top of page

Surveillance & Control Part 2

Contents

A Culture of Abuse

Bureaucracy

Non-Consensual Human Experimentation

Identifying the Enemy

Arrogance & Abuse: Entrenched Criminal Culture

Experimentation, Deception & Control

First Aid for Targets

An Experiment

A "System" in Bedlam

A Social Experiment

Language in Bi-Polar America

A Public Relations Problem

Theories and Facts

Arms Control

The Common Good

Gaming

Transparency and Public Control

Corruption and Complicity

“Old Boy”

The Department of Peace

The News

Investigations, Gossip and Slander

The Human Zoo

The Agents

Torture

Misinformation

Information Networks

Censorship and Violence

Gang Stalking

Funding

Evidence

Fake Rationality

Conformity and Repression

Hercules in the Stables

Red Eyes

The Secret Services

Murder by Proxy

Off-Stage

Spectrum Analysis

Domestic Terrorism

Apparent Suicide

The Puppet Masters

The Future of Conspiracy

The End-Game

The Suicide Squads

Made in America

The Tail of the Dragon

Limits of the Mind-Reader

International Crimes

Earth Changes

Russia

Civil Life

Symbiosis

The New Cold War

Pan-Human Struggle

Liberation Politics

Ghouls

Mutualism 102

Security Gnomes

In Criminals We Trust

Forensic Psychiatry

Psychiatrists: Innocent Until Proven Guilty

The New Authoritarianism

Old Thinking

Metastasis of the Cancer

Facts and Theories

We the People

Social and Political Behaviorism

The Economic Factor

Systemic Failure

Freedom I – II – III - IV

Apology

Gloria Naylor's 1996

Torture in Bhutan

Additional Information

A CULTURE OF ABUSE

The TI program is a high-tech manifestation of the culture of abuse that forms the core of police state psychology. The culture of abuse is familiar to everyone who has ever been to a military school or passed through a boot camp, known hazing, gang stalking or primitive bullying. It is familiar to young people as the bullying that takes the form of gossip and "piling on" that has today the help of texting technology. It is evident in the news media in the mania for pointing fingers and placing an individual in the stockade for public ridicule and shaming, carried out with venomous righteousness.

The use of new technologies in the TI program should not mask the basic spirit at work. The same spirit was seen in its most gruesome aspect in the Christian Inquisition, the witch burnings, the pogroms of Jews, the lynching of blacks, the genocide of the American Indians, and the ethnic “cleansings” carried out by the Nazis and other "superior" tribes. The forced march of the aristocrats to the French guillotine and the purges carried out in the earliest years of Soviet Communism manifested the same spirit. It was apparent during the Cold War in purges carried out by both sides.

The essence of abuse is to declare a group un-people. It is then possible to relate to that group in the most inhuman manner. This was evident in Iraq, where, after reviving the most fearful of Saddam's prisons at Abu Ghraib, we demonstrated to the world how poorly we understood the ideas of human rights or judicial process.

In a world in which ethnic cleansing and genocidal wars are still commonplace, Americans have learned to close their eyes to unpleasant facts to preserve the “comfort zone” of normal life. However, this may no longer be possible, given the advent of new technologies and the disposition of those with access to employ them in America. It is no longer necessary to have Abu Ghraib in a separate location. Thanks to the invention of “touchless torture", the sadists can reach you in your home.

Classified technologies unknown to the general public are made available to provide criminal opportunities and entertainment to sadists and perverts. The FBI is either blithely unaware of this or else does not regard domestic terrorism or misuse of restricted technologies as events worth investigating. The number of TIs in America may be in the hundreds of thousands. As a human rights abuse the Targeted Individuals program is astonishing for many reasons; the most astonishing is that the “investigative” reporters of the mainstream media have not reported it.

The new technologies permit not only continuous 24/7 intrusive surveillance, eliminating privacy; they permit the watching perverts (who are not police officers) to administer painful stimuli from a safe distance. This is in addition to the 24/7 tape recordings that play continuously for years, and the sonic weapons that are used to deprive a victim of sleep.

Imagine a sadist playing upon a torture machine like an organist to deliver various shocks and painful stimuli while providing live commentary. This is what covert experiments using tax dollars over the past sixty years have come up with for the benefit of the American citizen of the future. You can believe that it is for everybody, for the TIs are not special. They are not terrorists or criminals; they are ordinary people subjected to nonconsensual experimentation. It sounds insane because it is insane.

For the operators it is a paying job. Who may be paying them and for what reasons remains to be discovered. Each local situation may be, in some respects, distinctive. The operations may serve many different purposes for the individuals and groups involved. In San Antonio a group nominally under the authority of a Private Investigator was using these technologies to facilitate the rape of young women.*

The Peeping Tom technology, supplemented by computer hacking, places the operators in perfect position to commit a wide variety of crimes. Effectively immune to counter-attack from those they attack and abuse, they can use the technologies at their disposal as weapons of war for any almost any purpose. The pleasures of voyeurism, accompanied by delusions of grandeur, may partially compensate the members of these groups for the fact that they are not highly paid. The sadists in these groups undoubtedly enjoy being “over” their victims. They have “power” and they “own” the people they watch and torment.

The similarity of these activities to human trafficking is obvious. There are certainly other purposes as well, about which we can only speculate. We will do so later on, but to begin it is important to differentiate between facts and theories. The sadistic character of these operations is obvious to every TI. It is a basic fact, like the auditory harassment and mind reading.

Another prominent feature of these activities is their continuous and protracted character. This fact, which adds to the torture of the TI, also suggests that they are experiments that test, among other things, the effects of the various energies employed on the involuntary human subjects.

While the culture of abuse is obvious at the operative level, the source of the operations is the conceptualization of that culture as a systemic power augmented by the latest sophisticated technologies; for the methodologies that are implemented reveal a mind-set that is disposed toward torture, and toward the by-passing of both the laws of the land and the norms of civilization.

If we enter this world of conceptualization and planning in search of the devil, it will be necessary go beyond the TI program itself to expose the wider matrix of evil. In doing so, we will have to re-consider the worth of many of the ideas and values at the root of our modern way of life, as well as the deficiency of our institutions, in the light of their failure to nip in the bud this cancerous program.

__________

* See A New Breed: Satellite Terrorism in America (2009), John Hall.

BUREAUCRACY

Many TIs attribute this new system to the government, to the "deep state" or even to a global conspiracy. Given the radical evil evident in the system itself, they conclude that our government is essentially evil. Without excusing those who do in fact bear responsibility, I suspect that many of the bureaucrats and representatives who gave tacit or open approval to the implementation of the TI system did so without understanding its real nature. The program may have been described to them in terms that falsified the reality, and this deceptive description substituted for a real understanding of what was being done.

This does not fully excuse those who were deceived, but their guilt is more likely one of complacency and excessive trust rather than an ill will. Such errors are correctible with publicity and political pressure. Public demand for greater government transparency (especially in the realm of national security), legislative initiatives to meet the problems posed by the existence of new technologies, and administrative adjustments can create a new climate in Washington and throughout the country. Such a climate will be hostile to abusive programs carried out by fake police, and to the excessive reliance on covert programs that cede undue influence to unaccountable entities immune to the normal checks and balances.

NON-CONSENSUAL HUMAN EXPERIMENTATION

Apart from persuasion and control, scientific methods can be used to exterminate or erase whole groups of people. The Holocaust, the most familiar example, was the outcome of the hatred of Jews, but we see today that hatred can focus on many targets with the same inhuman rage, and science is ever ready to come to the aid of the exterminator by fashioning ever more effective weapons. Non-consensual human experimentation, which involves usually not hatred but obvious contempt for humanity or some portion of humanity that is regarded as expendable, may also be motivated by the search for new weapons. The underlying purpose of such experiments may be the elimination of a whole class or group of people. Such thinking is not as far from the minds of people as we might wish. After World War II, illicit experimentation went underground to avoid public disfavor, but in fact the field of such experimentation expanded, receiving a great boost from the influx of Nazi scientists and doctors that came over to "our" side. These scientists, their American collaborators, and their successors have been busy for generations. The TI program, carried out with the explicit or implicit approval of the American government, is one of the fruits of these clandestine efforts.

IDENTIFYING THE ENEMY

The TI program is highly organized, well funded and obviously over the top, but it may be only one program among many with roots in the same source. The program is global, but the national dimension of the problem is the natural and specific concern of Americans, who have sufficient freedom to act, to mobilize and to root out not only the TI program, but also any similar programs reflecting the same contempt for humanity.

This will mean identifying the source of the program within the power structure of American society. It will mean identifying all of those factors that directly or indirectly support the existence of this program. It will mean identifying the agents who are responsible for the operation of individual cells and forcing them to testify under oath, revealing what they know about the criminal conspiracy. It will mean holding the Director of the FBI, the Attorney General, and the Chiefs of all local police departments responsible for pursuing this conspiracy locally and tracing it to its roots in high places. If individual cells have been able to operate with impunity, that means, at the very least, that our law enforcement agencies have not been doing their job; it may also suggest complicity on the part of top brass within the various departments and agencies.

The problem posed by the general lack of interest in "compliance with the law and accountability for violations of the law"* within the intelligence community and, more generally, within the security culture, amount to a culture of corruption at the root of the American government. This affects both foreign and domestic policy in a manner that subverts democracy.

The problem implicates many as it descends from the NSA, CIA and military "think-tanks" to the operational level and comes within the purview of Congress, local police departments and the Justice Department. To give an example, if a functioning cell of the TI program is operating in NY City, who has jurisdiction? Does this criminal operation not come under the jurisdiction of the NYPD and/or the FBI? Is there no interest in investigating such a group? (We put aside the hypothetical "if it exists" since this qualification, like a fig leaf, camouflages and supports these clandestine criminal groups.) Presumably the NYPD brass knows these groups exist; ditto for the directors at the FBI.

If they know about the groups and they do nothing, it is because they want to do nothing (they are complicit), or it is because their hands are tied. If their hands are tied, we should ask, "By whom?"

Given the culture of corruption and the difficulty of getting to the root of the problem on a national level, it should be attacked locally wherever the climate is favorable for a housecleaning. In NY it must become the problem of the Police Commissioner, under the direction of the Mayor.

Violations of law and human rights originating in the culture of corruption and confusion within the intelligence community in Washington or Virginia should not affect a concerted effort by New Yorkers to clean up their own city.

_________

* Snowden, "Testimony to the European Parliament", The Snowden Reader, edited by David P. Fidler, 299.

ARROGANCE & ABUSE:

ENTRENCHED CRIMINAL CULTURE

Corruption has existed in virtually every power structure throughout recorded history. “Power corrupts and absolute power corrupts absolutely.” It is certain that these words were in the minds of the men who framed the Constitution and the Bill of Rights as the foundation of American law.

To imagine that our system today is immune from or even relatively free from such corruption would be to evidence either a childish naiveté or a miscreant’s preference for hypocrisy and camouflage. Undoubtedly, there is more corruption today than ever before, because there is more money and power to corrupt anyone who is pre-disposed to corruption. In addition, our system today is not as transparent as it once was. To the loss of transparency and the extreme temptations to go astray we may add the fact that as the culture of corruption is enlarged, it becomes easier to become corrupt. Since “everyone is doing it,” conformity becomes an added inducement. At the same time, those who might resist suffer a fatalistic resignation.

It is helpful to understand a little bit of history and psychology before delving into the specifically modern character of corruption in America. A broad knowledge gives background and safeguards us from some basic errors.

One basic error is the childish belief in American exceptionalism and the assumption of an exaggerated American virtuousness. This is only a replay of the sad comedy that underlies the patriotic fervor in every nation. Such complacent and unthinking endorsement of “one’s own” once led a man of wit to equate patriotism with scoundrelism. At the other extreme is the assumption that America is “the great Satan” or that the American government is more corrupt and evil than other governments. It is helpful to avoid such extreme ideas, first, because they are untrue to the facts; and, second, because they impede any effort to go forward and improve upon the existing situation. If we take aim at corruption within America, it is not done to put down America, but to build her up, and to restore her positive influence in the world.

Because America has enjoyed great power and influence, the American footprint is found all over the world. This has been, for the world, both good and bad.

It is absurd for America, today, to be lecturing other countries for the error of their ways. We need to set our own house in order. We can no longer assume that the American example has merit that the world must be eager to follow. The TI program, in particular, offers an outstanding example of everything Americans claim to abhor: the violation of human rights, institutionalized sadism, and contempt for both humanity and the Constitution. Moreover, it is pointless, unless it be part of a larger experiment aiming at the overthrow, through a gradual subversion, of our republican government. What is most disturbing about the TI program is that the technologies employed originated in the covert operations of our own government; and second, that the criminal groups today employing them enjoy a relative immunity. This immunity derives partly from their invisibility, and partly from the fact that the groups enjoy either the patronage or the complacent respect of those powers-that-be which are aware of them. Americans abhor everything that finds embodiment in the program, and yet the TI program exists. It is, for all practical purposes, national policy. The deception is deliberate. If people knew about the TI program, it would be abolished. Therefore, the people are kept in the dark, in the hope that they will blithely assume that the secrecy is necessitated by national security.

EXPERIMENTATION, DECEPTION & CONTROL

Much has been said about the targeted individuals as involuntary experimental subjects. But the experiments in this case may have many aspects. The public trust and credulity is also subject to experimental testing.

The notion that the population itself may be tested should not be so strange in this day and age. We know how zealously marketers test population samples. Teachers and other employees are tested before they are given tenure. Students are tested before they are admitted to a college or graduate school. Even children test their parents to find out how much is permissible or how much they can get away with.

In warfare one nation may test another. A military force may test the defenses of an enemy. Criminals also case the scene of a premeditated crime and test the defenses.

An enemy wishing to attack our country will study us to find out what our weaknesses are. A domestic criminal group wishing to advance its own agenda at the expense of the American people will study the prevailing conditions of American society.

The operation of the TI program is based on secrecy and deception. It cannot operate transparently. It can operate only if it remains hidden; if known at all, it must be perceived as something that it is not. The various forms of deception are interesting to note; in every case they are based on the weaknesses of the deceived.

For example, it may be misperceived as an integral part of the national security effort. This misperception is based on the complacency and wishful thinking of the general public.

It may also be misperceived, at the opposite extreme, as a rock solid conspiracy that enjoys the support of every highly placed person in both the government and the private sphere. Curiously, the paranoid conspiracy theory has the same effect as in the Pollyanna fantasy. It is just as bad to exaggerate the actual conspiracy as to minimize it; the former view fails to distinguish the various players and groups, not to mention the role of society as a whole; the paranoid theory is easily dismissed from consideration as hyperbolic nonsense and offers no path forward. Even if one were to believe the paranoid theory, the result could only be hopelessness, as one would imagine oneself to be battling an omnipotent enemy who was everywhere in control.*

Another aspect of deception is that the victims are made to appear as if they had mental problems. People think someone who is hearing voices must have a screw loose. This prejudice is based on the general ignorance of the new technologies in use. Stories of their use appear as science-fiction or else as evidence of a psychiatric problem. The ignorant “perceive” through the lens of their ignorance. Psychiatric professionals are in this respect even worse than laymen, for they add to their basic ignorance the “authority” of their profession, so that the victims of these outlandish experiments are “framed” as psychiatric patients. Again, the experiment may go beyond the individual subjects and also test the gullibility of the public, including the mental health profession. Like children testing their boundaries, the creators of these experiments may want to see just how much they can get away with. Most people will ask, “Why would they do that?” I cannot say. But I am confident that they are up to no good and that they should be stopped, sooner rather than later.

Speaking of science-fiction and deception, which today are combined in the biggest blockbuster films, I will endorse another hypothesis: namely, that the “alien abductees” of the late decades of the twentieth century were an earlier generation of involuntary test subjects.**

If this is true, the experimenters were all-too-human (“alien” only from the perspective of normal thinking and values), and what is most striking is how elaborate the deception was. It would seem that the experimenters, like the makers of blockbuster films, were testing their power to create illusions. Unlike the filmmakers, who are open about their purpose, the experimenters wrought secretly in the medium of “reality” television, a virtual tax-funded candid camera without the courtesy of a confession at the end of the show. The very implausibility of such a scenario would actually serve to safeguard the secret, together with the red herring of the “alien” nature of the abductors. The manifestation of “synthetic telepathy” must have been a convincing sign of the “alien” nature of the experimenters to the abductees, ignorant of the existence of the classified technologies. The sordid basic fact was that the abductees were nonconsensual test subjects. If extra-terrestrials exist and are capable of space travel, we must suppose them to be immeasurably wiser than the sociopaths who concoct these insane experiments.

The technologies involved are truly marvelous and could have extraordinarily beneficial applications, if they were released from the grasp of twisted minds and developed for sane and humane purposes.

__________

*I believe this is an important insight for anyone seeking positive social change. The extremes that I have termed the Paranoid Theory and the Pollyanna fantasy have the same psychological effect of neutering potential activism. The problems of our modern society are deep-rooted and systematic, but they result mainly from the organized mediocrity of the many players, rather than from a grand conspiracy of evil-doers which it is hopeless to oppose. A benevolent activism must take note of the deep-seated character of existing problems without succumbing to despair or hopelessness, or grasping at the straws of false solutions.

See Herbert Marcuse, The One-Dimensional Man, 1964, for an analysis of the special problem posed by modern technological organization. Erich Fromm treats the same subject in The Revolution of Hope: Toward a Humanized Technology, 1968. These humanist writers, among many others, saw the writing on the wall. Since modern forces have become so adept at burying the truth, it is useful to step back in time to re-capture it.

FIRST AID FOR TARGETS

Individuals who are under attack via the TI program often feel helpless owing to their isolation. Their attackers remain in the shadows, and the plight of the victims remains invisible or else is misunderstood by the general public.

The first problem for the TI is to understand what is happening. Because this is so far outside the normal boundaries of expectation, the TI is especially vulnerable during the earliest stage of being targeted. Moreover, one can expect little help from the police or even from friends and family. They will not understand. This inability to understand what is happening will actually be used against the target. Therefore it is imperative to learn as quickly as possible as much as possible.

This learning relates both to the specific targeting group and to the general TI problem, which is both national and global. Anything one can learn about the local targeting group will be useful in fighting back. One must also learn as much as possible about the new technologies being used and how they are being used. For this one can do some research on the internet. The more one knows the better one will be able to defend against the attack.

Socially and politically, the TI problem can be greatly alleviated by an information campaign that serves to inform the general public. This is important because, were the TI program to be generally known, it would be universally condemned. But these are long-term goals that relate to the future and to the TI problem in its larger, social aspect. At first the TI is bound to feel isolated by a situation which is incomprehensible.

Those attacked should try to avoid the negativism that arises through self-pity or feelings of helplessness or even shame resulting from the invasion of their privacy. The TI program, the people behind it, and the people who act as the paid operators or agents of the criminals who created this program are truly shameful. Those who are attacked must take the high ground. They are not under any official investigation. Since they have done nothing to warrant this type of attack, ultimately they are not alone. All normal human beings are on their side; they just don't know it yet.

These preliminary considerations relate to the targeted individual's psychological health and self-fortification. A positive mental attitude creates a strong shield. Spiritual faith helps too. This is essential, because one is essentially on one’s own. The usual support systems are of no use.

One should be careful not to aggravate one’s problem by any action that make one an easy target. Do not talk about the situation until you become informed. Avoid the type of behavior that makes people think you are crazy. You are not crazy, but if people think you are crazy, you may have social problems relating to their misconceptions.

You can file a report with the police. The police will probably not do anything. But it may be useful to have a record of the attack. Inform yourself thoroughly before you file any public report. Remain calm.

Study your attackers and their operation. Although the TI operations may be similar all around the world, there are also differences. Each operational team is made up of individuals. Some of them may be sadists, but many are ordinary people. Some may have taken the job because they were told a fairy tale about it being a national security operation. If they are reading your mind, you can talk to them just by thinking. Become a rapper or a radio personality. Tell the peeping Tom at the other end of the line what you think of him. You can learn to focus your thought more positively and change the game. Make the invaders your captive audience.

If some members of the operational team are decent people, you can turn them by talking sense to them. They probably realize that they were conned when they took these jobs in the first place. Help them to see the light. Also, let them know the jig is up. Their TI operation is going to go down the toilet. Tell them to get out, while there is still time to save their skins. Tell them to find an honest job. They don't have to be perverts.

As news of these operations gets around, there will be a saturation point, and the operations will be ended. Some individuals will undoubtedly go to prison and belong in prison. Others, probably the field agents, will testify, identify the major perpetrators, and facilitate the coming investigations into this monstrous criminal network.

There is some good information available already from the internet and in a few books. Be informed. Victims can help themselves and the general cause by learning to speak rationally, clearly and to the point. Spread the word, but do so intelligently. Network with others and help to organize a resistance. Be positive. Justice is with those who have been attacked. They will be vindicated. Beyond the solution of their individual problems, they can become a force in the fight against fascism, injustice and cruelty wherever they appear or in whatever form.

AN EXPERIMENT

We have said that the first problem for the TI is to gain an understanding of what is actually happening. This is not so easy. There is some information on the internet, but the TI cannot be sure if it is reliable or, even if it is, how well it fits his or her individual case. Suppose that a TI who is experiencing auditory harassment tries to ascertain the nature and extent of the auditory system by traveling away from the location at which the targeting originated. Does the sound decrease? Something may be learned in this manner. At the same time, even if there is a distance factor in the reach of the technology, this may be compensated in part by a volume control at the site of the source. Also, the technology/weapon may be portable. Not knowing all the variables involved, the TI is at a disadvantage in determining precisely what is happening. This leads to many faulty conclusions, particularly in the earliest stage of the attack.

The most common false conclusion is that the sound, which seems to be emanating from a point nearby (for example, from the roof of a house or from an adjacent apartment) is in fact coming from such a source. In fact the electromagnetically projected sound has an effect similar to ventriloquism. The TI, looking out the window or up in the attic, appears foolish.

As a consequence it is worse than useless to talk about these phenomena, for such talk merely produces the "common sense" reaction that the TI is befuddled. It is even worse to talk to a psychiatrist. In this situation "common sense" is mistaken because the technologies involved remain unknown to the common man. With a few rare exceptions, psychiatric professionals make the same mistake. This is even worse, for in this case the mistaken opinion has the "authority" of the so-called expert.

A "SYSTEM" IN BEDLAM

The utility of a rigid system is that it can be applied easily and efficiently; it becomes automatic and can be readily exported, in the manner of a business franchise. The weakness of such a system is that it lacks elasticity. It is easily targeted by an enemy. Even the NSA computers could be hacked, because the predictability of the system used made it an easy target.

The same weaknesses, characteristic of all systems, are evident in the TI program. Although individual cells may operate individually, in accordance with the individual personalities involved and the accommodation of these cells to individual purposes; the individual purposes seem often to have an add-on character; the personalities of the agents may moderate or slightly alter the activities of a cell, but they do not alter the fundamental character of the operation.

Thus the behavior of the operators in the TI program typically follows systematic patterns. They have their own “rules” to follow that take the place of the Constitution and the laws. Bizarre as it seems, especially when the extensive continuity of operations is considered, the TI program is a planned and systematic enterprise.

The identification of what may seem at first, in the individual case, to be haphazard delinquent activity, as a purposeful system, is significant. It opens the eyes to the extensiveness of an operation that threatens not just the comfort and well-being of a few individuals, but the very framework of government in the USA.

These criminal groups, impersonating police officers and national security operatives, are aided and supported by elements within the status quo. The NYPD has done nothing about these groups, even when their activities been reported. Why? It may be that individual officers on the scene cannot believe what they hear. But surely their superiors are aware of the presence of these groups. The Counter-Terror Commissioner must surely know about them. If not, he should be fired for incompetence. If he knows and has left them free to act, he is guilty of a crime, in which case he should be indicted and prosecuted.

A SOCIAL EXPERIMENT

One element of the TI system is a specific technique of harassment. When the individual subject’s mind is read, the content is referred to in an audio feedback. That is, the subject hears the operator referring to his (the subject’s) own thought. This provokes a reaction in the subject; the reaction is in turn “read” and thus a continuous loop is created.

We can only surmise the purpose of this technique, since we are not privy to the thoughts of the criminal minds responsible for the construction of the system. It would seem to have been developed for interrogations or as an adjunct to interrogations. This “interrogation” procedure is now being used in American cities on innocent and harmless citizens. These targeted individuals have not been charged with any crime; nor are those who attack them policemen. The procedure has nothing to do either with legitimate police work or counter-terror operations. The underlying purposes of the criminal groups are a subject of conjecture, and may differ according to the constitution of local groups. But two common themes of their activities are experimentation and intimidation. The whole thing is so bizarre that at first it is difficult even to think about it. The fact is, in this case we are confronting the activities of extreme perverts.

First, obviously, the new technologies are being tested. There is, however, no necessity to use involuntary test subjects for this purpose. If the mind-reader, for example, is being considered as a potential police tool, the question might be, "How much can be gained through the use of the mind-reader on an unwilling and hostile informant?" Although the answer to that question may have been sought at Guantanamo, minds that think in Arabic may have posed a problem for the would-be readers.

This sounds plausible, but we should also consider the possibility that plausible scenarios may simply camouflage the real purpose. We should consider that what we are looking at is a social experiment with many ramifications, which go well beyond the TI or the range and power of the new technologies. Although the current experiments are disguised as police work, they are not. The people running the TI program had no interest in stopping the Los Vegas shooter or the Texas church shooter. The execution of small children in a church and the use concert-goers for target practice are not concerns for the minds at work here. Even the idea that experiments are being conducted that will facilitate future police work should be questioned. This hypothesis is part of the Pollyanna fantasy which attempts to put a "best face" on every dubious fact.

The focus on the more or less randomly selected Targeted Individuals may itself be a red herring directing attention away from the more important national significance of the criminal groups, which may have multiple purposes. The TI system as currently operating is fairly rigid, but those within the system may be adaptable. Once they have “played the game” and proved to be reliable tools, they may be asked to go to the next level. If they are willing to harass and torture innocent people, they may be willing to participate in the blackmail of a Senator or a Judge. What has been formed is a criminal clique cloaked in the mystique of the “national security” and willing to break the laws (as long as they obey “the rules”), a small mercenary army that can be deployed under the direction of unknown persons for unknown purposes.

What can be done with this mercenary force? Let us list a few possibilities:

  1. It may be used for the harassment and intimidation of a whistle-blower, a journalist or the witness to a crime.

  2. It may be used by abusive landlords, who may then pay a fee to those providing a service.

  3. It may be used for corporate espionage and the theft of secrets.

  4. It may be used for the blackmail of Senators, Judges or other highly placed persons.

  5. In general, the system (or an adjusted version of the system) can be employed to acquire power over any group or individual in the USA and, to an extent, globally.*

  6. Especially, it may be used for sex crimes, such as the enslavement of women.

One woman claims she was targeted at the age of 20 and has been under observation and subject to harassment and torture for eighteen years. When she takes a bath, she wears a bathing suit. Peeping Tom-ism and sadism are at the heart of the system.

The experiment, seen in this light, may have to do more with testing American society as a whole than with the targeted individuals per se.

Will the public wake up or remain asleep? Will the fig leaf of "national security" suffice to keep official bodies with jurisdiction from curtailing these activities? Will prominent individuals subject to pressure cave in or resist?

The agents may be tested to see if they will follow orders, no matter how absurd. For this purpose, the irrational and absurd character of the ongoing experiments may be the perfect means. Bystanders are tested to see how they will react. Will the local Police Commissioners keep hands off, given a word from someone with a position in the NSA? Will the family and friends of the targeted individuals assume that these people are crazy? Will journalists stay off the topic? If they do not, can pressure be put on their editors to make sure that what they write doesn't see the light of day?

If the TI program is a social experiment designed to test the various groups within American society, the objective might be to increase the power of those controlling the groups, and through the erosion of the legal traditions and moral values formerly dear to Americans, ultimately create a police state in which the controllers enjoyed absolute authority. The power to target individuals, apart from the normal judicial process, is the power to suppress dissent. If individuals can be "picked off" at will by a criminal group, by-passing the electorate and the justice system, that group can become entrenched and immune to pressure, criticism, reform or prosecution. On the road to this police state, money and power are amassed and controlled in ever greater quanta.

__________

* The TI system seems to exist in a peculiarly virulent manifestation in Australia, where the USA has a highly sensitive military and surveillance installation. See on the internet under Surveillance Issues, Paul Baird, Human Rights and Privacy Advocate.

LANGUAGE IN BI-POLAR AMERICA

Finding the right words to describe something is the literary or vocal correspondence to the search for truth. As this process of verbalization is grossly abused, we are led to recognize a dark art of deception, in contrast with the luminous art of revelation. Between these extremes is the muddle in the middle. In addition to the ubiquitous “spinning” of every issue, there are also strong efforts to change the conversation and to focus the public interest on one topic rather than another. The result is that America today is disabled by the misuse of language and by the loss of a coherent view of the world.

In referring to those behind the TI program, we have the initial difficulty of "not knowing" who they are or what their purpose is. This is the existential situation of those who are attacked out of the blue. Because they do not know what is happening, these targeted individuals may sound crazy, as what is happening to them is crazy.

This may lead to the false conclusions of paranoia based on the inability of the majority to recognize the objective technologies at work. This specific misunderstanding is typical. Therefore it can be relied upon by those who wish to make use of it as a convenient red herring.

If the targeted individual makes it to the next stage, he knows already that there is little support to be expected from the general public.

Often at this point the TI begins to grasp that there is some kind of actual conspiracy at work. He may even exaggerate the extent of the conspiracy. Theories may be true or false. Or they may be partly true and partly false. The need at this point is for more precise information. If there is a conspiracy, the necessity is to understand it, so that we can define it in terms of its elements and modes of operation. If the public is oblivious, the public needs a wake-up call, so as to participate in the search for the facts here. This concerns everyone. This means that we need both an investigation and a PR effort.

This should be a job for investigative journalists. Instead, when we turn on the TV, we see the outrage of the liberal media over Al Franken's bad taste and the over-exposure of minor topics. Although everyday sex harassment is a real issue, we must be more concerned about those who are truly abused, than about those who object to a crude joke. We act as if female trafficking, gross violence, secret prisons, torture and genocide had been abolished from the Earth.

As the public attention is focused on trivial or distracting issues, it fails to note more substantial issues.

As we consider the two sides of America, it is evident that extremes on one side enable the extremes on the other. When "enlightened" liberals are preoccupied with soft issues, some very dark forces are left free to subvert democracy and institute processes that will eventually make the study of the Constitution obsolete. If that time ever comes, women may go back to being property.

In polarized America the people who are preoccupied with security and police work tend not to be liberals. But they have been left largely on their own to define the proper role of the police and the national security infrastructure. The police are challenged when a harmless motorist is shot, but apart from the obvious incidents that make it into the national news, there is a subterranean world of actions for which there is little accountability. After the debacle of the unnecessary 2003 invasion and occupation of Iraq, and the charade of a Congressional investigation, those responsible were awarded medals; and still greater sums were allocated for the agencies and departments that had failed us so grossly.

The policeman who goes on trial for shooting an innocent motorist is invariably declared not guilty by virtue of his declaration that he was afraid for his life. Is he even demoted to desk duty?

Beyond the strictly legal justice dispensed by official bodies, people note that a higher justice is systematically avoided. This social fact points to systemic corruption. It is hard to prove, but some things are so obvious that they don't need proof except in our courts of law.

A PUBLIC RELATIONS PROBLEM

The first line of defense of the TI program is the fiction that it doesn't exist. The "non-existence" of the program is related to the he difficulty of assembling "proof" of criminal activity that will have merit as evidence in the courts of law. This difficulty is compounded by the fact that individual cells or aspects of the program can be collapsed and made to disappear, if it is convenient for them to do so. The second line of defense is the fiction that the TI program serves national defense or the domestic police effort. Would-be investigators are straight-armed with the line that it cannot be investigated because this would tip off our defenses to the enemy. The third line of defense is the pressure that can be placed on those who come too close to success in exposing the operation.

These are formidable obstacles. They also demonstrate clearly (to those who are not blinded) the vulnerability of our nation to a take-over from within; made possible by the apathy and ignorance of the general public, the timid complacence of those who should be providing the counterweight against the accumulation of undue power by a single party, and the inadequacy of our investigative and judicial procedures.

The general public remains apathetic and tuned out despite the amassed testimony concerning the existence and use of the new technologies in illicit experiments and frankly criminal activities. The reasons for this apathy should be considered. It is, in a sense, a marketing or public relations problem. The facts suggest that the TI program is or should be an issue of primary significance, and yet, as a news subject, it remains marginalized in the domain of "conspiracy theories", "UFO abductions" and other items that entertain fringe groups but do not command the attention of the mainstream public.*

Given the multiplicity of news sources, it is impossible to keep anything completely secret. But a story that is not taken seriously may be even better, from the point of view of the conspirators. An actual secret can be found out and revealed. But if the “secret” is already exposed and not taken seriously, the conspirators can be confident that whenever it comes up, it will automatically be dismissed by the people who matter. To change this dynamic there must be a steady effort to publicize all relevant facts. For example, the existence of the mind-reading technology is unknown to the mainstream public. Those who are willing to believe that it exists still have to be convinced that it is currently deployed in the manner described by the TI community.

__________

* "Historically, mind hacking tests have been written off by the purposefully ignorant news media catering to the lowest common denominator. 'Brain-nappings', as the cultish like human effects weapons testing group of the Science and Technology Department of the CIA enjoy calling it, have traditionally been communicated to the public as hauntings, possessions, evil alien abductions, and in the recent decades, satanic ritual abuse cults." Project Soul Catcher: Secrets of Cyber and Cybernetic Warfare Revealed, Vol. 2 (2010), Robert Duncan, p. 4.

THEORIES AND FACTS

It would be fascinating to trace the evolution of the TI program, if we could. Because we are unable to do so, we construct hypotheses on the basis of what we know, hoping to spur a genuine investigation. In the absence of transparency and ascertained facts, intelligent policies are impossible.

Conspiracy theories are disparaged not because people do not believe in conspiracies, but because there are diverse individual theories with their adherents, and because the facts are so hard to get at that even thinking about the subject seems to many an exercise in futility. What remains common to the general public is a murky sense of corruption as a key factor in American life, giving rise to a pervasive malaise and disenchantment. This may lead to apathy or to activism based on some proposed solution to the problem, however “the problem” may be defined.

The activists are those who believe they know what is wrong and what is needed. They may be wrong, but they are passionately motivated by their strong opinions. In fact people cannot become enraged at what they don’t know about. They can only rage at something, even if it is only a scapegoat.

If we are fundamentally ignorant of what is going on, it will not help us to have strong opinions. America is a danger of becoming absurd. Russia’s Putin has been having some fun lately making us look silly. It’s not so hard to do. Despite our vast defense budget, we seem to have no defense at all against attacks from unexpected quarters.

The computers at the NSA are hacked and all the data stolen.

The Los Vegas shooter openly collects an arsenal for the massacre of 58 concert goers.

A discharged Air Force psycho goes into a Texas church and methodically executes the people inside, including small children.

A vicious criminal group with roots in our own security community operates without interference from the FBI or local police departments, carrying out, among other criminal activities, illicit experiments that flagrantly violate the rights of nonconsensual subjects, using the fig leaf of national security as a cover.

The absence of transparency in our security community is an invitation to high crime, not to mention incompetence, confusion and a lack of clear lines of responsibility.

The attack on the Cuban diplomats has still not been explained. The American diplomats were victims of sonic weapons and/or other electronic devices in the new world arsenal. These so-called non-lethal weapons, employed by a nationalist or other terrorist group, resulted in the loss of hearing for some of the diplomats targeted, as well as other symptoms. The Trump administration has used the incident as an excuse to cut back ties with Cuba, although that may have been the precise purpose of the unidentified attackers.

My suggestion is not a proof of anything. It simply points out that in the absence of transparency we are easily duped. The subversion of our national life may be effected by attacks that do not even make headlines. Something happens that is not understood, and later something else happens as a result of the first, unexplained incident.

ARMS CONTROL

The use of the mind reader in conjunction with harassment via messages electronically transmitted to the brain of the subject is characteristic of the TI program. The absurdity of such a combination reveals: 1) that the program has nothing to do with real counter-terror efforts or police work; and 2) that the program was devised by an individual or group with either sub-normal intelligence or an intelligence so twisted as to be almost inhuman. It seems to combine elements of surveillance, interrogation and punishment. Obviously the mind-reader can be used for much more sophisticated purposes. If used for serious spying, for example, the fact would not be broadcast to the person whose mind was being read.

One consequence of the bizarre combination of mind reader and harassment, whether intended or not, is to make reports of the TI program seem more incredible than they would be otherwise, for the natural reaction of every sane person who hears about it is that it makes no sense. It is literally inconceivable, not only because the technologies employed are unknown to most people, but because it cannot be believed that they are being used in the fashion described.

We believe the TI program is only the tip of an iceberg, suggesting the weighty mass of ice below the water line, and that the exposure of this horrific program will open the door to much that is even worse, if investigators, empowered by the pursuit of justice, have the will and tenacity to bring this evil business into the light of day.

If this is done, our nation may be purged of much of the corruption that has plagued our government and policies both domestic and foreign. It will then be possible to consider openly the better uses and controls to be placed upon the new generation of technologies, in cooperation with the other great nations of the world.

With a slight adjustment, the so-called non-lethal weapons can become lethal. The world's need for weapons control at all levels could not be more obvious. It is fruitless to regard only a few special specialized weapons, such as nuclear bombs, as the concern of arms control efforts, while weapons of all kinds are distributed globally and domestically, with little restriction.

THE COMMON GOOD

The intense nationalistic and partisan climate blinds us to the fact the arms control is a global problem, a common problem for all men and women. The usual justification for weapons is that they are necessary for defense against an aggressor. The people of the world have a common interest in eliminating weapons of all kinds, and in making it collectively both unnecessary and impossible for an aggressor to appear or, appearing, to cause much harm. The menace of nuclear weapons is not a specifically American problem, any more than the pollution of the air or seas can remain a merely local problem.

World standards with respect to common problems are inevitable, if humanity is to survive. This does not require a world government, as some fear. It does require national governments that have the sense to act cooperatively for the greater good.

Even when it comes to a soft issue, such as the behavior of men toward the “weaker” sex, we are foolish to make it a business of finger pointing, with "violators" placed in the stockade for the entertainment of gaping onlookers. We "individualize" the issue when in fact our standards are changing, and this needs to be discussed.

Many people are confused about what the appropriate or acceptable behavior is. For some "the line" is in one place, for others it is in another. In fact this should not be taken for granted. The whole matter should be discussed so that a new standard can gain acceptance and be known to everyone.

There are ways to cast issues in the light of the common good that offer a path to the future, in sharp contrast with the excessive partisan bickering, blaming and finger pointing that has become the contemporary style.

GAMING

As we noted earlier, if there were a desire to use the mind reader for spying, it would be absurd to alert the target with audio messages, informing him that he was under observation. Silently, with the mind-reader, a spy could peek into the mind of the unsuspecting target, and the contents of that mind could be observed in their natural state.

Once the target has been notified, the situation changes. He is aware of what is happening and he can react accordingly. He can add "false news" to the ordinary stream of his thoughts. Already the reader has difficulty discriminating between dreams, fantasies, intentions, trial balloons, random froth and so forth. The mind contents are diverse and generally unorganized, and the mountain of data is liable to bury the interpreter long before he derives any real certainty about anything.

Once the targeted individual in the current program knows he is being observed, he can also "play" the game in reverse. First, he can be gaining information about the criminal organization that has him under observation. For this purpose the tape recorded messages are most useful.

He can also "speak" to those on the other end simply by thinking, for this technology replicates, facilitates and crystallizes the natural telepathic faculty. It may be used in the future for ordinary telephone calls. For the present, the TI, as an involuntary experimental subject, can have some fun by describing the perverts who are monitoring him and by "writing" mental letters to various concerned parties, such as his political representatives.

It is good practice to organize one's thought in this manner, and the TI will have a much easier time than the reader who is, by the "rules" of his own job, forced to "follow" the TI and record his every thought.

In wrestling, this is called a reversal.

By doing this, those who are targeted can free themselves from the negative, victim psychology that seems to be so prevalent in the TI community. There is obviously a large component of sadism in the system itself, and many targeted individuals fall into the trap of feeling helpless, which merely encourages the sadistic tendencies in those on the other side.

TRANSPARENCY AND PUBLIC CONTROL

In addition to the TI groups, which follow an identified pattern, there may also be other groups operating both in the USA and in other countries. Such groups are not necessarily domestic in origin. If alien nationals were operating in this country, who would know? Who could tell the difference between our native, domestic terrorists and such an alien cell?

The group that attacked our diplomats in Cuba did not follow the TI protocol. In this operation the diplomats were certainly not alerted by tape recordings to the fact that they were under attack. They experienced some unusual forces and only later realized that they had been attacked when severe physical symptoms were noted in the victims.

The public is today given the message: "See something, say something." We are all supposed to be alert to the possibility of terror attacks. But our own government, via unsupervised groups, is the primary source of the new weapons and their use in domestic terror operations. These operations may also be carried out in foreign countries. If so, we, the American people, are culpable.

The need for public information on these new technologies and the types of groups already in existence is glaring. We must also be prepared for the possibility that these weapons will be used in the future in new combinations and for diverse purposes. The only way to get a handle on the problem is through maximum transparency, effective supervision of security agencies and private companies, and global cooperation to nip the problem in the bud. This can and should be an aspect of a global disarmament effort.

CORRUPTION AND COMPLICITY

We can see the TI program working (evading detection and opposition) as long as the number of individuals targeted is relatively low, and as long as the technologies involved remain largely unknown. As time passes, as the number targeted increases, and as the astonishing stories of victims, together with the knowledge of the technologies employed in these assaults on human dignity, seeps into the general public awareness, the program as constituted will be no longer viable.

An investigation may hasten this demise, but the program may then be re-constituted in a new form, and the public should be on guard against the type of superficial investigation that leaves in place all the essential elements of corruption and subversion of democracy.

That such corruption and subversion is a fact of life in America, we do not doubt, but we are less pessimistic than many observers. The primary conspirators are probably few in number. These few accomplish their ends through a variety of agents and agencies of equally variable quality and complicity; we presume that but few are dedicated to an evil way of life on principle. The cooperation of the agents is rendered because:

  1. They are deceived, as many will go along with a program they believe to be in the national interest;

  2. They have something to gain, and are led to support major acts of corruption through their own (minor) acts of corruption;

  3. They are intimidated into compliance; or

  4. They are led to cooperate through a combination of the above factors.

For example, the hired agents who function as the active cells of the TI operation have the usual incentive of hired workers in going along with the program of their bosses; in addition they are probably brought into the program with a "snow job" about the important national security work that they will be aiding. To begin with, they may be what you call regular people. Some may be veterans; some may be former cops or security people. Once involved, they are further bound by an oath of secrecy, fraternal loyalty, and a complicity that deepens as time goes on. The more deeply involved, the harder it may be to dissolve the ties and move on. Also, there may be an intimidation factor. If they attempt to break from the group, they may be themselves targeted, especially if they speak out.

The general public is also complicit, in the sense that public apathy has permitted the "security" culture and the culture of corruption to develop over decades, since President Eisenhower warned about the dangers of the military-industrial complex. The TI program is rooted in this culture, especially as it has evolved since the 9/11 attacks.

Under normal conditions the FBI would be the appropriate investigative body to take on such a national conspiracy. But the FBI is today subject to political pressures. Further, the legislative and judiciary branches of government have unwisely acceded to requests from within the security community for a broadening of authority together with a corresponding weakening of civil rights and the protections accorded to individual citizens. Within this context there is no check upon those individuals with access to new experimental technologies and huge allocated sums of money; no check upon their actions, no matter how criminal or perverted, or how far removed from anything even remotely connected to national security or genuine police work.

"OLD BOY"

It is extremely hard for ordinary people to imagine the TI situation. For this purpose a popular film may provide a rough idea: Spike Lee's “Old Boy” (2014), the re-make of a Korean film by Park Chan-wook. The original film was loosely based on The Count of Monte Cristo, the famous Dumas novel in which a Frenchman is sentenced to prison owing to the false testimony given to the court by his erstwhile friend. The modern prison in "Old Boy" is not an island fortress but a room somewhere, anywhere, and the prisoner is a kidnap victim. The key elements of the tale, for our purposes, are the facts that the modern prisoner is imprisoned without recourse to the justice system by an individual acting according to a private purpose. The prisoner does not even know why he is a prisoner, since he is never given an explanation for his imprisonment or introduced to his captor. He is fed daily like a pet, shown a variety of incomprehensible pictures and tormented in various ways by his unknown jailer. Since this crime is unknown to the general public, there are no protests, no petitions and no investigations into the matter. Neither film incorporates the precise technologies used in the TI scenario, but they successfully depict the complete deprivation of liberty, privacy and humanity in a situation in which all power is in the hands of a sadist.

In the TI situation the prison is portable in nature, since the targeted individual is not enclosed in a physical space but enclosed in a web constituted by electronic energies and deception. The attempt of the TI system is to create not a physical prison but a social and psychological prison, isolating and effectively marginalizing an individual human being. Through total surveillance and continual harassment, at enormous cost, one individual is deprived of privacy, and subject to a continual electronic assault. This assault, in the lowest range of the energies deployed, may be only a minor annoyance. But the same mechanism can also be used for a deadly attack, to produce sterility in the victim, or to drive a person insane. It is probable that the attackers do not even realize the long-term effects of the energies to which they subject their human guinea pigs.

A victim can only guess at the purpose underlying such an assault. Even the agents may not be aware of the actual reasons for the program in which they are the pawns or tools of the major players. Some reasonable guesses, however, may be made. A system is created that offers the possibility of pressuring and intimidating any individual through various means, including harassment, torture, blackmail and/or threats to family and loved ones. Moreover, all of these means of assault are unnoticeable (to the public) and can generally be carried out without leaving any evidential trail.

It would be a fundamental error to assume that those targeted are criminals or even suspected criminals. In fact anyone can be targeted. In the last analysis, every human being is an individual. The ability of a criminal clique to target individuals is the ability to control the government, the justice system, the economy, and the quality of life, not just for an individual, but for the whole nation.

The belief that the users of this system are serving the national security is the wishful thinking of those who just don't know the facts. The very use of the TI system, a colossal, planned violation of human rights, identifies those behind it and their agents as a criminal clique, deficient in the most elementary standards of human conduct.

The ultimate effect of these activities, if permitted to continue, will be to reduce the Constitution to a worthless piece of paper. Immigrants should then be informed that when they become American citizens, they forfeit all their rights and may be tortured at the whim of anonymous groups.

THE DEPARTMENT OF PEACE

On the world stage the American stock has fallen to the lowest point since WW II. The reason for this is simple. It is noted that we do not practice what we preach. In fact there are two Americans, and two voices are heard. One is a champion of human rights, democracy and freedom; the other is sinister and violent and self-interested almost to the point of imbecility. When our spokespeople admonish other nations for their human rights violations, they no longer appear as the champions of oppressed people, but as hypocrites.

If our wars have anything to do with winning the hearts and minds of people, our reputation as a nation matters. If we are not interested in hearts and minds, we will have more wars and more enemies eventually than we are able to deal with. Even at home we are approaching the point of civil war and disintegration as a nation.

Our investments as a nation have been poor. To remedy the deficit we need new thinking. As much as Russia in the 1980's, we are in need of a perestroika. Our problems cannot be solved with money or with arms, but if we can learn to use money and arms more sensibly, they can be useful rather than harmful.

The idea of having a Department of Peace, as proposed by Dennis Kucinich, is a good one. Its rejection was based on the same closed mind that is the source of all of our problems.

Above all, there is need for more emphasis on cooperative efforts that lead to win-win outcomes. There is a need for a spiritual capitalism to rise to the occasion.

Spiritual capitalism recognizes that the capital of each human being cannot be reckoned in dollars; it is the sum of his intrinsic wealth, the energy at his disposal, for good or for ill. The energy of an individual affects the whole world. When that energy is turned toward the good, then the way can be found to solve even apparently intractable problems.

THE NEWS

The number of those testifying about the TI program is impressive, and anyone interesting in discovering the facts can do so with a little research on the internet. Paul Baird’s website Surveillance Issues offers a long list of sources.

The fact that the major media have not reported the TI story would seem to confirm the belief that the major media are not to be trusted when it comes to reporting anything that may threaten powerful vested interests, especially when those interests have possession of the fearful arsenal of weapons discussed in our report and in the reports of so many people.

This will explain why there is so much soft news. It’s not that there are no reporters writing real stories. But if their stories get too close to the heart of darkness in America, they will be warned off, or bought off; there are carrots as well as sticks to keep people in line. If they persist in their search for the real truth, they may face some unpleasant consequences. So may their bosses, who may prefer to have their braver journalists in Syria or Afghanistan, where they will not be likely to upset the wrong people.

INVESTIGATIONS, GOSSIP AND SLANDER

The “news” that someone is “being investigated” has an effect apart from any actual investigation of the targeted person that is similar to the effect of pernicious gossip or slander. Consequently, fake investigations are a routine tool for harassment. If the police act in this manner, they are guilty of over-stepping. Private groups with an ax to grind may also carry out fake investigations. Similarly, the news media may over-emphasize the mere fact of an investigation in an effort to damage a reputation; it is as if an investigation were itself proof of guilt. Bigots use the words “suspect” and “suspicion” in the same manner. If we “suspect” something, the implication is that there is an objective reason for our suspicion, whereas suspiciousness may simply be a subjective characteristic indicative of an unwholesome or prejudiced nature. These basic thoughts underlie the presumption of innocence, which protects individuals against trial by gossip and conviction by accusation.

Modern society suffers from dual extremes in that everyone “in the open” is a target, subject to accusations and gossip, whereas the real criminals know how to stay out of sight. Their actions are covert and never discussed in the media.

THE HUMAN ZOO

Because the targeted individuals are monitored 24/7 continuously for many years, they have no privacy at all. For the watchers this deprivation has an amusing and sadistic aspect, which is expressed in the commentary made, for example, when the TI is on the toilet. The TI is owned and becomes a pet. Usually the watchers are men. Those who are watched may be male or female; they may even be children.

If the victims are adults, their sex lives are observed along with their bathroom activities. If they are sexually active, they become involuntary porno stars entertaining the perverts who are watching them. Many choose to be (or are forced to become) celibate. In effect, they are neutered, like the woman in Britain who adapted by wearing a bathing suit whenever she showered. The normal psychological effect of being monitored is a change of behavior. Some people are prevented from reproducing; and we do not even consider the direct physiological effects of experimental energies applied over long periods. These effects may range from sterility to the gradual break-down of the organism, to death, depending on the type of energies applied and the duration of their use.

Imagine such a regime of voyeurism and sadism applied to a developing child. If the experimenters wish to create a race of controlled slaves, they will begin with malleable children. The watcher-sadist will become the ever-present father or superego, and the Manchurian candidates of the future will become a feasible reality.*

__________

* The Manchurian Candidate (1959), a novel by Richard Condon, made into a film with the same title, depicts an American soldier who is captured by the enemy during the Korean War, brainwashed and allowed to return as a sleeper agent. Under the influence of his handlers, he is led to commit (against his own will) several murders, to further a plot in which he becomes a candidate for President. It remains an open question what tragic results have eventuated from the half-baked conditioning systems already in use or used in previous generations. Reports of violence by persons who claim to be hearing voices or experiencing conditions similar to those that characterize the TI situation are necessarily difficult to categorize accurately. It seems not unreasonable to conclude many acts of violence, murder or suicide have resulted from the TI experiment, whether according to the intent of the perpetrators driving their victims to acts of madness or through the unpredictable reactions of those targeted to prolonged abusive stimuli.

THE AGENTS

The voyeurs and delinquents who begin their association with the diseased “national security” culture in this manner acquire a taste for the illicit. They are also compromised by their violation of laws and norms of behavior, and may easily be led from small crimes to greater. If they are willing to harass and torture harmless people, they may be, subsequently, willing to participate in an assassination.

Not enough attention has been paid to this group, for the focus is usually on those elite, apparently untouchable criminals who presumably occupy high positions, wear the armor of money, privilege and power, and are hidden from sight and accountability. Such "elite" criminals undoubtedly exist, but they cannot be numerous. They work through various agents and agencies. Of the latter some may be willing accomplices. Others are no doubt duped, while still others are pressured into compliance. The fourth and largest group of facilitators consists of those who are oblivious and apathetic, the great dumb, timid public. The public needs to be informed, obviously. But those who desire to bring the corrupt system to an end might better target the fringe of the system and work their way toward the center.

The people who operate the equipment in small cells are anything but elite and they are also far from being untouchable. A single sting operation could bring to light many names and connections, leading back toward the heart of darkness. If our FBI were a functional group, this would have been done long ago. The mind reading equipment is in the hands of each of these operational cells. It should be taken out of their hands and made public. To say that this cannot be done because something is classified is to allow that flagrant criminal activities can be made untouchable by virtue of a bureaucratic label. This assertion throws our whole national security regime into question, and makes us wonder about every secret operation and every classified item in the whole filthy edifice.

The membership of the cells is recruited from more or less normal people looking for jobs. Probably many of them have been veterans or former security guards. At the higher, managerial level, we will probably discover some former policemen. I imagine that for all the groups in New York there is an executive who coordinates the groups, serves as liaison with the private sector through property owners and managers, and has a liaison in the NYPD, probably in the counter-terror department.

I am forced to make inferences, speculate and use my imagination since I lack the authority to conduct an official investigation. But it would not be hard to bust open this group, if there were slightest will to do so on the part of our law enforcement agencies, and if the FBI could be stirred to interest itself in the subversion of democracy in America.

TORTURE

The debate about torture that has gone on in public has only been a froth of public relations significance. Some of the opponents are certainly sincere, but they do not determine policy. In fact, torture has been accepted and is carried out normally. The TI program itself is evidence of how comfortable those in the security world are with the idea of torture. It is no longer restricted to places like Guantanamo, but has been exported to Manhattan and other places throughout the country; and it is applied, fantastically, not to suspected enemies, but to harmless American citizens.

The new instruments of torture have been described; they are electronic, and they are remotely operated. America's top dirty secret is that today American citizens are tortured on a regular basis; they have no rights at all, practically speaking; our checks-and-balances system has broken down and become little more than a historical memory, nostalgia.

We go on speaking the words about freedom and human rights, the Constitution and the Bill of Rights, but they have become hypocritical.

MISINFORMATION

If we use Google to find out about "Targeted Individuals" the first item to pop up confidently asserts that there is really no such thing. Like Santa Clause and the Devil, the "Targeted Individual" has no real existence. The term is merely the invention of "troubled unfortunates" and "paranoid cranks" unable to differentiate between their own disordered imagination and objective reality.

It is hard to imagine a serious thinker or investigator going so far wrong without deliberation. True, some people are extremely positive in their ignorance and like to assert their opinions as if they were laws of nature. This is the spirit of scientism, or science in drag as dogmatic religion.

The editor responsible for the RationalWiki article on Targeted Individuals may not be an intellectual prostitute in the service of a disinformation campaign; but if that had been the case, the resulting article would be the same. A pseudo-scientific narrative is substituted for the truth on a site that purports to dispose of pseudo-science!

Many of the first items up to bat are on the same order. One is an article from the New York Times, which really should be capable of something better.

These are shameful times, and anyone interested in the truth has to take a few extra steps to pass over the barriers erected in the path of the seeker. The truth is there.

There are four obstacles to the discovery. The first is the general ignorance of the existence of the new technologies, including a mind-reading device that is fully functional and deployed throughout our fair land. The second is the bizarre manner in which these new technologies are used by those who have access to them. The first two obstacles make the stories told seem unbelievable. The third is an active disinformation campaign designed to discredit the evidence and testimony offered as well as the persons offering it.

But the fourth obstacle is the most important. It is the investigative failure of those who don't look beyond their noses. Despite secrecy, misinformed gurus and an active disinformation campaign, people can find out the truth if they choose to do so. If they do not, it is owing to a lack of effort or intelligence.

INFORMATION NETWORKS

The example cited above raises the larger question of our networks and sources of information. If we rely on a search engine, the order in which items appear makes a difference. If the real information only appears on the second or third page, how many of our impatient students will get to it? Who determines the order of the items? If pre-eminence is purchasable, then advertisements pose as truth, fact or objective information.

The problem becomes acute if the information sought is especially frowned upon in circles of power and influence.

The subtle control of the flow of information is a most effective type of censorship. While banned books always become more popular as a result of being burned or banned, the censors in this case act with stealth and remain largely invisible.

The problem is further aggravated as politically oriented groups are today actively promoting their version of events. The groups with the greatest power are the most successful, in so far as success can be determined by power alone.

CENSORSHIP AND VIOLENCE

Censorship and the control of information constitute the most fundamental form of repression. It always leads to or conceals additional acts of repression and violence. As the saying goes, the first casualty in a war is the truth. In a society stabilized on the basis of perpetual warfare, the truth becomes more than an incidental casualty. It must be systematically downgraded through various processes of marginalization.

Remember how the second Iraq War was advertised prior to the American invasion in 2003. It was absurd, after the debacle was apparent, to refer to this as an intelligence problem. This was a problem of stupidity, endorsed by a large preponderance of the adult population. This is the charitable view. Some conspiracy theorists have posed the idea that the catastrophe was planned, which would be intelligent, if diabolical.

At Abu Ghraib we had an opportunity to see American liberators in action. While every normal person was appalled, the enemies of America were delighted to find proofs of their negative vision of America as Satan’s handmaiden. These proofs served as a virtual recruiting station for anti-American terrorists.

Many spokespersons lined up to assert that Abu Gharaib was an aberration. This is not who we are, they said. Actually we respect human rights. We don’t believe in torture. We like Muslims, too, as long as they are not fighting against us. The speakers were sincere, for America has a bright side as well as a dark side.

On the dark side the problem was viewed differently. The problem with Abu Ghraib was not that it happened but that it was not adequately concealed.

The same thinking is seen today in the TI program, which brings Abu Ghraib and Guantanamo home to America, and which, so far, has been more successful at concealing an atrocity that actually transcends the atrocity of Abu Ghraib, both in the numbers of those subject to abuse, and in the extraordinary fact that in this case there is not even a fig leaf of suspicion that the individuals targeted are terrorists or even jay walkers. They may be, on the contrary, writers, teachers, truck drivers, whistle-blowers, dissidents, housewives, factory workers, waitresses, airline pilots (harassed electronically even while flying jets with passengers!), or boyfriends of the daughters of individuals with access to the technology; or simply randomly chosen subjects for non-consensual experimentation.

The apparent senselessness of this program is actually a factor in making it harder for people to believe the facts of the case. The electronic surveillance and harassment is continuous. If the TI goes to the hospital for an operation, the harassment does not stop; it continues right through the surgery.

The connection between the TI program and censorship is not surprising, since the TI program is the expression of a form of violence and disregard of human rights that could never pass muster in the light of day. It is therefore hidden or obscured. The truth is repressed so as to make possible still greater repression and violence.

GANG STAKING

Gang stalking does not necessarily involve mind reading or the use of advanced electromagnetic technologies, but gang stalking is typically one of the features of the TI scenario.

Gang stalking, with or without the new technologies, is a basic expression of organized repression. An individual is isolated and victimized by a powerful party. Because they were afraid of the possible tyranny of a majority, the rights of minorities was a major concern of the original framers of the Constitution. The protection of minorities was further addressed by the Bill of Rights.

In North America, Europe and Australia, white skinned people are a majority, but in other parts of the world they are a minority. The extension of protection to minorities is fundamental to the idea of human rights as a global concern. Respect for minorities, the practice of tolerance and the manifestation of hospitality toward travelers is the ideal of civilization itself, as opposed to xenophobic isolation, bigotry and intolerance.

The ultimate minority is the individual. At the same time, everyone is an individual.

The crudest type of gang stalking is that which appears in small social groups, as children may isolate someone for bullying. Gossip is frequently the vehicle through which a group bullies an individual. This is also the natural vehicle for the enforcement of conformity and the repression of idiosyncrasy within the police state.

The tactics of gang stalkers range from crude violence to more subtle types of intimidation, usually involving the newest technologies. They can be of variable duration and intensity.

TI operations are labor intensive, protracted operations. If the mind of the target is read on a continual basis, even when he is asleep and dreaming, and if his computer is hacked and his daily computer work is monitored; a minimum of three individuals are required to maintain the operation. Although anyone might be "suspected" or "looked at" by an inquisitive intelligence agency, the targets are generally harmless, ordinary people; and such extensive "coverage" is not merely unreasonable; it is fantastic. This unreasonableness becomes a factor in the response to descriptions of the facts of TI cases by those targeted; they typically provoke incredulity.

FUNDING

If such protracted operations are in fact being carried out, there is considerable funding underlying the effort. The availability of the operators is not hard to understand. They are paid employees who also enjoy the perks of their ghoulish activities.

More salient questions revolve around the major sources funding these operations. Private groups are involved; since they are usually penny-conscious, we may wonder if there are tax write-offs for perverts if their activities are labeled Security? Apart from such a dodge (which boils down to a form of government funding) we know that billions of dollars are spent annually for national security and police operations with little accountability. We must presume that the major funding for the TI operations comes from such sources. Since there is so little transparency or oversight, and so little demand that these programs actually serve the national interest, there is lots of wiggle-room for every type of corruption imaginable.

EVIDENCE

Evidence is often confused with truth. But evidence can be falsified; it can be planted; it can be dealt with selectively; it can be misinterpreted. For these and other reasons, evidence is something less—far less—than the truth. Those who are interested in the truth will consider the available evidence carefully. But they will not jump to unwarranted conclusions.

Every advertisement offers evidence of the worth of the product. The smiling faces of the actors and actresses in the commercial are pictures worth a thousand words each. Why are they so radiant, so happy? Because they use the product!

Of course such evidence must be evaluated at its true worth.

For a long time there was no "evidence" of the fact that the earth revolved around the sun. People were free to believe that the earth was the center of the universe. But this did not change the basic fact. The earth revolved around the sun even though people were ignorant.

"Evidence" refers to the subjectivity of individuals or groups and has only a marginal relation to the truth.

In a society characterized by superficiality, speed and hasty conclusions, there are many con artists to take advantage of the unwary. If the con artists also have possession of sophisticated technologies to make their job easier, it should not be surprising that people can be fooled easily.

Among the new tools there are machines that can replicate specific human voices. To the auditory harassment already mentioned, this adds the possibility of a further mystification through mistaken conclusions based on evident (but unreal) facts.

What we find most disturbing is not the conspirators or con artists, but the complicit enablers among those who ought to be on the side of the angels. In the first rank are the psychiatrists, those masterful labelers and prescribers of pharmaceuticals. Are they so dense that they have no clue about what is going on? Are they afraid to speak out? Some lonely exceptions may be noted.

FAKE RATIONALITY

The role of psychiatrists, so far as the TI situation is concerned, has been to provide a convenient, facile and false explanation for phenomena which no one has taken the trouble to investigate seriously. Their "professional" judgment is then readily accepted by the consumers of instant "knowledge" via the electronic media.

Do they do this deliberately and conspiratorially? I do not believe so, although this may be true in a few cases. Rather, it suggests massive incompetence; and, worse, it suggests that they themselves have no clue regarding their own limitations.

One can see the same mind-set in a large number of "normal" people. By normal I mean statistically average, not psychologically healthy. These average people "know" that what the targeted individuals claim cannot be true.

They really mean that nothing outside the boundaries of their small range of experience or at odds with their opinions concerning the nature of the world can be, by them, believed. They live within a very neatly organized and enclosed world. The falsity of their world view no doubt requires them to ignore many inconvenient facts.

Perhaps Carlos Castaneda's term "the assemblage point" could be applied to the understanding of this crystallized and complacent ignorance and denial of what lies over the horizon. Or one might turn to the social theories of Herbert Marcuse in search of an explanation.

We could also speak of a fake rationality that enables certain groups of people to assemble a world view that operates like an old-style Hollywood set, to convey a convincing illusion. This illusion satisfies those who feel no need to peer around the cardboard fake scenery.

As the great physicist Heisenberg noted, mystery and uncertainty constitute a large part of our human world. Any effort to effectively remove them from the mental and psychological life is like lobotomizing the patient to relieve his discomfort.

CONFORMITY AND REPRESSION

The denial of inconvenient facts serves a function in the psychic economy and supports false rationality. For example, in the NSA one is given the advice, “Don’t rock the boat.” “Don’t ask questions.” “Don’t cause problems.” This is a military culture of obedience and conformity. To get ahead, one must go along.

Those who don’t rock the boat can acquire material benefits and promotions that would be denied to them, were they to question their superiors. Of course this is obviously, also, a culture of corruption, and we should not be surprised, therefore, if we have an “intelligence” problem.

The choice may be made consciously to follow the given advice and tread the safe and personally advantageous career path. This is a choice to obtain career advantages at the cost of a portion of one’s integrity, which one may make with full knowledge of the choice one is making. Others go along out of an instinctive conformity. These instinctive conformists are those most likely to embrace fake rationality. It absolves them of a portion of their human responsibility.

In a society in which attaining material advantages has become practically a religion, fake rationality provides the “proof” that this is the wisest thing a human being can do. It is the comforter of those who have given up something they prefer not to remember.

As the ideas that find embodiment in our society are ever more crystallized, increasing conformity is bolstered by fake rationality. A “pseudo-normality” is confirmed by promotion and position within the existing structures, whether in the military, the security apparatus, corporations, or major media.

The culture of repression arises as a vigilant effort to sweep away anything that may bring into question the prevailing acceptances. To an extent repression operates openly and with the concurrence of a portion of the population. But in addition there are repressive forces that operate in secret. The TI program is one example of these secret efforts. The secret within the secret is that these efforts are not designed to protect the national security. They are designed to protect the power and privilege of portions of American society that already have far too much of both.

HERCULES IN THE STABLES

Confusion in the TI community has a different basis. The TI would love nothing more than a clarification of the story, but is handicapped by the many objective factors already enumerated. Targeted individuals know very well that they don't have possession of all the facts. Their theories about what is happening may or may not be correct, but they are not formulated for the purpose of closing the subject.

In spite of the prevailing confusion and a "lack of hard evidence" for the claims made, the best information on the TI scenario is to be found in the TI community. The investigator has only to search out the best websites.

The investigator must isolate the basic reported facts and separate them from added interpretations and theories. Many of the reports reveal an emotional distress that is only natural, given the nature of the attacks. Some version of conspiracy theory is in fact a rational response to an existing conspiracy, even if the details are incorrectly grasped.

Confusion and false clarity are only the shoulders of the road, which reveal the need for clear facts and a comprehensive understanding.

One starry-eyed mystic writes reassuringly that there is no gang stalking or psychotronic harassment. It is only God trying to communicate with us. At least this fool is half right, since the religious person may take all experience as communication with God. To that extent he is less deluded than the psychiatrists and fake rationalists, who have convinced themselves that what is real (the harassment) is unreal, and what is unreal (their knowledge) is real.

But if anyone would put a divine spin on the ongoing TI experiment, it will not be by denial of the fact but by taking the dragon by the tail and hauling the beast whole into the light.

RED EYES

One site claims that the main sign of a TI is red eyes. This may be true if the eyes are targeted and damaged by the electronic stalkers, but it is not necessarily the case with all TIs. In fact there is probably considerable variation in the use of these new technologies, depending on the purpose and morality of the local groups; some assaults are extreme in their viciousness; others are relatively more moderate. It may seem absurd to characterize a protracted, continuous 24/7 assault as moderate, but I am speaking relative to reports from around the world. The attacks reported in New York are moderate compared to some of the horror stories from San Antonio, California, Australia, Great Britain and other parts of the world.

A group in San Antonio, for example, operated as a rape club, targeting attractive young women. Electromagnetic surveillance facilitated a series of more traditional crimes. These included breaking-and-entering and the use of rohypnol, the date-rape drug, to prey upon women with a minimum of risk to the members of the group, who were employees of a private investigator.*

Among the symptoms or physical marks attributable to the energies employed against a TI, tiny red marks may be visible if the TI is burned with the electronic version of lit cigarettes. The sleep deprivation resulting from nightly attacks naturally has physical consequences. Continual harassment and abuse have debilitating effects on most people.

The litany of extreme harmful effects said to result from these operations, listed on certain websites, may be exaggerated, or may only relate only to the most vicious and exceptional attacks; but it points out the very real potentiality of abusive actions using these technologies. Even the minimal use of these technologies for illicit surveillance and harassment is more than the public should tolerate.

__________ * See John Hall, A New Breed: Satellite Terrorism in America (2009), Strategic Book Publishing.

THE SECRET SERVICES

Diverse purposes, both good and bad, may be served by these technologies. Since we have spent much time outing some of the misdeeds and excesses originating in surveillance and covert activities, it behooves us to note the positive side of the picture and to find words for the secret services, viewed in their constructive and protective aspect, and justifying the public expense.

In so far as excesses have been present, there exists unavoidably a desire to seek rectification of existing problems, but these should not lead to the undesirable swing of the pendulum from one extreme to the other, and to the cancellation of useful activities that may even safeguard the nation from extreme dangers.

Technologies and groups may have either a life-saving effect or one that is perverse and criminal, and the business of those in charge must be to insure that the former is the case. If one follows the thinking along the lines of defense, which contemplates possible attacks by any of a variety of enemies, the ability to counter those attacks is essential to the safeguarding of the nation. One may conceive then of secret activities that are, at the extremes, good or evil; as well as those that are gray, or in the middle.

MURDER BY PROXY

It has been said that the TI program does not target suspected terrorists or dangerous people, that it does not carry out police work of any kind. A systematic program, it bypasses all the norms of our civil life and criminal justice system, by using "national security" as a cloaking device. It carries out illicit experiments and gathers information through invasive surveillance of randomly chosen people with the intention of empowering unknown entities who have access to the information as they have access to the new restricted technologies. These charges may be partly true. Further investigation is necessary.

In a few instances persons who were Targeted Individuals have committed violent acts, including murder. These acts, interpreted superficially, were ascribed to disturbed individuals, with no recognition of the possible perverted use of advanced technologies as a factor in driving these people over the edge. Many people have the capacity for violent action, if they are pushed beyond their breaking point. The potential of the TI program is that it may use psychological pressures in an inverted way not to heal or help people but to destroy them, humiliate them, or else thoroughly enslave them.

Since the TI program is kept secret, it is not recognized as a causal factor, or as a potential causal factor, in violent acts. Whether these acts of violence are an intended or accidental consequence of the TI program is unclear.

Now that we know about the new technologies relating to auditory harassment at a distance, crimes ascribed to “madness” or involving those reported to have been “hearing voices” should be re-considered in the light of the possibility that the known perpetrators may have been themselves targeted and goaded. This means quite simply that in all such crimes there may have been additional perpetrators behind the scenes who remain unsought, an astonishing omission when you consider the fact that many prominent people within our security establishment certainly know about these technologies and their use. Perhaps they could be nudged to have a talk with the detectives carrying out murder investigations. The same goes for suicide cases, since the victims may have been prodded to take their own lives; if so, these are unsolved murders.

OFF-STAGE

The concealment of an instigator or guilty party in a murder or murders is obviously a serious issue. But it is only one spectacular and fairly obvious example of the impact, or possible impact of concealment, in relation to a multitude of issues. Even if we assume the falsity of the 9/11 conspiracy theory, it is interesting to look at such a theory in the light of what it can tell us 1) about the extreme possibilities of malefic manipulation by behind-the-scenes actors; and 2) about the extreme skepticism concerning the nature of our government and national security apparatus. Without an actual knowledge of facts, one may believe that there was such a conspiracy or that there was no such conspiracy. Either way, there is little basis for an opinion. This is the noetic condition of the average American citizen in regard to this and to a multiplicity of issues; so many, in fact, that the voters are dangerously detached from anything akin to an understanding of how the world works, or of the system within which their lives are enclosed.

In this volatile sea of uncertainty, false rationality serves as a pacifying mirage. It is fundamentally unsound, even as it masquerades as certainty. The pictures assembled by false rationality serve always to veil or distract from reality, whether deliberately with deceptive intention, or unconsciously, as in the case of the self-deceived.

One way in which this works is by the selection of facts or cherry-picking to create a biased conclusion. Liberals, for example are currently focused on the sexual harassment issue. Liberal news shows present this as a national issue. Of course this is a real issue, but it is a “soft” issue, relative to more urgent matters. Whether a girl is inappropriately groped or propositioned by her boss is not to be compared with a girl being placed in a dungeon and tortured at will. While the liberals are focused on the groper they know, they are blind to the fact that our country could, in a worst case scenario, fall permanently under the control of a criminal class which, if more firmly established, will be able to retract at will any “rights” supposedly achieved by the advance of civilization. The assumption that the office groper is headline news distracts attention from the more sinister actions taking place off stage and hence is an example of the operation of false rationality in the liberal media.

Meanwhile, the blind submission to the requests by the national security community for ever more secrecy and funding is empowering criminal perverts with their own agenda, which probably includes the re-structuring of the nation in a manner that will bury liberalism forever. The difference in our response to the two situations is not determined by their relative seriousness but by the fact that one situation is currently on-stage and known, and the other is currently off-stage and unknown.

The more important news item is not in the news because almost no who knows wants to talk about it, and too many people seem to accept the nonsense that our secret programs are all serving the national security. If someone does come forward as a whistle-blower, he is punished for revealing secrets, or dismissed as a conspiracy theorist, as if that label were a proof that his claims were beneath consideration.

SPECTRUM ANALYSIS

National polarization matches apparently irreconcilable opponents: liberals seeking the extension of equal rights battle conservatives, who uphold a more traditional agenda.

The liberal media, focused on sexual misdemeanors, parade Al Franken, a virtual teddy bear, before the public like a Roman prisoner on a victory march, a caged barbarian on display. This gives the impression that Americans are establishing a new plateau of civilization, a model for the whole world to follow, in which respect for women, equal justice, and dignified standards in the workplace, will be enshrined as basic to the human rights agenda.

The impression is a false one, because the American underworld, which is filled with violence and crudity, is left out of the spotlight by the less than zealous news reporters. This omission is directly proportionate to the extent that they triumphantly feature the entertaining stories of the downfall of this or that celebrity.

Descending still further; into the infra-red, so to speak; we enter a nether realm where denial is not even necessary, because no accusations are heard in the mainstream media, although here the crimes to be considered are by several orders of magnitude the most outrageous. Moreover, they are not limited to individuals, who may always serve as scapegoats, but to systemic abuses and institutional corruption that render the very ideas of democracy and justice a huge joke.

DOMESTIC TERRORISM

There have been acts of domestic terrorism involving shooters who were Targeted Individuals subjected to auditory and other forms of harassment. These acts of terror, carried out apparently by lone shooters, actually involved multiple participants. Aaron Alexis, for example, dubbed the "Navy Yard Shooter", killed 12 people. He was almost certainly a Targeted Individual, since he sought help prior to the incident.

Owing to their ignorance, psychiatrists automatically label as paranoid schizophrenic any person who claims to hear voices and claims that he or she has been harassed electronically. The police accept this verdict with the same automatism, and that is the end of the case. They assume that the shooter, a disturbed individual, acted alone.

If the new technologies are acknowledged, and if it is understood that there is a systematic program that makes use of these technologies for invasive surveillance and harassment/torture, then it must also be acknowledged that shooting incidents involving persons who “hear voices” cannot be automatically classified as crimes ascribable to the “madness” of individuals, acting alone. In some cases, groups acting from a distance may have been goading the apparent shooter with electromagnetic harassment. In such cases, the members of those groups are clearly guilty of participation in a terroristic act.

The police do not consider these possibilities, however, and in some cases evidence has been concealed.*

In the case of Gavin Eugene Long, in particular, I would imagine that police forces throughout America might be interested in knowing if someone was pushing Gavin's buttons before he went over the top and killed three police officers. We need not believe that the intent of the harassment was to have this effect. It may be that the experiment got out of control. In either case, if a group was "working" with Gavin, the members of that group have some responsibility for the death of those three officers.

The TI typically does not know who is attacking him or why and draws his own conclusions. These conclusions are not necessarily correct. A TI who feels victimized by some poorly defined secret "police" or vigilante group may feel an explosive rage. Uniformed police officers may provide a convenient scapegoat.

The police and the FBI should know about the new technologies and the programs in which they are used. They need to do some real detective work and re-open any investigation prematurely closed owing to the ignorance of previous investigators, or efforts of intelligence personnel to shovel the dirt under a rug; and the public needs to know what they are doing.

Classified programs cannot be an excuse for concealing outrageous crimes. On the contrary, the realization that such events may be linked to classified technologies and their operation domestically should spark a need to know on the broadest lines, bringing all intelligence agencies under new scrutiny. Funding to these agencies can be curtailed or reduced, pending their forthcoming candor.

__________

* See the letter of Dr. Daniel Lebowitz submitted to the Senate Hearing on “The State of Civil and Human Rights in the United States”, Tuesday, December 9, 2014, in which he addresses the cases of Aaron Alexis and Myron May.

APPARENT SUICIDE

It is not known how many cases of apparent suicide there have been that deserve to be reconsidered, on the same grounds. The existence of the new technologies and groups acting at a distance to harass individuals by objectively imposing upon them phenomena that give the appearance of mental disease requires us to take a new look at all acts of violence in which these technologies and methods may have been a factor.

All apparent suicides of the last twenty years in which the victim complained of "hearing voices" and/or of being attacked by malefic agents should be reviewed, bearing in mind the possibility that the situation was essentially just as described by the sufferer.

The psychiatric profession has performed an amazing disservice in providing a "professional" but worthless opinion in a multitude of cases. Even if psychiatrists and psychiatric social workers have been duped by a clever program of deception, they are nevertheless guilty of gross incompetence and recklessness. An "authority" on the mind without a comprehension of the limitations of judgment is an impostor.

THE PUPPET MASTERS

The way in which the psychiatric profession has been played by players behind the scenes points to the nature of the intelligence underlying the TI program and kindred programs. For those persons and groups who do not believe in public transparency and arguments made before the public as a basis for national decisions, life becomes a game of clever subterfuge. If professionals and "experts" can be deceived, imagine how easy it is to con the vast, distracted American public.

I do not believe in a vast national conspiracy, in which all parties are equally reprehensible. Everyone has faults, and some corruption can be found in any department or field, but by and large I do not believe in an omnipotent sinister power. The reality is bad enough, but the evil in our midst can be ended if there is a sufficient response by all parties and by the people as a whole.

The rule of law requires transparency in all aspects of our government. We must not cede inordinate powers to any institution or representatives. Even our President is only a temporary worker. We do not put our faith in individuals. Neither should we have pogroms targeting individuals for their minor bad behavior, their skin color, their religion or their political beliefs. We do not need individual or group scapegoats. We need to restore balance and sanity to our way of life.

Even worse than the prejudicial enforcement of the law or a misguided approach to national security (errors in the public domain subject to correction) are those flagrant criminal actions made possible by the excesses of secrecy and covert actions, as well as an absence or insufficiency of effective oversight.

Our Constitution should not be lightly set aside. If there are new technologies and new problems that alter the world situation, we should make adjustments, without losing the spirit of those laws that serve as the foundation of our nation.

THE FUTURE OF CONSPIRACY

Given the emergence of a public awareness of the TI program and the nature of the scam that has been perpetrated through its agency, we can expect that future malfeasance will assume new forms. It is not enough for the public vigilance to recognize the historical character of evil. Evil is adaptable.

If it is recognized that “hearing voices” is a tip off to TI style harassment and abuse, the pattern of abuse may change. In the interim it is possible that the information that a person of interest, now deceased, formerly heard voices, will be suppressed or even become classified, for the protection of the criminal perpetrators.

I would like to know the back story of the Los Vegas shooter, who killed 58 innocent people in one carefully planned spree. Curiously, no one could figure out why he did it. When the mystery remained unsolved for a week, the story mysteriously disappeared from the news.

Likewise, we heard only that the Texas church shooter, who slaughtered a whole congregation, was a troubled person who had been abusive toward his ex-girlfriend. Did the Air Force withhold evidence relating to his mental state?

THE END-GAME

If the main purpose of the TI program is neither national security nor the provision of an auxiliary police force (the reasons probably given to those in a position to ask questions), what is it? As we have already suggested, there may be many purposes, including the collection of data. But we do see two major effects of the program. One is the gradual purging of dissent. The other is the fomentation of outbreaks of irrational violence. Both effects tend to shift the nation toward the hard right, and toward the embrace of the permanent security state.

The purging of dissent is accomplished through various forms of intimidation, including blackmail, assassination, harassment and marginalization. Targeted individuals are completely denied their basic rights as American citizens and even as human beings. They are subjected to inhuman treatment that goes on continuously year after year; for seven years, twenty years, endlessly. Their marriages often end in divorce; they may lose their jobs and become homeless. Their lives are maliciously and deliberately ruined. They seek help and find none. They have no recourse through the justice system, which is blind as never before. If, finally, some of them explode in acts of violence, it is more to be expected than otherwise. While it would be charitable to assume that these explosions were accidents unforeseen by the programmers of these cruel and psychotic experiments, that is probably not the case.

What is the result of a public explosion? Usually, it is to confirm the need for the security state. People are frightened and vote still greater funds for arms and for the programs that are supposed to protect them.

Take the case of Gavin Eugene Long, who, on July 17, 2016, shot three police officers dead in Louisiana and injured several others before he himself was shot. A veteran of Iraq, an ex-Marine, a black man, he was almost certainly a Targeted Individual. If so, it means that his reward as a soldier for serving his country was to come back to the USA and find a new enemy waiting for him.

Both the gradual purging of dissent and the fomentation of occasional outbreaks of irrational violence facilitate the shift of the nation toward the embrace of the permanent security state, the new American society, in which all fundamental power is held by a few, who are able to hire as many as they need to consolidate, guard and extend their power: the sheep soldiers of a neo-fascist regime.

THE SUICIDE SQUADS

The suicide squads are the riffraff collected into the various cells which carry out the day to day operations. In the beginning they are probably given a line about being special units created to bolster the national security through the use of remarkable but illicit technologies and methods. The may realize as time goes on that the nobility of their mission was only an appealing inducement to get on board with an extremely nasty and dubious clandestine program.

While there is immense opportunity for the satisfaction of sadism within these groups, and some within the groups may take pleasure in their work, by and large those recruited are probably regular people. They were looking for jobs, and these were the jobs that are available.

As the dirty secret seeps out of the air-tight container in which it has been held, it is possible that many of the members of these groups will be induced to speak out. It is in fact vital that they do so, to report both on the nature of the restricted technologies to which they have had access and on the ways in which those technologies have been used.

MADE IN AMERICA

American protests against human rights abuses in China, Russia, Israel, Venezuela, the Philippines or North Korea will remain hypocritical as long as outstanding human rights abuses are permitted in the USA. The dirty secret that American citizens can be tortured in their own country without ant recourse to the law, at the whim of psychotic groups equipped with technologies that permit mind reading and continuous 24/7 communication with the victim, renders null and void all presumption on the part of America to be any kind of exemplar of human rights.

As individuals or world citizens we can speak out against atrocities anywhere in the world. This is the spirit of Amnesty International and kindred groups. But anyone speaking in the name of America must bow his head in shame, silenced by the facts.

Anti-American sentiment feeds on these realities, and terrorists employ them as motivational tools in building their armies of destruction, but they are only the lesser builders. The greater builders are right here in America, for they have created the facts that inspire our enemies, as Abu Ghraib became the signature of America in Iraq.

To understand this is to grasp the new thinking that might be initiated in a Department of Peace. This is a true left wing idea. The absence of a true left leaves America hopelessly tilted to the right, like an eagle trying to fly with one wing. Democrats are viewed contemptuously because they appear as moderators of the Republican agenda, a second party, not a leading party.

In the light of our fears, it is even imagined that intelligent and benevolent policies would make us weak. On the contrary, they would make it possible for our strength to be used intelligently and for purposes that win us friends rather than enemies.

The only persons who could lose from such a change are those wedded to the corruption made possible by bloated defense budgets and the lack of supervision currently extended to the myriad covert operations.

Having substituted data collection for real intelligence, we have allowed "national security" to become the cover story for criminal perversion.

THE TAIL OF THE DRAGON

The organized domestic terror groups or "suicide squads" as they are sometimes called are a symptom and not a cause. An extreme manifestation, they indicate the root problem: funds beyond counting or accountability for projects equally unknown and unsupervised. In the labyrinth of our military-industrial complex and spy agencies, who would miss a few hundred billion dollars? Even the gold-plated toilet is probably classified.

The suicide squads constitute the segmented tail of the dragon. If we take hold of the tail, we take hold of the beast to which it belongs, as the TI system provides insight into the thinking that animates the men near the top of our national security infrastructure.

Abu Ghraib revealed to the world an America that had gone horribly astray. We were at pains to assert that this was not who we are; what happened there was only an aberration. But how then do we explain the existence of similar programs, with American citizens as victims, operative on American soil, and still awaiting exposure in our major media.

The sadism and contempt for law enshrined in the TI program is breathtaking. How was it possible?

It was possible because it was secret. No one knew it was happening except for a select few insiders and the members of the suicide squads themselves.

Of course those who were targeted knew. At least they knew that something monstrous had come into their lives, a living nightmare that they were at pains to describe even to themselves. If they spoke to anyone, they were met with disbelief. They were labeled by psychiatrists. And their victimization went on and on.

These 24/7 operations are carried on, unbelievably, for years. Such protracted labor-intensive operations boggle the mind. According to at least one researcher, they continue for the lifetime of the person targeted.*

__________

* See Guinea Pigs: Technologies of Control (2014), Chapter 8: "The Six Phases of Organized Stalking", by Dr. John Hall.

LIMITS OF THE MIND-READER

The mind-reader can pull both visual images and verbal thoughts out of the mind even when they are not fully articulated by the person being read and that person is not fully aware of them. But these contents still require interpretation, a labor intensive and even dubious process, unless the interpreter, through long familiarity or keen sensitivity, already has the key to the personality of the person being read.

If one wishes to ward off this mental invasion, and the feeling of helplessness that may accompany it, one has only to formulate conscious thoughts. These consciously formulated thoughts can then be imposed upon the reader, much as “the boss” imposes upon his stenographer the necessity of taking down his dictation. This is even easier than dictating because there is no need for the effort of speech. The one who is targeted thinks. The reader hears and is probably required to record what is heard. This reverses the polarity of the process: the home invaders are forced into a position of passivity and subjection. This should afford some compensatory satisfaction for those who are attacked through invasive technologies. The art of telepathy can also be practiced if one thinks with the idea that one’s thoughts can be heard. One can formulate long diatribes, make fun of the peeping Toms, and “write” the rough draft of letters, articles and books exposing their operations. One has a captive audience.

Another limitation of the mind-reader is that if a person thinks in a foreign language, the usual problems of translation will be added to the difficulty of de-coding the data.

This new technology will have far-reaching applications. Some may be immensely beneficial. Others may be less so. Imagine the job interview of the future. While the candidate is being interviewed, his mind is being read by a third person.

A similar technology may be used to transform the telephones of the future, making possible a form of communication akin to telepathy, or direct transmission and reception of thought, with no need for speech.

Experiments carried out by sensitive researchers could greatly augment the understanding of psychology.

The fact that the new mind-reading technology is currently “restricted” to use by sadists and perverts tells us all we need to know about the minds behind the Targeted Individuals program.

INTERNATIONAL CRIMES

Because the Targeted Individuals program is a global criminal phenomenon, international efforts have been made to ban the abusive use of the new technologies in the manner characteristic of this program. We cannot say that all of the criminal groups originate in one source, but it seems likely that America is the global leader in the creation and deployment of these new technologies.

This is important to recognize because American citizens have a responsibility for the activities of criminal groups originating in their own country. These groups effectively create American foreign policy without the consideration of the American Congress or President, or the electoral input of the people. It may be a natural conclusion of foreigners that these operations are carried out by American intelligence agencies with the approval of the American government and people. The normal result of this conclusion would be a growing anti-Americanism, along with the belief that American idealism is only a hypocritical assertion.

In America the use of these groups to target American citizens must result in anti-establishment feeling and a growing hatred of all the emblems and actuality of authority of any kind. Uniformed police officers may be selected as scapegoats for the venting of this type of extreme feeling.

Apart from the TI program, there may be a host of similar activities employing the same or a similar array of technologies in various ways. In the Cuba incident, for example, an entire embassy group was targeted. Since no outgoing audio feed informed the victims, all they were aware of at the time they were attacked was a series of unusual but subtle sounds and vibrations. Some of the adverse effects of these attacks were only realized after a lapse of time.

No culprit was found, but ultimately the Cuban government was blamed, and the incident was used as an excuse by the Trump administration for downgrading American-Cuban relations, a result that may have been the very intent of those who engineered the attack.

EARTH CHANGES

A major negative result of the TI program and other secret programs is that they foster in the American people a loss of trust in and growing alienation from their government. In the most recent and sensational case, our intelligence agencies make the broad claim that Russia attempted to meddle in out election. Our President denies this. Many people distrust the President, but as many distrust the intelligence agencies, throwing the whole issue into confusion, between claims and counter-claims. The Special Prosecutor goes forward, but even he and his team are accused of partisanship. According to the President, the whole FBI is tainted with bias and is in tatters. All of this makes evident a complete loss of consensus, including the ability even to agree about the basic facts, let alone the policy that should follow from their analysis.

People engage these issues usually on the basis of who they hate the most. This creates the intensely partisan rancor and a different form of the Targeted Individuals scenario, as the partisans of each camp gang stalk members of the other camp at any sign of weakness. This is also reflected in the nightly news and reveals, above all, the bias of the individual news program.

While our nation is falling apart, the stalkers are primarily concerned about the real or imaginary bad behavior of this or that individual.

All of this makes us the laughing stock of our enemies. They don't even have to send suicide bombers. They can just sit back and watch us destroy ourselves.

Putin, too, has a good laugh, but he is only getting back at us for the humiliations Russia suffered after the surrender of Soviet Communism, when we were not satisfied with victory but had to kick sand in the face of the fallen foe. What goes around comes around. After the collapse of Soviet Communism, America became, briefly, the world's exclusive superpower. Unfortunately this did not lead to wise policies but to policies animated primarily by greed and old style power politics, with plenty of dirty tricks under the radar.

The invasion of Iraq in 2003 with a coalition of the willing was the final disastrous sign of American arrogance, losing the last vestige of the world's respect. It was observed that while we had the power to destroy countries, we no longer had the power to build them.

Today the world is in a very chaotic state. As the old allegiances and alliances fail, it is akin to movements of the earth under our feet. Nationalism is resurgent. It is a dangerous time.

RUSSIA

One cannot argue against the defense state by arguing that there is nothing to defend against, but one can argue against the excesses that are based on fear, greed and aggression; and one can argue against specific defense policies, if there is reason to believe that they do not serve the national interest.

The obvious desire of the Trump administration to alter the relationship with Russia is met by an equally obvious desire to resist such an alteration. Instead of arguing the point on the merits of either choice, in the light of the national interest, the parties engage in a byzantine process of PR campaigns, cross-accusations and legal maneuvers in which strong interests aggressively assert their right to control policy, but without bothering to enlighten the public as to the reasons in either case, by elucidating the pro-and-con of the two positions.

If it were possible to have a more constructive relationship with Russia, that might not be a bad thing. Of course the rationale would have to be more than the business prospects of a few individuals or companies lobbying for the change. On the other hand, the advocates of the policy already in place, or a representative of their view, should be required to show that resistance is based on something more than entrenched interests and inertia.

The habits of secret deals and of leaving things to the "experts" dies hard, but perhaps the major media could be so bold as to ask a few questions on the actual substantive policy issues, as distinct from the daily gossip, oft repeated mention of investigations in progress, and motion pictures of Jared Kushner carrying his suitcase.

We do not argue for one policy or another but insist that the rationale for any major policy decision be made transparent. Only if and when the public is informed and persuaded by sound reasoning can an implemented policy be said to be American or national policy. Backroom deals and covert operations may only express the will of the few individuals involved. A mere PR effort may camouflage the real decisions and actions behind a slogan. This is not persuasion but deception and manipulation. We do not elect representatives and give them carte blanche to do whatever they please.

It is up to the news media to do a better job framing the issues. Editorials should be left on the editorial page. We have opinions aplenty. It is time people were allowed to have some information about what is being proposed, and what is being done in their name.

Democracy cannot survive without an informed public. This requires transparency in all of the operations of government. It requires honest and open consideration of all issues facing the nation.

CIVIL LIFE

The outrage of the Targeted Individuals program affords us an outstanding example of everything that is wrong with America today. For we view it not simply as an isolated aberration but as the extreme manifestation of tendencies that are both ubiquitous and deforming to our national life.

In the absence of transparency and the open debate of issues and policies, with an emphasis on the national interest, as distinct from the interest of private persons, groups, corporations or political parties, our national life falls prey to the lowest common denominator.

Instead of openly opposing ideas or proposals, we defame the person making the proposal. Character assassination replaces argument, and everyone is a loser. Remaining uninformed, we take sides. All we know are the opinions that are drummed into us. As these opinions always involve the demonization of some other person or party, we are liable to turn into a nation of attack dogs.

Thankfully, everyday people are far healthier than their leaders. It is when we turn on the television that civil life seems to have become a sickly stew of defamation, gang stalking, bribery, secrecy, covert actions, fanaticism and hypocrisy.

SYMBIOSIS

There is a major difference between live and recorded audio transmissions. If monitoring is continuous, and there is also an immediate audio feedback making that fact plain, then it becomes possible, even perhaps inevitable, that the TI and the monitoring group will be involved in some type of symbiotic interplay; this is especially likely if the membership of the monitoring group is constant, producing familiarity between the interacting individuals.

There are three types of symbiosis:

1) mutualism;

2) commensurism; and

3) parasitism.

Most TI accounts emphasize the negative experience and the parasitism of the stalkers who conduct the illicit surveillance and harassment. This is a natural reaction, especially when the nature of the attack is first realized. But this reaction implies victimization, and identification as a victim. The TI is owned, abused, harmed and helpless. The case may be altered, however, if the TI chooses not to be a victim.

This means fighting back. It means turning the situation to positive advantage.

The TI takes possession of the high ground and begins to target his monitors. He begins to mine them for information that will be useful in terminating the use of abusive technologies globally. This places the TI in alignment with the highest spiritual forces, and energizes him in a way that strengthens his immune system and turns him into a formidable warrior.

He can use the synthetic telepathy to "speak" to his monitors. He can entertain them, abuse them, teach them. They are a captive audience, forced to listen to his harangues. He can let them know that they are on the wrong side of the law. This makes them vulnerable and likely to come to a bad end. He can encourage them to get out of the foul TI program and find honest jobs or, better yet, help him to reveal the truth to the world about the existence of the new technologies and the despicable manner in which they are being used. He can remind them of the Constitution and the Bill of Rights. He can remind them of what it means to be an American. He can become friends with them and turn them toward the light.

The realization of a positive mutualism is only possible if the TI is strong-minded. It also requires a degree of receptiveness on the part of the monitors that may or may not be present. Local operations vary, and so does the quality of the operators.

The idea of mutualism may seem abhorrent to some. Does it imply that one is reconciled to the invasive surveillance? Does it imply a situation comparable to the Stockholm Syndrome, in which the hostage befriends his captor in the hope of gentler treatment?

If the surveillance cannot be terminated, it is a waste of energy for the TI to continually chafe and experience victimization. It is psychologically better to be reconciled to the inevitable, while taking constructive steps to terminate the whole abusive system. If one can forget oneself and think in terms of the universal liberation, one can use the circumstances of one's individual entrapment for the greater good.

The situation is then analogous to that which existed between the two sides during the Cold War, when both sides realized it was to their mutual advantage to avoid the maximum antagonism or Mutual Assured Destruction (MAD). The situation may also develop an entertaining or educational aspect. The TI, while seeking the termination of the abusive system, may hold out to his antagonists the possibility of personal redemption through realignment with the forces of light.

It is also important for those who are attacked to maintain their normal lives as much as possible and even to learn to ignore the attacks.*

It is possible that any type of direct response can be used by the attackers, since their is a hypnotic aspect to the continued audio harassment that draws the victim into a never-ending loop. By learning to ignore what is going on, one retains a freedom of action.

By joining others in the effort (educational and political) to expose and bring to an end the system itself, one can leave behind any tendency to become a victim.

__________

* This suggestion was also made by Nicholas Kirkland, a TI with decades of experience, who has offered some excellent advice for targeted individuals in an excerpt from his book, The Silent Massacre: Electronic Torture and Mind Control in the United States of America and Law Enforcement Complicity (2008).

THE NEW COLD WAR

In the old Cold War scenario "the free world" was pitted against the Communist bloc and the latter was considered to be the embodiment of the totalitarian police state.

In the new Cold War scenario the threat of the totalitarian police state does not come from Communism, or from the UN (as some crackpots imagine). It comes from the growth of the security regime in every nation. Today the distinction between the USA, the USSR and China is less and less with each passing year. As the Communist powers surrender Communism and adopt capitalist economics, the capitalist nations adopt policies and mechanisms that increasingly promote the realization of the police state. The new Cold War does not pit the USA against Russia or China. It pits the police state in all its forms against the forces of liberation in every country. This battle is both national and international.

The people of Russia have nothing against the people of America, or vice-versa. Why, then, should Russia and the USA be at odds? This is largely a manufactured enmity. It is manufactured by a few small groups in each country. Although Americans, by and large, have no fear of Russia, they can certainly know first-hand the repressive power of their own government; ditto for the people of Russia with respect to their own government; particularly if they have experienced the Targeted Individuals program.

The petty battles of the old, familiar nationalism, pitting state against state, are absurd in the modern world; but they are re-kindled by the die-hards to retain elements of the old world order, or disorder, from which they derive profit or comfort. This type of nationalism serves to veil the real conflict between the forces of liberation and the forces of repression in each country.

PAN-HUMAN STRUGGLE

Because the TI scenario is an archetypal articulation of this struggle within modern highly technological societies, the Targeted Individual has an opportunity to take his stand with the forces of liberation in a global battle. Who else can see so clearly what is actually at stake?

In the first stage of the TI drama, it is natural to see the whole experience in a wholly negative light. The TI has every right to complain of the injustice and inhumanity of his plight. But as long as thinks in these terms he will be a victim; he will count his losses and identify with his weakness and helplessness.

When he resolves to fight back, he is better off; when he allies himself with others in the same fight, he is still better off; when he realizes beyond the TI situation the many forms of operative repression, he can understand that the TI is not as isolated as he at first imagined, and he is still better off; he is involved in a pan-human struggle to define the future.

This realization must be subsequently expressed through all the relevant departments of modern life; political, legal and educational activity are necessary to translate the fundamental liberation into new forms of domestic and international politics, building the just world that, today, seems like a far off dream.

LIBERATION POLITICS

The inhuman cruelty and injustice of the TI system grows out of a repressive system and is simply the most radical systematic expression of repression and injustice.

A parallel issue that is now center-stage for Democrats is that of the sexual harassment of women. Occasionally men are sexually harassed but sexual harassment is mainly a woman's issue. It grows out of the history of centuries of repression and domination of women by a patriarchal order.

For the Democrats this is probably a losing issue, because they isolate it and give it too much emphasis and priority, taking the party into the ultra-violet, even as Democrats in power become increasingly invisible. Their mistake is to focus all their ammunition on the treatment of women in the workplace, a relatively "soft" issue, compared to the systematic rape and abuse of women in the TI program.

Bernie Sanders has focused on the extreme disparity that has developed in the economic sphere through the agency of modern, government managed capitalism. Again, the focus is on repression, but this time the aggrieved party is defined economically as the great majority that has lost ground through the machinations of policies tilted always toward the benefit of a few.

There are many other issues, but the main issues are those of justice, economic and political. The basic themes are winners for a strong and energized Democratic Party. The cultural issues should follow in the train, and not be the leading point.

The defense issues are also a main theme. Here the problem is that the tail wags the dog. We no longer have an army because we have an enemy. We have enemies because we have a military establishment which cannot imagine life without enemies and war planning. It is not about defense if we are the aggressors.

We need to reverse our thinking in order to gradually reduce this sphere, which consumes an inordinate portion of the national budget. With better policies we can have fewer enemies. Some of the expenditures and organization geared toward security can be re-directed toward other purposes. This should be done in such a way that workers are not adversely affected by sudden changes. Swords to plowshares thinking must be systematic and not left to the marketplace. The marketplace is fine for the minutiae of daily life, but thoughtful, systematic purposes can only be implemented with intelligent large-scale planning.

This requires us to think more clearly about freedom. Do we support the freedom of abusers to run amok, or the freedom of people to live and work normally?

Race and gender issues are only special instances of the justice issue. Women want justice and fair treatment. So do blacks and other minorities, racial, religious or cultural.

Men abuse women and enslave women by pursuing their selfish interests and taking advantage of their greater physical strength. The alternative is to adopt a chivalrous attitude by overcoming their basic aggressiveness. This is the path of civilization.

The "other" or alien is either an object of fear and abuse, or he is accorded hospitality under the aegis of civilization.

Xenophobia inspires us to build walls and regard all foreigners with suspicion and hostility. Civilization inspires us to tear down the walls and recognize a common humanity.

The basic issues are simple. We embrace civilization, or we let the beast out of his cage. Civilization and justice find completion when we use our strength for the protection of the weak.

The values of civilization are synonymous with our humanity. They are not a grab-bag of special issues or interests to be put forth apologetically.

GHOULS

The analogy of the spectrum, and the issue of red and blue polarization, can be shown in a picture: the red earth beneath our feet, and the blue sky above; beyond the visible spectrum, the infrared and the ultraviolet, the subterranean realm of infernal affairs and covert actions, and the world of the spirit, the final frontier.

Green, yellow and orange are the intermediate colors that represent the normal territory of human life. Relative to the soul and body, we do not live wholly in the realm of the spiritualized soul; not do we live exclusively in the physical realm. We realize the soul in the body.

The realm of covert activities has become altogether too great. Formerly this realm was inhabited by ghosts and hauntings, vampirism and the dregs of spiritualism. Today it is inhabited by intelligence agencies, both public and private, prying into the privacy of everyone on the planet. It would be bad enough if they were only watching. But they also interfere prodigiously. It is impossible to imagine that this unsupervised interference is beneficial, except occasionally. More usually, the knowledge they attain they use for their own benefit, and not for the benefit of the billions of people trying to get through the day. Because this realm is largely ignored, our visible politics becomes a puppet show.

Just as our economic system is a rigged game, favoring the house, or holders of economic power; so is the security world tilted toward the maintenance of power, and the repression of forces that might disturb the status quo. This is not the service of justice; nor is it the protection of "American" interests.

The laws establish an abstract basis of equality, but the laws are not equally enforced; they are enforced selectively.

Democrats must pay more attention to security issues and not cede this terrain to the Republican party. Republicans have already invaded the blue territory of education. There is need for more balance. Al Franken's naughty behavior is not a pressing national problem. A culture of violence and intimidation is. This culture is only partially recognized. Much of it has gone underground, like the Tommyknockers of the Stephen King novel. From their vantage of safety and invisibility, malefic forces are actively influencing life above ground.

MUTUALISM 102

The highest form of mutualism is the win-win scenario, when everyone is together on the most positive track. But this is a love story and is not likely to be achievable in the TI scenario, even when the TI is supremely positive.

If the gang stalkers continue their harmful activities, what can the TI do? Apart from love and encouragement, there is the penalty that a TI can impose on those that are acting against him. The eagle holds both an olive branch and arrows.

He can gather information that will embarrass those who are targeting him. If the local police department or other law enforcement agencies are complicit or useless, he can communicate those facts to a larger public. It is no doubt better if this can be done in solidarity with others, but there are sometimes things that an individual can do on his own behalf. If he has leverage, he can use it to alter the behavior of the stalkers, forcing them to back off and present a more benevolent attitude.

The TI should be careful not to expose himself to further attacks by any behavior that makes him an easy target. He must take the high road. He should steer clear of psychiatrists and psychiatric social workers. Owing to entrenched professional ignorance, they automatically interpret "hearing voices" as a symptom of paranoia.

When the individual TI or the TI community as a group is able to negatively impact the gang stalkers and their supporters, through education, publicity, legal action, and political action, the stalkers will be moved back, at least to a degree. Programs of covert surveillance and harassment will no doubt continue, but if they are deprived of their "immunity," they will not be carried out as recklessly or prove as poisonous as in recent decades.

SECURITY GNOMES

When ordinary people think of the security, they tend to give the benefit of the doubt to the men and women in uniform and to those charged collectively with the safeguarding of the nation. Of course many, if not most, of these people deserve our respect and merely attempt to do their duty as they see it. But there has also evolved over many decades a corrupt sub-culture with strong roots in the military-industrial complex and, to a lesser extent, in the law enforcement community.

When people hear about some bizarre enterprise such as the TI program, their first reaction is incredulity. Even if they accept that such technologies exist, they cannot imagine that they would be employed in the fashion described. As normal, reasonably sane people, they do not think in the manner that has become second nature to those who have labored for years, like gnomes, in underground lairs, with access to classified technologies and unlimited budgets, nursing secrets, thinking always of wars past, present and possible, concocting plans and conducting experiments, all the while by-passing all the normal checks of the civilian law.

The problem with professionalism or specialization is that, after a while, it becomes absurd and excessive through over-development of a narrow culture.

The military-industrial complex is sometimes referred to as the deep state, but this is a misnomer that legitimizes an aberration. Eisenhower, prescient in his Farewell address in 1961, warned us about this danger. (The full text can be found in the Appendix.) He also spoke eloquently about the need for balance.

In the same speech he noted that the situation of the time was due to our enemy, Communism. Communism no longer exists in any form that need disturb us, except in North Korea. Yet the world today seems far more dangerous than it did before the collapse of the Soviet Union and with it, the bi-polar world order.

IN CRIMINALS WE TRUST

We know that criminal behavior prefers to operate in darkness or behind a veil of deception. When we create more and more space for covert operations, we also create opportunities for crime. We do this because we trust that no one will take advantages of these opportunities. This is foolish. Even when the motives for secret operations are not altogether bad, their wisdom may be dubious,

Therefore national security cannot be the province of "experts" and security professionals who operate in a rarefied atmosphere of unaccountability. The public demand for transparency is necessary to check tendencies toward corruption and mismanagement. National security cannot be merely a phrase; it requires sound policies that reflect the will of the people, and these are only to be discovered by putting the issues on the table in the light of day.

Ironically, the TI program, which is probably the most outrageous example of abuse and corruption, remains practically unknown because of the success with which secret operations can be carried out. Left out of the evening news, and out of the public view, they are also left free from oversight. This is precisely the formula for the maximizing of corruption.

FORENSIC PSYCHIATRY

The failure of the psychiatric profession as a whole in relation to the TI problem raises larger ethical, social and legal questions of incompetence and corruption that cast doubt, specifically, on the validity of the authoritative aspect of forensic psychiatric verdicts. These questions have been raised within the profession by the more sensitive and astute psychiatrists, such as R. D. Laing and Stephen Szasz. Unfortunately the voices of a discerning and dissenting minority have not altered the lumbering course of the larger ship, which seems to be on automatic pilot.

There can be no blame attached to an effort in good faith to cast some light on the mysteries of the mind; nor is there blame attached to a humble admission of ignorance or uncertainty. Contemptible is the presumption of knowledge, especially when this presumption is backed up by courts and police officers.

In fact naming is not diagnosis. The convenience of definitive verdicts for courts can have no bearing on the essential facts; nor can this convenience alter the worthlessness of such verdicts from the point of view of science, common sense or justice.

PSYCHIATRISTS:

INNOCENT UNTIL PROVEN GUILTY

The belief that the psychiatric community is "in on the conspiracy" is based on a misinterpretation of the facts by some of those who have experienced the consequences of a false diagnosis.* While there may be individuals who have played a criminal role in deliberately dispensing or encouraging a false diagnosis, the criminality of a few individuals cannot be held against an entire profession. Any individual who has acted in such a manner is twice guilty, and richly deserves both professional disbarment and life behind bars.

The profession, in general, can be accused of gross failure, but not criminality, in the role played relative to the TI program. Psychiatrists and psychiatric social workers have been played as fools; and they have been used by the architects of the TI program as unwitting accomplices in the torture/harassment of countless targeted individuals, through the false diagnosis of those subjected to electronic attack. Their "useful" error was undoubtedly expected by the programming group, which probably included some professional psychologists. Even the role of the latter may be at least partly excusable, in that they may have made their contribution (under military supervision and under conditions of pledged secrecy) without having the final determination of the exact nature of the program.

This should be a great embarrassment to psychiatrists. By way of making up for their unintentional complicity in outrageous crimes, they should hereafter play a leading role in exposing the TI program and join their voices to the demand that it be brought to an end.

__________ * I refer to the psychiatric community in general. In individual cases, psychiatrists have undoubtedly been guilty of criminal activity, especially in connection with experiments conducted under the aegis of American intelligence agencies, in which a culture of “malignant normality” reigns. See The CIA Doctors: Human Rights Violations by American Psychiatrists (2006), Collin Ross.

THE NEW AUTHORITARIANISM

The negative role of psychiatry in (unconsciously) giving support to the TI program is only one aspect of the larger problem of false authority. Because the false diagnosis operates socially as an authoritative fact, it has kinship with the activity of the police impersonator. The difference is that in the latter case the falsity is deliberate and fully conscious. Moreover, one version of falsity can mesh with another and create a larger nexus of falsity.

If we can imagine that the "news" can also be controlled, manipulated or censored so as to support rather than expose these activities, then it will be evident that the problem is further compounded. Various means may be used to compromise the news media. There are carrots and sticks. There are prejudices that can be played like a violin. The fact is that the major media have completely failed to "deliver" the TI story, although it has major significance and has been available for many years.

The role of our elected officials can be and often is similarly compromised, as they are subject to bribery, intimidation and prejudice. The J. Edgar Hoover dirt files have been vastly elaborated, making almost anyone subject to blackmail. Blackmail can be re-inforced with a sweetener. This is simply operant conditioning at the political level.

Corruption has always existed in our society, but never before has it become so systematic and so powerful in its arrangements. It is a great mistake to imagine this in terms of the bad apple. What we are considering is a vast web that includes many different groups and a multitude of players, with varying degrees of complicity. Perhaps they are simply too timid to rock the boat, and their only contribution is their silence.

The various participants may not even be aware of one another. It is not that kind of conspiracy. Most merely live in the gray area of their own personal limitations.

One result of intense individualism and specialization is a compartmentalization of society which separates various professions from the reality check. In place of the reality check they have conventionality, or the "standard" of practice.

Thus authoritarianism or "unwarranted influence" grows insidiously.

In one respect, we would seem to be going in the opposite direction, as the issue of sex harassment has come to the fore. Male bosses and power figures are being called to account for past abusive behavior. This is seen as a sweeping societal change for the better.

But it should be recognized that the improvement of conditions for women is only a reality within limited spheres. The underground reality is that the conditions for women have not improved and are sometimes far worse than it has ever been before.

On a world scale female trafficking, sex slavery and appalling conditions for those without advocates is a reality that dwarfs the improvements being realized by a few affluent or fortunate women.

In America the women in the TI program are virtually abducted and turned into sex slaves. They are daily mind-raped by tormentors using technologies developed by our security infra-structure. The major media have nothing to say about this.

Also, the tendency of the news media to turn everything into a drama of individuals and to demonize this or that person is both a deceptive charade and an appeal to the basest elements. Essentially, it is simply another version of gang stalking. To turn someone like Al Franken into a monster is ridiculous. The real problems of the abuse of women should be considered broadly and with a sense of proportion.

OLD THINKING

The old style of the police state was to rely on crude and obviously brutal methods. This can still be seen from time to time in the USA, but it is more often the case in a backward country like the Philippines, where the current national leader is nothing more than a thug.

A major problem today is that we still think of the police state in these old terms. We use the existence of these backward states to convince ourselves of our superiority and to reassure ourselves that we are okay. By comparing ourselves with the worst, we can make our own mediocrity look like excellence.

This is only a form of self-deception. We become complicit in pulling the wool over our own eyes. Meanwhile, we remain oblivious of the covert activities carried out in our name, and we become guilty of national hypocrisy.

The newest police state methodologies rely on and will increasingly rely on the most advanced technologies. These technologies make possible the virtual invisibility of the active forces. This gives "unwarranted influence" to untrustworthy entities and is among the greatest threats to civilization and democracy today.

METASTASIS OF THE CANCER

The TI program represents the cutting edge of police state tactics in the USA at the present time, but it is not a program run by the police or by the FBI. It is run by a private contractors in the pursuit of private interests.

While these groups are criminal in their activities, they act as if they were above the law. Where they recognized at all, they may be mis-identified as projections of legitimate state power for two reasons:

1)Their actions are carried out without interference from the FBI or the local police departments. This raises the issue of complicity on the part of law enforcement agencies.

2)They employ restricted technologies, to which they could only have access, if access were being provided by military or security personnel with access to these technologies. This raises the issue of high crimes on the part of those supplying these technologies to private entities for criminal purposes.

The close association of state power with private business entities and advanced technology (creating a technological fascism) was the main danger that Eisenhower warned about in his 1961 Farewell Address. Unfortunately, the warning was not heeded.

These groups do a complete end-run around the judicial process and create their own private judicial system, in which might dispenses with right, to streamline the goals of those involved.

One technique employed by the new invisible police state is the marginalization of those selected for attack. The way in which this is most commonly and openly done is through the smearing of a political opponent. But there are also more subtle techniques of marginalization. Having people labeled by psychiatrists through a false (but plausible) diagnosis is one such. Targeted Individuals are indirectly smeared by the fact that a description of the manner in which they are being attacked typically elicits this type of labeling, from both professionals and non-professionals. This indirect smearing may be augmented by direct smearing through slander or false testimony in a legal complaint.

In the TI program, individuals are subject to continuous, 24/7, socially invisible, multi-pronged attack, carried out with the aid of advanced technologies. These attacks are designed to disenfranchise these individuals and render them voiceless and helpless. Subject to continuous assault, isolated, and lacking recourse through the justice system, they typically experience the gradual deterioration of their health, finances and social standing.

In the world of official correspondence and tax returns, the perpetrators of these crimes are probably designated as private contractors who provide “security” to those private entities who can afford them. In NY these may be, among others, abusive landlords who wish to operate under the radar.

Although these are private, not official groups, they have been given access to restricted technologies unknown to the public. The provision of these technologies to private entities is tantamount to the arming of private groups with military grade weapons, for use against other citizens or groups.

These weapons are used to terrorize, torture, marginalize and finally destroy designated individuals. Because the technologies involved are experimental, those targeted are also serving as guinea pigs in protracted involuntary experiments.

The composition of these criminal groups may vary from state to state. They may include licensed or unlicensed private investigators, former cops, former security guards or veterans, along with anyone looking for work in the new world of electronic gang stalking.

FACTS AND THEORIES

The individual gang members are undoubtedly monitored themselves by their superiors in the food chain. In this case the monitoring is probably a passive surveillance, although they may be reminded now and then that they are being watched.

The term "mind control" that is often used to refer to these activities is too strong; that term evokes the total control expressed in fiction works of the fifties, such The Puppet Masters, The Body Snatchers and The Manchurian Candidate. The reality is one of a constant pressure to toe the line, using standard operant conditioning techniques, but with the additional leverage provided by the new technologies. The individual can still resist and fight back. The weaker, however, succumb easily.

Undoubtedly, there have been cases of suicide prompted by these insane experiments; while other victims have been goaded to explode in anti-social violence. Many others have been marginalized through isolation, job loss and broken marriages, and through the deterioration of health and well-being resulting from continual and protracted invasive surveillance and low-level assaults.

The line that one is encouraged to toe will depend on the specific objective of the criminal group. As these groups are various, so are their purposes.

In the case of the gang members, what is desired is that they follow the "rules" that govern their operation and remain silent about these activities. Undoubtedly, there is a prospect of punishment if they get out of line. It is significant that there have been almost no reports or confessions from members of these groups. I have seen one on the internet, from an anonymous writer. It seemed to me genuine, but in such a case the possibility of fraud must also be considered. There is so much fakery on the internet, and those attuned to the TI situation are well aware of it. In the letters and responses that appear, there are frequent references to disinformation.

The difficulty of finding the truth in this matter is, for a layman, profound. We know a little and we forced to make conjectures about the rest, and we are told by fools that we have no evidence and called conspiracy theorists. Of course we have theories. Only the brain-dead do not.

The most thorough report I have seen is from John Hall, whose book Guinea Pigs: Technologies of Control (2014) has a chapter in which he describes the six stages of targeting. His conception of a national operation with several levels of purpose, and significant variations at the local level, depending on local entities, agrees with my own thinking. I prefer not to think of this as a "government" project, as I believe such language confers a legitimacy that the operation does not deserve.

WE THE PEOPLE

Many people within the TI community conceive of a vast unified conspiracy. We believe this concept exaggerates the unity and malefic character of the many participants. Certainly there are conspiracies. They are a part of modern life, and they are many. But in addition to the major players of a conspiracy, there are minor players, whose awareness and complicity is limited. Nor can one absolve the great mass of people, who go about their lives, leaving serious matters to others. Popular indifference and irresponsibility is the other side of the coin of the exaggerated conspiracy theory.

An alienated population, largely divorced from serious thinking or responsibility, is incapable of performing the role of citizenship. Their "representatives" are equally incapable of performing their role of checking inordinate influence and power.

Even the most extreme theories may serve as a warning. Given the rapidity of modern change and the existence of several evil trends, is it so hard to imagine extreme and terrible developments in the future?

The restoration of checks and balances is only possible through the demand of an alert electorate, with honest representatives in Washington.

SOCIAL AND POLITICAL BEHAVIORISM

We would like to illustrate the manner in which social habits can create the appearance of a conspiracy. It has to do with a way of thinking that permeates the professions and the life style of modern man.

To begin, we quote from One Dimensional Man: Studies in the Ideology of Advanced Industrial Society (1964) by Herbert Marcuse. Discussing the linguistic forms and habits that develop from operationalism, or technological reasoning, Marcuse says,

"As a habit of thought outside the scientific and technical language, such reasoning shapes the expression of a specific social and political behaviorism. In this behavioral universe, words and concepts tend to coincide, or rather the concept tends to be absorbed by the word. The former has no other content than that designated by the word in the publicized and standardized usage, and the word is expected to have no other response than the publicized and standardized behavior (reaction). The word becomes cliche and, as cliche, governs the speech or the writing; the communication thus precludes genuine development of meaning."

This appears in Chapter 4: The Closing of the Universe of Discourse.

This linguistic shorthand (and the concomitant loss of meaning) is furthered when we move at the speed of business. Consider the difficulty of the journalist who has to create a headline of five or six words to "communicate" a story, or the limitation imposed on the communication of meaning by the sound bite.

Let us now turn to the TI situation and observe how these factors work in a real social situation. The TI is attacked by the new technologies. His mind is read and he "hears" voices that are projected direct to his brain. Since these technologies have been classified and remain generally unknown, for all practical, social purposes, they do not exist. He tries to communicate what is happening to the people around him. If he knows who is stalking him and where they are located, he may report the attack to the police. Even so, no one takes him seriously. Everyone believes he has a mental problem.

A psychiatric social worker arrives on the scene and after a twenty minute interview, in which the main concern is to discover whether the person who hears voices is in danger of committing suicide or any other act of violence, writes down the diagnosis: paranoid schizophrenia.

Note that no investigation has taken place, neither by the police nor the social worker. Even the interview of the "diagnosing" social worker with the person under assault has been cursory, at best.

That diagnosis can easily become an operational factor in further events down the road. If the TI situation has been set up by an abusive landlord, the electro-magnetic attack may be followed by a legal action, such as an attempted eviction.

Now the "diagnosis" serves as evidence in housing court, where it is considered by lawyers and judges who have no knowledge of the actual events except at second or third hand. In fact the TI has been set up, and is the victim of an extraordinary crime, in which the victim is framed. If his situation continues on a downward spiral, he may easily become homeless or even institutionalized.

A diagnosis of a mental condition, after a single encounter, even under the best of circumstances, is no more than a tentative or theoretical proposition. No sensible person would take it seriously. But people who are moving at the speed of business do not always have the time or patience to be sensible. They take the label as fact, which provides an operational guide to subsequent behavior (on the part of health professionals, lawyers, judges, family members, friends, virtually everyone). Often it is a family member who makes the initial diagnosis, which is immediately ratified by health professionals. Finally, even the lawyer representing the TI cannot be convinced that what the TI describes is anything other than evidence of a mental problem or subjective condition.

The police, social workers, lawyers, judges and family members are not participants in a conspiracy. They have, generally no evil intentions. But they act as if they were in concert with the actual conspirators. They do so because they cannot help it; they are acting automatically, out of a limited habit of thought or prejudice. They know nothing about the new technologies and even if they knew about them, they would probably not be able to imagine their use in something as bizarre as the TI project.

Here again we have a problem of comprehension owing to the inability of people to step outside their conventional mind-set to perceive or even believe in the existence of something unusual and outside their familiar mental boundaries.

In fact the security gnomes responsible for the TI project do not think like ordinary people. Their thinking is not necessarily healthy, reasonable, or defensible even under the loosest conception of national security. But secrecy, lack of supervision, and unlimited budgets give them wide latitude to pursue even insane purposes. And it is likely that these unknown persons are also responsible for other, equally bizarre projects and no doubt have far-ranging plans for still more insane projects, if they are allowed to persist, unchecked, in their encroachment of civil liberties, human rights and good sense.

THE ECONOMIC FACTOR

Those who attack the “welfare state” as a manifestation of the “left” should recognize that a large portion of our exorbitant military spending can be attributed to the “welfare state” of the “right”. Even apart from the completely unnecessary, counter-productive and expensive wars in Vietnam and Iraq, the lucrative contracts and sinecures provided to those in the military-industrial complex can scarcely be justified apart from the dubious idea that these activities “employ” so many people. Likewise, big business has long been the beneficiary of national policies, including the bail-out of the “too-big-to-fail” banks in 2008, a policy pursued by both Republican and Democratic administrations.

The amalgamation of government and business and science is a fact, no matter who is in office. Government policy affects the economic life of every American and has for many decades, through tax policy, trade policy, immigration policy, and defense policy. Every government decision puts money is some pockets and empties others. We do in fact have a “managed” economy and not a “free” economy. But if we look at the basic economic statistics of the past four decades, it should be obvious who has been helped by government.

The “welfare state” is probably here to stay, and it is quite reasonable for those in government to be concerned with the welfare of the citizens. We can only hope that these concerns and the managed economy might be managed more justly and sensibly.

Objectionable is the lack of recognition of who is being served by a policy. Hand-outs to the wealthy are generally masked or veiled with nonsensical rhetoric, while the poor are accused of sloth and parasitism.

The lack of transparency and the lack of clarity finds its apotheosis in the covert programs, and here the level of corruption and the dollar amounts exceed by many times the trifling amounts taken by those programs that directly serve the poor.

The TI program may be of no use to the citizens of the USA, but it serves the self-interest of many, including, among major participants, the scientists involved in nonconsensual experimentation, the manufacturers of the new technologies and other private contractors (some calling themselves private investigative agencies), as well as those empowered through the management of these projects; all feeding at the “national security” trough. Last and least, it provides opportunity to those who find employment and entertainment through the day to day operation of these abusive activities.

SYSTEMIC FAILURE

The idea that the USA is becoming dysfunctional through corruption is widely held. However, analysis of existing problems and proposed solutions are needed more than the rage of scapegoating. The narrow focus on passing events by major media fails to provide the contextual framework that gives these events meaning and enables us to see them in proportion. If the TI program affords an outstanding example of systemic failure, it cannot be considered as an isolated and exceptional occurrence; rather, we should welcome the light it sheds on larger problems.

This program could not have come into being without the support citizens, officials and representatives have given to covert programs in general, unknown and inadequately supervised. When there is lack of transparency and oversight, the normal human tendency to corruption is magnified many times; and this applies to the watchers, first of all. The second consideration is the unwholesome perspective that has become enshrined in the security state. When we are led by fear, greed and aggression, we merely surrender to the basest human nature. This makes no one safer; quite the opposite. The American ideal cannot rest merely on economic or military power. If America does not stand up for human rights and the dignity and worth of the individual human being, what nation on earth will do so?

Covert operations in support of openly defined national objectives are possibly defensible. Covert operations that by their nature create policy may be reasonably described as subversive. Covert operations that fly in the face of openly declared policies and principles are treasonous.

In general and by preference, just domestic and foreign policy objectives should be achieved by open, above the board, means; secrecy and covert operations should be minimized. This would be far easier to achieve were we to abandon our own overly aggressive posture. To be strong in defense is fine; but peace is not achieved through strength alone, and our primary goal should be, as it once was, to light the way for the free world.

This mission, once crystal clear; because it was defined by an opposition to what we understood as the unfree nature of the totalitarian societies; has been lost. The bi-polar world of the Cold War has disappeared. So must we define freedom anew for the new time.

FREEDOM

-1-

The idea of freedom, which played such a large part in the early, heroic history of America, and which was especially glorified by contrast with her Cold War opponents, seems to have gone into semi-retirement.

Freedom is no longer regarded as the very substance of our nation, as it once was. There is no great antithesis to remind us of ourselves.

Russia and China have embraced many of our values. As we, sadly, have embraced some of the values formerly ascribed to the totalitarian states, there is today little real difference between us and them. If they have their problems, so have we. If they have their human rights abuses, so have we.

Our economies are intertwined and we are mutually dependent. Since a major war would be disastrous for everyone, we have a common interest in avoiding such an eventuality. We may hear about competitive or strategic advantage, but this is only a superficial quibbling that disguises the larger and more important facts, and seems to persist merely because the speakers cannot adapt themselves to new conditions, or have too much stake in the old way of thinking to abdicate.

All of the major powers are conservative, essentially, which means that the status quo is affirmed by measures that are repressive in relation to any developments that might lead to any radical change, especially if that change were to replace those who are in charge.

The other day the Russian president thanked the American president. American intelligence agencies, he announced, had provided a tip that may have averted a major terrorist attack in St. Petersburg. This, if true, is actually a fine thing and may be acknowledged as an indication of the brighter side of the common coin.

However we may think of freedom, we do not wish anyone to be free to blow up cathedrals or crowds of innocent people. This far at least the world's people may be in agreement. They wish, first of all, to be free from terror and oppression.

FREEDOM

-2-

The problem is we do not and cannot know if Putin’s statement is true. As long as governments play the game of disinformation, no statement of any such government can be taken at face value.

To the extent that the American people are the victims of disinformation, misinformation, prejudice, spinning, and the distorted or partial interpretation of facts, their inevitable confusion and uncertainty will militate against the formulation of sensible policies.

“Know the truth; the truth will set you free.” Conversely, if you do not know the truth, you cannot be free. You cannot even know if you are free or a slave. This is the situation pictured in the film “The Matrix” and, long ago, by Plato in The Republic.

The very word freedom must be examined, for we must know what we mean by it; what we wish to be free from; and what we wish to be free for. Freedom to do whatever one wishes is not the freedom we have in mind; this would include the freedom of terrorists to blow you up while you are at a concert or shopping at the fruit and vegetable market. We accept that our freedom to act is bounded by the normal restraint that social life imposes.

If, therefore, we would be free from the attacks of terrorists, we must be free from any desire to molest others. Another word for this freedom is civilization. Intrinsic to the idea of freedom is respect for humanity, or the recognition of human rights.

Even in warfare, assuming an actual need to defend against aggression, we adhere to certain principles that impose upon us a duty, for example, to treat prisoners with dignity; at least we do so, if we are civilized.

The implication is that we are free from the tendencies of the base, lower nature. Freedom, like civilization, is an achievement. It sets us above the lower life forms, which are helplessly subject to fear and terror; or to predatory instincts.

Freedom is a spiritual realization. No one is born free, least of all animals, which have no freedom to be anything except what they have been made to be.

As business has become warfare; and war embraces disinformation as a weapon; we find ourselves in a global war zone. The truth has become collateral damage; and we are incapacitated and insecure as a result. To be free from terror, we must learn to be harmless; we must demand truth from one another and from governments as well.

FREEDOM

-3-

Because we cannot rely exclusively upon the spiritual realization of freedom, our laws are based upon the system of checks and balances. The idea is to prevent the acquisition of undue power by any actor or agency within the whole of our nation. This is for the mutual security of all citizens and for the preservation of the nation itself as a free country.

These ideas are even more significant today, given the extreme polarization and the politicization of every issue within the country. Excessive power is inevitably political power. No individual or group is elected or appointed to act as the exclusive guardian of American security. Elected officials and agencies have the power that is theirs under law; no more, no less.

No foreign threat is greater than the internal threat posed by entities within our country usurping powers or rights in excess of what has been granted under law. This is especially the case when these entities act covertly and thus evade both public debate and due process.

To make the national security apparatus or some portion of it immune to normal scrutiny and oversight is an absurdity.

Men are not angels, as Madison said, and this goes double for the men in our intelligence agencies and police forces, active or retired.

As a result of the excess of trust conferred upon these groups, we now have covert operations on American soil run by unknown and unaccountable individuals that target American citizens who have never even been accused of a crime and pose no danger to anyone. These innocent persons are turned into involuntary guinea pigs in a never-ending obscene experiment.

This is beyond bizarre. It suggests that the people running this show don’t know what country this is.

FREEDOM

-4-

A final aspect of freedom may be noted: the tolerance that does not readily take offense or make an issue of minor misbehavior. This is especially worthy of note in our time, when pointing fingers and accusations are flying in all directions.

Our checks and balances system is meant to operate with respect to the powers of government; it is not a formula for civil life. Today everyone is his brother's keeper; but this suggests not an alert citizenry but a social sickness. The energy we devote to small complaints is subtracted from the great issues that deserve our attention.

It is necessary to restore innocence as a norm of our national life.

APOLOGY

The writer knows how imperfect this report may appear. It is not offered as a final word but as a trumpet to awaken interest in a subject that can no longer be allowed an exclusively underground existence.

It is natural for the innocent reader to wonder: To what extent is this report fact-based and to what extent is it based upon conjecture and imagination?

In fact, the very nature of the problem defies the desirable offering of such evidence as would satisfy a court of law. My primary evidence comes from my own experience as a targeted individual and is therefore subjective. One can search online and find many such testimonials. A growing body of work both online and in print, including descriptions of the technologies involved and many of the government programs through which they were developed, substantiates these personal testimonies. I have on this basis attempted to infer the larger facts, making an effort to avoid extravagance and to hold my imagination within the bounds of reason. This report is not and cannot be the final story. If I have achieved even a rough accuracy in my portrayal of this filthy program, I am content. It remains now for the wider public to awake to the issue.

GLORIA NAYLOR'S 1996

Gloria Naylor (1950-2016) was an accomplished American novelist who won the National Book Award for The Women of Brewster Place (1983). After she became a Targeted Individual, she wrote a book about it. The title 1996 is taken from the year Naylor became the victim of a campaign of organized stalking. She describes her experience in a memoir/novel, using her own name for the leading character, while fleshing out the picture by using her imagination to describe the people arrayed against her.

At first the organized stalking campaign makes use of conventional techniques. It is notable primarily because so many people are involved and so much energy is given to a campaign with a trivial basis. The arbitrary and "over the top" nature of the campaign is noteworthy but not as unusual as many people would think. It is less a case of individual injustice than of the systemic abuse of power rooted in the covert world of so-called "national security" and the processes, experiments and operations that have developed over decades. Since WW II, and especially in recent decades, supervision and accountability have been largely absent, despite the prescient warning offered by Eisenhower in his Farewell Address of 1961.

Naylor remains focused on the first year of her own experience, but she offers also a substantial addendum that includes the public litigation of a former NSA employee, John St. Clair Akwei, and a "Survey of Evidence Regarding Mind Control Experiments by Cheryl Welsh, which provide some insight into the larger picture, as of 2005, the year of publication of the novel. Naylor has turned her considerable talent to the task of offering a clear picture of the nature of these operations. What seems most absurd or unrealistic in her picture is actually spot on. These operations are in fact absurd and seem to be carried out by people who are almost demented. At the same time their vices "flower" under the protection of their imaginary patriotism.

Many Jewish people were involved in her particular case, and Naylor quite reasonably imagines a scenario in which the ADL is working with someone in the NSA. Many neighborhood watch groups, security groups and local organizations collaborate with individual members of our intelligence organizations. Complicit private groups and individuals are not limited to Jewish groups or the obvious auxiliary police. The budgets of intelligence organizations have been virtually limitless, and individual agents also have the capacity to "use" people through blackmail or threat. In short, a vast culture of corruption operates in which "police" and "national security" activity have become indistinguishable from organized crime.

Toward the end of her story, Naylor introduces the newer mind-invasive technologies that are currently employed for surveillance, torture and harassment in the USA and globally. The technology she describes, in use in 1996, is only effective within a short-range and therefore requires the proximity of the attackers to their target. Given the further development of the technology, this limitation may no longer exist. Also, we must bear in mind a time lag between the public "outing" of the facts of these secret technologies and their existence.

The role of the psychiatrist/character in Naylor’s story is positive. He is sympathetic and protective of his patient. However, he is also faced with physical proof of her harassment, and therefore he is not confronted with the characteristic "lack of evidence" in TI cases. Owing to their ignorance of the EMF technologies and their current use in the USA, psychiatrists and psychiatric social workers typically interpret "auditory harassment" as "auditory hallucinations" and therefore mis-diagnose their patients. This results in more in further troubles for the person attacked.

TORTURE IN BHUTAN

Tek Nath Rizal was a human rights activist in Bhutan in support of a suppressed minority. This was displeasing to the King. Rizal was arrested and tortured. In addition to the common types of torture and humiliation all too frequently suffered by political prisoners, he was “worked on” with some of the newer electromagnetic technologies. His experience is lucidly described in his autobiographical account, Torture, Killing Me Softly: Bhutan Through the Eyes of Mind Control Victim (2009).

Although our focus has been the TI program in the USA, it is worth noting that these technologies are used all over the world. Even in a country as undeveloped as Bhutan was thirty years ago these technologies were used. Without doubt one of the “great powers” was responsible for this atrocity. Undoubtedly, in a covert action, “intelligence” operatives acting in the name of this unknown “great power” made these new instruments of torture available to the Bhutanese King.

If we assume the “great power” in question was one of the democracies, the people of that democracy are collectively responsible for the acts of torture carried out with the assistance of their unknown representatives; even if they remain unaware of the actions carried out or the fact of their responsibility.

The use of these technologies in the USA follows the same pattern that appears in the account of Tek Nath Rizal. They are not used for “national security” or in the fight against terror; they are used abroad to export terror, and at home to establish a terroristic regime domestically, if Americans are supine enough to accept it. Typically, the victims are slandered by the abusers. In addition to being mind-raped, they are subject to attack through a variety of so-called non-lethal weapons. Since the evidence of these attacks is concealed from the public, these crimes are not addressed by the courts or even mentioned in the major media.

This situation has arisen through an excessive willingness to permit and underwrite covert activities, and through the prevailing attitude toward and carte blanche given to “national security” operatives generally. Unfortunately, in the absence of transparency, adequate supervision and accountability, “intelligence” agencies have consistently spawned monstrosities. The fig leaf of “national security” has been sufficient to ward off the necessary scrutiny and leave to perverts the full range of opportunity.

ADDITIONAL INFORMATION

Electronic Harassment Guinea Pigs: Technologies of Control (2014), John Hall Gang Stalking: The Threat to Humanity (2014), Corkin Cherubini Diary of an Angry Targeted Individual (2014), Renee Pittman

Twelve Years in the Grave: Mind Control With Electromagnetic Spectrum, The Invisible Modern Concentration Camp (2013), Soleilmavis Liu New World War, Second Edition (2011), Mark M. Rich Microwave Experiment: A Story of Government Testing on a United States Customs Officer (2011), Mary E. Gregory Project Soul Catcher: Secrets of Cyber and Cybernetic Warfare Revealed, Vol. 2 (2010), Robert Duncan A New Breed: Satellite Terrorism in America (2009), John Hall The Hidden Evil (2009), Mark M. Rich Torture, Killing Me Softly: Bhutan Through the Eyes of Mind Control Victim (2009), Tek Nath Rizal The Silent Massacre: Electronic Torture and Mind Control in the United States of America and Law Enforcement Complicity (2008), Nicholas Kirkland Mind Matrix: Covert Electronic Harassment Mind Control Program (2008), Commander X Coherent Madness: Effective Defense Against Covert Warfare (2008), Mukazo Vunda Cause Stalking (2007), David Lawson Controlling the Human Mind: The Technologies of Political Control or Tools for Peak Performance (2006), Nick Begich The CIA Doctors: Human Rights Violations by American Psychiatrists (2006), Collin Ross The Matrix Deciphered (2006), The Saint

1996 (2005), Gloria Naylor Terrorist Stalking in America (2001), David Lawson Virtual Government: CIA Mind Control Operations in America (1997), Alex Constantine Operation Mind Control (1978), Walter Bowart

Psychological Issues Stalking the Soul: Emotional Abuse and the Erosion of Identity (2000), Marie-France Hirigoyen

Legal Issues Unequal Protection: The Risk of Corporate Dominance and the Theft of Human Rights (2002), Thom Hartmann

Websites www.surveillanceissues.com www.biggerthansnowden.com www.mindjustice.org www.freedomsos.com Electromagnetic Weapons are Being Used to Torture and Subjugate Countless American Citizens "Neurological Warfare & United States Experiments", Nicholas Kirkland, 2008, http://educate-yourself.org

Peacepink

Targeted Individuals Canada Targeted Individual Testaments Worldwide Campaign against Electronic Torture and Experimentation


bottom of page