Αγορά Πολιτών

Τρόπος Συμμετοχής

Χορηγίες

Πολίτες στην Αγορά

Έχουμε 542 επισκέπτες συνδεδεμένους

Επικοινωνία

Γερμανία 004917667046073 (SMS)

7/3/2017, 20:00

European Dissidents ALARM

 

Zeppelin: Beyond Gravity

 

Foreign intervention in Greece?

 

Η ανελεύθερη Ελλάδα

 

Η Ελλάδα καταγώγιο;

 

Αν.Επ. Π. Παυλόπουλο

  

Intangible prisons

 

Plausible deniability

 

Images of German w & s

 

Crimes against Humanity

 

"Chimera" - "Bellerophon"

 

pr. Donald Trump

 

  

Legal Notice 87

 

Βδέλλες, αποικιοκρατικές

 

Being a German

 

Legal Notice 84

 

Dirty colonial methods

 

Georgi Markov, BG - KGB

 

Samples of Barbarity

 

Ελλάδα - αποκόλληση

 

Έλληνες, στο έλεος...

 

Harvester's log 16/3/17

 

 

Legal Notice 66

 

Execrable

 

Legal Notice 62

 

  

My story

 

  

Aggression?

 

  

Η Εστία μου

 

  

Why so untidy?

 

  

Αποικιοκρατία

 

  

Εξόντωση Ελλήνων αντιφρονούντων;

 

  

Ζήτημα εμπιστοσύνης

 

  

Μεθοδικότητα

 

  

Ανοικτή Επιστολή πρέσβη ΗΠΑ

Αφορμή, U2RIT vs Ελλάδα;

Βιοηθική

A request to U2RIT

Colonial aggression - 2

Open Letter to UN S.G.

Open Letter to p.C. & p. O.

Δήλωση πρόθεσης επαναπατρισμού

 

Ο "εφιάλτης" της Νυρεμβέργης

Συλλογή Φωτογραφιών

Αίτημα προστασίας, προς Ιταλία

Chroma key, background removal

Science and Ethics

Να συμβάλει και η U2RIT

Θα ξαναφτιάξουν πολλές φορές Άουσβιτς και Zyclon B

 

Split-Screen effect

Η Ζωή είναι Ωραία.

Βόρεια Κορέα

Λευτεριά στους Έλληνες, εξανα- γκαστικά "Εξαφανισμένους"

 

Μυστικές δίκες;

Trustworthiness

Πολιτισμό, ή, απληστία;

Ακραία Στυγνότητα

Η Τέχνη της Επιβίωσης

Political Asylum 3

Επιστροφή στις ρίζες

The Human Cost of Torture

An urgent appeal for solidarity

More obvious than the Sun

Western "culture"

Political Asylum

Έννομη Προστασία

Μια μήνυση που εγείρει ερωτηματικά

 

 

 

Honor your father...

Noise

Creative Greeks

A pair of Dictatorships

Jails with intangible bars PDF Εκτύπωση E-mail
Αξιολόγηση Χρήστη: / 0
ΧείριστοΆριστο 
Συνεννόηση για Δράση - Απόψεις
Συντάχθηκε απο τον/την Χρήστος Μπούμπουλης (Christos Boumpoulis)   
Κυριακή, 17 Σεπτέμβριος 2017 19:05

 

nelson-mandela-in-jail.jpg

 

Jails with intangible bars

Nelson Rolihlahla Mandela (/mænˈdɛlə/[1]; 18 July 1918 – 5 December 2013) was a South African anti-apartheid revolutionary, politician, and philanthropist, who served as President of South Africa from 1994 to 1999. He was the country's first black head of state and the first elected in a fully representative democratic election. His government focused on dismantling the legacy of apartheid by tackling institutionalised racism and fostering racial reconciliation. Ideologically an African nationalist and socialist, he served as President of the African National Congress (ANC) party from 1991 to 1997.

A Xhosa, Mandela was born in Mvezo to the Thembu royal family. He studied law at the University of Fort Hare and the University of the Witwatersrand before working as a lawyer in Johannesburg. There he became involved in anti-colonial and African nationalist politics, joining the ANC in 1943 and co-founding its Youth League in 1944. After the National Party's white-only government established apartheid—a system of racial segregation that privileged whites—he and the ANC committed themselves to its overthrow. Mandela was appointed President of the ANC's Transvaal branch, rising to prominence for his involvement in the 1952 Defiance Campaign and the 1955 Congress of the People. He was repeatedly arrested for seditious activities and was unsuccessfully prosecuted in the 1956 Treason Trial. Influenced by Marxism, he secretly joined the banned South African Communist Party (SACP). Although initially committed to non-violent protest, in association with the SACP he co-founded the militant Umkhonto we Sizwe in 1961 and led a sabotage campaign against the government. In 1962, he was arrested for conspiring to overthrow the state and sentenced to life imprisonment in the Rivonia Trial.

Mandela served 27 years in prison, initially on Robben Island, and later in Pollsmoor Prison and Victor Verster Prison. Amid growing domestic and international pressure, and with fears of a racial civil war, President F. W. de Klerk released him in 1990. Mandela and de Klerk negotiated an end to apartheid and organised the 1994 multiracial general election in which Mandela led the ANC to victory and became President. Leading a broad coalition government which promulgated a new constitution, Mandela emphasised reconciliation between the country's racial groups and created the Truth and Reconciliation Commission to investigate past human rights abuses. Economically, Mandela's administration retained its predecessor's liberal framework despite his own socialist beliefs, also introducing measures to encourage land reform, combat poverty, and expand healthcare services. Internationally, he acted as mediator in the Pan Am Flight 103 bombing trial and served as Secretary-General of the Non-Aligned Movement from 1998 to 1999. He declined a second presidential term and in 1999 was succeeded by his deputy, Thabo Mbeki. Mandela became an elder statesman and focused on combating poverty and HIV/AIDS through the charitable Nelson Mandela Foundation.

Mandela was a controversial figure for much of his life. Although critics on the right denounced him as a communist terrorist and those on the radical left deemed him too eager to negotiate and reconcile with apartheid's supporters, he gained international acclaim for his activism. Widely regarded as an icon of democracy and social justice, he received more than 250 honours—including the Nobel Peace Prize—and became the subject of a cult of personality. He is held in deep respect within South Africa, where he is often referred to by his Xhosa clan name, Madiba, and described as the "Father of the Nation".

[https://en.wikipedia.org/wiki/Nelson_Mandela]

 

mandela_2111519a.jpg

   

CIA’s Deputy Director Cohen Strives to Suggest That “Authoritarianism”–“Ubiquitous Surveillance” and “Criminalization of Dissent”–& Abuse of “Fundamental Human Rights” Occurs Only Outside the US

 

The transcript of a recent talk (Sep 17/2015) given by Deputy Director David Cohen at Cornell University and preserved verbatim on the CIA website, titled “The CIA of the Future,” makes for rather spectacular if not laugh-out-loud reading.

Particularly in light of the recently-released 500-page Summary of the CIA’s post-911 Torture Report, and the CIA’s continuing involvement in non-consensual and clandestine MKULTRA-extended human experimentation on Americans, in America, covered here under Human Rights, and widely discussed online, including in this excellent post at The Vigilant Citizen, Origin and Techniques of Monarch Mind Control, which details the absolutely grisly and unimaginably sadistic methodologies of torture and trauma-based mind control and psychological “alter” formation used by the CIA in its clandestine ’50s-’70s experiments on children, as well as other “unwitting human subjects, including CIA employees, military personnel, doctors, other government agents, prostitutes, mentally ill patients, and members of the general public,” Mr. Cohen’s remarks ring rather hollow.

Predictably, the talk contained a lot of bemoaning of violence and stress abroad, as if the CIA had had absolutely nothing to do with the creation of any of this violence, directly or indirectly, covertly or overtly, clandestinely or publicly, in particular with the creation of ISIS, which even the New York Times ended up covering.

“First, the ideas, institutions, and states that have formed the foundation of the post-Cold War system, and have delivered at least a modicum of governance, service, and security to often multi-ethnic populations, are under stress. Nowhere is this more apparent than in the brutal extremism of the so-called Islamic State in Iraq and the Levant (ISIL), which seeks to erase the borders—and, tragically, the ancient communities—of Syria and Iraq.”

Yes, tragically, the ancient communities of Syria and Iraq, which the US military –assisted by the CIA–has been trying to wipe off the map.

He goes on directly though to hint that other countries, elsewhere, are engaging in such horrors as “media manipulation, ubiquitous surveillance, criminalization of dissent, and controlled elections.”

“At the same time, democratic governance is under siege. For the ninth consecutive year, Freedom House in 2014 reported more declines than gains in the quality of democracy worldwide. Worsening ethno-sectarian and socioeconomic strains are contributing to the trend. So, too, does the rise of a more sophisticated form of authoritarianism that forgoes brute force and heavy-handed propaganda in favor of technology-enabled media manipulation, ubiquitous surveillance, criminalization of dissent, and controlled elections.“

Descent into outright mendacity appears soon enough, as once more–the CIA as a whole seems to want to keep stressing this, even in their noncommittal and perfectly blase responses to FOIA requests (including mine/at Muckrock), perhaps in the hope that repetition might succeed where deception fails:

“Let me emphasize up front that CIA collects only foreign intelligence—that is, information relating to foreign governments, foreign organizations, foreign persons, or international terrorists.

“And contrary to what you may have seen on “Homeland,” CIA does not undertake foreign intelligence collection in the United States to acquire information concerning the domestic activities of US citizens. Our efforts are focused overseas, on identifying threats and opportunities linked to foreign individuals, governments and organizations outside our borders.”

Sure. And MKULTRA never happened. Nor does the current targeting of individuals, domestically and abroad, with mind-control, directed-energy, SIGINT-collection methodologies, and brain-entrainment methodologies in the realm of “behavior modification,” which we can see is based entirely on MKULTRA, although possibly concealed under a different name, have anything to do with the CIA, no doubt.

Just in reference to that foreign/not-domestic claim, here’s a Thought for the Day from a CIA mind-control programmer, quoted in ex-CIA scientist Dr. Robert Duncan’s rather revealing book on the “mind-hacking” (and quite domestic) activities of the CIA, on one aspect of the ubiquitous mind-control CIA program, a creation of “sleeper cells and sleeper agents”:

“Sleeper cells and sleeper agents are activated for different purposes. Let’s say hypothetically John Lennon sounds like communist propaganda, we will send out a psycho-sleeper to kill him. Hypothetically speaking, if Ronald Reagan is becoming senile, he is a security risk for national secrets, we will activate a sleeper. If a Defense contractor becomes an alcoholic or sex addict, he/she may be a security risk, so we silently assassinate them with seemingly natural causes. If the Kennedys don’t fit in line with our country’s objectives—you get the point.” CIA programming braggart.

Chapter 1, Hacking Computer and Biological Systems/Project Soul Catcher, Volume 2–Robert Duncan

(From the back cover: Project Soul Catcher, Volume 2 “details the CIA practices of interrogation and cybernetic mind control in their pursuit to weaponize neuropsychology.”)

But there’s more. Mr. Cohen spends a few paragraphs working up fervor in the CIA’s devotion to diversity in the workplace, throwing in little anecdotes to demonstrate its usefulness in action, adding:

“On countless occasions, our cooperation with foreign liaison has quietly achieved significant results. Working together, we have disrupted terrorist plots, broken vicious insurgencies, intercepted transfers of dangerous weapons and technology, and brought international criminals to justice, among many other accomplishments. And as CIA assists many of these services in building their human-intelligence collection capability while insisting that, in the process, they respect fundamental human rights, we can count even more on their partnership in helping us expand our own collection efforts around the globe.”

Yes, that’s more than rich. Please note, the CIA insists they respect fundamental human rights. Really? Small quote from a Huffington Post article on the CIA Torture Report, just as a reminder, to Mr. Cohen, who appears to have forgotten what the CIA was doing in their “enhanced interrogation” program:

“The study reveals several gruesome instances of torture by mid-level CIA officers who participated in the program, including threats of sexual violence using a broomstick and the use of “rectal hydration” in instances of harsh interrogations that lasted for days or weeks on end. And, contrary to the agency’s prior insistence that only three detainees were subject to waterboarding, the Senate report suggests it was likely used on more detainees.”

Also drop in here, for a revealing look at the CIA’s No-Touch Torture program, covered by Dr. Duncan, who used to work for the Department of Defense, CIA, and Justice, and helped develop the technologies now unfortunately in use by them.

It’s a sad reflection on America today that a government agency–with a horrific history of torture, among other atrocities--which purports to be a foreign-intelligence collection and espionage agency yet practices deadly “behavior-modification” torture technologies in secret on citizens (including this writer/hence those FOIA requests) and detainees while engaging in blatant deception propaganda in public is permitted to continue spreading propaganda and continue functioning at all, when it really should be exposed for what it is, and completely disbanded.

[https://everydayconcerned.wordpress.com/tag/mkultra/page/2/?iframe=true&preview=true%2Ffeed%2F]



Dr. Robert Duncan: The Executive Summary: Neuropsychological and Electronic No-Touch Torture Report

I just recently came across this article on aspects of the Senate Torture Report, posted with a release date 4/2015, and read it with quite some interest as it seems to openly discuss the phenomenon of “No-Touch Torture” or covert remote-control electromagnetic torture of private individuals in once-free Western societies as an acknowledged CIA pursuit. The information it offers from the CIA point of view seems to suggest some of the CIA rationales and unspoken subtext and context for this program of torture, and gives hints as to what exactly is being intended and accomplished (covert detention without due process via electronic incarceration, covert “interrogation” via brainwave acquisition and modulation, covert “monitoring” via radio signalling to implanted devices) by this completely pathological and insane and absolutely inhumane program targeting thousands of individuals worldwide.

It would seem therefore, reading this report, that the entire phenomenon of “Targeted Individuals” being hit with electromagnetic and other directed-energy weapons is a CIA set-up, ostensibly to test more of their “enhanced” interrogation techniques on unsuspecting “detainees”–ordinary people in the US and elsewhere, who, much like the many innocent prisoners of Guantanamo who were picked up in Yemen and other places and have absolutely no connections to terrorism yet are being detained indefinitely without charges and tortured while in custody, are being “detained indefinitely,”and being “interrogated,” and being “tortured for purposes of interrogation”–only rather exotically, with energy weapons and implants which peer into brains and body parts, constantly track EMF emissions, and attack continuously and covertly with EMF signals on bodies and brains which are translated inside brains also as images, moods, feelings, sensations, dreams, and audio commands. Experimentation on human brains and nervous systems with energy weapons.

This is supremely disturbing, and an issue that needs to be tackled openly and publicly with the CIA. As noted elsewhere on this site, this is blatant human experimentation, that is being permitted covertly behind the scenes by our government under “classified” and “state secret” covers using “national security” as password for absolute abuse. (It’s not called Torture for nothing.)

 

The Executive Summary:
Neuropsychological and Electronic
No-Touch Torture Report



Based on “The Torture Memos” and the Senate Intelligence Committee’s Declassified “Torture Report”

By Robert Duncan, A.B., S.M., M.B.A., Ph.D.



Torture is a horrific topic and most minds will turn away from it because it can’t be comprehended that humans can be motivated, or computer programs can be run to do this to other sentient beings. Just when we believed we were becoming more civilized as a culture, the technology for torture has advanced more than a hundred fold in recent decades.

This summary will get into ‘the minds of the dishonorable monsters’ of the psychology of torture. Those like Dick Cheney who helped authorize it under certain administrations and regimes of the U.S. government which have been proven to be criminal under U.S. law, treaties, and the International Criminal Court. There are many people involved in the conspiracy and cover-up including General Hayden.

The full report discloses the spectrum of techniques of interrogation and torture used by the U.S. and its allies. The United States government will officially deny the claims of this “no-touch torture report” but in time it will stand firm.

The technologies used are still classified as state secrets and will not be discussed in this summary. The torture methods have been leaked through thousands of American citizens who have survived the no-touch torture programs. The research and testimony has been accumulated since 2002 and merely used as examples but the names of the victims are withheld.

This report will not use skewed, misleading language such as “enhanced interrogation” to describe the torture techniques.

Why torture? The CIA claims it works. The assumption is that it works to gain actionable intelligence. Torture is often used for revenge, punishment, interrogation, and behavior modification. In other terms torture is used to remove the continuity of thought to confuse the target to reveal information, erase brain patterns such as values and beliefs, or to break down the human spirit to make them submit and obey their handlers.

The downside of torture is that the countries that do it lose “moral soft power” in world politics. Without due process, over 25% of those reported in the Senate Torture Report were declared innocent. Blowback is always a repercussion of torture. Torture often takes a long time to affect the target from months to years. Torture has shown to be unreliable except for getting false confessions and bad information but the U.S. and its allies are improving on their tactics and techniques.

The purpose of this report is to draw the parallels between physical torture techniques and no-touch torture methods used in secret by governments who possess the technologies that still go on today. This is a brief summary of offensive psychological and information warfare methods using traditional methods and modern cybernetic techniques while exploring hyper-game theory to walk the target to the desired path: leak intelligence, commit assassinations, or change beliefs.

Numerated Torture Methods for
Interrogation and Behavior Modification

(A comparison between physical and no-touch torture tactics)

  1. Induction of Depressive/Manic states

The idea is to shake up the emotional states of the target because different information can be accessed at each state. Making the target feel despair and helplessness is the objective. This cycle of hope building and then breaking is done in many ways. The techniques between the physical methods and the no-touch technological methods are similar. Speech is very important during this process of emotional manipulation. Such examples are, “We have imprisoned you without due processes or hope of it. You are indefinitely detained.” Hope building examples include, “Sorry. We have mistaken you for someone else. You will be compensated for false imprisonment and torture.” The main difference between the cybernetic technology and physical is that emotional state clusters can be entrained into the target mind which speeds up the process. The communication is done differently but perceived as human speech. In the no-touch torture methods it is helpful if the target is labeled with mental illness that is being created for discrediting purposes so as not to draw human rights groups’ attention.

  1. Memory Erasure

The military and CIA have been researching memory erasing drugs for half a century. The focus of this summary report is on interrogation. Memory erasure is an important technique during interrogation. It is used in combination with sleep deprivation. There are many drugs that have been developed for physical memory erasure. One such interrogation method requires acquiring information from the target while on these drugs and recording the subject. After a sleeping cycle, the interrogator claims that the target has confessed. Of course the target remembers nothing of their conversation. The interrogator will play samples of the subject’s conversation back to them making the subject believe that the interrogator knows more than they do. Similar techniques are used in the wireless, no-touch torture and interrogation programs. The cybernetic methods of memory erasure have additional purposes. The memory erasure can be used on the cybernetic target to make the target believe people have broken in and moved their belongings. While physical black bag jobs do occur, it is a way to make the target more paranoid.

  1. Electricity and Shocks

Pain and fear of death are common tactics during interrogation. Shocking by electricity is a traditional method of torture and exposed in the CIA’s secret prisons. Shocking the testicles and nipples are the most common due to their sensitivity. Interestingly, the thousand of interviews of no-touch torture involves “stings” and “shocks” to various parts of their bodies over long durations.

  1. Fear and Terror

There are many techniques to induce extreme fear in the target. In physical renditions dogs, power drills, guns, insects, mutilation, blow torches, water boarding, suffocation, mock burials, and mock executions are just a few the United States government have used. Remember that many targets of torture die from the physical effects. It is torture to death.
Let us compare the no-touch torture methods used to inflict the same terror and mental anguish. In several of these techniques the target needs to hear their handler’s voice. This report does not describe the technologies used to broadcast voices to the target at a distance. While the subject can be broadcast mental images to their mind using hypnosis and other suggestions as well as visual entrainments, the more invasive controls of the brain manipulation technologies can be used to entrained the brain’s autonomic nervous systems such as not breathing causing the target to not be able to sleep from fear of suffocation equivalent to water boarding. The neural linguistic programming can add fears such as heart attack, stroke, and cancer threats. Even motor cortex mapping can cause twitches in any part of the body. One example used a swift neck movement with a voice transmission, “We are trying to break your neck.” Directed energy effects such as Active Denial System can make the target feel that they are on fire indefinitely without the target dying from burns. Maximum pain and torture weapons have been evolving. Every drug effect can be artificially induced into the target mind including those of poisons.

  1. Imprisonment and Isolation

Isolation is commonly used as punishment in prisons. Many whistleblowers like Bradley Manning suffer this condition. In soft interrogation it is used to get the target to talk to their interrogator since humans have the need for companionship. In no-touch torture the target is driven from their friends and family using different techniques in order to isolate them so that the electronic mind control has more effect on their psyche. Like in Guantanamo, the target becomes isolated losing their job and medical care. Part of the method involves slander in their community. They end up on the most part in poverty and paranoid about doctors and other people from false correlations that are purposefully induced into their lives. Isolation is also a form of sensory deprivation which will be discussed later. Days and weeks lose their meaning.

  1. Sexually Disturbing Tailored Pornography

The Summary of the Senate Torture Report disclosed the disgusting revelations that in the secret torture prisons the targets were forced to perform homosexual acts on each other against their will and religion in order not to be beaten or killed. This is a common break down tactic of belief systems and the human will. In no-touch torture the techniques are more psychologically specialized for each target. Most common examples include homosexual targets that are forced with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are forced to view child pornography in their minds. And vice versa is true, that heterosexual targets are forced to view homosexual sexual acts like in the secret U.S. torture prisons.

  1. Mutilation

Also mentioned in the declassified report on torture was mutilation of the human. Cutting the naked target’s penis and scrotum, pulling nails or teeth is common. In no-touch torture mutilation is done by trickery. Let us look at a couple examples. There have been several targets who believed that the microwave hearing effect and other voice induction methods were done by microchips implanted in their teeth or ears. They had all their teeth pulled because they believed it was a technology called bone conductance. Others have poked out their ear drums in the belief they had micro implants in their ears. There are many more examples of trickery used to make the targets mutilate themselves.

  1. Personal and Spiritual Defamation

In physical torture the CIA and other groups use propaganda and defamation of character for those they oppose. For detainees they try to disenfranchise the target from their religion. They will defecate on their Bible or Koran for example. They might say, “Why is your God not saving you?” In no touch torture and behavior modification they might try to make an atheist believe in god. It is just a mechanism to alter belief systems for control and experimentation. Perhaps the target may wish to confess their secrets to a “voice of god weapon”. Information warfare covers the gamut of electronic communication as well. The government training exercise uses language like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”, “use deception”, “ruin business relationships”, and “post negative information on appropriate forums” – in a malicious effort to target bloggers, activists, journalists, social event organizers and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.

  1. Psychological Intimidation

This is a topic for a target at the beginning of the trials and programs. Physical break-ins are common even if the target has an alarm system. The NSA has used stalking of foreign officials in the past for economic gain. The FBI does black bag jobs to invade a home without a warrant. The point is to let the target know they are being watched and to increase their paranoia. The NSA easily hacks all computer systems and causes harm to the victim’s intellectual property and their relationships from that endpoint. In the no touch torture false correlations between pain and a neighbor coming home can be induced.

  1. Rape

Rape is a common practice in torture. It causes much psychological trauma. In the United States methods of rape in their military and CIA secret prisons it is often relabeled. It is commonly done by prods but “rectal rehydration” is the more common misnomer. Often they call it forced feeding through the rectum but it is meant to induce psychological scaring and trauma. Several have died from the technique due to rectal bleeding. In no-touch torture the psychological trauma of simulated rape takes on different forms. Using technique often called EEG-heterodyning the targets will receive molestation effects of their genitals. In men this can be the anus and genitals. Similarly women can be wirelessly raped by the analogous function of perception.

  1. Dietary Manipulation, Forced Weakness and Sickness

The idea behind dietary manipulation is to weaken the target. This is easily done in a physical setting but in no-touch the hunger trigger needs to be suppressed. Sometimes a false correlation between eating food and sickness is induced to make the target believe they are being poisoned. However, poisoning is common in physical renditions too.

  1. Repetition

Verbal breakdown is most important during interrogations and torture. Obviously speaking the language of the target is necessary. This is why there are interrogators in all languages. Repetition is an important neural linguistic programming interrogation tactic to influence the target mind. During the breakdown process, threats to kill and to torture the target’s family or friends are common. Repetitious questioning and breakdown phrases are automated in both the physical and no-touch versions of torture. An interesting technology that is used for no-touch torture is called chatter bots. Chatter bots, an artificial intelligence program, automate much of the repetition so that the interrogators don’t drive themselves crazy during the neural linguistic torture and programming phases. Let us not forget the Chinese Water Torture, a single drop of water on the forehead of the detainee for months. Repetition is a form of torture.

  1. Sensitization of Pain Impulses

While the reverse can be obtained, optimizing perceived pain and misery is the objective in torture. Each trauma adds to the overall misery throughout life. Optimization of pain has been studied by the military and intelligence agencies. In the past the CIA has used drugs such as LSD to enhance fear and terror in the subject. Other methods such as hypnosis can increase perceived pain and the power of suggestion such as telling the subject his pinky finger is going to be cut off before it is done. In no-touch torture the same psychological manipulations are exerted. Subliminal and overt suggestions are often told to the subject before the directed energy or EEG heterodyning pain inductions in order to maximize their effectiveness.

  1. Sensory Overload and Deprivation

Again, this technique of overloading or depriving the human of sensory stimulus is ubiquitous in torture around the world not just in U.S. secret prisons. Torture subjects in the United States have reported the use of repetitive bad music and noise campaigns. An unusual torture technique used in the U.S. secret prisons was of a use of a plastic suit filled with ice while they beat the target. Ultra bright lights for days on end in the prison and hot/cold temperature changes in the environment are frequent. In no-touch torture, the target’s brain is forced to release dopamine which causes pupil dilatation. This acts as a sensory overload. For example the non-lethal microwave weapons research done by a professor in University of Nevada has shown this capability. Body metabolism can be altered with these weapons causing cold and hot flashes. Targets of no-touch torture often hear endless tinnitus.

  1. Sexual Humiliation and Lack of Privacy

Often used in common prisons is a lack of privacy. It is both necessity for security and a form of sexual humiliation. Also in prison many people are raped. No-touch torture offers the same sexual humiliation and lack of privacy by using through wall radar, cameras, and EEG visual cloning to let the target know they are being watched. Degrading comments are often used on the no-touch torture subjects while they are naked or in the bathroom.

  1. Maximum Sensory Pain Techniques

Basic torture involves brutalization, i.e. physical strikes, kicks in the groin, pepper spray or tear gas, etc. Anything that involves maximum pain is the objective. Amazingly, these same basic tortures can be done wirelessly into the human mind. All forms of sickness have been reported without any real illness behind the suffering. All suffering can be entrained into the minds of no-touch torture subjects.

  1. Sleep Deprivation

This is the number one torture method along with the popularity in the press of water boarding. This is done in every country that uses torture. The United States is number one in torture since they are currently the world’s only superpower. A repetitive sleep deprivation cycle is generally done 180 hrs/7.5 days at a time in the physical renditions, or in no-touch torture five days awake and two days of sleep. Sleep deprivation accomplishes the objective of memory loss during interrogation and induces hallucinations which help with the interrogation process. In behavior modification and programming it is necessary too.

  1. Stress Positions

Keeping detainees handcuffed above their head and to walls so that they must stand for days is a common ploy in torture. These types of poses are called stress positions. They can be mimicked in no-touch torture. An example of one such trick requires the target to believe they can deflect radar energy using pots or pans and that it is directional. The target is being given an ample amount of pain until their hands and arms are spread apart holding the pans trying to block the signals. They must maintain that position in order to get any relief from the torture signals. However the stress position itself is physical torture. Often accompanying this technique are voices saying to the target, “You are doing it to yourself.”

We will finish off this summary of U.S. and its allies’ torture, interrogation, and behavior modification experimentation with ideas of why they are done to the general public and falsely accused detainees. Anyone can be put into these programs. Justice and rule of law does not exist at the highest levels of government. Treaties are worthless because the #1 agreement in the rules of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead by example.

No-touch torture uses the same interrogation tactics as physical interrogations but with some new twists. Techniques such as “Jeff and Mutt” a.k.a. “Good Cop Bad Cop” are used. The bad cop tortures the target and the good cop tries to gain their trust. In mind control, trust games are commonly employed to manipulate the beliefs of the target. Creating hatred of groups through false correlations and deception is a common CIA method of trickery.

In the CIA programs, the target is put through these phases as written in the documentation, “Disorient and confuse the target. Use them for our purposes, and then dispose of them in any way possible.” We can only surmise by our sample set of a thousand people what “dispose” means: prison, suicide, or perhaps a mental hospital. Coercing and torturing people to suicide is very common. Both tactics in physical or no-touch torture involves plausible deniability.

The no-touch interrogations are better than physical rendition techniques for exposing support networks. Traditional NSA tracking of email and phones calls are useful but if the targets are taken into a secret prison they can’t contact their networks. In no-touch torture, the target will contact everyone who might help them. Then those relationships can be destroyed to isolate the target. All these techniques rely on the target having a fear of death and pain.

Deception is very important during interrogation. In physical interrogations the targets are often drugged. This creates the confusion necessary to pull off certain trickery. In terrorist interrogations, for example, the CIA uses fake newspapers to make the target believe whatever event they were suspected of plotting had already happened, obviously looking for a confession. Sometimes the government in charge of the torture is looking for a political gain through a false confession. None-the-less false flag operations are commonly used in both forms of torture and interrogation. The trick is to make the target believe another foreign country is doing it to them. In no-touch torture the trick is to make them believe someone related to them is behind their suffering.

Voice transformation and morphing is an interesting technology also used in both physical and wireless interrogations. It is a form of deception used against a target to trick them into believing that they are speaking to real people that they know. It has been used in war to trick generals. Obviously spoofing email and other identities on internet forums can be used in this manner too.

Finally, the topic of human experimentation for improving weapons, torture, interrogation, and social disruption methods will be breached. Most of the techniques mentioned above work most effectively if the target has no SERE training (Survival, Evasion, Resistance and Escape) or psychological understanding of the methods to influence the human mind. Unfortunately, every sample point in the world’s society needs to be studied to improve the weapons systems. This is why many random people are put into the torture and mind control experiments. There are some devious uses of a secret army of remote controlled assassins in every country in the world. The samples must include different education, language, culture, and economic factors. Obviously, silencing dissidents, oppositions of political parties, and whistleblowers are included in the lists of applications. The most disturbing of the trends in torture is testing and improving it. No-touch torture is much more complex than physical torture. Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary to test on innocent targets. Often the subject will be taunted by the statement, “Try to stop us.” This statement forces the torture subject to try to figure out shielding and jamming techniques to stop the wireless torture and helps the weapons designers to improve on the system.

However, the psychological and perceived physical pain is only half the story with no-touch torture. It also involves a set of scripts, mind games if you will, to walk the target to murder and/or suicide. This is called “Hyper Game Theory”. It is used in war games to determine how to control your enemies and targets. Game Theory can be used on governments, individuals, or for determining propaganda to alter cultures. The experiments on the public provide a means to test the efficacy of these scripts and determine under what circumstances to use them.

One last comment on why “We must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military industrial complex” as President Eisenhower warned. During these torture programs run by the United States and its allies, accurate “truth” data points need to be used to judge the efficiency of the interrogation methods. This is why there is a dispute between the CIA and Senate Intelligence Committee reports about the usefulness of torture. Subterfuge by the CIA hacking into the senate oversight committee’s computers is a big deal; a rogue agency has been formed. Data fusion centers, Homeland Security Data Fusion Centers, NSA, and FBI collect data on Americans. This data in turn is used during torture and interrogation of Americans in no-touch torture.

[https://everydayconcerned.net/2015/09/06/dr-robert-duncan-the-executive-summary-neuropsychological-and-electronic-no-touch-torture-report/]



The perpetual and illegitimate, irrational and senseless, quasi, total war against the colonized Nations' natural leadership is an historical fact.

During the early days, the colonized Nations' natural leaders, those who were not assassinated, they were, illegitimately, incarcerated behind bars.

Now, the atrocious exploitation of the modern technological advances have given, to the contemporary colonialists, the fluency to politically marginalize them by no-touch, covert, inhumane methods: social marginalization, professional banning, monetary income deprivation, zersetzen torture, electronic implants, directed-energy weapons, biological extortion, character assassination, etc.

Do, colonialists, profit, on the long run, by their colonial policy?

The answer is, indirectly, reflected by the present status of the participating, to the contemporary colonialism, groups.

  • What kind of Freedom and what quality of everyday life, do, the British Royals, enjoy?

  • What kind of Freedom and what quality of everyday life, do, the British Nation, enjoys?

  • What kind of Freedom and what quality of everyday life, do, the Khazarian Nation, enjoys?

  • What kind of Freedom and what quality of everyday life, do, the American Nation, enjoys?

  • What kind of Freedom and what quality of everyday life, do, the Russian Nation, enjoys?

  • What kind of Freedom and what quality of everyday life, do, the Israeli Nation, enjoys?

  • What kind of Freedom and what quality of everyday life, do, the Turkish Nation, enjoys?

  • What kind of Freedom and what quality of everyday life, do, the Nomads' Nation, enjoys?

Computer hackings happens all the time.

Have, the participants to the colonialism, considered what might happen to them if, and when, the “wrong” computer hacking takes place?

By what has been already written to History, is there any past colonial method which hasn't been used, eventually, against colonialists, themselves?

The colonialists, by actively depriving, the rest of the human kind, from normality, through, torturing and eventually, indirectly, illegitimately and arbitrarily, incarcerating or “incarcerating” (namely, behind, either, tangible, or, intangible, bars), of the colonized Nations' natural leaderships, they, most probably, secure the, quasi, bouncing back to them, of their own, inconsiderate, colonial policy.


Christos Boumpoulis

economist



P.S.: The colonialists' spontaneous pervert “joy” of legitimate dissidents', either, testicular shredding, or, arbitrary incarcerating, is impossible to hide. However, within this marvelous world that we live into, even the colonialists may, somehow, become civilized.



Mandela walking out of prison with Winnie

https://www.youtube.com/watch?v=ei12AeL3cKU



MANDELA 'BACK' IN HIS ROBBEN ISLAND CELL - BBC NEWS

https://www.youtube.com/watch?v=SPM6lhs6EU8



Apartheid- Nelson Mandela & Robben Island.wmv

https://www.youtube.com/watch?v=HqYNtwyZiDQ

  

Note: The photos was found here, http://sacap.edu.za/app/uploads/2013/12/nelson-mandela-2.jpg and here, http://i.telegraph.co.uk/multimedia/archive/02111/mandela_2111519a.jpg.




Τελευταία Ενημέρωση στις Κυριακή, 17 Σεπτέμβριος 2017 19:24