The Andrew Carrington Hitchcock Show (1010) Dr. Eric Karlstrom – Mafia States, Gangstalking, Torture, And Terrorism Of Civilians


Webmaster’s (ETK) Notes For Program

Mafia States’ Gangstalking, Torture and Terrorism of Civilians

Alternative Titles:

1) Gangstalking America’s Mafia-Torture-Terror Tactics to Eliminate Truth and Truth-Tellers

2) Amerikan Empire’s Global Organized Stalking is 60-year old CIA-DOD “Counter-Insurgency” Terror Operation That Deploys No-Touch Torture, Neuroweapons, and Nonlethal Weapons Against Civilians

3) Organized Stalking + NeuroTechnology = The Illuminati Program From Hell To Enslave Humanity

4) Gangstalking: How the National Security Racketeering Network Eliminates Truth and Truth Tellers:

5) “Reverse Engineering the Amerikan-Global Gestapo: Government Gangstalking – Genocide (G5) System

6) Pax Americana?: The Iron, Fascist Fist of Global Gangstalking Torture, Terror, and Tyranny

Webmaster’s (ETK) Synopsis (5/20/19) of “the program” from gangstalkingmindcontrolcults.com:

“Organized gang stalking” (aka “counter-intelligence stalking,” ”GISTAPWO-666,” and “the program”) comprises psychological-psychotronic operations, torture, terrorism, war crimes, and “crimes against humanity” committed by governments and their private subcontractors against millions of innocent civilians worldwide. Victims (aka “Targeted Individuals” or “TIs”) are secretly and extra-judicially “blacklisted,” tracked, and targeted with no-touch torture, “nonlethal” (directed energy) weapons, and mind/behavioral control (neuro) weapons which were developed in the 1940s, 50’s and 60s under the CIA’s top-secret Project MKULTRA and MONARCH mind control programs, etc. This DOD-CIA-NSA-NASA-NATO-DHS-FBI-DNI program is the modern extension of numerous previous programs, most of which have been outlawed. These include the East German Stasi’s “Zersetzung,” the FBI’s COINTELPRO, and the CIA’s MKULTRA, MONARCH, MHCHAOS, and Phoenix Programs. “The Program,” apparently the short version of “Monarch: The New Phoenix Program” (Thomas, 2007), constitutes “unconventional”-“information”-“cyber”-“psychological” and “psychotronic warfare,” “low-intensity conflict,” and so-called “peacekeeping operations” justified under the guise of the phony “War on Terrorism” and “National Security.” The program is entirely unconstitutional and illegal, consumes trillions of taxpayer dollars, and conscripts a large percentage of Americans as “citizen-spies” who are paid, enticed, bribed, and/or coerced to participate in the harassment, torture, terrorization, and destruction of fellow citizens whom government has secretly designated as “political enemies” and/or guinea pigs for DOD weapons testing and brain mapping. Millions of “whistleblowers,” “dissidents,” veterans, Christians, Constitutionalists, and other good people fill the ranks of the classified, top-secret “Terrorism Watch List” generated at DHS/FBI Fusion Centers. These citizens are labeled “potential terrorist threats” and “non-investigative subjects”/”Code 4: silent hits.”

Apparently, the Deep State/intelligence/military complex will pay virtually any amount to keep “the program” going to test their military weapons on non-consensual experimentees and simultaneously eliminate potential opponents of the New World Order. Many of the “perpetrators” drive brand new vehicles! (The government’s “missing” $43 trillion in “unaccountable adjustments,” recently “classified” as a State secret under cloak of “National Security,” may be one source of funding for this mammoth “black” operation.)

Functions of “the program”/”GISTAPWO-666”

“The program:”

1) neutralizes and/or eliminates people of conscience who are illegally blacklisted and targeted as “threats.”
2) comprises state-sponsored terrorism that deploys secret military weapons, including directed energy (EMF) and mind control/neuro-weapons, no-touch torture, and “crisis actors” against domestic populations. Weather warfare/geoengineering (ex.: Hurricane Harvey) and staged, false-flag terror events (ex.: Operation 9/11, the massive California EMF (electromagnetic frequency)-fires of 2017 and 2018) are other forms of state terrorism that deploy these or similar weapons.
3) provides a steady stream of non-consenting and often unwitting human subjects (lab rats) who are human trafficked through classified government contracts to corporations, hospitals, and universities for the testing and deployment of these nonlethal- and neuro-(brain) weapons.
4) provides the means by which the Deep State (government-military-intelligence-mafia complex) can control and coordinate the civilian sector to function as a secret army of spies and covert operators. Primary “perpetraitors” include the FBI/DHS Threat-Fusion Center system, private intelligence subcontractors such (FBI’s) InfraGard, CIA/DIA-paid “hive mind” teams of brain researchers and manipulators, federal, state, and local police, most of the legal system, “Terrorism Liason Officers” (TLOs) chosen from the ranks of police and first responders, “surveillance role players,” “crisis actors,” spotters, trackers, neighborhood watch vigilantes, etc.
5) gives elites the technological means to covertly control, enslave, and/or genocide entire populations.
6) helps military and corporate leaders develop and refine their ability to fight wars primarily with mind control and EMF weapons.
7) produces a steady stream of traumatized, fragmented, and programmed, mind-controlled “shooters” who function as either actual shooters or as “patsies” in Pentagon-funded, false-flag, state-sponsored terror events which are stage-managed to terrorize the public, empower and embolden the military-intelligence-police state, and justify the repeal of Americans’ Second Amendment right to bear arms.
8) enriches the corporatocracy, organized crime, and military-intelligence agencies and stimulates the economy by: a) funneling trillions of federal dollars to innumerable public and corporate agencies and enterprises and b) asset stripping the wealth and physical and intellectual property of “targets.”
9) comprises an “invisible” civil war in which military personnel control both sides of a managed conflict in the American “battlespace” under USNORTHCOM (U.S. Northern Command) and U.S. Air Force mission control that deploys weaponized EM frequencies, AI (artificial intelligence), satellites, the Geographic Information Grid (GIG), telecommunications systems including satellites, cell towers, and cell phones, and advanced supercomputer and computer technology, including mobile, virtual war rooms termed C4ISR (“Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance”).
10) comprises a silent, covert coup against the civilian population, the US Constitution, the American Republic, and Western Civilization.
11) corrupts, controls, criminalizes, militarizes, weaponizes, and satanizes large segments of societies.
12) presages a global, techno-fascist, totalitarian, privatized military-intelligence-police state cum New World Order-one-world-government (UN Agenda 2030!?) in which most of humanity could be reduced to cyborg-slave status or genocided.
13) provides the technological means by which futurists such as Dr. Norbert Weiner, Dr. Ray Kurzweil, Elon Musk, and Bill Gates apparently hope to ensure immortality for themselves and their Judeo-Masonic-Illuminati-satanic cult through the digital replication (i.e., theft) and enhancement (“hive mind”) of human brains and central nervous system characteristics and concomitant production of “transhumanist” cyborgs.

We may surmise that a chief goal of the CIA-DOD’s post-WWII “Manhattan Project of the Mind” (Project MKULTRA, etc.) has always been to develop the technological means for the elite to attain “godhood” as per Genesis 3:4-5:

“And the serpent said unto the woman, “Ye shall not surely die… ye shall be as gods.””

14) helps usher in a Luciferic-Antichrist one-world system: The Hebrew term, “Tikkun Olam” (meaning “reinventing or repairing the world”) expresses this goal. It appears that the long-planned “Jewish Utopia”/”Universal Jewish Empire” may involve the replacing of God’s creation and God’s people with digital, cyborg copies.

Although the existence of “the program” is officially denied and its victims are routinely labeled and institutionalized as paranoid/schizophrenic/delusional, innumerable books, articles, official military documents, patents, and the testimonies of thousands of credible individuals prove it has existed in various forms for well over half a century. Currently, government and media are engaged in covering up “the program” by deploying many of the same psyop-organized stalking-information-cyber warfare protocols as previous coverups, for instance, of Operation 9/11.

This website is dedicated to educating the public to the dangers of this evil, totalitarian system. I especially hope it will help save the lives and livelihoods of many “targeted citizens” (aka TIs) and will contribute to the exposure and total dismantling of this diabolical program. The U.S. Constitution is still the law of the land in America as per Madison V. Marbury (1803) which states: “All laws repugnant to the Constitution are null and void.” “Perpetraitors” must be exposed and held accountable; there is no statute of limitations for these crimes.

GISTAPWO-666; for “Global Intelligence-Syndicate, Secret, Satanic, Space-based, Surveillance, Stalking, Tracking, Targeting, Torture, Terrorism, Termination, Transhumanism And Psycho-Political, Policing-for-Profit, Psychotronic, and Psychological Warfare Operations.”

1) US Government/CIA/Pentagon Mind Control and Torture Of Innocent Civilians: Cheryl Welsh; 13 Articles

US Government/CIA/Pentagon Mind Control and Torture Of Innocent Civilians: Cheryl Welsh; 13 Articles

VII. In Contravention of Conventional Wisdom CIA “no touch” torture makes sense out of mind control allegations

University of Wisconsin professor Alfred McCoy wrote the 2006 book, A Question of Torture, CIA Interrogation, from the Cold War to the War on Terror. It’s a compelling account of McCoy’s search for understanding the CIA’s ‘no touch’ torture techniques used in the war on terror and the Iraq War.

McCoy pieced together what ‘no touch’ torture is and how it was spread globally. The CIA’s new ‘no touch’ torture works by attacking and destroying the basis of personal identity. Evidence of several government manuals helped prove that the techniques were disseminated “from Vietnam through Iran to Central America.”

‘No touch’ torture techniques sound strangely similar to mind control allegations. A comparison of ‘no touch’ torture to mind control allegations raised the possibility that mind control allegations could be based on the well researched psychological theory for ‘no touch’ torture. Torture victims exhibit symptoms similar to psychotic processes and organic disorders and experts say this is not mental illness but an outcome of the psychological component of torture. Psychotherapist Otto Doerr-Zegers, who has treated Chilean victims tortured under General Augusto Pinochet stated:

“The psychological component of torture becomes a kind of total theater, a constructed unreality of lies and inversion, in a plot that ends inexorably with the victim’s self-betrayal and destruction….”

This is similar to the technique of “street theater” that mind control victims described in Mind Wars and the Washington Post Magazine article. As torture victims are not mentally ill, mind control victims would not be mentally ill, but rather have undergone and are undergoing a traumatic situation comparable to torture, such as the alleged illegal targeting with government mind control weapons.

II. The beginnings of CIA ‘no touch’ torture and how it spread

McCoy described the research behind ‘no touch’ torture and how it spread globally:

“From 1950 to 1962, the CIA became involved in torture through a massive mind-control effort, with psychological warfare and secret research into human consciousness that reached a cost of a billion dollars annually, a veritable Manhattan Project of the mind. … If we trace a narrative thread through a maze of hundreds of experiments, the CIA research moved through two distinct phases, first an in-house exploration of exotic techniques such as hypnosis and hallucinogenic drugs, and, a later focus on behavioral experimentation by contract researchers, several of the most brilliant behavioral scientists of their generation …

“While this Agency drug testing led nowhere, CIA-funded behavioral experiments, outsourced to the country’s leading universities, Harvard, Princeton, Yale, etc., produced three key findings that contributed to the discovery of a new form of torture that was psychological, not physical, … perhaps best described as “no-touch torture.” (McCoy outline, 2)

“Across the span of three continents and four decades, there is a striking similarity in U.S. torture techniques, both their conceptual design and specific techniques, from the CIA’s 1963 Kubark interrogation manual, to the Agency’s 1983 Honduras training handbook, all the way to General Ricardo Sanchez’s 2003 orders for interrogation in Iraq. … Guantanamo perfected the three-phase psychological paradigm by attacking cultural identity and individual psyche. (McCoy outline, 14)”

McCoy explained what ‘no touch’ torture is:

“The CIA’s psychological paradigm for ‘no touch’ torture fused two new methods, “sensory disorientation” and “self-inflicted pain,” whose combination, in theory, would cause victims to feel responsible for their own suffering and thus capitulate more readily to their torturers. Refined through years of practice, sensory disorientation relies on a mix of sensory overload and sensory deprivation via banal procedures, isolation then intense interrogation, heat and cold, light and dark, noise and silence, for a systematic attack on all human stimuli. The fusion of these two techniques, sensory disorientation and self-inflicted pain, creates a synergy of physical and psychological trauma whose sum is a hammer-blow to the existential platforms of personal identity. (McCoy outline, 4-5)

McCoy described the principles underlying ‘no touch’ torture:

“Through covert trial and error, the CIA, in collaboration with university researchers, slowly identified three key behavioral components integral to its emerging techniques for psychological torture.

“Discovery #1 Sensory deprivation In the early 1950s …Dr. Donald Hebb found that he could induce a state akin to psychosis in just 48 hours. …after just two to three days of such isolation [sitting in a cubicle ..with goggles, gloves and ear muffs on.] “the subject’s very identity had begun to disintegrate.”

“Discovery #2 Self-inflicted pain …Albert Biderman, Irving L. Janis, Harold Wolff, and Lawrence Hinkle, advised the agency about the role of self-inflicted pain in Communist interrogation. …During the 1950s as well, two eminent neurologists at Cornell Medical Center working for the CIA found that the KGB’s most devastating torture technique involved, not crude physical beatings, but simply forcing the victim to stand for days at a time, while the legs swelled, the skin erupted in suppurating lesions, the kidneys shut down, hallucinations began.

“Discovery #3 Anyone can torture …Finally, a young Yale psychologist Stanley Milgram, …conducted his famed obedience experiments, asking ordinary New Haven citizens to torture on command and discovering that, in contravention of conventional wisdom, anyone could be trained to torture. …[Milgram] did controversial research under a government grant showing that almost any individual is capable of torture, a critical finding for the agency as it prepared to disseminate its method worldwide. (McCoy outline, 4, Question of Torture, 32-33)

“By the project’s end in the late 1960s, this torture research had involved three of the 100 most eminent psychologists of the 20th century-Hebb, Milgram, and Janis, as well as several presidents of the American Psychiatric Association and the American Psychological Association. (A Question of Torture, 33)

“That notorious photo of a hooded Iraqi on a box, arms extended and wires to his hands, exposes this covert method. The hood is for sensory deprivation, and the arms are extended for self-inflicted pain. … Although seemingly less brutal than physical methods, no-touch torture leaves deep psychological scars on both victims and interrogators.

One British journalist who observed this method’s use in Northern Ireland called sensory deprivation “the worst form of torture” because it “provokes more anxiety among the interrogatees than more traditional tortures, leaves no visible scars and, therefore, is harder to prove, and produces longer lasting effects. (Question of Torture, 8-9)”

“In 2004, the Red Cross reported: “The construction of such a system. … cannot be considered other than an intentional system of cruel, unusual and degrading treatment and a form of torture. “(McCoy outline, 9)”

The history of CIA torture runs parallel to CIA neuroscience-based mind control research and also CIA nonlethal weapons research. This is important because mind control allegations include descriptions of techniques that sound like all three CIA programs. It is possible that the related cold war CIA ‘no touch’ torture, nonlethal weapons and neuroscience-based mind control programs have co-mingled for intelligence uses. Pulitzer Prize winning New York Times reporter and author Tim Weiner wrote the 2007 book Legacy of Ashes, History of the CIA. Weiner described the CIA torture programs and the U.S. secret detention centers around the world. This is a brief excerpt of the extensive programs:

“The project dated back to 1948, when Richard Helms and his [American intelligence] officers in Germany realized they were being defrauded … The agency had set up clandestine prisons to wring confessions out of suspected double agents. One was in Germany, another in Japan. The third, and the biggest, was in the Panama Canal Zone.

“Like Guantanamo, … It was anything goes.” … (Weiner, 64-5)

“Senior CIA officers, including Helms, destroyed almost all the records of these programs in fear they might become public. (Weiner, 66)

“The agency, as Cheney said that morning, went over to “the dark side.” On Monday, September 17, President Bush issued a fourteen-page top secret directive to Tenet and the CIA, ordering the agency to hunt, capture, imprison, and interrogate suspects around the world. It set new limits on what the agency could do. It was the foundation for a system of secret prisons where CIA officers and contractors used techniques that included torture. One CIA contractor was convicted of beating an Afghan prison to death. This was not the role of a civilian intelligence service in a democratic society. But it is clearly what the White House wanted the CIA to do. …

“[The CIA] had participated in the torture of captured enemy combatants before, beginning in 1967, under the Phoenix program in Vietnam. …

“Under Bush’s order, the CIA began to function as a global military police, throwing hundreds of suspects into secret jails in Afghanistan, Thailand, Poland, and inside the American military prison in Guantanamo, Cuba. It handed hundreds more prisoners off to the intelligence services in Egypt, Pakistan, Jordan, and Syria for interrogations. (Weiner, 482)”

Nonlethal weapons are another outcome of CIA behavior control research. Steven Aftergood wrote about the initial stages of nonlethal weapons in the September/October 1994 Bulletin of the Atomic Scientists: “Details about programs to develop so called “non-lethal ” weapons are slowly emerging from the U.S. government’s secret “black budget.” … The concept of non-lethal weapons is not new; the term appears in heavily censored CIA documents dating from the 1960s.” Dr. Barbara Hatch-Rosenberg described nonlethal weapons on page 45, “Non-lethal” weapons may violate treaties:

Most of the weapons could be considered “pre-lethal” rather than non-lethal. They would actually provide a continuum of effects ranging from mild to lethal, with varying degrees of controllability.

“Many of the non-lethal weapons under consideration utilize infrasound or electromagnetic energy (including lasers, microwave or radio-frequency radiation, or visible light pulsed at brain-wave frequency) for their effects. These weapons are said to cause temporary or permanent blinding, interference with mental processes, modification of behavior and emotional response, seizures, severe pain, dizziness, nausea and diarrhea, or disruption of internal organ functions in various other ways. In addition, the use of high-power microwaves to melt down electronic systems would incidentally cook every person in the vicinity.

McCoy explained: “CIA Paradigm: In its clandestine journey across continents and decades, this distinctly American form of psychological torture would prove elusive, resilient, adaptable and devastatingly destructive, attributes that have allowed it to persist up to the present and into the future. …

These characteristics also apply to nonlethal weapons and neuroscience-based mind control. All three are emerging state tools of the future and can neutralize the enemy by controlling the behavior of the enemy. A 2005 book entitled, Torture, Does it Make Us Safer? Is It Ever OK? was co-published with Human Rights Watch. Some general reasons for why governments use torture as a state tool include the following. Governments torture because it is a way to obtain coerced confessions. The confessions can be used for propaganda purposes. Torture serves a variety of state purposes: “to terrorize certain elements of the population, to instill a climate of fear in the public more generally, and to break key leaders and members of these groups, uncovering their networks.” Another purpose of torture is to “obtain intelligence by any means,” “annihilate subversives” and “eliminate the enemy.”

Counterinsurgency warfare is taking place in Iraq and major newspapers have reported on the many detainees that have consistently alleged being subjected to ‘no touch’ torture techniques. As reported in the September 16th, 2007 Sacramento Bee, General David Petraeus co-wrote the Counterinsurgency Field Manuel – U.S. Army Field Manual on Tactics, Intelligence, Host Nation Forces, Airpower,” which Newsweek said, is “highly touted as the basis upon which the surge of U.S. forces this year would be organized.”

The book Torture, also included a description of “counterinsurgency warfare, in which torture was a principal weapon” and was developed “during the French experience in Indochina and Algeria.”

The addendum of Naylor’s novel 1996 included this description of some of the most commonly reported mind control symptoms:

“Victims are subjected to various kinds of harassment and torture, twenty-four hours a day, seven days a week, for years on end. Most believe that some type of technology can remotely track, target, and control every nerve in their bodies. Heart and respiration rate can speed up and slow down, and stomach and bowel functions are regulated. Illnesses and all types of pain can turn on and off in an instant. Microwave burns are reported.

“Sleep deprivation is common and dreams are manipulated. Victims say, “They [whoever is targeting them] can see through my eyes, what I see.” Sometimes victims describe seeing the images of projected holograms. Thoughts can be read. Most victims describe a phenomenon they call “street theater.” For example, people around the victim have repeated verbatim, the victim’s immediate thoughts, or harassive and personalized statements are repeated by strangers wherever the victim may go.

“Emotions can be manipulated. Microwave hearing, known to be an unclassified military capability of creating voices in the head, is regularly reported. Implanted thoughts and visions are common, with repetitive themes that can include pedophilia, homophobia and degradation. Victims say it is like having a radio or TV in your head. Less frequently, remote and abusive sexual manipulation is reported. Almost all victims say repetitive behavior control techniques are used and include negative, stimulus-response or feedback loops.”

The counterintuitive and bizarre torture techniques are discernible within the mind control allegations. The mind control techniques seem to be psychological techniques to disorient the victim and cause him to feel completely controlled, dependent and at the mercy of his torturers. Similar to the “kind of total theater” for torture, “street theater” is almost certainly a part of the process of breaking one’s personality and to gain behavior control over that person.

2) Brains can be stolen and raped. The authorities do it! In 1977, the New York Times published 30 articles about the CIA’s brain control systems. The most important things brought to light were that this project had already begun in the late 1940’s and that with this technology, they had built a state-within-a-state.

In April 10, 1967, the New York Times editorial, “Push-Button People,” discussed the ongoing (mind control/cybernetics) experiments and warned about the dangers of this technology. They also mentioned that probably there were countries that already planned to subjugate their people using this technique. Both the U.S. and Sweden were countries that had far-reaching plans to subjugate citizens, beyond their knowledge, in brain control systems.”

Throughout the history of mankind, there has never existed anything more totalitarian. There has never been anything more anti-democratic. A dictatorship can never be greater than when its citizens’ brains are linked to computer control.

The State has become a cannibal, a rapist who is eating its citizens. Transforming us into biological manipulable components.

What happened during over 60 years of brain experimentation? Which doctors, professors, what institutions have been involved in the most anti-democratic project that ever existed? By what kinds of methods has it been possible to keep it off the media and from people’s attention? What is the role of the medical corporations? They are involved. FOI’s (Sweden’s DOD/DARPA) and America’s NSA supercomputers must be turned off. We are all about to become the State’s lab rats and chip-regulated behavior-skulls.

(The CIA’s Phoenix Program) in Vietnam in 1970 used this same brain technology to identify and mass murder 33,000 civilians who were identified, by the technology, as Vietcong sympathizers!

– Robert Naeslund: The Human Brain Project

3) …. regarding “The National Security Racketeering Network”… “the program” at its core is an extra-judicial, political targeting and elimination program. This is a soft-kill operation. The expected outcome is self-harm, financial disruption, social disruption (of “Targeted Citizens”). They want to get rid of you (the TC) via any means possible in a clandestine fashion and also have fun and generate revenue while doing it. This is a style of “parasitic crony capitalism” because Department of Justice, Department of Homeland Security, and possibly DOD, are farming out contracts on innocent Americans….. So it is both a political targeting operation as well as a revenue generation scheme that starts off within the deep state shadow government.

I’ve read that DOJ/DHS have contracts with corporate private prisons in which DOJ helps these prisons maintain a certain quota of prisoners. They’ve done the same thing with the private intelligence agencies which run the extra-judicial militias, or targeting crews, which DOJ refers to as “surveillance role players” or” live action role players.” (I.e., they guarantee delivery of “quotas” of “targeted individuals.”)

Who owns these private intelligence agencies? Retired federal law enforcement and intelligence personnel; FBI, NSA, DEA, JTTF, Homeland Security, ex-military officers…. there are over 1800 private intelligence agencies in the US that operate with zero oversight. This is a giant racketeering network…. probably the biggest, underground, black-market illegal business in the United States today.

Dr. X Keyscore

4) 6) “As a Targeted Individual, you are attacked by many forces from all sides. You are an enemy of the state. This is called Joint Targeting. This military strategy is described in these military documents. You are a MILITARY TARGET.

Joint Publication 3-60: Joint Targeting (Joint Chiefs of Staff, 2007) (pdf)
Joint Publication 3-60: Joint Targeting (2013) (pdf)
JP-3-60 Joint Targeting and US Targeted Killings (Joint Chiefs of Staff, 2013)

These documents describe how and why you are chosen as a Target. They even describe why your immediate and extended family is attacked as well:

“Target development always approaches adversary capabilities from a systems perspective. While a single target may be significant because of its own characteristics, the target’s real importance lies in its relationship to other targets within an operational system. A target system is most often considered as a collection of assets directed to perform a specific function or series of functions. While target systems are intra-dependent to perform a specific function, they are also interdependent in support of adversary capabilities (e.g., the electric power system may provide energy to run the adversary’s railroads that are a key component of their military logistic system). Target development links these multiple target systems and their components (targets) to reflect both their intra- and interdependency that, in aggregate, contribute to the adversary capabilities.”
–Citizens Against Harmful Technology (CAHT)

5) “Neuroscience captures $175 billion dollars annual market space…. The brain is the next battlespace…. We are targeting the brain…. We need to recon (the) target area (i.e., the domestic population) in order to: 1) acquire viable targets and 2) avoid collateral damage. Like (in) any race, the morbidity and mortality, going at this speed… is real.

We are tracking neurological or brain signatures of key targeted individuals that are thought to represent whole groups. If I understand how his or her brain works and do this on a broad enough scale, I can develop patterns and I can use this in ways that informs my intelligence; this force multiplies and synergizes my human intelligence (HUMINT), my signals intelligence (SIGINT), and my communications intelligence (COMINT). NEURINT (Neuro intelligence) coupled with assessment and access gives me these capabilities…. I can utilize neuro-pharmacologics and various forms of brain stimulation to extract information from key intelligence targets.”

-Dr. James Giordano, Professor of Neuroscience, Georgetown University, DARPA/U.S. Army Consultant Confessions of a High-Level Perp: Dr. James Giordano – Battlespace/Organized Stalking Applications of Neuroscience and Neuroweapons (2017 youtube lecture, my transcription and notes, and pdf)

6) NSA-whistleblower, Bill Binney: “NSA decided that with bulk acquisition of data, US citizens would be the first to have (all) their information collected . The rest of the world are now being treated like US citizens.

(This) falls back to the principles of totalitarianism and how dictators have operated down through the centuries. It’s know what your people are doing and find the ones who are not conforming to what you want them to do and then get rid of them. And that’s fundamentally what this process (Operation Stellar Wind and others) does.

.. this goes back to Caesar Augustus. Anybody that opposed him- you needed to know about it first of all, and once that happened, they would disappear. The same was true of the Soviet Union or East Germany with the Stasi. If you said anything out of line, you ended up in jail or in a sanitarium or something or in a gulag somewhere. The same was true of the Nazis and the Gestapo and SS.

This is the way totalitarian states operate. This gathering knowledge about people and the entire population is a totalitarian procedure. This is the domestic threat that our Constitution and the oath of office we took was given to prevent. No other country in the world could have done to us what we have done to ourselves.

This is the time when all good Americans need to stand up and oppose this. … these agencies are threatening what is fundamental to human rights everywhere. (We) have to ensure that we have some way of verifying and keeping these agencies in line.

Ex-NSA’s Bill Binney on Operation “Stellar Wind;” NSA’s Totalitarian, Global, Bulk Data Acquisition Spying Program; How NSA Surveilles You

7) James Angleton summed up his career in the CIA in a mid 1980’s interview with author, Joseph Trento:

“You know how I got to be in charge of counterintelligence? I agreed not to polygraph or require detailed background checks on (Wall Street lawyer and spy) Allen Dulles and 60 of his closest friends. The real problem, Angleton concluded, was that “there was no accountability. And without real accountability everything turned to xxxx.

You know, the CIA got tens of thousands of brave people killed… (ETK: Actually, the figure is estimated in the range of 6 to 30 million). We played with lives as if we owned them. We gave false hope. We – I – so misjudged what happened.

Fundamentally, the founding fathers of U.S. intelligence were liars. The better you lied and the more you betrayed, the more likely you would be promoted. These people attracted and promoted each other. Outside of their duplicity, the only thing they had in common was a desire for absolute power.

Allen Dulles, Richard Helms, Carmel Offie, and Frank Wisner were the grand masters. If you were in a room with them you were in a room full of people that you had to believe would deservedly end up in hell. I guess I will see them there soon.”

From Joseph Trento’s “The Secret History of the CIA,” (2001) pp. 478-47

8) “I toiled wholeheartedly in the vineyards because it was fun, fun, fun. Where else could a red-blooded American boy lie, kill and cheat, steal, deceive, rape and pillage with the sanction and blessing of the All-Highest?”

-Colonel George Hunter White, MKULTRA Operative, CIA/OSS (Office of Strategic Services)/FBN in his final report to Dr. Sidney Gottlieb, overseer of 4 CIA’s MKULTRA Programs, including “Midnight Climax”

9) The NSA Gave Israel Access to All US Citizens’ Communications Data, Leaked Docs Reveal

June 1, 2019: Headlines: “Most Valued Partner”: NSA fed Israel intel for targeted assassinations (against Lebonese civilians and civilian infrastructure), leaked docs show”

Israeli SIGINT ISNU (Israeli SIGINT National Unity)

Office of the Director of National Intelligence-

In 2009, a MOU gave Israel unrestricted access to all NSA data.

10) Over 20 Million Americans (Including President Trump) Illegally Targeted, Tracked, Stalked, Zapped with Directed Energy-Neuro Weapons, and Surveilled 24/7 According to FBI/CIA/NSA Whistleblower

Over 20 Million Americans (Including President Trump) Illegally Targeted, Tracked, Stalked, Zapped with Directed Energy-Neuro Weapons, and Surveilled 24/7 According to FBI/CIA/NSA Whistleblower

Circa News has been covering the alleged abuses of the intelligence community against Americans. They noted how the unmasking protocol for intercepts collected by the National Security Agency changed under the Obama administration, supposedly to better catch terrorists prepping for lone wolf attacks, could open Americans up to political espionage. Then, they wrote about how the FBI may have illegally shared spy data on Americans with unauthorized parties who did not have clearance to view such information. The Foreign Intelligence Surveillance Court (FISA) wrote a ten-page ruling listing hundreds of privacy violations committed by the FBI when gathering information during the tenure of then-FBI Director James Comey. Now, a former NSA contractor has filed a lawsuit against James Comey, allegedly a covering up the illegal methods that are being used to monitor Americans and violate their constitutional privacy rights.

The (CIA and NSA) contractor Dennis Montgomery reportedly took multiple hard drives containing 600 million classified documents to prove how the intelligence community is violating Americans’ privacy. He was granted immunity, but the FBI never followed through. The FBI has documentation of them taking possession of the hard drives. Montgomery alleges that over 20 million Americans’ identities were illegally unmasked:

A former U.S. intelligence contractor tells Circa he walked away with more than 600 million classified documents on 47 hard drives from the National Security Agency and the CIA, a haul potentially larger than Edward Snowden’s now infamous breach.

And now he is suing former FBI Director James Comey and other government figures, alleging the bureau has covered up evidence he provided them showing widespread spying on Americans that violated civil liberties.

The suit, filed late Monday night [June 12] by Dennis Montgomery, was assigned to the same federal judge who has already ruled that some of the NSA’s collection of data on Americans violates the U.S. Constitution’s Fourth Amendment, setting up an intriguing legal proceeding in the nation’s capital this summer.

Montgomery alleges that more than 20 million American identities were illegally unmasked – credit reports, emails, phone conversations and Internet traffic, and bank account numbers were some of the items the NSA and CIA collected.

11) From US Geospatial Intelligence Foundation (GEOINT) (a not-for profit, tax exempt 501-c-3 corporation- which includes DOD, tech companies, intelligence agencies-corporations)…. Symposium (2014):

at 14:00: DJ Welsh (Moderator):

Reads from Final Report of GEOINT symposium: Written by intelligence professionals… re: multi-INT persistent surveillance….. This is network centric warfare where each person is a human network node on the Global Information Grid.

Welsh: Global data collection is being accelerated on every level. Human beings are being transformed into nodes on the Global Information Grid. As far as this network centric-Artificial Intelligence system is concerned, you will be reduced to the sum total of the data collected on you. And that is the end game in the quest to control more than 7 billion people on the planet…… “Mastering the Human Domain.”

They’re collecting everything (data on everybody). Their customers are the proponents of global government. Their adversaries appear to be the unbridled masses of humanity.

This could also be considered gang stalking. From the perspective of intelligence and law enforcement agencies and corporations which use organized gang stalking as a secret and illegal weapon for subversion… the perfect operation in this context is one in which the target becomes progressively isolated, impoverished, emotionally degraded and eventually seeks what appears to be the only available outlet, suicide.”

5 DJ Welsh Youtubes On Takedown of Humanity: “JADE” in Jade Helm 15 Is A.I. SOFTWARE/ SOCOM’s (Special Operations Command’s) ‘ARSOF’ OPERATING CONCEPT 2022/Militarization of Police (1033 Program & Exec. Order 13684)/2015 GEOINT Symposium

5 DJ Welsh Youtubes On Takedown of Humanity: “JADE” in Jade Helm 15 Is A.I. SOFTWARE/ SOCOM’s (Special Operations Command’s) ‘ARSOF’ OPERATING CONCEPT 2022/Militarization of Police (1033 Program & Exec. Order 13684)/2015 GEOINT Symposium

12) Preston James, PhD. You are the Enemy

“There is now a New American War. It is inside America. It is called the “War on Terror”. The enemy is YOU! It is a staged, Phony War that has been created by the International Zionist Crime Syndicate (IZCS).

Every Military Force needs an enemy. Without an ongoing or perpetual war, the War profiteers quickly go bankrupt. In order to keep their profit stream going from war, war-profiteers need to create successive new wars or a significant threat of impending war.

This new War on Terror has been socially engineered to provide a continual stream of degradations and provocations against the average American, provoking many in a never-ending stream to resist, and causing them to be labeled dissenters. Once they have been labeled dissenters they are put on a Department of Homeland Security (DHS) Main Core Terror Watch List, which top insiders know is a targeted assassination list for later eradication of all Freedom-loving Americans who want to restore the American Constitutional Republic.

At present the Main Core list has over ten million Americans on it, and it is growing every day with thousands of new additions. Get a ticket for a driving offense or any arrest (even if later proven innocent) and it is highly likely you will be placed on this Main Core Terror Watch and Assassination list.

Over time these provocations are designed to result in a continuing stream of America dissenters that want to take their Republic back from the zionist hijackers and will meet DHS tyranny and force with the like. Any and all Dissenters are now being defined as “Enemies of the State”.

… the Department of Homeland Security is now recognized as a major IZCS beach-head inside America and part of a long term plan to establish a foreign controlled IZCS neo-Bolshevik military force inside America to tyrannize, wage war against, and eventually serially mass murder most Americans.

This is why some top insiders refer to DHS as the New American Gestapo or Stasi. Some see it now morphing into a New Red Cheka mass-murder machine for dispensing Bolshevik-style Red Terror and the serial mass-murder of Americans.

The War on Terror is obviously a Phony. But it has been the greatest boon to the American Defense Complex ever, with many times more net American Taxpayer dollars spent on this war than any other war in history, including WW2 or the Vietnam War.”

-Preston James, Ph.D., (YOU Are THE ENEMY, Veterans Today (2014)

At spiritual level:

John 4:4: Ye are of God, little children, and have overcome them: because greater is he that is in you, than he that is in the world.

We have to stand up and tell the truth! We have to wake up. If you are Christian and a truth-teller, the devil hates you because you walk in truth and he is the author of lies.

At political level…..

1) “Should the practice of Spydom become universal, farewell to all domestic confidence and happiness.” -London Times, Christmas 1859

(ETK comment: “The practice of Spydom” has become universal.)

3) “I will splinter the CIA into a thousand pieces and scatter it into the wind.” – President John F. Kennedy, shortly before his assassination (by the CIA and others) on Nov. 22, 1963

4) “It is the function of the CIA to keep the world unstable, and to propagandize the American people to hate, so we will let the establishment spend any amount of money on arms….”

-John Stockwell, Ex-CIA Station Chief and highest CIA employee to “go public” (EX-CIA Whistleblower, John Stockwell: “US Fascist Shadow Government, CIA Secret Wars and Drug Running, Gulf War I and NWO, JFK Assassination, etc. (1986, 1989, 1991)

5) “Intelligence operations have turned out to be a domestic war.”…. “Abolish the CIA and Covert Action: The Organizing Committee demands the CIA and covert action be abolished not only because we recognize that the CIA serves only the multinational corporate empire, which is thoroughly antidemocratic and unAmerican, but also because the CIA is a criminal organization and covert actions are criminal actions.” -(From CounterSpy, 1976)

((Declassified “CounterSpy” Magazine (1973-1984) Issues Expose U.S. Government-CIA-FBI Criminal/Terrorist Operations Worldwide)

1) “Why, of course, the people don’t want war. Why would some poor slob on a farm want to risk his life in a war when the best that he can get out of it is to come back to his farm in one piece. Naturally, the common people don’t want war; neither in Russia nor in England nor in America, nor for that matter in Germany. That is understood. But, after all, it is the leaders of the country who determine the policy and it is always a simple matter to drag the people along, whether it is a democracy or a fascist dictatorship or a Parliament or a Communist dictatorship…

Voice or no voice, the people can always be brought to the bidding of the leaders. That is easy. All you have to do is tell them they are being attacked and denounce the pacifists for lack of patriotism and exposing the country to danger. It works the same way in any country.”

– Hermann Goering (as told to Gustav Gilbert during the Nuremberg trials)

1) “If you tell a lie big enough and keep repeating it, people will eventually come to believe it. The lie can be maintained only for such time as the State can shield the people from the political, economic and/or military consequences of the lie. It thus becomes vitally important for the State to use all of its powers to repress dissent, for the truth is the mortal enemy of the lie, and thus by extension, the truth is the greatest enemy of the State.”

-Joseph Goebbels, Reich Minister of Propaganda of Nazi Germany

If both the past and the external world exist only in the mind, and if the mind itself is controllable- what then?
Who controls the past controls the future; who controls the present controls the past.

George Orwell, 1984

There will be in the next generation or so a pharmacological method of making people love their servitude and producing dictatorship without tears so to speak. Producing a kind of painless concentration camp for entire societies so that people will in fact have their liberties taken away from them, but will rather enjoy it, because they will be distracted from any desire to rebel – by propaganda, or brainwashing, or brainwashing enhanced by pharmacological methods. And this seems to be the final revolution.

Aldous Huxley, Committee of 300, Tavistock agent, 1961.

Dr. John Coleman:

Allen Dulles: 1953:

In 1953, (CIA Director Allen) Dulles, speaking before a national meeting of Princeton alumni, distinguished two fronts in the then-current “battle for men’s minds”: a “first front” of mass indoctrination through censorship and propaganda, and a “second front” of individual “brainwashing” and “brain changing.” Before an audience of fellow Ivy Leaguers, Dulles skipped the usual pieties about democracy. The same year, Dulles approved the CIA’s notorious MKULTRA project, and exempted it from normal CIA financial controls.

Alex Constantine, Psychic Dictatorship in the U.S.A. 1995

11) “We have been compelled to create a permanent armaments industry of vast proportions. Added to this, three and a half million men and women are directly engaged in the defense establishment. We annually spend on military security more than the net income of all United States corporations.

…. we have been compelled to create a permanent armaments industry of vast proportions. This conjunction of an immense military establishment and a large arms industry is new in the American experience. The total influence – economic, political, even spiritual – is felt in every city, every Statehouse, every office of the Federal government. We recognize the imperative need for this development. Yet we must not fail to comprehend its grave implications. Our toil, resources and livelihood are all involved; so is the very structure of our society.

In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist.

We must never let the weight of this combination endanger our liberties or democratic processes. We should take nothing for granted. Only an alert and knowledgeable citizenry can compel the proper meshing of the huge industrial and military machinery of defense with our peaceful methods and goals, so that security and liberty may prosper together.

(ETK Comment: That the “military-industrial complex” has now executed a successful coup (overthrow) of the American government is evidenced by the fact that “alert and knowledgeable citizens” are now targeted as “enemies of the state.”)

6) “As a Targeted Individual, you are attacked by many forces from all sides. You are an enemy of the state. This is called Joint Targeting. This military strategy is described in these military documents. You are a MILITARY TARGET.

Joint Publication 3-60: Joint Targeting (Joint Chiefs of Staff, 2007) (pdf)
Joint Publication 3-60: Joint Targeting (2013) (pdf)
JP-3-60 Joint Targeting and US Targeted Killings (Joint Chiefs of Staff, 2013)

These documents describe how and why you are chosen as a Target. They even describe why your immediate and extended family is attacked as well:

“Target development always approaches adversary capabilities from a systems perspective. While a single target may be significant because of its own characteristics, the target’s real importance lies in its relationship to other targets within an operational system. A target system is most often considered as a collection of assets directed to perform a specific function or series of functions. While target systems are intra-dependent to perform a specific function, they are also interdependent in support of adversary capabilities (e.g., the electric power system may provide energy to run the adversary’s railroads that are a key component of their military logistic system). Target development links these multiple target systems and their components (targets) to reflect both their intra- and interdependency that, in aggregate, contribute to the adversary capabilities.”
–Citizens Against Harmful Technology (CAHT)

5) “Neuroscience captures $175 billion dollars annual market space…. The brain is the next battlespace…. We are targeting the brain…. We need to recon (the) target area (i.e., the domestic population) in order to: 1) acquire viable targets and 2) avoid collateral damage. Like (in) any race, the morbidity and mortality, going at this speed… is real.

We are tracking neurological or brain signatures of key targeted individuals that are thought to represent whole groups. If I understand how his or her brain works and do this on a broad enough scale, I can develop patterns and I can use this in ways that informs my intelligence; this force multiplies and synergizes my human intelligence (HUMINT), my signals intelligence (SIGINT), and my communications intelligence (COMINT). NEURINT (Neuro intelligence) coupled with assessment and access gives me these capabilities…. I can utilize neuro-pharmacologics and various forms of brain stimulation to extract information from key intelligence targets.”

-Dr. James Giordano, Professor of Neuroscience, Georgetown University, DARPA/U.S. Army Consultant Confessions of a High-Level Perp: Dr. James Giordano – Battlespace/Organized Stalking Applications of Neuroscience and Neuroweapons (2017 youtube lecture, my transcription and notes, and pdf)

“Quaisi-quantitative Equation: In science we seek to describe, classify, and quantify…..

Here is quasi-quantitative equation that helps describe and classify G5 (Global Gestapo: Government Gangstalking Genocide)

G5 = Global Government Gestapo Gangstalking Genocide = 4GW (4th Generation Warfare) =

(S15 + T7 + M12 + N6 + 5D + 17PDHSFBISD + 9I + P9 + C18) ÷ R3T3

G5 = (Global Government Gestapo Gangstalking Genocidal Operation)

What, Who, Why:

S15 = satellite-supercomputer-synchronized surveillance, stalking, street theatre, Stasi-DHS-security services-special forces-secret spying, subjugation and slavery (of targets) with secret weapons*

T7- tracking, targeting, terrorism, torture, termination, and transhumanism technologies (used against targets)

M12= microwave-microchip-mind control, mind-zapping and mind-mapping by Mossad- and Milgram-manipulated military and mafia minions (against targets)

N6 = (CIA-DODs) no-touch torture, nonlethal weapons and neuroweapons* and wielded by National Security Racketeering Network and Neighborhood Death Squads (against targets)

5D = 5 D’s of the United Kingdom’s General Communications Headquarters (GCHQ) are “Deny, Deceive, Disrupt, Degrade, and Destroy” (the target.)

+17D = (Pentagon-Department of Homeland Security-FBI-Stasi Supplementary Ds) = deprive, discredit, defeat, defame, destabilize, deter, decompose, disintegrate, deconstruct, denigrate, devolve, damn, devastate, dehumanize, demonize, deprecate, de-legitimize (the Target)

9I = implant, isolate, intimidate, incarcerate, institutionalize, immobilize, irritate, insult, infiltrate (the target)

Who, What, How, Why (Perpetrators and Technology)

P9= Pentagon (POG) psychological operations groups’ profiling, psychological warfare, psy-acts, psychotronics, and psychology professions’ psychiatric reprisal (against targets)

C18 = corrupt, cruel, clueless, cell-phone-carrying cowardly citizen-spies coordinated by “counter-intelligence,” “counter-terrorism, Fusion Centers, cops, and corporate criminals, and C4ISR* causing civil conflict (*C4ISR = command, control, communications, computers, intelligence, surveillance, reconnaissance)

Denominator:

R3T3 = resolve, resilience, resources of targeted truth tellers

Explanatory/subsidiary equations

SW (secret weapons) = MC (mind control) + DEW (directed energy (electromagnetic frequency or EMF) weapons) + RNM (remote neural manipulation) + BCI (brain-computer-interface) + BBI (brain to brain interface) + MEG (magnetoencephalography)- brain recording applications. _ neuro-pharmacologics (drugs)- (remote brain stimulation)- biotracking- through brain “signatures”- The interface combines electroencephalography (EEG) to record brain signals and transcranial magnetic stimulation (TMS) to deliver information noninvasively to the brain.

According to neuroscientists and “neuro-ethicist”, Georgetown University professor and DARPA-Pentagon consultant, Dr. James Giordano, in his lecture on Battlespace Neuroscience (this website):

c) closed-loop brain stimulation approaches (implants and transcranial and magnetic electrical stimulation), and

24) “Weaponizable neuroscience technologies” allow us to:

a) assess, predict and control particular cognitions, emotions, and behavior of adversaries,
b) mitigate aggression and foster cognitions, emotions and/or behaviors of affiliation or passivity in enemies,
c) induce morbidity, disability, or suffering and thus, “neutralize” enemies and/or potential opponents, or
d) induce mortality, that is, kill adversaries.
25) Nonlethal Weapons are now being used on an international scale.
26) In-close pharmaceuticals and organic neurotoxins (“weapons of mass disruption”) can deliver specific effects to individuals, altering cognition, emotionality, leadership potential, and behavior. These create social disruption on various scales, from the individual to the group to larger population.
27) Ultra-low dose/high specific agents are useful for targeting diplomatic/local culture “hearts and minds.”
28) High morbidity neuro-microbiological agents are deployed to make people sick.
29) These weapons are used to target key individuals in various, different communities to produce statistical information useful in creating short- and long-war effects. “In a long-war scenario, I can reduce productivity and health of individuals, communities, and nations.”
30) Neuro-microbials with high neuro-psychiatric symptom clusters produce public panic/public health disintegrative effects.
31) Gene-edited microbiologicals have novel morbidity/mortality profiles.
32) Nano-neuroparticulate agents so small they go through brain-blood barriers are used to create a hemorrhage disposition in the brain, and thus, strokes. (ETK comment: Is this how Dr. Paul Marko was killed by a blood-clot in the brain- i.e., stroke?)
33) High CNS aggregation lead/carbon-silicate nanofibers are network disrupters. (ETK note: Here, is he referring to Morgellons Disease?).
34) Neurovascular hemorrhagic agents (for in-close and population use as “stroke epidemic” induction agents) are highly disruptive.
35) In combat operations, neuroweapon devices are highly evolving.
36) Neurosensory immobilizing agents include high-output sensory stimulators which can be administered by UAVs (unmanned aerial vehicles), drones, or insect borne, or by large vehicles such as cars or tanks. Sensory mobilizing agents use high electromagnetic pulse energy that may also use high levels of sound and light energy to disrupt neurosensory functions. These are being used.
37) Trans- and intracranial pulse stimulators use direct electromagnetic pulses to disrupt the network aggregation-network properties of the brain and create confusion. These are both individual and group disruptors. These neural network “confusion generators” can be hand held or delivered by UAV, drone, and insects.
38) In “Information War,” military/intelligence/National Security Forces deploy “neuro-Ops”, or altered reality tactics, that are also used in regular warfare. Transcranial mechanisms are used to disrupt people’s sense of time and place.
(ETK comment: Actually, the CIA and DOD had operationalized EDOM (Electronic Dissolution of Memory) and RHIC (Radio-Hypnotic Intracerebral Control) by 1962.)
39) Cortically-coupled neural temporal function alteration is accomplished by “time warpers”, another form of “Information Warfare.”
40) Pharmacologic neurostimulation is used to induce cognitive-emotional disruption, another form of “Information Warfare.”
41) Cyborgs are used in mixed Intell-Combat Ops/Information Warfare. Neuro-modified “cyborg” systems include the DARPA “Beetle” and the Dragon flEYE.
42) “There are now dedicated efforts by numerous states that are keenly investing in the development of these neuroscience technologies. Similar efforts are also being developed by independent actors, venture-capital funded individuals, and businesses that have an interest in developing these technologies to change the balance of power.”
43) “Thus, we need to identify risk scenarios that evolve from specified events, craft strategies for preemption, preparation, response, and amelioration, examine (setting, exploring, and exploiting) conditions at the operational level, across all elements, and the physical, cognitive and informational domains, create strategies that are relevant, durable, and can be targeted for demographics and psychographics in the face of severe culture impacts, and identify/plan a robust framework to remain effective and adaptive- and ethically sensitive and responsive- to a changing environment as risks to society co-evolve.”
And finally, we have Dr. James Giordano extols the uses of these neuro technologies for “intelligence acquisition,” arguing that they “uphold a higher moral conduct in the face of various forms of intelligence operations” (that is, other means of information extraction/enhanced interrogation/torture”). Dr. Giordano then gives lip service to and then more or less dismisses the neuro-ethical arguments.
44) “I can also use this for intelligence acquisition in different ways. I can utilize neuro-pharmacologics and various forms of brain stimulation to be able to extract information from key intelligence targets in ways that are far less deleterious and/or harmful to said targets and thus, uphold a higher moral conduct in the face of various forms of intelligence operations.
This is not without argument. Some think that the last sanctified space is that of my consciousness. And you are using this stuff to invade that? You’re right. There is an ethical argument there. Is this more or less harmful than other means of information extraction?

(ETK: Here, Giordano indirectly refers to “enhanced interrogation” (that is, torture) methods outlined in the CIA’s KUBARK torture manual. In effect, he is arguing that torture of civilians is permissible and that neurotech may “uphold a higher moral standard than other forms of torture.)

d) neuro-sensory augmentation devices, or bioengineering, to increase visual acumen to create cochlear and auditory implants- i.e., “eagle eye” or “bat’s ear.”

1) Big data bases (“Big Data”), such as accomplished by the NSA’s metadata collection operations, are a key component used for mapping patterns of individual brains and groups of brains.
2) Using neuroscience and technology in combination with “Big Data,” “we” (Giordano’s term) can affect the way humans think, feel and act. “We” can use this power to achieve “national defense” and “intelligence” agendas and to advance “our” ideologies and interests.
3) “We” can use the technologies of neuroscience as “soft weapons” and “hard weapons” to defeat, incapacitate, destroy, and kill individuals and groups.
4) Neuroscience and technologies are useful in the development of military PSYOPS (psychological operations) and Military Information Support Operations (MISO).
5) “Hard” neurotech weapons include drugs, chemical agents, biologicals (microbes and toxins), neuro-tech devices, and hybrid “cyborg” systems/”biological drones.”
6) Neuroscince captures $175 billion of annual market space.
7) To target the brain, we need to acquire viable targets and in doing so, try to reduce “collateral damage.”
(ETK note: “Targets” here are synonymous with “targeted individuals” (TIs) and non-consensual human experimentees.)
8) Neuroscience/technology research is currently like a superhighway or superspeedway and, according to Giordana:
“Like (in) any race, the morbidity and mortality, going at this speed, with this level of integrity and this level of momentum, is real.”
(Here, Giordana is apparently referring to the morbidity and mortality of experimental brain subjects, the “targeted individuals”).
9) “Assessment” technologies used to acquire “viable targets” and “avoid collateral damage” include:
a) neuro-imaging techniques, including computerized tomography, single-photon emission tomography, a highly specific electromagnetic (EM) pulsed signal to image brain areas and “tracks” (communicating networks and nodes within the brain),
b) neuro-physiological recordings such as electro-encephalograms (EEGs) in combination with quantitative techniques,
c) use of neurogenomics and genetics; neurogenetic profiles of individuals and groups,
d) neuroproteomics (biomarkers), and
e) neuro-cyber informatics- with computer applications is useful in manipulating what kinds of information are delivered to the brain.
(ETK note: Here, Giordana is apparently referring to Remote Neural Monitoring and Manipulation (RMN), among other techniques used in so-called IW, or Information Warfare).
10) Neuroscience/technology “Intervention” techniques include: a) cyber-linked neurocog manipulation (also presumably including “Remote Neural Monitoring and Remote Neural Manipulation”), b) novel Pharmaceuticals, c) neuro-microbiologicals, d) organic neurotoxins, and e) neurotechnologicals.
11) Neuroscience today is an “integrative” (interdisciplinary) science involving cyberscience/technology, Anthro-social sciences, Natural sciences, Biotechnology, Nanoscience/technology and has important applications in the fields of National Defense, Intelligence, and National Security.
12) The goal is to produce neuroscience applications and technologies that are scalable, customizable, accessible, sharable, and secure, so they can be deployed by multiple (anonymous or non-anonymous) “user-groups” that include state as well as non-state actors.
(ETK note: Perhaps this means that these programs and tools are being deployed by various government and private groups now engaging in organized stalking/electronic torture/mind control operations. Giordano has provided the rational, tools, and modus operandi of “GOG’S NeW GESSTTTTTAPO”)
13) Intelligence operators are harnessed to brain-machine interfacing systems so as to allow an increased capability through reciprocal dynamic robotics such that they can learn from each other and thereby improve performance.
(ETK note: Here, Giordana is apparently referring to CIA/DIA “hive mind teams” (the so-called “clones”) and Special Operations Groups personnel who utilize brain-to-computer and brain-to-brain technologies to continually monitor the brain states of TIs, as per the ‘Bryan Tew Hypothesis’ described on this website).
14) fmi/MEG (Magnetoencephalography) is used for brain recording applications.
15) Neuro-pharmacologics (drugs) are used for “affiliative enhancement” (ETK note: to make people more or less loyal to particular groups?).
16) (Remote) brain stimulation is used for cognitive stimulation. (I.e., again, this describes Remote Neural Manipulation (RNM)?)
17) Bio-tracking through brain “brain signatures” is accomplished. (Continual surveillance and tracking is a fundamental aspect of any TI’s targeting.)
18) Key targets that are tracked through their brain signatures are selected because they are thought to represent whole groups, and the resulting data, presumably representative of whole groups, is used to construct “neural narratives.” Data are “normalized” and fed back into “Big Data” computers. (ETK: This is also described in the Tew Hypothesis.)
19) TITAN (Tiered-integrated Tracking and Access Networks) utilizes biologically-implantable chips to track key individuals and provide information about the way brains work to create narratives and behaviors.
20) “We” (Giordano, DARPA, DOD, other neuroscientists etc.) put an individual’s “biometric data” into data bases.
21) Bio-sensors indwelling within targets can be uploaded (and read) remotely, yielding telemetrized information. This technology applies to RFID chips and the monitoring of key biological variables used in health-information data bases which can also be used for population monitoring, tracking and identification, etc.
22) These neuroscience/technologies increase military/intelligence “Human Intelligence” (HUMINT), “Signals Intelligence” (SIGINT), “Communications Intelligence” (COMINT), and “Neural Intelligence” (NEURINT) capabilities.
23) Neuroscience/technologies used to improve intelligence operators and warfighters’ (so-called “super-soldiers”) cognitive skills, emotional capabilities, and certain behaviors and actions include:
a) advanced neuro-pharmacological agents (drugs),
b) computational brain-machine interfaces,
c) closed-loop brain stimulation approaches (implants and transcranial and magnetic electrical stimulation), and
d) neuro-sensory augmentation devices, or bioengineering, to increase visual acumen to create cochlear and auditory implants- i.e., “eagle eye” or “bat’s ear.”

19) TITAN (Tiered-integrated Tracking and Access Networks) utilizes biologically-implantable chips to track key individuals and provide information about the way brains work to create narratives and behaviors.

WW (weather warfare) and N3:

NW (neuroweapons) = cyber-linked “neuro-cog”- pharmecueticals, neuro-microbiologicals, organic neurotoxins, and neurotechnologicals.

NSA “Big Data” HUMINT + SIGINT+ COMINT (communications intelligence) + NEURINT (neuro intelligence) + GEOINT (Geospatial intelligence) using satellites, GIG, conscious supercomputers- computer topography- remote capture and computer interpretation of EEGs (electro-encephalography) PSYOPs + RNM + BCI + BBI + MEG (magnetic encepholography) + neuro-cyber infomatics (computer manipulation of information delivered to the brain)

Fifth Column Groups of Synagogue Of Satan in America (Domestic Enemies):

1) Illuminati families- Rothschild, Rockefeller, Harriman Bush

2) Jews- Mossad-Sayanim- George Soros-Zbigniew Bzrezinski-Henry Kissinger (Illuminati agentur)

3) Masons (Scottish Rite Freemasons, of “Judaism for gentiles,” funded Tavistock and CIA’s top secret mind control program)

4) Satanists- Wicca, etc.

5) MKULTRA-MONARCH-mind controlled slaves- product of some 70 years of CIA-DOD mind control operations

6) Foreign Secret Societies (CFR, etc.)

7) Tavistock-City of London-Wall Street financial nexus

8) Foreign and American intelligence agencies (MI6, Mossad, CIA, NSA, FBI): Allen Dulles and Wall Street connection

9) Shock Troops of New World Order Psychologists (quote from Sir John Rawlings Reese)

10) Militarized Police

11) Civilian Secret Army (Obama’s Bill Clinton’s )

12) New Age Movement; basically a product of Britain and the Jews

13) Communist influences