ce399 | research archive: (electronic) mind control

David Duke’s CIA Connections

Posted in Uncategorized by ce399 on 30/04/2019

The below article is reprinted from People’s Weekly World, Long View Publishing Company, 235 West 23rd Street, New York, NY 1001L

by Tim Wheeler

David Duke, it is said, idolized his father, an engineer for Shell Oil Company, who, like his son, was a white supremacist. The father, David Hedger Duke, volunteered for service in Southeast Asia during the Vietnam War. He was sent to Laos as an agent of the U.S. State Department’s Agency for International Development (USAID.)

Young David, meanwhile, completed high school and enrolled at Louisiana State University, where he became notorious on “Free Speech Alley” for his racist and anti-Semitic harangues. Just before he dropped out of LSU, on March 4,1971, Duke was ordered to report for active duty. Selective Service records show that he was classified 1-A. But in a “highly unusual move,” reports Tyler Bridges of the Times-Picayune of New Orleans, “Duke was given a student deferment, March 18, even though he soon left school and didn’t return for eighteen months…None of the members of his draft board contacted said they knew why the injunction notice was rescinded.” When Bridges asked Duke why he hadn’t been drafted, Duke responded, “Well,I was in Laos during the war.” And indeed he was. He boasted that he spent nine months in Laos beginning in May 1971 flying twenty missions “behind enemy lines aboard CIA Air America transport planes, dropping supplies to CIA mercenary troops in the mountains. In attempting to debunk details of Duke’s story, critics only confirm the main point. Charles Green, for example, head of the Agency for International Development (AID) language school in Laos, said Duke served only six weeks as an English language instructor of Laotian army officers. Green claims he fired Duke when he walked into his classroom and saw that Duke had drawn a Molotov cocktail on the blackboard.

It is well known that the CIA used USAID as a cover for covert warfare in Southeast Asia. It is entirely plausible that David Duke was recruited as a covert agent of the CIA. That would explain why his induction into the military was mysteriously rescinded.

It would also explain Duke’s strange immunity in other criminal and terrorist activities. In September 1976 Duke was the sponsor of a conference of neo- Nazis and Klansmen at a hotel near his home in Métairies, an all-white suburb of New Orleans. When police arrived, Duke and his followers surrounded the squad car. Duke led the mob in chanting, “White Power.” Duke screamed at the officers, “You are a Jew. You work for the FBI. They are commie traitors and you are too.” The police radioed for help and Duke was among those arrested. He was tried but received a suspended sentence. Why?

On December 31,1980, Duke sat on a French quarter balcony in New Orleans with a convicted felon named Michael Perdue. According to Gwen Udell,a close friend of Duke’s who was there, the two men “hashed over Perdue’s plan to invade the Caribbean island of Dominica’ “ A small band of mercenaries would sail to the tiny black populated country, overthrow the government and set up a white supremacist junta,” reports the Times-Picayune, Perdue “dreamed of making millions by running a casino and exporting lumber.” Others say the real “export” was to be cocaine and other narcotics.

Duke reportedly helped Perdue find a charter boat to transport his mercenary commandos and put Perdue in touch with people who would finance the bizarre expedition, codenamed Operation Red Dog.

On April 27,1981, officers of the federal Bureau of Alcohol, Tobacco and Firearms arrested them just before they boarded the yacht in Lake Ponchartrain. Despite his ringleader role, Duke was not arrested. He was subpoenaed to appear before a grand jury, where he pleaded the Fifth Amendment, refusing to testify. Nine of the ten other conspirators, including Duke’s co-hort Klanman Don Black, were found guilty and served time in prison. Why was Duke let off?

Echelon: Exposing the Global Surveillance System (Covert Action Quarterly 2/1998)

Posted in Uncategorized by ce399 on 28/12/2012

3 and 16 March 1998: Link to original sources on Echelon

2 February 1998
Source: http://206.13.40.11/1996/dec/echelon.html
Thanks to IB

EXPOSING THE GLOBAL SURVEILLANCE SYSTEM

by Nicky Hager

This article is reprinted with the permission of CAQ [to Ham Radio Online] (CovertAction Quarterly). CAQ subscription information follows the article.

This article appears in CAQ with the following sidebar articles:

NSA’S BUSINESS PLAN: GLOBAL ACCESS by Duncan Campbell
GREENPEACE WARRIOR: WHY NO WARNING? by Nicky Hager
NZ’s PM Kept in the Dark by Nicky Hager
Nicky Hager’s book Secret Power is available from CAQ for $33.

IN THE LATE 1980’S, IN A DECISION IT PROBABLY REGRETS, THE U.S. PROMPTED NEW ZEALAND TO JOIN A NEW AND HIGHLY SECRET GLOBAL INTELLIGENCE SYSTEM. HAGER’S INVESTIGATION INTO IT AND HIS DISCOVERY OF THE ECHELON DICTIONARY HAS REVEALED ONE OF THE WORLD’S BIGGEST, MOST CLOSELY HELD INTELLIGENCE PROJECTS. THE SYSTEM ALLOWS SPY AGENCIES TO MONITOR MOST OF THE WORLD’S TELEPHONE, E-MAIL, AND TELEX COMMUNICATIONS.

For 40 years, New Zealand’s largest intelligence agency, the Government Communications Security Bureau (GCSB) the nation’s equivalent of the US National Security Agency (NSA) had been helping its Western allies to spy on countries throughout the Pacific region, without the knowledge of the New Zealand public or many of its highest elected officials. What the NSA did not know is that by the late 1980s, various intelligence staff had decided these activities had been too secret for too long, and were providing me with interviews and documents exposing New Zealand’s intelligence activities. Eventually, more than 50 people who work or have worked in intelligence and related fields agreed to be interviewed.

The activities they described made it possible to document, from the South Pacific, some alliance-wide systems and projects which have been kept secret elsewhere. Of these, by far the most important is ECHELON.

Designed and coordinated by NSA, the ECHELON system is used to intercept ordinary e-mail, fax, telex, and telephone communications carried over the world’s telecommunications networks. Unlike many of the electronic spy systems developed during the Cold War, ECHELON is designed primarily for non-military targets: governments, organizations, businesses, and individuals in virtually every country. It potentially affects every person communicating between (and sometimes within) countries anywhere in the world.

It is, of course, not a new idea that intelligence organizations tap into e-mail and other public telecommunications networks. What was new in the material leaked by the New Zealand intelligence staff was precise information on where the spying is done, how the system works, its capabilities and shortcomings, and many details such as the codenames.

The ECHELON system is not designed to eavesdrop on a particular individual’s e-mail or fax link. Rather, the system works by indiscriminately intercepting very large quantities of communications and using computers to identify and extract messages of interest from the mass of unwanted ones. A chain of secret interception facilities has been established around the world to tap into all the major components of the international telecommunications networks. Some monitor communications satellites, others land-based communications networks, and others radio communications. ECHELON links together all these facilities, providing the US and its allies with the ability to intercept a large proportion of the communications on the planet.

The computers at each station in the ECHELON network automatically search through the millions of messages intercepted for ones containing pre-programmed keywords. Keywords include all the names, localities, subjects, and so on that might be mentioned. Every word of every message intercepted at each station gets automatically searched whether or not a specific telephone number or e-mail address is on the list.

The thousands of simultaneous messages are read in “real time” as they pour into the station, hour after hour, day after day, as the computer finds intelligence needles in telecommunications haystacks.

SOMEONE IS LISTENING: The computers in stations around the globe are known, within the network, as the ECHELON Dictionaries. Computers that can automatically search through traffic for keywords have existed since at least the 1970s, but the ECHELON system was designed by NSA to interconnect all these computers and allow the stations to function as components of an integrated whole. The NSA and GCSB are bound together under the five-nation UKUSA signals intelligence agreement. The other three partners all with equally obscure names are the Government Communications Headquarters (GCHQ) in Britain, the Communications Security Establishment (CSE) in Canada, and the Defense Signals Directorate (DSD) in Australia.

The alliance, which grew from cooperative efforts during World War II to intercept radio transmissions, was formalized into the UKUSA agreement in 1948 and aimed primarily against the USSR. The five UKUSA agencies are today the largest intelligence organizations in their respective countries. With much of the world’s business occurring by fax, e-mail, and phone, spying on these communications receives the bulk of intelligence resources. For decades before the introduction of the ECHELON system, the UKUSA allies did intelligence collection operations for each other, but each agency usually processed and analyzed the intercept from its own stations.

Under ECHELON, a particular station’s Dictionary computer contains not only its parent agency’s chosen keywords, but also has lists entered in for other agencies. In New Zealand’s satellite interception station at Waihopai (in the South Island), for example, the computer has separate search lists for the NSA, GCHQ, DSD, and CSE in addition to its own. Whenever the Dictionary encounters a message containing one of the agencies’ keywords, it automatically picks it and sends it directly to the headquarters of the agency concerned. No one in New Zealand screens, or even sees, the intelligence collected by the New Zealand station for the foreign agencies. Thus, the stations of the junior UKUSA allies function for the NSA no differently than if they were overtly NSA-run bases located on their soil.

The first component of the ECHELON network are stations specifically targeted on the international telecommunications satellites (Intelsats) used by the telephone companies of most countries. A ring of Intelsats is positioned around the world, stationary above the equator, each serving as a relay station for tens of thousands of simultaneous phone calls, fax, and e-mail. Five UKUSA stations have been established to intercept the communications carried by the Intelsats.

The British GCHQ station is located at the top of high cliffs above the sea at Morwenstow in Cornwall. Satellite dishes beside sprawling operations buildings point toward Intelsats above the Atlantic, Europe, and, inclined almost to the horizon, the Indian Ocean. An NSA station at Sugar Grove, located 250 kilometers southwest of Washington, DC, in the mountains of West Virginia, covers Atlantic Intelsats transmitting down toward North and South America. Another NSA station is in Washington State, 200 kilometers southwest of Seattle, inside the Army’s Yakima Firing Center. Its satellite dishes point out toward the Pacific Intelsats and to the east.

The job of intercepting Pacific Intelsat communications that cannot be intercepted at Yakima went to New Zealand and Australia. Their South Pacific location helps to ensure global interception. New Zealand provides the station at Waihopai and Australia supplies the Geraldton station in West Australia (which targets both Pacific and Indian Ocean Intelsats).

Each of the five stations’ Dictionary computers has a codename to distinguish it from others in the network. The Yakima station, for instance, located in desert country between the Saddle Mountains and Rattlesnake Hills, has the COWBOY Dictionary, while the Waihopai station has the FLINTLOCK Dictionary. These codenames are recorded at the beginning of every intercepted message, before it is transmitted around the ECHELON network, allowing analysts to recognize at which station the interception occurred.

New Zealand intelligence staff has been closely involved with the NSA’s Yakima station since 1981, when NSA pushed the GCSB to contribute to a project targeting Japanese embassy communications. Since then, all five UKUSA agencies have been responsible for monitoring diplomatic cables from all Japanese posts within the same segments of the globe they are assigned for general UKUSA monitoring. Until New Zealand’s integration into ECHELON with the opening of the Waihopai station in 1989, its share of the Japanese communications was intercepted at Yakima and sent unprocessed to the GCSB headquarters in Wellington for decryption, translation, and writing into UKUSA-format intelligence reports (the NSA provides the codebreaking programs).

“COMMUNICATION” THROUGH SATELLITES: The next component of the ECHELON system intercepts a range of satellite communications not carried by Intelsat.In addition to the UKUSA stations targeting Intelsat satellites, there are another five or more stations homing in on Russian and other regional communications satellites. These stations are Menwith Hill in northern England; Shoal Bay, outside Darwin in northern Australia (which targets Indonesian satellites); Leitrim, just south of Ottawa in Canada (which appears to intercept Latin American satellites); Bad Aibling in Germany; and Misawa in northern Japan.

A group of facilities that tap directly into land-based telecommunications systems is the final element of the ECHELON system. Besides satellite and radio, the other main method of transmitting large quantities of public, business, and government communications is a combination of water cables under the oceans and microwave networks over land. Heavy cables, laid across seabeds between countries, account for much of the world’s international communications. After they come out of the water and join land-based microwave networks they are very vulnerable to interception. The microwave networks are made up of chains of microwave towers relaying messages from hilltop to hilltop (always in line of sight) across the countryside. These networks shunt large quantities of communications across a country. Interception of them gives access to international undersea communications (once they surface) and to international communication trunk lines across continents. They are also an obvious target for large-scale interception of domestic communications.

Because the facilities required to intercept radio and satellite communications use large aerials and dishes that are difficult to hide for too long, that network is reasonably well documented. But all that is required to intercept land-based communication networks is a building situated along the microwave route or a hidden cable running underground from the legitimate network into some anonymous building, possibly far removed. Although it sounds technically very difficult, microwave interception from space by United States spy satellites also occurs.4 The worldwide network of facilities to intercept these communications is largely undocumented, and because New Zealand’s GCSB does not participate in this type of interception, my inside sources could not help either.

NO ONE IS SAFE FROM A MICROWAVE: A 1994 expos of the Canadian UKUSA agency, Spyworld, co-authored by one of its former staff, Mike Frost, gave the first insights into how a lot of foreign microwave interception is done (see p. 18). It described UKUSA “embassy collection” operations, where sophisticated receivers and processors are secretly transported to their countries’ overseas embassies in diplomatic bags and used to monitor various communications in foreign capitals.

Since most countries’ microwave networks converge on the capital city, embassy buildings can be an ideal site. Protected by diplomatic privilege, they allow interception in the heart of the target country. *6 The Canadian embassy collection was requested by the NSA to fill gaps in the American and British embassy collection operations, which were still occurring in many capitals around the world when Frost left the CSE in 1990. Separate sources in Australia have revealed that the DSD also engages in embassy collection. On the territory of UKUSA nations, the interception of land-based telecommunications appears to be done at special secret intelligence facilities. The US, UK, and Canada are geographically well placed to intercept the large amounts of the world’s communications that cross their territories.

The only public reference to the Dictionary system anywhere in the world was in relation to one of these facilities, run by the GCHQ in central London. In 1991, a former British GCHQ official spoke anonymously to Granada Television’s World in Action about the agency’s abuses of power. He told the program about an anonymous red brick building at 8 Palmer Street where GCHQ secretly intercepts every telex which passes into, out of, or through London, feeding them into powerful computers with a program known as “Dictionary.” The operation, he explained, is staffed by carefully vetted British Telecom people: “It’s nothing to do with national security. It’s because it’s not legal to take every single telex. And they take everything: the embassies, all the business deals, even the birthday greetings, they take everything. They feed it into the Dictionary.” What the documentary did not reveal is that Dictionary is not just a British system; it is UKUSA-wide.

Similarly, British researcher Duncan Campbell has described how the US Menwith Hill station in Britain taps directly into the British Telecom microwave network, which has actually been designed with several major microwave links converging on an isolated tower connected underground into the station.

The NSA Menwith Hill station, with 22 satellite terminals and more than 4.9 acres of buildings, is undoubtedly the largest and most powerful in the UKUSA network. Located in northern England, several thousand kilometers from the Persian Gulf, it was awarded the NSA’s “Station of the Year” prize for 1991 after its role in the Gulf War. Menwith Hill assists in the interception of microwave communications in another way as well, by serving as a ground station for US electronic spy satellites. These intercept microwave trunk lines and short range communications such as military radios and walkie talkies. Other ground stations where the satellites’ information is fed into the global network are Pine Gap, run by the CIA near Alice Springs in central Australia and the Bad Aibling station in Germany. Among them, the various stations and operations making up the ECHELON network tap into all the main components of the world’s telecommunications networks. All of them, including a separate network of stations that intercepts long distance radio communications, have their own Dictionary computers connected into ECHELON.

In the early 1990s, opponents of the Menwith Hill station obtained large quantities of internal documents from the facility. Among the papers was a reference to an NSA computer system called Platform. The integration of all the UKUSA station computers into ECHELON probably occurred with the introduction of this system in the early 1980s. James Bamford wrote at that time about a new worldwide NSA computer network codenamed Platform “which will tie together 52 separate computer systems used throughout the world. Focal point, or `host environment,’ for the massive network will be the NSA headquarters at Fort Meade. Among those included in Platform will be the British SIGINT organization, GCHQ.”

LOOKING IN THE DICTIONARY: The Dictionary computers are connected via highly encrypted UKUSA communications that link back to computer data bases in the five agency headquarters. This is where all the intercepted messages selected by the Dictionaries end up. Each morning the specially “indoctrinated” signals intelligence analysts in Washington, Ottawa, Cheltenham, Canberra, and Wellington log on at their computer terminals and enter the Dictionary system. After keying in their security passwords, they reach a directory that lists the different categories of intercept available in the data bases, each with a four-digit code. For instance, 1911 might be Japanese diplomatic cables from Latin America (handled by the Canadian CSE), 3848 might be political communications from and about Nigeria, and 8182 might be any messages about distribution of encryption technology.

They select their subject category, get a “search result” showing how many messages have been caught in the ECHELON net on that subject, and then the day’s work begins. Analysts scroll through screen after screen of intercepted faxes, e-mail messages, etc. and, whenever a message appears worth reporting on, they select it from the rest to work on. If it is not in English, it is translated and then written into the standard format of intelligence reports produced anywhere within the UKUSA network either in entirety as a “report,” or as a summary or “gist.”

INFORMATION CONTROL: A highly organized system has been developed to control what is being searched for by each station and who can have access to it. This is at the heart of ECHELON operations and works as follows.

The individual station’s Dictionary computers do not simply have a long list of keywords to search for. And they do not send all the information into some huge database that participating agencies can dip into as they wish. It is much more controlled.

The search lists are organized into the same categories, referred to by the four digit numbers. Each agency decides its own categories according to its responsibilities for producing intelligence for the network. For GCSB, this means South Pacific governments, Japanese diplomatic, Russian Antarctic activities, and so on.

The agency then works out about 10 to 50 keywords for selection in each category. The keywords include such things as names of people, ships, organizations, country names, and subject names. They also include the known telex and fax numbers and Internet addresses of any individuals, businesses, organizations, and government offices that are targets. These are generally written as part of the message text and so are easily recognized by the Dictionary computers.

The agencies also specify combinations of keywords to help sift out communications of interest. For example, they might search for diplomatic cables containing both the words “Santiago” and “aid,” or cables containing the word “Santiago” but not “consul” (to avoid the masses of routine consular communications). It is these sets of words and numbers (and combinations), under a particular category, that get placed in the Dictionary computers. (Staff in the five agencies called Dictionary Managers enter and update the keyword search lists for each agency.)

The whole system, devised by the NSA, has been adopted completely by the other agencies. The Dictionary computers search through all the incoming messages and, whenever they encounter one with any of the agencies’ keywords, they select it. At the same time, the computer automatically notes technical details such as the time and place of interception on the piece of intercept so that analysts reading it, in whichever agency it is going to, know where it came from, and what it is. Finally, the computer writes the four-digit code (for the category with the keywords in that message) at the bottom of the message’s text. This is important. It means that when all the intercepted messages end up together in the database at one of the agency headquarters, the messages on a particular subject can be located again. Later, when the analyst using the Dictionary system selects the four- digit code for the category he or she wants, the computer simply searches through all the messages in the database for the ones which have been tagged with that number.

This system is very effective for controlling which agencies can get what from the global network because each agency only gets the intelligence out of the ECHELON system from its own numbers. It does not have any access to the raw intelligence coming out of the system to the other agencies. For example, although most of the GCSB’s intelligence production is primarily to serve the UKUSA alliance, New Zealand does not have access to the whole ECHELON network. The access it does have is strictly controlled. A New Zealand intelligence officer explained: “The agencies can all apply for numbers on each other’s Dictionaries. The hardest to deal with are the Americans. … [There are] more hoops to jump through, unless it is in their interest, in which case they’ll do it for you.”

There is only one agency which, by virtue of its size and role within the alliance, will have access to the full potential of the ECHELON system the agency that set it up. What is the system used for? Anyone listening to official “discussion” of intelligence could be forgiven for thinking that, since the end of the Cold War, the key targets of the massive UKUSA intelligence machine are terrorism, weapons proliferation, and economic intelligence. The idea that economic intelligence has become very important, in particular, has been carefully cultivated by intelligence agencies intent on preserving their post-Cold War budgets. It has become an article of faith in much discussion of intelligence. However, I have found no evidence that these are now the primary concerns of organizations such as NSA.

QUICKER INTELLIGENCE, SAME MISSION: A different story emerges after examining very detailed information I have been given about the intelligence New Zealand collects for the UKUSA allies and detailed descriptions of what is in the yards-deep intelligence reports New Zealand receives from its four allies each week. There is quite a lot of intelligence collected about potential terrorists, and there is quite a lot of economic intelligence, notably intensive monitoring of all the countries participating in GATT negotiations. But by far, the main priorities of the intelligence alliance continue to be political and military intelligence to assist the larger allies to pursue their interests around the world. Anyone and anything the particular governments are concerned about can become a target.

With capabilities so secret and so powerful, almost anything goes. For example, in June 1992, a group of current “highly placed intelligence operatives” from the British GCHQ spoke to the London Observer: “We feel we can no longer remain silent regarding that which we regard to be gross malpractice and negligence within the establishment in which we operate.” They gave as examples GCHQ interception of three charitable organizations, including Amnesty International and Christian Aid. As the Observer reported: “At any time GCHQ is able to home in on their communications for a routine target request,” the GCHQ source said. In the case of phone taps the procedure is known as Mantis. With telexes it is called Mayfly. By keying in a code relating to Third World aid, the source was able to demonstrate telex “fixes” on the three organizations. “It is then possible to key in a trigger word which enables us to home in on the telex communications whenever that word appears,” he said. “And we can read a pre-determined number of characters either side of the keyword.” Without actually naming it, this was a fairly precise description of how the ECHELON Dictionary system works. Again, what was not revealed in the publicity was that this is a UKUSA-wide system. The design of ECHELON means that the interception of these organizations could have occurred anywhere in the network, at any station where the GCHQ had requested that the four-digit code covering Third World aid be placed.

Note that these GCHQ officers mentioned that the system was being used for telephone calls. In New Zealand, ECHELON is used only to intercept written communications: fax, e-mail, and telex. The reason, according to intelligence staff, is that the agency does not have the staff to analyze large quantities of telephone conversations.

Mike Frost’s expos of Canadian “embassy collection” operations described the NSA computers they used, called Oratory, that can “listen” to telephone calls and recognize when keywords are spoken. Just as we can recognize words spoken in all the different tones and accents we encounter, so too, according to Frost, can these computers. Telephone calls containing keywords are automatically extracted from the masses of other calls and recorded digitally on magnetic tapes for analysts back at agency headquarters. However, high volume voice recognition computers will be technically difficult to perfect, and my New Zealand-based sources could not confirm that this capability exists. But, if or when it is perfected, the implications would be immense. It would mean that the UKUSA agencies could use machines to search through all the international telephone calls in the world, in the same way that they do written messages. If this equipment exists for use in embassy collection, it will presumably be used in all the stations throughout the ECHELON network. It is yet to be confirmed how extensively telephone communications are being targeted by the ECHELON stations for the other agencies.

The easiest pickings for the ECHELON system are the individuals, organizations, and governments that do not use encryption. In New Zealand’s area, for example, it has proved especially useful against already vulnerable South Pacific nations which do not use any coding, even for government communications (all these communications of New Zealand’s neighbors are supplied, unscreened, to its UKUSA allies). As a result of the revelations in my book, there is currently a project under way in the Pacific to promote and supply publicly available encryption software to vulnerable organizations such as democracy movements in countries with repressive governments. This is one practical way of curbing illegitimate uses of the ECHELON capabilities.

One final comment. All the newspapers, commentators, and “well placed sources” told the public that New Zealand was cut off from US intelligence in the mid-1980s. That was entirely untrue. The intelligence supply to New Zealand did not stop, and instead, the decade since has been a period of increased integration of New Zealand into the US system. Virtually everything the equipment, manuals, ways of operating, jargon, codes, and so on, used in the GCSB continues to be imported entirely from the larger allies (in practice, usually the NSA). As with the Australian and Canadian agencies, most of the priorities continue to come from the US, too.

The main thing that protects these agencies from change is their secrecy. On the day my book arrived in the book shops, without prior publicity, there was an all-day meeting of the intelligence bureaucrats in the prime minister’s department trying to decide if they could prevent it from being distributed. They eventually concluded, sensibly, that the political costs were too high. It is understandable that they were so agitated.

Throughout my research, I have faced official denials or governments refusing to comment on publicity about intelligence activities. Given the pervasive atmosphere of secrecy and stonewalling, it is always hard for the public to judge what is fact, what is speculation, and what is paranoia. Thus, in uncovering New Zealand’s role in the NSA-led alliance, my aim was to provide so much detail about the operations the technical systems, the daily work of individual staff members, and even the rooms in which they work inside intelligence facilities that readers could feel confident that they were getting close to the truth. I hope the information leaked by intelligence staff in New Zealand about UKUSA and its systems such as ECHELON will help lead to change.

CAQ SUBSCRIPTION INFORMATION

CAQ (CovertAction Quarterly) has won numerous awards for investigative journalism. In 1996, it won 4 of “Project Censored” top 25 awards for investigative reporting. CAQ is read around the world by investigative reporters, activists, scholars, intelligence buffs, news junkies, and anyone who wants to know the news and analysis behind the soundbites and headlines. Recommended by Noam Chomsky; targeted by the CIA.

Each article in the 64-page magazine, which is in its 19th year of publication, is extensively footnoted and accompanied by photographs and graphics.

For a single issue, send $6. A one year subscription: US $22; Canada/Mexico $27; Latin America/Europe $33; Other areas $35. A two year US subscription is $38.

Please send check or money order in $US to:
CAQ
1500 Massachusetts Ave. #732
Washington, DC 20005, USA

Mail, phone or fax Mastercard or Visa with address info and expiration date Phone: 202-331-9763 Fax: 202-331-9751 E-mail: caq@igc.org

CHECK OUT OUR WEB SITES

http://mediafilter.org/caq
http://www.worldmedia.com/caq

Army Research Grant to Explore Communication Through Brain Waves (American Forces Press Service 2008)

Posted in Uncategorized by ce399 on 09/07/2012

News American Forces Press Service  E-Mail A Copy | Printer Friendly | Latest News  News Article Army Research Grant to Explore Communication Through Brain Waves By Donna Miles American Forces Press Service

The 1982 Clint Eastwood thriller “Firefox” seemed like the ultimate military science fiction story: A former Vietnam War pilot steals a state-of-the-art Soviet fighter plane armed with weapons controlled solely by thought.

More than 25 years later, the Army is funding research to explore the futuristic concept of using brain waves to communicate.

The Army Research Office awarded a $4 million grant in mid-August to lay the scientific foundation it hopes will someday enable soldiers in the field to communicate through a deliberate thought process.

Elmar Schmeisser, ARO program manager, described the revolutionary concept in terms of the way today’s field soldiers communicate with radios. “You’ll press the button on your harness, you’ll think, then you’ll throw the button off,” he said.

Gone will be the microphone. Gone will be the receiver. The message will go directly from the soldier’s head into a computer programmed to decipher his brain waves, Schmeisser explained.

The result will be communication that’s silent, secure and free of background noise.

“If I record what you are saying from your brain wave, … it is automatically noise-free, clear and secure,” he said. “No one can overhear you, because you are not saying anything out loud, so it is an absolutely secure system.”

But getting to that point will require a monumental scientific breakthrough – something researchers at the University of California, Irvine, Carnegie Mellon University and the University of Maryland hope to work toward with the ARO grant.

It could take 15 or 20 years before technology gets to the point to support the system. “The mathematics behind this is fierce. It is really difficult,” Schmeisser said.

But if scientists are successful, they could bring tremendous capability to future soldiers, he said, while providing a huge side benefit as well. The technology could provide a way for soldiers with brain injuries – as well as civilians with neurological problems such as Lou Gehrig’s Disease – to communicate without speaking or writing, he said.

Test subjects for the project will don special caps that take electroencephalography, or EEG, signals sent out by their brains. The readings register as squiggles on a computer screen. The challenge for scientists is to figure out how to translate the squiggles into messages a computer can type out or speak.

The decoded thoughts – translated brain waves – would be transmitted using a system that points to the person intended to receive the message.

But getting to that point could take decades, Schmeisser said, because of the huge amount of brain activity that takes place at the same time, and the fact that no two people have the same EEG blueprint.

“What makes this difficult is that everyone’s brain is unique and everyone’s EEG is unique, just like everyone’s speech is unique,” he said. “So it has to be individualized for every person.”

But users also need to be trained to think in a way the system will understand, he said. “For this thing to have any chance of working at all, the individual has to learn to think clearly and loudly,” he said.

Schmeisser compared the system to a computer-based voice-recognition program that translates speech into text. “You have to speak slowly and clearly, and at the end you have a certain amount of accuracy,” he said. He noted a variety of factors that can interfere: nasal congestion, an unfamiliar accent or background noise.

“So you will have to think the same way and train the machine so it understands your particular pattern,” he said.

Schmeisser dismissed claims that the technology could be used to read people’s minds without their knowledge or consent. “This is not about mind reading. It doesn’t even think about ‘mind’ at all,” he said. “For this to work, you are going to have to be fully involved, and that is going to take time.”

The program is among the Army’s research projects intended to build the scientific foundation for future breakthroughs. “We’re looking at long-term goals,” Schmeisser said. “By putting research like this in place now, in 15 years you may be able to harvest that. This is not going to be operational in any real military sense for quite awhile.”

The grant for the program comes from the Defense Department’s Multidisciplinary University Research Initiative Program, which supports research involving more than one science and engineering discipline.

“In that synergy, you might be able to generate a breakthrough and research that will allow invention,” Schmeisser said. “So this program is not focused on creating inventions. It is focused on creating the basic science foundation from which inventions flow.”

Few other organizations are able invest in such high-risk ventures, despite the high payoff they could provide. “The Army is interested in these breakthrough technologies,” he said. “They are high-risk, and they may not pay off, but when they do, they pay off big.”

And in many cases, the payoffs not only benefit the military, but also have civilian applications. Schmeisser pointed to just a few technologies that started as Army research programs, lasers and radar among them.

“The spinout for military technology has been here since the Bronze Age, he said, pointing to how early man first developed weapons, then turned them into tools. “Fighting and the development of military technology is something humans have been doing as far back as we can record,” he said. “But the peacetime dividend of military development has been huge.”

Another long-term Army-funded program, still in its infancy, is exploring how to use genetically modified viruses to produce nanocircuitry. Angela Belcher, the chief scientist behind that effort, won the 2004 John D. and Catherine T. MacArthur Foundation Award for her efforts.

In addition to paving the way to low-cost production of nanoscale integrated circuits and other electronic components, Belcher’s program could also lead to a broad range of next-generation applications: medical implants and tissue growth, energy-efficient batteries and lighting, faster and smaller computers, detectors for hazardous agents and stronger armor for military craft, among them.   Related Sites: Army Research Office

http://www.defense.gov/News/newsarticle.aspx?id=51091

#MKULTRA The #CIA Program of Research into Behavior Modification US Senate (pdf file)

Posted in Uncategorized by ce399 on 04/07/2012

#Declassified Sensory Consequences of #Electromagnetic Pulses by Laser Plasmas #NavalResearch #UFlorida $514,175

Posted in Uncategorized by ce399 on 22/06/2012

Investigation of #ESP and its uses in #Intelligence: #CIA #DoD #STARGATE Program #SRI #SAIC (pdf file)

Posted in Uncategorized by ce399 on 19/06/2012

Emotional Abuse of Children #AndrewVachss (Parade Magazine 28/8/1994)

Posted in Uncategorized by ce399 on 16/06/2012

You Carry the Cure In Your Own Heart

Emotional abuse of children can lead, in adulthood, to addiction, rage, a severely damaged sense of self and an inability to truly bond with others. But—if it happened to you—there is a way out.

by Andrew Vachss
Originally published in Parade Magazine, August 28, 1994

The attorney and author Andrew Vachss has devoted his life to protecting children. We asked Vachss, an expert on the subject of child abuse, to examine perhaps one of its most complex and widespread forms—emotional abuse: What it is, what it does to children, what can be done about it. Vachss’ latest novel, “Down in the Zero,” just published by Knopf, depicts emotional abuse at its most monstrous.

Parade article cover photo

I’m a lawyer with an unusual specialty. My clients are all children—damaged, hurting children who have been sexually assaulted, physically abused, starved, ignored, abandoned and every other lousy thing one human can do to another. People who know what I do always ask: “What is the worst case you ever handled?” When you’re in a business where a baby who dies early may be the luckiest child in the family, there’s no easy answer. But I have thought about it—I think about it every day. My answer is that, of all the many forms of child abuse, emotional abuse may be the cruelest and longest-lasting of all.

Emotional abuse is the systematic diminishment of another. It may be intentional or subconscious (or both), but it is always a course of conduct, not a single event. It is designed to reduce a child’s self-concept to the point where the victim considers himself unworthy—unworthy of respect, unworthy of friendship, unworthy of the natural birthright of all children: love and protection.

Emotional abuse can be as deliberate as a gunshot: “You’re fat. You’re stupid. You’re ugly.”

Emotional abuse can be as random as the fallout from a nuclear explosion. In matrimonial battles, for example, the children all too often become the battlefield. I remember a young boy, barely into his teens, absently rubbing the fresh scars on his wrists. “It was the only way to make them all happy,” he said. His mother and father were locked in a bitter divorce battle, and each was demanding total loyalty and commitment from the child.

Emotional abuse can be active. Vicious belittling: “You’ll never be the success your brother was.” Deliberate humiliation: “You’re so stupid. I’m ashamed you’re my son.”

It also can be passive, the emotional equivalent of child neglect—a sin of omission, true, but one no less destructive.

And it may be a combination of the two, which increases the negative effects geometrically.

Emotional abuse can be verbal or behavioral, active or passive, frequent or occasional. Regardless, it is often as painful as physical assault. And, with rare exceptions, the pain lasts much longer. A parent’s love is so important to a child that withholding it can cause a “failure to thrive” condition similar to that of children who have been denied adequate nutrition.

Even the natural solace of siblings is denied to those victims of emotional abuse who have been designated as the family’s “target child.” The other children are quick to imitate their parents. Instead of learning the qualities every child will need as an adult—empathy, nurturing and protectiveness—they learn the viciousness of a pecking order. And so the cycle continues.

But whether as a deliberate target or an innocent bystander, the emotionally abused child inevitably struggles to “explain” the conduct of his abusers—and ends up struggling for survival in a quicksand of self-blame.

Emotional abuse is both the most pervasive and the least understood form of child maltreatment. Its victims are often dismissed simply because their wounds are not visible. In an era in which fresh disclosures of unspeakable child abuse are everyday fare, the pain and torment of those who experience “only” emotional abuse is often trivialized. We understand and accept that victims of physical or sexual abuse need both time and specialized treatment to heal. But when it comes to emotional abuse, we are more likely to believe the victims will “just get over it” when they become adults.

That assumption is dangerously wrong. Emotional abuse scars the heart and damages the soul. Like cancer, it does its most deadly work internally. And, like cancer, it can metastasize if untreated.

When it comes to damage, there is no real difference between physical, sexual and emotional abuse. All that distinguishes one from the other is the abuser’s choice of weapons. I remember a woman, a grandmother whose abusers had long since died, telling me that time had not conquered her pain. “It wasn’t just the incest,” she said quietly. “It was that he didn’t love me. If he loved me, he couldn’t have done that to me.”

But emotional abuse is unique because it is designed to make the victim feel guilty. Emotional abuse is repetitive and eventually cumulative behavior—very easy to imitate—and some victims later perpetuate the cycle with their own children. Although most victims courageously reject that response, their lives often are marked by a deep, pervasive sadness, a severely damaged self-concept and an inability to truly engage and bond with others.

We must renounce the lie that emotional abuse is good for children because it prepares them for a hard life in a tough world. I’ve met some individuals who were prepared for a hard life that way—I met them while they were doing life.

Emotionally abused children grow up with significantly altered perceptions so that they “see” behaviors—their own and others’—through a filter of distortion. Many emotionally abused children engage in a lifelong drive for the approval (which they translate as “love”) of others. So eager are they for love—and so convinced that they don’t deserve it—that they are prime candidates for abuse within intimate relationships.

The emotionally abused child can be heard inside every battered woman who insists: “It was my fault, really. I just seem to provoke him somehow.”

And the almost-inevitable failure of adult relationships reinforces that sense of unworthiness, compounding the felony, reverberating throughout the victim’s life.

Emotional abuse conditions the child to expect abuse in later life. Emotional abuse is a time bomb, but its effects are rarely visible, because the emotionally abused tend to implode, turning the anger against themselves. And when someone is outwardly successful in most areas of life, who looks within to see the hidden wounds?

Members of a therapy group may range widely in age, social class, ethnicity and occupation, but all display some form of self-destructive conduct: obesity, drug addiction, anorexia, bulimia, domestic violence, child abuse, attempted suicide, self-mutilation, depression and fits of rage. What brought them into treatment was their symptoms. But until they address the one thing that they have in common—a childhood of emotional abuse—true recovery is impossible.

One of the goals of any child-protective effort is to “break the cycle” of abuse. We should not delude ourselves that we are winning this battle simply because so few victims of emotional abuse become abusers themselves. Some emotionally abused children are programmed to fail so effectively that a part of their own personality “self-parents” by belittling and humiliating themselves.

The pain does not stop with adulthood. Indeed, for some, it worsens. I remember a young woman, an accomplished professional, charming and friendly, well-liked by all who knew her. She told me she would never have children. “I’d always be afraid I would act like them,” she said.

Unlike other forms of child abuse, emotional abuse is rarely denied by those who practice it. In fact, many actively defend their psychological brutality, asserting that a childhood of emotional abuse helped their children to “toughen up.” It is not enough for us to renounce the perverted notion that beating children produces good citizens—we must also renounce the lie that emotional abuse is good for children because it prepares them for a hard life in a tough world. I’ve met some individuals who were prepared for a hard life that way—I met them while they were doing life.

The primary weapons of emotional abusers is the deliberate infliction of guilt. They use guilt the same way a loan shark uses money: They don’t want the “debt” paid off, because they live quite happily on the “interest.”
When your self-concept has been shredded, when you have been deeply injured and made to feel the injury was all your fault, when you look for approval to those who can not or will not provide it—you play the role assigned to you by your abusers. It’s time to stop playing that role.

Because emotional abuse comes in so many forms (and so many disguises), recognition is the key to effective response. For example, when allegations of child sexual abuse surface, it is a particularly hideous form of emotional abuse to pressure the victim to recant, saying he or she is “hurting the family” by telling the truth. And precisely the same holds true when a child is pressured to sustain a lie by a “loving” parent.

Emotional abuse requires no physical conduct whatsoever. In one extraordinary case, a jury in Florida recognized the lethal potential of emotional abuse by finding a mother guilty of child abuse in connection with the suicide of her 17-year-old daughter, whom she had forced to work as a nude dancer (and had lived off her earnings).

Another rarely understood form of emotional abuse makes victims responsible for their own abuse by demanding that they “understand” the perpetrator. Telling a 12-year-old girl that she was an “enabler” of her own incest is emotional abuse at its most repulsive.

A particularly pernicious myth is that “healing requires forgiveness” of the abuser. For the victim of emotional abuse, the most viable form of help is self-help—and a victim handicapped by the need to “forgive” the abuser is a handicapped helper indeed. The most damaging mistake an emotional-abuse victim can make is to invest in the “rehabilitation” of the abuser. Too often this becomes still another wish that didn’t come true—and emotionally abused children will conclude that they deserve no better result.

The costs of emotional abuse cannot be measured by visible scars, but each victim loses some percentage of capacity. And that capacity remains lost so long as the victim is stuck in the cycle of “understanding” and “forgiveness.” The abuser has no “right” to forgiveness—such blessings can only be earned. And although the damage was done with words, true forgiveness can only be earned with deeds.

For those with an idealized notion of “family,” the task of refusing to accept the blame for their own victimization is even more difficult. For such searchers, the key to freedom is always truth—the real truth, not the distorted, self-serving version served by the abuser.

Emotional abuse threatens to become a national illness. The popularity of nasty, mean-spirited, personal-attack cruelty that passes for “entertainment” is but one example. If society is in the midst of moral and spiritual erosion, a “family” bedrocked on the emotional abuse of its children will not hold the line. And the tide shows no immediate signs of turning.

Effective treatment of emotional abusers depends on the motivation for the original conduct, insight into the roots of such conduct and the genuine desire to alter that conduct. For some abusers, seeing what they are doing to their child—or, better yet, feeling what they forced their child to feel—is enough to make them halt. Other abusers need help with strategies to deal with their own stress so that it doesn’t overload onto their children.

But for some emotional abusers, rehabilitation is not possible. For such people, manipulation is a way of life. They coldly and deliberately set up a “family” system in which the child can never manage to “earn” the parent’s love. In such situations, any emphasis on “healing the whole family” is doomed to failure.

If you are a victim of emotional abuse, there can be no self-help until you learn to self-reference. That means developing your own standards, deciding for yourself what “goodness” really is. Adopting the abuser’s calculated labels—”You’re crazy. You’re ungrateful. It didn’t happen the way you say”—only continues the cycle.

Adult survivors of emotional child abuse have only two life-choices: learn to self-reference or remain a victim. When your self-concept has been shredded, when you have been deeply injured and made to feel the injury was all your fault, when you look for approval to those who can not or will not provide it—you play the role assigned to you by your abusers.

It’s time to stop playing that role, time to write your own script. Victims of emotional abuse carry the cure in their own hearts and souls. Salvation means learning self-respect, earning the respect of others and making that respect the absolutely irreducible minimum requirement for all intimate relationships. For the emotionally abused child, healing does come down to “forgiveness”—forgiveness of yourself.

How you forgive yourself is as individual as you are. But knowing you deserve to be loved and respected and empowering yourself with a commitment to try is more than half the battle. Much more.

And it is never too soon—or too late—to start.

http://www.vachss.com/av_dispatches/disp_9408_a.html

Space Weapon Stirs Debate Over Possible Offensive Use [On Earth] (NYT 22/2/1987)

February 22, 1987

A debate has developed over whether the space weapon envisioned by the Reagan Administration for the first phase of its plan for a defense against missiles could strike offensively at targets in orbit and on earth.

Scientists and space experts who are critical of the ”Star Wars” plan say the weapon’s potential for offensive use could upset the balance of power and promote war rather than deter it.

Advocates of the antimissile system strongly disagree, saying any offensive roles for the weapon are either limited or nonexistent.

A Homing Rocket

The weapon at issue is a homing rocket meant to destroy targets by smashing into them. Administration officials see it as the first line of defense in a rudimentary antimissile system being considered for possible early deployment in the 1990’s. Constellations of such arms would orbit over the Soviet Union to knock out rising Soviet missiles.

But scientists, many of them critics of the antimissile program, say such weapons could also attack Soviet satellites and battle stations in space.

Moreover, they add, such weapons could be modified so their warheads could enter the earth’s atmosphere to knock out Soviet planes, radars and possibly even missiles in underground silos.

For many attacks, critics say, the weapon is far superior to the lasers, particle beams and other futuristic arms being studied for eventual deployment in what President Reagan calls his Strategic Defense Initiative.

”For certain ground targets, it’s the best offensive weapon” in a panoply of technologies, said Dr. Peter D. Zimmerman, a physicist and senior associate at the Carnegie Endowment for International Peace in Washington.

Dr. Harvey L. Lynch, a physicist at the Center for International Security and Arms Control of Stanford University, said, ”If the Soviets decided to deploy such a thing, people like Caspar Weinberger would be having fits.” Defense Secretary Weinberger is one of the strongest supporters of ”Star Wars.”

The Soviet Union has consistently said that the proposed antimissile weapons had an offensive purpose and that the United States was seeking strategic superiority and the ability to conduct a nuclear surprise attack.

Advocates of the system disagree, saying that most offensive applications of the proposed space weapons are illusory and that the critics are raising farfetched notions that ignore the laws of physics.

”They’re trying to throw a political scare into people,” Lieut. Gen. Daniel O. Graham, retired, of the Army, said of the charges that the system would have offensive potential. General Graham directs High Frontier, a Washington lobbying group that favors the plan.

Lieut. Gen. James A. Abrahamson of the Air Force, director of the Pentagon’s Strategic Defense Initiative Organization, said that attacks on ground targets were physically impossible with the envisioned space weapon and that his program would never make the technical changes needed to give it an offensive potential. ‘It’s a Red Herring’

”Why we would want to do that is absolutely beyond me,” he said, stressing that the whole point of the program was defense. ”It’s a red herring.”

Despite such assurances, a growing number of groups and individuals are studying whether space arms have possible offensive roles. Secret reports have been completed by the National Academy of Sciences and by the Rand Corporation, a California research organization that studies military issues for the Pentagon. Last week the American Association for the Advancement of Science held a public symposium on the topic at its annual meeting.

So, too, Pentagon officials are said to be quietly assessing the question, if only to consider potential enemy threats. ”They would be remiss if they didn’t look at this stuff,” said Robert English, a senior analyst with the Committee for National Security in Washington, who was a Pentagon policy analyst from 1982 to 1985.

Scientists who study the offense issue say space lasers, whose concentrated beams of light were once viewed as powerful enough to set cities on fire, have lost some of their luster. Dr. Lynch, the Stanford physicist, has calculated that clouds, pollutants and atmospheric distortions could sap most of a laser beam’s power. Although lasers are potentially capable of striking airplanes in flight, they are essentially useless against cities and military targets on earth, Dr. Lynch said.

Doubling of Weapon Funds

In contrast, the space weapon now at the forefront of the Administration’s antimissile quest has considerable potential for earth strikes, according to some scientists.

The power of the weapon’s warhead comes from the energy of its motion when it hits a target – its kinetic energy – rather than chemical or nuclear explosives. According to Defense Week, an industry publication, funds for research on the weapon are to more than double next year, going to $303 million from $126 million.

For defense, the rocket would be fired from an orbiting weapon platform and its small warhead, equipped with heat-seeking sensors, would track rising missiles, destroying them on impact. Several hundred and perhaps even thousands of platforms would have to continuously orbit the earth, a small fraction of them over Soviet missile fields at any given time.

Both advocates and opponents of the weapon say that at least some offensive potentials are inescapable. For instance, the kinetic warhead, speeding through the void of space, could be directed to knock out enemy satellites. ”You’re going to have that capability whether you want it or not,” said General Graham of High Frontier.

Dr. Ashton B. Carter, a Harvard physicist and consultant to the Defense Department, said the weapon also posed a threat to space-based battle stations. ”People interested in defense should be worried about such developments,” he said. ”Every technical advance is not necessarily good news.”

If modified, the kinetic warhead could also enter the earth’s atmosphere to attack planes, military facilities and possibly even ”hardened” missile silos, according to critics of the program. They add that kinetic weapons designed for offense might look no different from defensive ones.

”The kinds of kinetic kill vehicles that have been proposed for use in a first generation S.D.I. system can be redesigned and rejiggered for offensive” strikes against ground targets, Dr. Zimmerman of the Carnegie Endowment told the the American Association for the Advancement of Science.

The main modifications, he said, would be to increase the weight of the warhead and to improve the system to guide it. He added that it would reach earth targets in two or three minutes.

After the space-based warhead was launched, he said, the platform would track it and send guidance data with laser beams so the warhead was well-aimed prior to re-entry into the earth’s atmosphere. On average these warheads would miss their targets by about 80 yards, he noted, ”which is obviously too big for most uses.”

To increase accuracy, Dr. Zimmerman said, the warhead could be equipped with its own internal guidance system for the final phase of the flight, which would ”bring the miss distance down” to a few yards. He noted that the huge kinetic energy of the inert warhead would cause it to flash ”into a fireball” when it slammed into an earth target. He said such a weapon would have ”real capabilites against soft and soft-ish ground targets” such as radar installations, and it could also knock out planes.

Other experts say kinetic weapons could be used to launch space-based strikes against ”hardened” military targets, including the concrete-and-steel silos that house nuclear missiles.

Gary Hudson, president of Pacific American Launch Systems in Redwood City, Calif., a private company that develops rocket launchers for commercial payloads, said he once conducted a private study of space-based kinetic arms made of long rods of dense material such as uranium and tungsten.

”There’s no question about silo busting,” he said. ”You’re talking about penetrations of 150 to 200 feet in solid granite.” He added that in the 1970’s the Air Force, in a secret program code-named Trim, also considered the use of dense rods to destroy missile silos.

Speaking on the condition of anonymity, a Pentagon consultant who studies offensive roles of space arms for the Pentagon said plans for using kinetic weapons were feasible, but he questioned whether they made economic sense.

”Whether they can be used profitably for ground attack, against silos and other targets, in a cost-effective way is very problematic,” he said. ”Putting heavy things is space is extraordinarily expensive.”

Scientists critical of the antimissile plan say the easiest way to get around the weight problem is simply to equip space-based rockets with nuclear warheads, which long ago were adapted to the rigors of atmospheric re-entry. Such a move is banned by treaty, Dr. Caroline Herzenberg, a physicist at the Argonne National Laboratory in Argonne, Ill., told the meeting of the American Association for the Advancement of Science. But she added that it could ”unfortunately be accomplished surreptitiously.”

General Abrahamson of the Pentagon’s antimissile office said that all potential plans for attacking targets on earth required extensive modifications to kinetic space weapons and that the arms, as now conceived, would burn up if fired into the atmosphere. Even with weapon changes, he said, successful attacks on missile silos would be unlikely, although he conceded that strikes on airplanes were possible.

He emphasized, however, that the whole trend of the kinetic weapon program was to make warheads smaller and smaller, thus making the possibility of ground strikes ever more remote.

Moreover, he said, no weapon modifications could ever be made surreptitiously because the open nature of American society meant that all such plans would eventually fall into the hands of the Soviet military.

In response, critics say the Russians could never be sure of the benign intent. There would always be doubts. Moreover, critics stress, all military officials must assume the worst to avoid surprise. In this case, the Soviet Union would have to assume that space-based kinetic weapons could be used offensively. And that perception, even if wrong, could lead to a vicious cycle of fears in a crisis that would increase the risk of war.

Moreover, critics of the antimissile plan say space weapons with no ability to strike earth targets could nonetheless play a pivotal role in fighting an offensive nuclear war.

”The most obvious one is to use them in conjunction with a first strike, use them to mop up the weakened response of you adversary,” Dr. Lynch of Stanford told the American Association for the of Science last week.

Photo of Lieut. Gen. James A Abrahamson (UPI) (page 20; photo of Dr. Peter D. Zimmerman (NYT/Paul Hosefros) (page 20); photo of Dr. Harvey Lynch (NYT/terence McCarthy) (page 20)

UK Licenses Human Embryo Creation (JAMA 7/2003)

Posted in Uncategorized by ce399 on 14/06/2012
Medical News and Perspectives | July 23/30, 2003
JAMA. 2003;290(4):449-450. doi:10.1001/jama.290.4.449

The United Kingdom (UK) has granted a license to Roslin Institute, Edinburgh, Scotland, to create human embryos for stem cell research via parthenogenesis, a “virgin birth” technique that jolts oocytes into a fertilized state without sperm. The license also allows the institute—former home of Dolly the sheep, which died in February—and its lead cloning researcher, Ian Wilmut, PhD, to derive stem cells from embryos created for in vitro fertilization (IVF) .

These nonhuman primate eggs have developed into 8-day-old embryos via a process called parthenogenesis (Science . 2002;295:819) (Photo credit: AAAS)

It is the fourth license for embryonic stem cell research handed out by the government of the United Kingdom, but the first license allowing the creation of human embryos by any means.

Speaking at the National Institutes of Health, Bethesda, Md, Wilmut said that he supports research on all types of stem cells, whether from embryos or adult tissues.

But he added that cloned embryos offer the most promising means for identifying the origins of and treatments for genetic conditions such as amyotrophic lateral sclerosis, or Lou Gehrig disease (JAMA. 2001;285:1691-1693). Embryos created using DNA from individuals with such diseases could provide researchers with an almost unlimited supply of stem cells, each carrying the key genetic defect. Such a pool would allow scientists to undertake more, and more sophisticated, experiments than any other available technology, said Wilmut, who spoke at a conference sponsored by the General Motors Cancer Research Foundation.

INCREASING THE EGG SUPPLY
INCREASING THE EGG SUPPLY

In an interview following his talk, Wilmut said that the aims of the newly licensed research are two-fold: to improve basic stem cell culturing technologies and to increase the supply of human eggs available for research.

INCREASING THE EGG SUPPLY

Roslin will immediately begin collecting embryos donated by patients from IVF clinics, which typically create several excess embryos per pregnancy attempt. The second route to boosting the egg supply, parthenogenesis, is much more technically challenging, said Harry Griffin, PhD, acting director at Roslin.

INCREASING THE EGG SUPPLY

The process involves gathering immature eggs from donors undergoing surgery for nonfertility-related reasons and then coaxing them to maturity in the laboratory. If successful, Roslin scientists will try to glean stem cells from the parthenotes (embryos grown from unfertilized eggs).

INCREASING THE EGG SUPPLY

Roslin’s agenda is the latest in a long line of advances involving parthenogenesis. Decades ago, scientists discovered that some plants and lower animals, including insects and corals, reproduce via the technique. Because the oocytes do not complete meiosis, they contain a full complement of the parent’s chromosomes—a clone.

INCREASING THE EGG SUPPLY
SUCCESS IN PRIMATES

Then in 1936, Gregory Pincus, MD, one of the scientists involved in developing the first birth control pill, induced parthenogenesis in rabbit eggs via temperature change and chemical agents. In 2001, Michael West, PhD, and colleagues at Advanced Cell Technology (ACT), Worcester, Mass, announced the creation of human parthenotes, although many scientists expressed skepticism about the embryos’ usefulness, as they died shortly after creation. A year later, though, a team led by ACT scientists and Kent Vrana, PhD, professor of physiology at Wake Forest University School of Medicine, obtained embryonic stem cells from monkey parthenotes, an advance that sparked a wave of enthusiasm (Science. 2002;295:819).

SUCCESS IN PRIMATES

Roslin is the latest institute to ride that wave, and Wilmut expressed confidence that parthenogenic human embryos will eventually provide a rich source of stem cells for research. But constructing a steady supply of stem cells is just the first step in the research pipeline. Once collected, the cells need to be fed and kept stable.

SUCCESS IN PRIMATES

Because current stem cell lines rely on mouse “feeder” cells, in theory, Wilmut said, unknown viruses in animal feeder cells could find their way into the human cells, a concern that the US Food and Drug Administration has also raised. To avoid that possibility, scientists at Roslin are developing techniques that would rely instead on human feeder cells or, even more ambitiously, on completely cell-free media. That is, the embryonic stem cells would grow in a rich soup of organic compounds.

SUCCESS IN PRIMATES

According to an abstract posted on the Web site of the UK’s Human Fertilization and Embryology Authority (HFEA), the agency that grants stem cell research licenses, Roslin now has permission to pursue this goal, too (http://www.hfea.gov.uk/aboutHFEA/researchLicenses.htm).

TO CLONE, OR NOT TO CLONE
TO CLONE, OR NOT TO CLONE

Like Roslin, the other three UK licensees—Guy’s Hospital, London; the Institute of Stem Cell Research at the University of Edinburgh; and the London Fertility Centre—are culturing stem cells from donated IVF embryos.

TO CLONE, OR NOT TO CLONE

Under a sweeping 1990 law, the HFEA regulates all IVF and human embryo research in the United Kingdom; a 2001 update to the HFEA banned all reproductive cloning and mandated that any artificially created human embryos must be destroyed within 14 days. In March, the House of Lords ruled that despite challenges from antiabortion groups, the HFEA holds the authority to license research involving embryo creation via parthenogenesis and cell nuclear replacement, although cloning for reproductive purposes remains off limits.

TO CLONE, OR NOT TO CLONE

Wilmut did not say if Roslin would pursue a license to attempt the more controversial nuclear replacement technique, the method used to create Dolly. In nuclear replacement, genetic material from an adult cell is transplanted into an oocyte, which is stimulated and begins embryonic development—a procedure that succeeds only rarely. While parthenogenesis allows cloning of reproductive-aged females, nuclear replacement could, hypothetically, clone any person, alive or dead (if viable DNA can be recovered).

TO CLONE, OR NOT TO CLONE

While tightly controlled in the United Kingdom, cloning research in the United States is largely unregulated. Bills outlawing the creation of cloned embryos for reproduction—and also for research, depending on the bill—have stalled in the US Congress, leaving the cloning landscape wide open for private companies. However, restrictions apply to researchers receiving federal funds, who may work with a handful of approved but largely uncharacterized embryonic stem cell lines and are not allowed to create cloned human embryos (JAMA. 2003; 289:1092).

New Stem Cell Center
New Stem Cell Center

As parthenotes and embryos evolve as a source of embryonic stem cells, other researchers are concentrating on adult cells with transformative potential.

New Stem Cell Center

One type, marrow stromal cells, have taken center stage with a 5-year, $4.3 million grant from the National Institutes of Health (NIH) to Tulane University in New Orleans. The funds will support a new center to prepare and distribute standardized, high-quality marrow stromal cells.

New Stem Cell Center

Because producing the cells is technically challenging, the Tulane center will speed basic and, eventually, clinical research, said Judith Vaitukaitis, MD, director of the National Center for Research Resources at NIH.

New Stem Cell Center

Recent research has shown that, when injected into animals, marrow stromal cells populate bone, cartilage, lung, skin, liver, and brain tissue.—B.V.

http://jama.jamanetwork.com/article.aspx?articleid=196988

#CIA #MindControl at #StanfordResearchInstitute #AlexConstantine #Scientology #ElectronicMindControl

Posted in Uncategorized by ce399 on 13/06/2012

CIA MIND CONTROL AT STANFORD RESEARCH INSTITUTE

By Alex Constantine

December 1996

Concrete evidence that electronic mind control was an object of study at SRI was exposed by the Washington Post on August 7, 1977:

“When the Navy awarded a contract to the Institute, the scientific assistant to the Secretary of the Navy, Dr. Sam Koslov, received a routine briefing on various research projects, including SRI’s. As the briefer flashed his chart onto the screen and began to speak, Koslov stormily interrupted, ‘What the hell is that about?’ Among the glowing words on the projected chart, the section describing SRI’s work was labeled:

ELF and Mind Control.

ELF stands for extremely [low] frequency electromagnetic waves, from the very slow brain frequencies up to about 100 cycles per second…. But the Mind Control label really upset Koslov. He ordered the SRI investigations for the Navy stopped, and canceled another $35,000 in Navy funds slated for more remote viewing work.”

Contrary to Koslov’s order to kill the research, the Navy quietly continued to fork out $100,000 for a two-year project directed by a BIONICS specialist.

Mind control is not a humanitarian pastime: the project was military, and if SRI was indeed a source of covert EMR brain experimentation, test subjects from the community at large were subjected to torture plied with the same thorough disregard for human rights as the radiation tests conducted at the height of the Cold War.

The treatment subjects have received at the hands of their own government would be considered atrocities if practiced in wartime.

Mind control was also used in domestic covert operations designed to further the CIA’s heady geopolitical ambitions, and during the Vietnam War period SRI was a hive of covert political subterfuge. The Symbionese Liberation Army, like the People’s Temple, was a creation of the CIA. The SLA had at its core a clique of black ex-convicts from Vacaville Prison. Donald DeFreeze, otherwise known as Cinque, led the SLA. He was formerly an informant for the LAPDs Criminal Conspiracy Section and the director of Vacaville’s Black Cultural Association (BCA), a covert mind control unit with funding from the CIA channeled through SRI. The Menlo Park behavior modification specialists experimented with psychoactive drugs administered to members of the BCA. Black prisoners were programmed to murder selected black leaders once on the outside.

The CIA/SRI zombie killer hit list included Oakland school superintendent Dr. Marcus Foster, and Panthers Huey Newton and Bobby Seale, among others. DeFreeze stated that at Vacaville in 1971-72, he was the subject of a CIA mind control experiment. He described his incarceration on the prisons third floor, where he was corralled by CIA agents who drugged him and said he would become the leader of a radical movement and kidnap a wealthy person. After his escape from Vacaville (an exit door was left unlocked for him), that’s exactly what he did.

EM mind control machines were championed at Stanford University by Dr. Karl Pribram, director of the Neuropsychology Research Laboratory: “I certainly could educate a child by putting an electrode in the lateral hypothalmus and then selecting the situations at which I stimulate it. In this was I can grossly change his behavior.” Psychology Today feted Pribram as “The Magellan of Brain Science.” He obtained his B.S. and M.D. degrees at the University of Chicago, and at Stanford University studied how the brain processes and stores sensory imagery. He is credited with discovering that mental imaging bears a close resemblance to hologram projection (the basis for transmitting images to the craniums of test subjects under the misnomer “remote viewing?”).

The Institute is bonded incestuously to corporate sponsors. Former SRI Chairman E. Hornsby Wasson, for example, was a director of several major companies, including Standard Oil of California, and he went on to become chairman of the Chamber of Commerce and CEO of Pacific Telephone & Telegraph and Bell Telephone of Nevada.

The SRI/SAIC psi experiments were supervised at Langley by John McMahon, second in command under William Casey, succeeding Bobby Ray Inman, the SAIC director. McMahon has, according to Philip Agee, the CIA whistle-blowing exile, an affinity for technological exotics for CIA covert actions. He was recruited by the Agency after his graduation from Holy Cross College (the alma mater of CIA contractees Edward Bennett Williams, attorney, and Robert Maheu, hit man). He is a former director of the Technical Services Division, deputy director for Operations, and in 1982 McMahon was appointed deputy director of Central Intelligence. He left the Agency six years later to take the position of president of the Lockheed Missiles and Space Systems Group. In 1994, he moved on to Draper Laboratories. He is a director of the Defense Enterprise Fund and an adviser to congressional committees.

Many of the SRI empaths were mustered from L. Ron Hubbard’s Church of Scientology. Harold Puthoff, the Institute’s senior researcher, was a leading Scientologist. Two remote viewers from SRI have also held rank in the Church: Ingo Swann, a Class VII Operating Thetan, a founder of the Scientology Center in Los Angeles, and the late Pat Price. Puthoff and Targ’s lab assistant was a Scientologist married to a minister of the church. When Swann joined SRI, he stated openly, “fourteen Clears participated in the experiments, more than I would suspect.” At the time he denied CIA involvement, but now acknowledges, “it was rather common knowledge all along who the sponsor was, although in documents the identity of the Agency was concealed behind the sobriquet of an east-coast scientist.”

The Agency’s interest was quite extensive. A number of agents of the CIA came themselves ultimately to SRI to act as subjects in remote viewing experiments, as did some members of Congress.

“If you recall,” astronaut Edgar Mitchell, another participant in the experiments, informed radio disinformation broker Art Bell on April 30, 1996, “back in the early ’70s, I did work at SRI with Harold Puthoff and Russell Targ and Uri Geller, and I was invited to brief the CIA on our results. George Bush was head of the CIA at that time. Subsequently, a great deal of psychic work was done by CIA, and very successfully because the Soviets were doing it at that time as well — very successfully.”

Mitchell spins a cocoon of mystical yarns as outrageously far-fetched as any of his SRI cronies. He claims to have traced the brain’s center of ESP to native creativity, a “relationship that exists in nature, it’s responsible for our inner-experience…. It involves the zero-point field, quantum physics, mystical experience, parapsychological functioning….” The ubiquitous “aliens,” he insists, are at the heart of the federal UFO cover-up, visitors from a civilization “a few million, or even a few billion years older than we are.” His book The Way of the Explorer is chock-a-block with the astronaut’s rambling Shamanic cover stories, supposedly the culmination of 25 years of research on intelligent life in the universe and the paranormal.

The Agency was purportedly so taken with the SRI experiments that the bankroll for “human augmentation” research swelled. Millions of dollars were thrown at “Grill Flame” under (DIA) and Navy auspices. The projects at SRI were augmented by a parapsychology team at Fort Meade in Maryland under INSCOM and the NSA. Military intelligence personnel were recruited, including Major Ed Dames, the Psi-Tech founder, occultist and communer with “demons.” General Stubblebine ran the project and broadened it to include tarot and the channeling of spirits. By this time, Puthoff and Swann left the Church of Scientology to join a spin-off religious movement.

The DIA inherited “Grill Flame.” A reporter for the BBC (requesting anonymity) offers a glimpse of the Army’s remote viewing project at Fort Meade, and declares he was given The Official Line, i.e., “we were about to be used for disinformation. As soon as I started asking hard questions, the project was taken away from us and [given] to a far more docile broadcaster.” The British correspondent learned that medical oversight for the psi experiments was provided by Dr. Louis Jolyon West, then a professor of psychiatry at UCLA, one of the most notorious CIA mind-control specialists in the country. Apart from monitoring the health of the subjects, according to SRI spokesmen, Dr. West conducted his own experimental studies of the
phenomenology of dissociative states,” or multiple personalities, at the Institute. Colin Ross, a specialist in dissociative disorders, confirms that Dr. West’s work for the CIA centered on the biology or personality of dissociative states.

In “Pseudo-Identity and the Treatment of Personality Change in Victims of Captivity and Cults” (1994), Dr. Louis “Jolly” West examines the creation of “changelings,” or dissociative personalities that enable the subject of mind-control conditioning to adapt to trauma. “Prolonged environmental stress,” UCLA’s own ranking CIA mind-control specialist observed (in a drastic departure from the public stance of the False Memory Syndrome Foundation, an organization he formerly directed as a advisory board member, on multiplicity), “or life situations profoundly different from the usual, can disrupt the normally integrative functions of personality. Individuals subjected to such forces may adapt through dissociation by generating an altered persona, or pseudo-identity.”

Patricia Hearst (examined by Dr. West for trial) hosted an alternate personality named “Pearl,” he offers, a manifestation more distinct and individuated than “Tania.” The newspaper heiress was subjected to a regimen of “persuasive coercion” (a personal form of harassment by an organized group, any form of intimidation short of violence) and trauma-based programmimg of a sort developed by CIA specialists (like Dr. West) — “violently abducted by members of the [CIA-mustered] Symbionese Liberation Army in February of 1974, brutalized, raped, tortured, and forced to participate in illegal acts beginning with the bank robbery for which she was later (in our view wrongly) convicted. The traumatic kidnapping and subsequent 2 months of torture produced in her a state of emotional regression and fearful compliance with the demands and expectations of her captors. This was quickly followed by the coerced transformation of Patty into Tania and subsequently (less well known to the public) into Pearl, after additional trauma over a period of many months (Hearst & Moscow, 1988; The Trial of Patty Hearst, 1976). Tania was merely a role coerced on pain of death; it was Pearl who later represented the pseudo-identity which was found on psychiatric examination by one of us (West) shortly after Hearst’s arrest by the FBI. Chronic symptoms of PTSD were also prominent in this case.”

Many victims of the CIA-anchored experimentation have been left with multiple personalities induced at a young age, and it is certain that the CIA can trigger induced multiple personalities electronically from a remote source to commit any act on cue, the ultimate Manchurian Candidate. Under Dr. West’s tutelage at UCLA, parapsychology experiments of another sort were conducted by Kirlian aura researcher Thelma Moss, a writer for television and a human guinea-pig herself in LSD experiments conducted in 1957. Three years later, as a UCLA psychology student, she designed protocols for her own LSD experiments under the supervision of Dr. Oscar Janiger.

The CIA, of course, could not be far away. Dr. Janiger’s supplier of the drug was the legendary Captain Al Hubbard, the Johnny Appleseed of LSD. “Nothing of substance has been written about Al Hubbard,” Janiger once said, “and probably nothing ever should.” Hubbard, a convicted rum-runner, had a knack for electronic communications. He was recruited by the OSS by agents of Allen Dulles and surely reported to the CIA thereafter. Hubbard, an arch-arch-conservative, joined SRI at the urging of Willis Harman, director of the Institute’s Educational Policy Research Center, ostensibly as a security guard. Harman, an LSD experimenter himself, admits, “Al never did anything resembling security work.” Hubbard was employed on the Alternative Futures Project, a corporate strategy program. Al had a grandiose idea, one co-worker recalls, that “if he could give the psychedelic experience to the major executives of the Fortune 500 companies, he could change the whole of society.” Hubbard was a major supplier to university’s sponsoring experimentation, and flooded the youth subculture he despised with LSD in the 1960s. The massive drug-dealing operation at least as large as the government’s, and had Harmon’s was full support. Al Hubbard’s contract at SRI was canceled in 1974.

Among the labs closed in 1966 with the criminalization of LSD was Dr. Janiger’s. His protege, Thelma Moss, continued to pursue experimentation with the hallucinogen as a psychotherapeutic tool, later as an ESP trigger and for experiments in “behavior modification.” Her increasingly bizarre interests led her to Kirlian photography, and she set up a lab at the Neuropsychiatric Institute under Dr. West.

At least one volunteer in Moss’ experiments alleges to have been led down a blind alley to lifelong torture. D.S. (requesting anonymity) appeared on Moss’ doorstep in 1978. After the experiments, she was overwhelmed by back-to-back psychic experiences. Not true ones, she realized, but precognitive dreams that had to be fed to me. (Biotelemetric subjects routinely complain that their dreams are commandeered.) For 15 years she walked through a barrage of EM novelty effects. The psychic episodes gradually gave way to torture, including severe head pains and endless hours of persuasive coercion, the art of psychological paralysis honed by the CIA in the prison system.

In 1994 she began to receive non-stop audio transmissions that still torment her, cybernetic voices registering on her brain’s primary frequency allocation, her mental channel.

Another indication that military biotechnology, cyber-psi, was focal in Stargate research was the Agency’s choice of The American Institutes of Research (AIR) in Washington, D.C. to evaluate the validity of remote viewing. AIR could be counted on to keep the (mind control) secrets. In the 1970s, the Army’s Office of the Inspector General released declassified files disclosing a series of CIA-DoD behavior modification experiments conducted in prisons, mental hospitals and campuses from 1950 through 1971. The documents identified 44 laboratories enriched with public tax funds for secret, inhumane brain research. The first on the list was AIR. SRI also received funding. An in-house study ensured CIA personnel would not be dragged in from the cold.

Some of the aims of the research:

Inducing toxic psychosis, terminal cancer, stress, sleep, headaches and chemical lobotomies.

Developing foods that taste normal but stimulate fear and anxiety.

The concoction of drugs to facilitate the brainwashing of civilians.

Using LSD-25 and electrodes in the brain to pinpoint pain centers.

A number of SRI spinoffs have taken remote viewing into the private sector. A brochure for the Farsight Institute states flatly that technology is used, and promotes the alien diversion: The Farsight Institute (TFI) was founded by Courtney Brown, Ph.D., in 1995, evolving from a research program he conducted in the early 1990s, described in his book Cosmic Voyage: A Scientific Discovery of Extraterrestrials Visiting Earth (Dutton 1996). “Dr. Brown’s investigations began with his training in a remote viewing technology that had previously been used by the U.S. military during highly classified operations in the 1980s and ’90s,” according to his sales literature. “Historically, the principal breakthroughs with this technology were made at
Stanford Research Institute in the 1970s and 1980s by the gifted artist and natural psychic, Ingo Swann. The vision of The Farsight Institute is to promote the continued research and development of the most modern and effective forms of this continually evolving technology.” Other remote viewing gurus from the SRI program have sprung up like poison mushrooms around the country, ranting obliquely on the paranormal and scapegoating
“aliens.”

The rhetoric is a serious development in intelligence cult programming for mass consumption. The populace is subjected to the same crazed systems used to indoctrinate recruits of the mind control cults.

Psi-Tech founder Ed Dames claimed on Art Bell’s syndicated radio program that his company can comb “the collective unconscious” for answers to such mysteries as the origins of the AIDS virus. By scanning the “Global Mind,” Dames claims, “we perceived massive global weather changes that preclude growing crops, a tremendous problem with epidemics and pandemics in Third World countries because it appears the ozone problem is increasing the mutation rate. Were perceiving a bovine AIDS that kills a lot of babies. The future gets grimmer after that.”

Parapsychology, E.T.s and the “End Times” are not just for the cults anymore. The intelligence community wants the you to believe … believe …

… the Cold War-style propagandists. Current mind control disinformation has its foundations in anti-Communist propaganda. Lt. Col Thomas Beardon, an Army Reservist, was made to order in magazines published by the “Committee to Restore the Constitution” and other ultra-conservative organizations. Beardon had a loyal following. He made a career of writing about emergent Soviet EM mind-control technology, but somehow it rarely seemed to cross his mind that the U.S. might be pursuing the same initiative. Beardon warned that the Soviets were developing weapons that generate “time-reversed (TR) electromagnetic waves,” and were capable of launching a “TR Blitzkrieg War” of awful proportions. He warned grimly that the black-hearted Communists had their hands on “time-reversal” weapons that could “take Europe.” A single flying Soviet “TR wave weapon,” he claimed, was capable of knocking out all British and American radars. It could “kill personnel wholesale.”

[…]

—————————————————————-
MindNet Journal FTP Archive Filename: [mn196.txt]
================================================================

To receive the MindNet Journal via email:

Send message: [subscribe mindnet] to:
.

To unsubscribe:

Send message: [unsubscribe mindnet] to:
.

Back issues of the MindNet Journal are available at our
FTP Archive site: ftp://idiom.com/users/vericomm/mindnet/

The MindNet Journal Publication Index contains descriptions
of all back issues and is located at the FTP site (filename:
[mnindex.txt]).

Letters to editor, Mike Coyle:
.

Submission of articles for publication within the MindNet
Journal on the subjects of mind control, directed-energy
weapons, non-lethal weapons, ritual abuse, UFO abductions,
bioelectromagnetics, hypnosis and other related topics
will be accepted with the author’s statement of permission
to publish. The editor reserves the right to accept or
reject for publication. The publisher disclaims all
responsibility to return unsolicited matter. Send articles
for publication to:
or VERICOMM, POB
32314, Oakland, CA 94604-2314 USA.

VERICOMM (sm) and its agents disclaim any and all
responsibility or liability for any and all claims and/or
guarantees, express or implied, and delivery of products,
merchandise and/or services offered for sale by advertisers
and/or authors within the MindNet Journal.

The MindNet Journal mailing list is owned and maintained by
VERICOMM (sm), POB 32314, Oakland, CA 94604-2314 USA.

The MindNet Journal is published by VERICOMM (sm) in
cooperation with the Freedom Of Thought Foundation, POB
35072, Tucson, AZ 85740-5072 USA.

================================================================

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXX  XXXX  X      X       X  X      X      X   X   X   X   XXXX
XXXXX  XX  XX  XXXXX  XXX  X  X  XXXXX  XX  X  X X  X  X X  XXXX
XXXXXX    XXX  xxxxX      XX  X  XXXXX  XX  X  XXX  X  XXX  XXXX
XXXXXXX  XXXX      X  XXX  X  X      X      X  XXX  X  XXX  smXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

http://mindcontrolforums.com/mindnet/mn196.htm