stripe, don't care about such agreements.
This article has used the term data-processing to demonstrate its importance to ascertaining what so-called information warfare and information operations are all about. Data-processing is the action this nation and others need to protect. Information is nothing more than the output of this activity. As a result, the emphasis on information-related warfare terminology ('information dominance,' 'information carousel') that has proliferated for a decade does not seem to fit the situation before us. In some cases the battle to affect or protect data-processing elements pits one mechanical system against another. In other cases, mechanical systems may be confronted by the human organism, or vice versa, since humans can usually shut down any mechanical system with the flip of a switch. In reality, the game is about protecting or affecting signals, waves, and impulses that can influence the data-processing elements of systems, computers, or people. We are potentially the biggest victims of information warfare, because we have neglected to protect ourselves.
Our obsession with a 'system of systems,' 'information dominance,' and other such terminology is most likely a leading cause of our neglect of the human factor in our theories of information warfare. It is time to change our terminology and our conceptual paradigm. Our terminology is confusing us and sending us in directions that deal primarily with the hardware, software, and communications components of the data-processing spectrum. We need to spend more time researching how to protect the humans in our data management structures. Nothing in those structures can be sustained if our operators have been debilitated by potential adversaries or terrorists who - right now - may be designing the means to disrupt the human component of our carefully constructed notion of a system of systems.
1. I. Chemishev, 'Can Rulers Make 'Zombies' and Control the World?' Orienteer, February 1997, pp. 58-62.
2. Douglas Pasternak, 'Wonder Weapons,' U.S. News and World Report, 7 July 1997, pp. 3846.
3. Ibid., p. 38.
4. FM 101-5-1, Operational Terms and Graphics, 30 September 1997, p. 1-82.
5. Joint Pub 3-13.1, Joint Doctrine for Command and Control Warfare (C2W), 7 February 1996, p. v.
6. The American Heritage Dictionary (2d College Ed.; Boston: Houghton Mifflin, 1982), p. 660, definition 4.
7. Denis Snezhnyy, 'Cybemetic Battlefield & National Security,' Nezavisimoye Voyennoye Obozreniye, No. 10, 15-21 March 1997, p. 2.
8. Victor I. Solntsev, 'Information War and Some Aspects of a Computer Operator's Defense, ' talk given at an Infer Conference in Washington, D.C., September 1996, sponsored by the National Computer Security Association. Information in this section is based on notes from Dr. Solntsev's talk.
9. Pasternak, p. 40.
10. Ibid., pp. 40-46.
12. Larry Dodgen, 'Non-lethal Weapons,' U.S. News and World Report, 4 August 1997, p. 5.
13. 'Background on the Aviary,' Nexus Magazine, downloaded from the Internet on 13 July 1997 from http://www.execpc.com/vjentpr/nexusavi.html
< http://www.execpc.com/vjentpr/nexusavi.html > , p.7.
14. Aleksandr Cherkasov, 'The Front Where Shots Aren't Fired,' Orienteer, May 1995, p. 45. This article was based on information in the foreign and Russian press, according to the author, making it impossible to pinpoint what his source was for this reference.
15. Bob Brewin, 'DOD looks for IT 'golden nuggets,'' Federal Computer Week, 28 July 1997, p. 31, as taken from the Earlybird Supplement, 4 August 1997, p. B 17.
16. Oliver August, 'Zap! Hard day at the office for NATO's laptop warriors,' The Times, 28 July 1997, as taken from the Earlybird Supplement, 4 August 1997, p. B 16.
The Goals of Project Blue Beam
The Project Blue Beam/British Israel Brain Wash from the Islamic Side (July 5, 2006)
|All information posted on this web site is the opinion of the author and is provided for educational purposes only. It is not to be construed as medical advice. Only a licensed medical doctor can legally offer medical advice in the United States. Consult the healer of your choice for medical care and advice.|