{"id":14071,"date":"2016-03-31T20:54:44","date_gmt":"2016-04-01T00:54:44","guid":{"rendered":"https:\/\/cosmicconvergence.org\/?p=14071"},"modified":"2017-08-07T13:00:27","modified_gmt":"2017-08-07T17:00:27","slug":"who-owns-and-controls-the-military-industrial-complex","status":"publish","type":"post","link":"https:\/\/cosmicconvergence.org\/?p=14071","title":{"rendered":"Who Owns and Controls the Military-Industrial Complex?"},"content":{"rendered":"<p><!--more--><strong>The Millennium Report Exclusive:<br \/>\n<\/strong>The following exclusive report is quite lengthy and exhaustive. \u00a0There is no other series of disclosures about the <em>Military-Industrial Complex<\/em> on the Internet as revealing and radioactive.<\/p>\n<p>The classified information and privileged data contained in this report are well worth downloading before they are disappeared forever from the World Wide Web.<\/p>\n<p>There are two other very important expos\u00e9s that ought to be read in tandem with this one. They, too, disclose much secret information about <strong>The Highlands Forum<\/strong>. \u00a0As follows:<\/p>\n<p><a href=\"http:\/\/themillenniumreport.com\/2015\/08\/google-conceived-funded-and-directed-by-the-cia-part-i\/\">GOOGLE: Conceived, Funded and Directed By The CIA \u2014 Part I<\/a><\/p>\n<p><a href=\"http:\/\/themillenniumreport.com\/2015\/08\/google-conceived-funded-and-directed-by-the-cia-part-ii\/\">GOOGLE: Conceived, Funded and Directed By The CIA \u2014 Part II<\/a><\/p>\n<p>Only after reading Part I, will the many plots and sub-plots of Part II make much more sense.<\/p>\n<p><a href=\"http:\/\/stateofthenation2012.com\/?p=34965\">Who Really Owns and Controls the Military-Industrial Complex? Part II<\/a><\/p>\n<p><a href=\"http:\/\/themillenniumreport.com\/\">The Millennium Report<\/a><\/p>\n<p>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<\/p>\n<p><a href=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2016\/03\/UFOS-Military-Industrial-Complex.png\" rel=\"attachment wp-att-26555\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-26555\" src=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2016\/03\/UFOS-Military-Industrial-Complex.png\" alt=\"UFOS-Military-Industrial-Complex\" width=\"450\" height=\"221\" \/><\/a><\/p>\n<h1>Who Owns and Controls the Military-Industrial Complex?<\/h1>\n<h2><b>The Highlands Forum EXPOSED<\/b><\/h2>\n<p class=\"p1\"><span class=\"s1\"><b>By Anonymous Patriots<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">We are not only incensed that our elected officials are turning a blind eye to the transnational enemy within our country and around the world, we are disgusted with these warlords, both military and corporate, that send our sons and daughters to wars-for-profit to have their blood spilled for their own families\u2019 profits. As citizens of the world, we are filled with anger when we see men, women, and children slaughtered and displaced so that the few at the top can earn profits from blood and guns. We are sick and tired of wars <i>ad nauseam<\/i>, from our fathers who were killed in Viet Nam, our neighbors on 9-11, displaced war refugees around the world, not to mention the millions of starving children around the world who could use the money we spend on DARPA and their war tools for clean water, food, and education. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">This anger has arisen in us to the point that we had to find out <b>WHO IS IN CHARGE.<\/b> Unlike many of our politicians, we know that naming our enemy is the first step towards identifying and disarming them. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Many readers to this site will be quite familiar with the usual suspects: the Rothchilds, Rockefellers, and big banksters who command the top tier of the human wealth pyramid. We also know that they work closely with government agencies to plan and implement continuing military, cyber, and economic wars.<span class=\"Apple-converted-space\">\u00a0 <\/span>We have all read about how the Bilderberg Club, Illuminati, and the Knights of Malta coordinate these machinations with the Vatican. We know that the U.S. Federal Reserve is just a private corporation with a monopoly to print Federal Reserve notes that manipulates and plunders the U.S and global economy. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">It is what we don\u2019t know that interested us. So we decided to follow the money. <b><i>Who are the war profiteers that are plundering American lives, wealth, and democracy?<\/i><\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">In this article, the Anonymous Patriots are back again. Armed with the internet and a keen ability to interpret the geopolitical landscape, we have traced these GLOBAL WAR CRIMINALS back to the economic machinations that make them richer and more powerful with every military invention that they hoist on us. We are tired of becoming poorer, sicker, and more enslaved by these ruling sub-humans and ask you to arm yourselves with the knowledge we have gleaned from our research.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Then, be a patriot. Send this article to as many people as you can, as quickly as you can, so that the truth will be preserved when TPTB think about taking down this website.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>Brief Background <\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">(We apologize that our articles are so long, but much needs to be said. You might want to cut and paste the article into a Word document so that it is easier to navigate and read.) <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">To begin our journey, please review this list of the top ten or so military contractors, or <b><i>Military Warlords<\/i><\/b>.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><i>Lockheed Martin Corporation, The Boeing Company, Raytheon Company, General Dynamics Corporation, Northrop Grumman Corporation, Leidos Holdings, Inc., Huntington Ingalls Industries, L-3 Communications Holdings Inc., United Technologies Corporation, BAE Systems PLC, SAIC, McKesson Corporation, Bechtel Group Inc., Veritas Capital Fund, Booz Allen Hamilton Holding Corporation.<\/i><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Now let\u2019s look at the top shareholders of the top military contractors, who we call the <b><i>Corporate or Bankster Warlords. <\/i><\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><i>Vanguard Group, State Street Corp, Capital Research Global Investors, Templeton Investment Counsel LLC, Barclays Bank Plc, BlackRock Investment Management (UK) Ltd., Schroder Investment Management, Capital World Investors, Bank of America Corporation, JPMorgan Chase &amp; Co., Bank of New York Mellon Corp, Black Rock Advisors, Black Rock Fund Advisors, Old Republic International, Wellington Management Company, BlackRock Institutional Trust Company, N. A., Evercore Trust Company, N. A., FMR, LLC, , Invesco Ltd., Franklin Resources, Goldman Sachs Group Inc., T. Rowe Price Group, Inc.<\/i><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">What is worth noting about this list is that you can find some of the usual suspects: Rothchilds, Rockefellers, Morgans, Warburgs, and the rest of the Bankster Warlords behind some of these names. These Americans are in the business of war, every type of war or conflict that enables them to sell their war products. Like any for-profit business they have products to sell and to make good profits they need a vibrant, robust customer base. \u201cPeace-on-earth-goodwill-toward-men\u201d is not a market that will purchase their war services and wares. <span class=\"Apple-converted-space\">\u00a0 \u00a0<\/span><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">To make things even more complex so that we can never figure out who is in charge, every one of these corporations owns major shares in every other corporation. <b><i>They are intertwined like a grape vine.<\/i><\/b> If we look closer we find that every one of these corporations conducts international business and is invested in international military ventures. They are not governed by any one nation as they transcend nations.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>This type of Corporate Warfare is transnational<\/i><\/b>.<span class=\"Apple-converted-space\">\u00a0 <\/span>It is beyond being international or global. These companies work outside of the control of American as a nation. They work against Americans with their transnational economic warfare and make money from both sides of any military or corporate warfare. No matter who wins or loses, no matter how many of our children die in their war theaters, and no matter who the politicians are, they make money. And then they invest this money back into the same business because <b>the business of war is extremely profitable. <span class=\"Apple-converted-space\">\u00a0 \u00a0<\/span><\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Essentially, they are war criminals just like Henry Schroder, who funded both Hitler and England.<span class=\"Apple-converted-space\">\u00a0 <\/span><b><i>This type of banking warfare is common throughout history.<\/i><\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Henry Schroder was a German banker who went to England to help start England\u2019s central banking system. Blackwater, Templeton, and many of the other companies listed above are English and German who are all tied to the Bank of England in ways that no one can explain because the English Parliament is not allowed to question the Queen\u2019s business. <b><i>No one knows who owns the Bank of England or who the shareholders are. <\/i><\/b>This should raise some eyebrows and make the conspiracy theorists ecstatic, and for good reason. It is fair to say that the lion\u2019s share of war profits in America go to England.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>The Queen of England Makes Money from War<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Accordingly, all the unsubstantiated conspiracies about the Queen of England have some merit after following the money back to the bankster warlords who set up the U.S. Federal Reserve. But unlike most conspiracy theories suggest, the Federal Reserve regional banks are not the true culprits. The true culprits are the original investors in the corporations, listed above, who serve the military through all types of wars \u2013 physical conflict, information, and economics.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>It is the interwoven fabric of the investments of the war-supporting corporations that have created a system that is inbred and tied to England\u2026and then to Rome.<\/i><\/b><span class=\"Apple-converted-space\">\u00a0 <\/span>Simply through the association of the royal families of the world who are members of the Knights of Malta you have an economic intelligence community that is insider trading at a transnational level. The Bilderberg Group, the Club of Rome, or DARPA are associations of powerful people with deep investments in military concerns who must protect their financial interests and pass wealth onto their family members. That is why so many of the richest families intermarry &#8211; to keep it \u201call in the family.\u201d<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The richest and most powerful people in the world belong to the Knights of Malta, the Equestrian Order of the Holy Sepulchre of Jerusalem, the Order of the Garter, the Teutonic Knights and many other orders that vow allegiance to the Vatican. If we wish to broaden the perspective, one can add that the Society of Jesus, the Jesuits, are involved at all levels and have worked tirelessly as the soldiers of the Pope to create the ultimate spy network.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>The Vatican Makes Money from War<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">All banking started in Italy and was connected to the Vatican.<span class=\"Apple-converted-space\">\u00a0 <\/span>It is fair to say that the central banking ideas of Italy have been replicated in the central banking systems used throughout the world. Central banking comes from the Vatican and through the different agencies of the Vatican (Knights of Malta) <b><i>the world economy is manipulated by insider trading information that is being shared with the Vatican via the vows of allegiance that every Knight of Malta makes.<\/i><\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The Vatican profits by war because it takes in hundreds of billions a year through refugee placement services and humanitarian aid provided to war-torn areas. The more war \u2013 the richer the Vatican becomes. That is why the Vatican supports unbridled migrations of people and the chaos that ensues from war. The Knights of Malta are one of the largest charities in the world. The Catholic Church has thousands of different tax-free, charitable organizations that receive money to help in humanitarian causes. <b><i>No one knows how much money the Catholic Church receives each year.<\/i><\/b><span class=\"Apple-converted-space\">\u00a0 <\/span>The Vatican Bank has been caught many times laundering money on a huge scale.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Just like the almost unfathomable interwoven inbreeding of the bankster warlords, the double-speak of the Vatican is filled with lies. The Vatican says one thing and does the opposite. The Vatican itself gives no money away to any charity. The oldest and richest corporation in the world gives nothing to charity but is a \u201cfront\u201d for the largest charity corporation on the planet.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The Vatican also created Canon Law which developed into Common Law, Admiralty Law, and other forms of law. America attorneys still take an oath to the Temple Bar in the City of London. This is a reference to the Templar\u2019s Headquarters in the City of London. The Templars were a Catholic order that more or less established banks from Europe to Jerusalem during the Crusades. Again, whether we look at the history of banking or law, all roads lead to Rome. Therefore, when we hear the theorists get all worked up about the conspiracies rampant in the military industrial complex, we should perhaps listen a little more carefully and do our own research to find that the simply version is supported by the detailed version.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">But that still leaves the question of <b><i>who \u201cruns\u201d the military industrial complex<\/i><\/b>.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>The Long War is Forever\u00a0<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">This question is actually quite simple to answer. Conspiracy theorists (yes, that\u2019s us folks) will tell you that DARPA drives the engines of the military through farming out its \u201cwish list\u201d to private corporations to compete for the contract to build the desired technology. This is true. DARPA is well known for funding multiple initial projects and then further funding the winner. Often these \u201cwinners\u201d create corporations that are given military contracts that pay the corporation to make the \u201cwar device\u201d and the shareholders of the company glean the profits.<span class=\"Apple-converted-space\">\u00a0 <\/span><b><i>The Internet, Cisco Systems, Google, and Facebook are all inventions of DARPA.\u00a0<\/i><\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">And we hardly have to mention the cost over-runs on every military contract. These contracts, paid for by American tax payers, are for hundreds of billions of dollars and the corporation is allowed and encouraged to make a big profit so the interwoven Corporate Warlords get their cut of the pie. <b><i>When Rumsfeld audited the 7 trillion dollar Pentagon budget, 2.3 was missing<\/i><\/b>. This is typical and still, to date, it hasn\u2019t been \u201cfound.\u201d<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Even worse than the Corporate Warlord\u2019s profits is the fact that every one of the top military contractors does business in international markets. This means that <b><i>every military contract is, will be, or can be shared with other nations, including the very \u201cenemies\u201d for which the war-device is produced.<\/i><\/b><span class=\"Apple-converted-space\">\u00a0 <\/span>Transnational Corporate Warlords are selling the same \u201cmilitary secrets\u201d to our enemies. Just read the web sites of any top military contractor where they proudly proclaim their international business in military devices. These transnational corporations are also using their influence to destabilize markets, economies, countries and currencies to create new business. Once DARPA gets the militarized version of the invention, the source code usually is made public. This may seem crazy, but it always feeds the enemy our new weapon designs so that they can keep up the appearance of a \u201cweapons race.\u201d\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Transnational corporations are dismantling America through political and military manipulation of the economy <\/i><\/b>and the Corporate and Banking Warlords are having a party amidst the seeming chaos and confusion. These warlords know full well that the CIA manipulates currency as a continuing war. The International Monetary Fund, the World Bank, the International Bank of Settlements advance the causes of these Corporate Warlords. Destabilizing countries creates the need for international intervention.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>The military industrial complex created the War on Terror and calls it the \u201clong, soft war\u201d<\/i><\/b> because it will never end. The pronouncement of the War on Terror was the declaration of the overthrowing of American Democracy by warlord oligarchy. Only a few people benefit from this war and often the politicians who declare the \u201cNew World Order\u201d take up positions in corporations that profit from war. Former presidents and prime ministers become Corporate Warlords and make a fortune.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>American Democracy is Doomed<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">If the following corporations continue to exist, American Democracy will fall and become the military arm of the triangle of power between New York, the City of London and Vatican City. These seeming vague indications will be elaborated on in the rest of this article but for now let\u2019s review an outline of who owns and controls the military industrial complex.<\/span><\/p>\n<h4 class=\"p5\" style=\"padding-left: 60px;\"><span class=\"s1\"><i>&#8220;For we are opposed around the world by a monolithic and ruthless conspiracy that relies primarily on covert means for expanding its sphere of influence &#8211; on infiltration instead of invasion, on subversion instead of elections, on intimidation instead of free choice, on guerrillas by night instead of armies by day. It is a system which has conscripted vast human and material resources into the building of a tightly knit, highly efficient machine that combines military, diplomatic, intelligence, economic, scientific and political operations. Its preparations are concealed, not published. Its mistakes are buried not headlined. Its dissenters are silenced, not praised. No expenditure is questioned, no rumor is printed, no secret is revealed.&#8221;<span class=\"Apple-converted-space\">\u00a0 \u00a0 \u00a0 \u00a0<\/span><\/i><\/span><\/h4>\n<h4 class=\"p5\" style=\"padding-left: 60px;\"><strong><span class=\"s1\">&#8212; John F. Kennedy, April 27, 1961<\/span><\/strong><\/h4>\n<p class=\"p5\"><span class=\"s1\">John Kennedy found out shortly after he spoke these words that the \u201cmonolithic and ruthless conspiracy\u201d was also at home in the United States. It was surely one of the causes of his assassination for in those days few knew of the treasonous behavior of Corporate and Banking Warlords. In our time, the greedy warlords are proud of what they do and the government supports them in full knowledge that transnationalism is destroying America.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>Pentagon Missing Trillions<\/b><\/span><\/p>\n<h4 class=\"p3\" style=\"padding-left: 60px;\"><span class=\"s1\"><i>\u201cThe military&#8217;s money managers last year made almost $7 trillion in adjustments to\u00a0<\/i><\/span><i>their financial ledgers in an attempt to make them add up, the Pentagon&#8217;s inspector\u00a0<\/i><span class=\"s1\"><i>general said in a report released Frida. \u00a0<\/i><i>The Pentagon could not show receipts <\/i><\/span><span class=\"s1\"><i>for $2.3 trillion of those changes.\u00a0<\/i><\/span><\/h4>\n<h4 class=\"p3\"><span class=\"s1\"><i>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <strong>Pentagon&#8217;s Finances in Disarray<\/strong><\/i><strong>,<\/strong><br \/>\nJohn M. Donnelly, <\/span><span class=\"s1\"><span class=\"Apple-converted-space\"><br \/>\n<\/span>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 The Associated Press, 2001<\/span><\/h4>\n<p class=\"p5\"><span class=\"s1\">This type of waste indicates the scale upon which the military industrial complex seemingly answers to no one.<span class=\"Apple-converted-space\">\u00a0 <\/span>No one checks whether DARPA inventions are moral. <b><i>All military inventions, even if they advertise them as helpful, are weaponized.<\/i><\/b> What DARPA releases is only the tip of the iceberg and is public. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>But there is a more secret group that directs the military in its future goals. One group, essentially one man, has been behind creating the direction of military and commercial warfare for decades.<\/b> He founded the Highland Group which hosts forums for DARPA, Department of Defense, CIA, FBI, In-Q-Tel, Homeland Security, SAIC, and many other government agencies and organizations.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">All Highland Forums are private, invitation only, have no written agenda and basically are secret and did not happen. Except for the fact that the Corporate Warlords who are invited become privy to the direction of research for the US military, which subsequently creates the directions of Corporate Warlords. Nothing is written down so that no one is held responsible. The Highland Forums have been directing DARPA research and the research of the CIA\u2019s research and development component called In-Q-Tel.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>The Highland Forum, Richard Patrick O\u2019Neill, and the Long War <\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Let\u2019s take a closer look at the Highland Forums. The description below is taken from their website:<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Highland Forums Program Description Overview<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">\u201cInformation Warfare,\u00a0Information Operations, Information Assurance, and Operational Resilience Information is an instrument of national, global, and corporate power. As such, control over its use, its protection, and its manipulation, are national and global security issues.\u00a0This Research Program examines strategic and tactical offensive and defensive aspects of information operations (IO) <b><i>by state and non-state actors to achieve political, military, and economic goals through IO means, including computer network operations (CNO), computer network attack (CNA), computer network exploitation (CNE), computer network defense (CND), psychological operations (PSYOPS), perception management, media manipulation, propaganda, strategic influence, and public diplomacy, among others.\u201d<\/i><\/b><\/span><\/p>\n<p class=\"p8\"><span class=\"s1\">Richard Patrick O&#8217;Neill, the director of Highlands Group describes his work on their website as:<b> <\/b>\u201cA core element of the Highlands Group activity has been the Highlands Forum. Over the past 18 years almost fifty major meetings and twenty enrichment sessions have been held around the country. Each succeeding session, small and cross-disciplinary in nature, brought remarkable people&#8211;from Nobel laureates and Pulitzer winners to young tech pioneers; from science fiction authors to corporate CEO&#8217;s; from scientists to military leaders&#8211;to link innovators from the &#8220;core and the edge&#8221;, without an outcome in mind, exploring a theme and a set of ideas, looking for novelty and emergence. The in-depth proceedings of those events are posted to the Secretary of Defense Highlands Forum website, along with interviews, original papers, and book reviews.\u201d <a href=\"http:\/\/www.highlandsgroup.net\/perspectives.php?id=17\"><span class=\"s2\">http:\/\/www.highlandsgroup.net\/perspectives.php?ID=17<\/span><\/a><\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">One of the only descriptions found on the internet about a presentation at a Highlands Forum is given below to show the direction the group is taking to ensure that \u201cwar\u201d continues universally.<br \/>\n<\/span><span class=\"s3\"><br \/>\n<\/span><span class=\"s1\"><b><i>The Web and the Long, &#8220;Soft&#8221; War<\/i>, <\/b>by Irving Wladawsky-Berger at <a href=\"http:\/\/blog.irvingwb.com\/blog\"><span class=\"s4\">http:\/\/blog.irvingwb.com\/blog<br \/>\n<\/span><\/a><\/span><span class=\"s1\"><br \/>\n\u201cA few weeks ago I attended a very stimulating meeting, the Highlands Forum. The Forum is sponsored by the Office of the US Secretary of Defense to explore new ideas and emerging trends that will help support high-level Department of Defense (DoD) policy and strategy, especially as they relate to information and information technologies.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"> The Highlands Forum was organized in 1994 by retired US Navy captain Dick O&#8217;Neill. It is chaired by the Principal Deputy Assistant Secretary of Defense for Networks and Information Integration. Each meeting is centered on a specific topic. Around 25 experts from government, industry, academia, the arts and the professions are invited to discuss their ideas on the subject &#8211; to be part a kind of strategic conversation. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"> While our discussions were generally technology-based, you cannot ponder how IT, the Web and related technologies could impact DoD without also thinking hard about the global environment that DoD, and society in general will face over the next decade and beyond. DoD&#8217;s primary task is \u201cto deter conflict &#8211; but should deterrence fail, to fight and win the nation&#8217;s wars.\u201d <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"> Then there is the <b><i>War on Terror<\/i><\/b>, which DoD has started to refer to as the <b><i>Long War<\/i><\/b>, a term that I first heard at the Forum. The Long War is perhaps as much about <b><i>winning the hearts and minds of people and nations<\/i><\/b>, as it is about defeating, or at least containing an enemy that is often hard to find. While one absolutely needs the weapons and military training to win the classic, hot conflicts, <b><i>the soft or cultural aspects of the conflict are at least as important <\/i><\/b>that over time could undermine democratic principles, free markets and our standard of living. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"> It is a fact that <b><i>the Internet, started by DoD for very legitimate defense purposes<\/i><\/b>, has become the world&#8217;s platform for communication, information and innovation. Perhaps DoD should once again take on a lead role, this time in supporting research and pilot programs that will accelerate the development of some of the most complex and critical applications and emerging technologies that are driving the evolution of the Web for the very different requirements of the 21st Century. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"> I would justify the investments as part of our efforts <b><i>to prepare for and fight the Long War<\/i><\/b>, as well as to help our armed forces become even more highly skilled, collaborative, information-based organizations. I think that a major part of the Long War is to get as many people and countries around the world to be part of and benefit from our increasingly interconnected economies. <b><i>We need to help them see<\/i><\/b> a potentially promising future for them and their families.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>History of the CIA\u2019s Version of DARPA \u2013 \u201cIn-Q-Tel\u201d<\/b><\/span><\/p>\n<h4 class=\"p5\" style=\"padding-left: 60px;\"><span class=\"s1\"><i>\u201cThe lie can be maintained only for such time as the state can shield the people from political, economic and\/or military consequences of the lie.\u00a0It thus becomes vitally important for the state to use all of its powers to repress dissent,\u00a0for the truth is the mortal enemy of the lie, and thus by extension, the truth becomes the greatest enemy of the state<\/i>.\u201d\u00a0<\/span><\/h4>\n<h4 class=\"p5\" style=\"padding-left: 60px;\"><span class=\"s1\"><strong>Dr. Joseph M.\u00a0Goebbels<\/strong><br \/>\n<\/span><strong><span class=\"s1\">Ministry of Enlightenment, Third Reich<\/span><\/strong><\/h4>\n<p class=\"p5\"><span class=\"s1\">The CIA has a legacy of operating at the cutting edge of science and technology with a reputation for bold innovation and risk taking, often working in advance of the private sector and other branches of government. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">By the late 1990s, the pace of commercial innovation had overtaken the ability of government agencies to develop and incorporate new technologies. The tech industry was innovating far too rapidly to ignore. Commercial technologies from the startup world addressed many of the same information technology, biotechnology, communications, and energy challenges that faced the intelligence community.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">In 1998, CIA identified technology as a top strategic priority, and set out a bold and radical plan to create a new venture that would help increase the agency\u2019s access to private sector innovation. In-Q-Tel was chartered in February 1999 by a group of private citizens at the request of the Director of Central Intelligence and with the support of the U.S. Congress. IQT was tasked with building a bridge between the IC and a new set of technology innovators.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>The CIA\u2019s \u2013 Science Applications International Corporation (SAIC)<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Leidos, a joint spin-off of\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/science_applications_international_corporation\">Science Applications International Corporation<\/a>\u00a0(SAIC),\u00a0is an American defense company headquartered in\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/reston,_virginia\">Reston, Virginia<\/a>, that provides scientific, engineering, systems integration, and technical services. Leidos works extensively with the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/united_states_department_of_defense\">United States Department of Defense<\/a>\u00a0(4th largest DoD contractor FY2012), the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/united_states_department_of_homeland_security\">United States Department of Homeland Security<\/a>, and the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/united_states_intelligence_community\">United States Intelligence Community<\/a>, including the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/national_security_agency\">National Security Agency<\/a>, as well as other U.S. government civil agencies and selected commercial markets. On September 27, 2013, SAIC changed its name to\u00a0Leidos\u00a0and\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/corporate_spin-off\">spun off<\/a>\u00a0a $4 billion government services and\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/information_technology\">information technology<\/a>\u00a0company, which retains the name\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/science_applications_international_corporation\">Science Applications International Corporation<\/a>.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>SAIC Projects<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/defense_intelligence_agency\">Defense Intelligence Agency<\/a>\u00a0(DIA) transitioned a Remote Viewing Program to SAIC in 1991 which was renamed\u00a0the <a href=\"http:\/\/en.wikipedia.org\/wiki\/stargate_project\">Stargate Project<\/a>. The\u00a0Stargate Project\u00a0was the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/code_name\">code name<\/a>\u00a0for a\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/u.s._army\">U.S. Army<\/a>\u00a0unit established in 1978 at\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/fort_meade\">Fort Meade<\/a>, Maryland, by the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/defense_intelligence_agency\">Defense Intelligence Agency<\/a>\u00a0and\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/sri_international\">SRI International<\/a>\u00a0(a California contractor) to investigate the potential for\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/psychic\">psychic<\/a>\u00a0phenomena in military and domestic applications. This primarily involved\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/remote_viewing\">remote viewing<\/a>, the purported ability to psychically &#8220;see&#8221; events, sites, or\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/information\">information<\/a>\u00a0from a great distance.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">In March 2001 SAIC defined the concept for the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/national_security_agency\">NSA<\/a>\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/trailblazer_project\">Trailblazer Project<\/a>. Trailblazer was a continuation of the earlier\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/thinthread\">ThinThread<\/a>\u00a0program which the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/united_states\">United States<\/a>\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/national_security_agency\">National Security Agency<\/a>\u00a0(NSA) pursued during the 1990s.\u00a0The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued three weeks before the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/september_11_attacks\">September 11, 2001 attacks<\/a>\u00a0due to the changes in priorities and the consolidation of U.S. intelligence authority.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The &#8220;change in priority&#8221; consisted of the decision made by the director of NSA General Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that claimed to protect the privacy of U.S. citizens. ThinThread was dismissed and replaced by the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/trailblazer_project\">Trailblazer Project<\/a>, which lacked the privacy protections.\u00a0A consortium led by\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/science_applications_international_corporation\">Science Applications International Corporation<\/a>\u00a0was awarded a $280 million contract to develop Trailblazer in 2002.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Trailblazer\u00a0was a United States\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/national_security_agency\">National Security Agency<\/a>\u00a0(NSA) program intended to develop a capability to analyze data carried on communications networks like the internet. It was intended to track entities using communication methods such as cell phones and e-mail. In 2002, NSA contracted SAIC for $280 million to produce a &#8220;technology demonstration platform&#8221;\u00a0for the agency&#8217;s project, a &#8220;Digital Network Intelligence&#8221; system to analyze data carried on computer networks. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">In 1945 the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/joint_intelligence_objectives_agency\">Joint Intelligence Objectives Agency<\/a>\u00a0was established and given direct responsibility for\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/operation_paperclip\">Operation Paperclip<\/a>. The program recruited former\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/nazism\">Nazi<\/a>\u00a0scientists,\u00a0some of whom had been identified and prosecuted as war\u00a0during the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/nuremberg_trials\">Nuremberg Trials<\/a>. Several secret U.S. government projects grew out of Operation Paperclip.\u00a0These projects included <a href=\"http:\/\/en.wikipedia.org\/wiki\/project_chatter\">Project CHATTER<\/a>\u00a0(established 1947), and\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/project_bluebird\">Project BLUEBIRD<\/a>\u00a0(established 1950), which was renamed\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/project_artichoke\">Project ARTICHOKE<\/a>\u00a0in 1951. Their purpose was to study\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/mind_control\">mind control<\/a>,\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/interrogation\">interrogation<\/a>,\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/behavior_modification\">behavior modification<\/a>\u00a0and related topics.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>MITRE<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><a href=\"http:\/\/www.saic.com\/\">SAIC<\/a>\u00a0and Leidos (<a href=\"http:\/\/www.leidos.com\/\">Solutions for National Security, Health, and Engineering<\/a>) are for-profit companies that primarily work for various arms of the U.S. government.\u00a0<a href=\"http:\/\/www.mitre.org\/\">The MITRE Corporation<\/a>\u00a0is a Federally Funded Research and Development Company (FFRDC). MITRE is a private, not-for-profit corporation that operates FFRDCs &#8211; federally funded research and development centers. If you&#8217;ve ever flown in a jet or used GPS, you&#8217;ve benefited from technology with roots in an FFRDC. But despite the name, FFRDCs are about much more than R&amp;D. These unique organizations serve as long-term strategic partners to the government, providing objective guidance in an environment free of conflicts of interest. They work with their government partners &#8211; also called sponsors &#8211; to assist with systems engineering and integration, research and development, and study and analysis.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">For all intents and purposes, this makes MITRE a pseudo-government organization.\u00a0 This is largely because the government is their only client.\u00a0 In practice this means that meetings and decisions that are closed to contractors and consultants from other firms often have MITRE folks advising the government decision makers.\u00a0\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>Cyberspace &#8211; A New Operational Domain<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">In 2011, the United States (U.S.) Department of Defense (DOD) named cyberspace a new operational domain. The cyberspace domain provides critical capabilities that enable the U.S. Military to conduct operations in all domains (land, sea, air, space, and cyberspace). The U.S. Cyber Command and the Military Services are working to integrate the cyberspace domain with the other operational domains in order to conduct military command and control and achieve national security objectives. To effectively integrate cyberspace operations, DoD requires situational awareness of the Mission, Network, and Adversary based on analysis of operational data in order to make timely and effective decisions. <\/span><\/p>\n<p class=\"p9\"><span class=\"s1\"><b>Cyber Weapons are the New Arms for War<\/b><\/span><\/p>\n<p class=\"p9\"><span class=\"s1\">The military has for years been developing offensive capabilities, giving it the power not just to defend the U.S. but to assail its foes.\u00a0<b><i>Using so-called cyber-kinetic attacks, Alexander and his forces now have the capability to physically destroy an adversary\u2019s equipment and infrastructure, and potentially even to kill. <\/i><\/b>Alexander has concluded that such cyber weapons are as crucial to 21st-century warfare as nuclear arms were in the 20th. And he and his cyber warriors have already launched their first attack. The cyber-weapon that came to be known as Stuxnet was created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s. The first known piece of malware designed to destroy physical equipment, Stuxnet was aimed at Iran\u2019s nuclear facility in Natanz. By surreptitiously taking control of an industrial control link known as a Scada (Supervisory Control and Data Acquisition) system, the sophisticated worm was able to damage about a thousand centrifuges used to enrich nuclear material.<\/span><\/p>\n<p class=\"p9\"><span class=\"s1\">But Stuxnet is only the beginning. Alexander\u2019s agency has recruited thousands of computer experts, hackers, and engineering PhDs to expand U.S. offensive capabilities in the digital realm.\u00a0The Pentagon has requested $4.7 billion for \u201ccyberspace operations,\u201d even as the budget of the CIA and other intelligence agencies could fall by $4.4 billion. It is pouring millions into cyber defense contractors. And more attacks may be planned.<\/span><\/p>\n<p class=\"p9\"><span class=\"s1\">On a remote stretch of desert in central Utah, the National Security Agency has built a massive, 1 million-square-foot data warehouse. Costing more than $1.5 billion, the highly secret facility is designed to house upward of trillions of intercepted phone calls, e-mail messages, internet searches and other communications intercepted by the agency as part of its expansive eavesdropping operations. The NSA is also completing work on another data warehouse, this one in San Antonio, Texas. <\/span><\/p>\n<h4 class=\"p5\" style=\"padding-left: 60px;\"><span class=\"s1\"><i> \u201cThe essential element in the black art of obscurantism is not that it wants to darken individual understanding but that it wants to blacken our picture of the world, and darken our idea of existence.\u201d <\/i><\/span><\/h4>\n<h4 class=\"p5\" style=\"padding-left: 60px;\"><span class=\"s1\">Friedrich Nietzsche, <i>Human, All Too Human<\/i><\/span><\/h4>\n<p class=\"p5\"><span class=\"s1\"><b><i>A Description of Psyops from a Military Document<\/i><\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">&#8220;Intelligence and Electronic Warfare Support to Psychological Operations&#8221; is based upon\u00a0&#8220;Special Operations Forces Intelligence and Electronic Warfare Operations&#8221;\u00a0Field Manual No. 34-36 published on 30 September 1991 by Department of the Army Headquarters in Washington DC.<\/span><\/p>\n<p class=\"p3\"><span class=\"s4\">Missions<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">PSYOP missions are planned products and psychological actions in peace or war that are directed toward foreign enemy, <b><i>friendly<\/i><\/b>, and neutral audiences. The purpose is to influence attitudes and behaviors to achieve <b><i>national political<\/i><\/b> and military objectives.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">PSYOP supports varied military, political, and diplomatic actions across the operational continuum. These missions can be strategic, operational, or tactical missions.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Strategic PSYOP missions are conducted at the <b><i>national<\/i><\/b> or theater level to advance broad, long-term psychological objectives in support of <b><i>national psychological objectives<\/i><\/b>.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Operational PSYOP missions are conducted to achieve mid-term objectives in support of theater campaigns and major operations.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Tactical PSYOP missions are conducted to achieve immediate or short-term objectives in support of tactical military operations.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Any of the above categories of PSYOP may support more than one level of the operational continuum. That is why distinctions between the categories of PSYOP are often blurred.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Special operation forces (SOF), whether operating unilaterally or in cooperation with conventional forces across the entire operational continuum, must always consider non-military factors and objectives. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">PSYOP missions:<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Play a critical and integral role in achieving or addressing these non-military objectives.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Aid in accomplishing tactical, operational, and strategic military objectives.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">May be the only military force employed.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Must be integrated with all operations to prevent contradictory or conflicting messages.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>Some Declassified In-Q-tel Projects<\/b><\/span><\/p>\n<h4 class=\"p5\" style=\"padding-left: 90px;\"><span class=\"s1\"><i><span class=\"Apple-converted-space\">\u00a0<\/span>\u201cThe conscious and intelligent manipulation of the organized habits and opinions of the masses is an important element in democratic society. Those who manipulate this unseen mechanism of society constitute an invisible government which is the true ruling power of our country.\u201d<br \/>\n<span class=\"Apple-converted-space\"><br \/>\n<\/span><\/i><\/span><strong><span class=\"s1\">Edward Bernays, <i>Propaganda<\/i> <\/span><\/strong><\/h4>\n<p class=\"p5\"><span class=\"s1\"><b><i>Recorded Future<\/i> &#8211; <\/b>Using what they call a &#8220;Temporal Analytics Engine,&#8221; Recorded Future (RF) provides forecasting and analysis tools to help analysts predict future events by scanning sources on the internet, and\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/data_mining\">extracting<\/a>,\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/network_theory#Link_analysis\">measuring<\/a>, and\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/data_visualization\">visualizing the information<\/a>\u00a0to show networks and patterns in the past, present, and future. As of 2015\u00a0the engine was described as &#8220;Web Intelligence Engine<b> <\/b><a href=\"http:\/\/en.wikipedia.org\/w\/index.php?title=visible_technologies&amp;action=edit&amp;redlink=1\">Visible Technologies<\/a>\u00a0\u2013 social media monitoring.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Digital Reasoning<\/i> &#8211; <\/b>Since 2012, the firm has sold its Synthesys software to banks and hedge funds,\u00a0including\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/ubs\">UBS<\/a>\u00a0and\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/point72_asset_management\">Point72 Asset Management<\/a>.\u00a0Financial institutions use Synthesys to scan internal e-mails within a given company in search of unfamiliar patterns between employees, in terms of word-specific content, frequency and interpersonal connections.\u00a0The aim is to predict fraud before it occurs. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Palantir <\/i>&#8211; <\/b>Palantir Technologies, Inc.\u00a0is a\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/private_company\">private<\/a>\u00a0American\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/software\">software<\/a>\u00a0and services company, specializing in\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/data_analysis\">data analysis<\/a>. The company is known for two software projects in particular:\u00a0Palantir Gotham\u00a0is used by counter-terrorism analysts at offices in the United States Intelligence Community and\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/united_states_department_of_defense\">United States Department of Defense<\/a>, fraud investigators at the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/recovery_accountability_and_transparency_board\">Recovery Accountability and Transparency Board<\/a>, and cyber analysts at\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/information_warfare_monitor\">Information Warfare Monitor<\/a>.\u00a0 <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><a href=\"http:\/\/en.wikipedia.org\/w\/index.php?title=callminer&amp;action=edit&amp;redlink=1\"><b><i>CallMiner<\/i><\/b><\/a><b> &#8211; <\/b>Phone speech analytics software<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>MASINT &#8211;\u00a0<\/i><\/b> Remote tracking, surveillance, and extraction of brain-waves typifying thought-forms, emotional states, analytic mind states, and others<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><a href=\"http:\/\/en.wikipedia.org\/w\/index.php?title=mohomine&amp;action=edit&amp;redlink=1\"><b><i>Mohomine<\/i><\/b><\/a><b><i>\u00a0mohoClassifier<\/i> &#8211; <\/b>Organizes mass data<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>3VR<\/i> &#8211; <\/b><a href=\"http:\/\/www.3vr.com\/\">3VR Inc<\/a>. develops software enabling organizations to mine data from video. 3VR works with leading banks, governments, law enforcement and retailers at the moment.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Adaptx<\/i> &#8211; <\/b>Creates digital pens that speed up field data collection.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Basis Technology<\/i> &#8211; <\/b>Synthesizes the foreign chatter and provides software for text analytics in over twenty languages.\u00a0They work primarily in applied natural language processing, deriving meaning from the ways people actually use language. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Cloudera<\/i> &#8211; <\/b>Large-scale data storage. <a href=\"http:\/\/www.cloudera.com\/\">Cloudera Enterprises<\/a>\u00a0is one of the most cost-effective ways for companies to securely carry out large-scale data analysis and storage.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><a href=\"http:\/\/www.fireeye.com\/\"><b><i>FireEye<\/i><\/b><\/a><b><i> &#8211;<\/i> <\/b>FireEye is one of the most advanced cybersecurity firms and\u00a0specializes in protecting against botnet attacks and also works to combat the malware that brings computers into the network.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>The Ember Corporation<\/i>\u00a0&#8211; <\/b><a href=\"http:\/\/www.ember.com\/\">Ember Corporation<\/a> focuses on developing networking systems that simplify wirelessly networking low-power products. They&#8217;re focused on smart energy, remote monitoring, and remote control uses of their tech.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Infinite Z &#8211;<\/i> <\/b>Virtual-holographic simulation a reality through an interactive 3D environment.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>OpenSpan<\/i> &#8211; <\/b>Makes software that enables organizations to see\u00a0exactly\u00a0what employees are doing on their computer: what programs they&#8217;re using, what progress they&#8217;re making, etc.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Seventh Sense<\/i> &#8211; <\/b>Develops health monitoring products that interface with human skin<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Sonitus Medical<\/i> &#8211; <\/b>Makes a hearing system that transmits sound imperceptibly through the mouth. The SoundBite hearing system plays off the principle of bone conduction to transmit audial messages. A nearly invisible in-the-mouth hearing and communication platform is non-invasive and connects directly to the inner ear, allowing the user to hear transmitted messages through their skull.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Spotter RF<\/i> &#8211; <\/b>Makes super-powerful radars in a handheld form that\u00a0can track a person walking anywhere within a 148 acre space, and it&#8217;s handheld.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Visible Technologies<\/i> &#8211; <\/b>Extracts business solutions from social media chatter with software that allows users to extract business value from social communities, and also give customer insights for brands online.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Walleye <\/i>&#8211; <\/b>Makes handheld devices that can see into and through solid objects<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>DARPA Applications<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><a href=\"http:\/\/www.fbo.gov\/index?s=opportunity&amp;mode=form&amp;id=6ef12558b44258382452fcf02942396a&amp;tab=core&amp;_cview=0\"><b><i>Social Media in Strategic Communication<\/i><\/b><\/a>\u00a0(SMISC) program is an attempt to get better at both detecting and\u00a0conducting propaganda campaigns on social media. SMISC has two goals. First, the program needs to help the military better understand what\u2019s going on in social media in real time &#8211; particularly in areas where troops are deployed. Second, Darpa wants SMISC to\u00a0help the military play the social media propaganda game itself.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The Pentagon is building a tool to identify social media propaganda campaigns that produces counter-spin through computer artificial intelligence. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">http:\/\/www.washingtonsblog.com\/2011\/07\/pentagon-seeks-to-manipulate-social-media-for-propaganda-purposes.html<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Interactive Facial Recognition in Real Time <\/i>&#8211;<\/b>BBC facial recognition programs help predict the success or failure of television programming. In the past, the BBC has used its facial recognition technology, built by in-house startup CrowdEmotion, to track 4,500 faces as people watched show trailers to see what kinds of emotions the commercials produced. They\u2019ve also looked at how hundreds of study participants react to programs like\u00a0Top Gear\u00a0and\u00a0Sherlock. <a href=\"http:\/\/fortune.com\/2016\/02\/13\/bbc-ads-crowdemotion\/\">http:\/\/fortune.com\/2016\/02\/13\/bbc-ads-crowdemotion\/<\/a><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"> The company CrowdSight uses facial recognition software in real time. They advertise on their website: \u201cUnderstand and Predict your Audience! Deliver Better Experiences by Knowing their Emotional Behavior and Engagement in Real-time. CrowdSight Software Development Kit (SDK) is a flexible and easy-to-integrate Crowd Face Analysis Software which allows you to gather real-time, anonymous information about your audience while they behave spontaneously in different life environments. Understand your audience emotional reactions and engagement towards your products, content and campaigns, and recognize important demographics such as age, gender and ethnicity, in real-time. CrowdSight works offline and on the most popular desktop and mobile platforms (Windows, Mac, Linux, iOS, Android).\u201d<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><a href=\"http:\/\/sightcorp.com\/crowdsight\/\">http:\/\/sightcorp.com\/crowdsight\/<\/a><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Visual Evoked Potential<\/i><\/b> (VEP)<b> \u2013 <\/b>A VEP is an electrical potential recorded after a subject is presented with a type of visual stimuli. There are several types of VEPs.<span class=\"Apple-converted-space\">\u00a0 <\/span>Steady-state visually evoked potentials (SSVEPs) use potentials generated by exciting the retina, using visual stimuli modulated at certain frequencies. SSVEP\u2019s stimuli are often formed from alternating checkerboard patterns and at times simply use flashing images. SSVEP has proved to be successful within many BCI systems. This is due to several factors, the signal elicited is measurable in as large a population as the transient VEP and blink movement and electro-cardiographic artefacts do not affect the frequencies monitored. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Synthetic Telepathy and Silent Communication <\/i>&#8211; <\/b>In a $6.3 million Army initiative to invent devices for telepathic communication,\u00a0<a href=\"http:\/\/en.wikipedia.org\/w\/index.php?title=gerwin_schalk&amp;action=edit&amp;redlink=1\">Gerwin Schalk<\/a>, underwritten in a $2.2 million grant, found that it is possible to use ECoG signals to discriminate the vowels and consonants embedded in spoken and in imagined words. The results shed light on the distinct mechanisms associated with production of vowels and consonants, and could provide the basis for brain-based communication using imagined speech. Research into synthetic telepathy using\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/subvocalization\">sub-vocalization<\/a>\u00a0is taking place at the University of California, Irvine under lead scientist Mike D&#8217;Zmura. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The first such communication took place in the 1960s using EEG to create Morse code using brain alpha waves. Using EEG to communicate imagined speech is less accurate than the invasive method of placing an electrode between the skull and the brain.\u00a0On February 27, 2013 the group of\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/miguel_nicolelis\">Miguel Nicolelis<\/a>\u00a0at\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/duke_university\">Duke University<\/a>\u00a0and IINN-ELS successfully connected the brains of two rats with electronic interfaces that allowed them to directly share information, in\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/miguel_nicolelis#Brain_to_brain\">the first-ever direct brain-to-brain interface<\/a>. On 3 September 2014, scientists reported that direct communication between human brains was possible over extended distances through Internet transmission of EEG signals. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>Sentient World Simulation &#8211; <\/b>The DoD is developing a parallel to Planet Earth, with billions of individual &#8220;nodes&#8221; to reflect every man, woman, and child this side of the dividing line between reality and AR. Called the Sentient World Simulation (SWS), it will be a &#8220;synthetic mirror of the real world with automated continuous calibration with respect to current real-world information&#8221;, according to a concept paper for the project.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"> &#8220;SWS provides an environment for testing Psychological Operations (PSYOP),&#8221; the paper reads, so that military leaders can &#8220;develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners.\u201d SWS also replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers believe they can predict how individuals and mobs will respond to various stressors.<span class=\"Apple-converted-space\">\u00a0 <\/span><a href=\"http:\/\/www.theregister.co.uk\/2007\/06\/23\/sentient_worlds\/\">http:\/\/www.theregister.co.uk\/2007\/06\/23\/sentient_worlds\/<\/a><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Insight Program<\/i> &#8211; <\/b>DARPA awarded a $14 million contract to SAIC for the\u00a0<a href=\"http:\/\/www.darkgovernment.com\/news\/insight-program-darpas-ubiquitous-intelligence\/\">DARPA Insight program<\/a>, which is intended to help U.S. intelligence experts detect threat networks, irregular warfare, and terrorist operations by combining intelligence information from imaging sensors, crowd-source and other social network or text-based sensors, as well as from other sources for further analysis. The program seeks to fill gaps in current U.S. intelligence, surveillance and reconnaissance (ISR) systems that center on the inability to exploit and cross-cue several different intelligence sources automatically.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The DARPA Insight program seeks to develop integrated human\/machine reasoning into intelligence equipment to encompass operator knowledge and reasoning when dealing quickly with complex data from many different sensors. SAIC experts will concentrate on these areas in building the Insight next-generation ISR analysis system.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">SAIC experts will build model-based behavioral correlation, modeling, prediction, and threat network analysis tools that combine intelligence information across many different sources automatically to improve the efficiencies of multi-intelligence sensors. The company also will develop a unified data-management and processing environment that integrates new intelligence sensors and software algorithms.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>EM fields and Hidden symbols<\/i> &#8211; <\/b>DARPA is revealing programs, which have existed for years, to develop methods and techniques to incept thoughts and ideas into the mind. They reveal how once a mind has been programmed with the memory patterns, words and symbols can trigger the programing without the need of the original device.<br \/>\n<\/span><span class=\"s1\"><br \/>\n<b><i>Mind Control Project<\/i> &#8211; <\/b>The aim of this program is to remotely disrupt political dissent and extremism by employing &#8220;Transcranial Magnetic Stimulation&#8221; (TMS) in tandem with sophisticated propaganda based on this technology. TMS stimulates the temporal lobe of the brain with electromagnetic fields. The program, conducted by The Center for Strategic Communication, is based at Arizona State University. This research aims to literally induce or disrupt the operation of narratives within the brain. In other words, this research aims to stop individuals from thinking certain thoughts and make others believe things they normally would not believe. This research has tremendous interrogation possibilities and could potentially be used to more successfully spread propaganda or stop political upheaval to an unsuspecting public.\u00a0This research is being conducted by The Center for Strategic Communication at ASU and is entitled\u00a0<a href=\"http:\/\/csc.asu.edu\/projects\/\">\u201cToward Narrative Disruptors and Inductors: Mapping the Narrative Comprehension Network and its Persuasive Effects\u201d<\/a>. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Transcranial Magnetic Stimulation is a very powerful tool used to impair the brain functioning of individuals. See the videos below for a brief demonstration of the effects of TMS: <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><a href=\"http:\/\/youtu.be\/xjtnpqcj-ia\">http:\/\/youtu.be\/XJtNPqCj-iA<\/a><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><a href=\"http:\/\/youtu.be\/fmr_t0mm7pc\">http:\/\/youtu.be\/FMR_T0mM7Pc<\/a><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Once the research group determines which parts of the brain are associated with cognitive reasoning and narrative comprehension, they attempt to impair those sections in order to \u201ccreate a fundamental basis for understanding how to disrupt or enhance aspects of narrative structure and\/or brain functioning to minimize or maximize persuasive effects on subject proclivity to engage in political violence. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Once it is determined that disruption of certain portions of the brain can enhance persuasive messaging, individuals can be persuaded to do things they normally would not do and believe things they normally would not believe. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">It offers the capability to induce or disrupt the operation of narratives in the brain, and develops the capability to induce narrative validity. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Mechanical disruptions of narrative processing may be, ultimately, replicated through targeted strategic communication campaigns that approximate the narrative disruptions induced via magnetic stimulation. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Through extensive research, they may be able to replicate the machine\u2019s brain disrupting functioning simply through carefully crafted and researched persuasive messages and propaganda. With enough data, the government could spread propaganda through the media that people will almost automatically believe, whether it is true or not.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">In terms of interrogation possibilities, Transcranial Magnetic Stimulation can be forced upon individuals to make them believe certain things, say certain things, and perhaps admit to acts they did not actually commit (as the TMS can induce narrative validity), or commit acts they normally would not commit.<br \/>\n<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>The Brain Project<\/i> &#8211; <\/b>This area of study has received $100 million in funding via Obama&#8217;s ten-year\u00a0<a href=\"http:\/\/www.activistpost.com\/2012\/02\/elite-think-tanks-neuroscience-and.html\">BRAIN Project<\/a>, as well as a\u00a0<a href=\"http:\/\/www.wired.com\/wiredscience\/2013\/05\/neurologist-markam-human-brain\/all\/\">$1.3 billion commitment from Europe<\/a>. Concurrently, there is heavy military funding through agencies such as the Defense Advanced Research Projects Agency (DARPA). This raises the question of transparency when a &#8220;black budget&#8221; often justifies total secrecy in the name of national security.<br \/>\n<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Neuroscientists Successfully Plant False Memories<\/i><\/b> &#8211; MIT neuroscientists have shown that they can plant false memories. They also found that many of the neurological traces of these memories are identical in nature to those of authentic memories. Most of the research in this area currently revolves around how to induce and eliminate fear. The study also provides further evidence that memories are stored in networks of neurons that form memory traces for each experience we have.\u00a0 Scientists already know how to set off an emotional response in combat veterans by simulating a specific set of frequencies that have become associated with wartime experience.<\/span><\/p>\n<p class=\"p11\"><span class=\"s4\"><a href=\"http:\/\/sitsshow.blogspot.com\/2013\/08\/disclosure-darpa-reveals-mass-mind.html\">http:\/\/sitsshow.blogspot.com\/2013\/08\/disclosure-darpa-reveals-mass-mind.html<\/a><\/span><\/p>\n<p class=\"p11\"><span class=\"s4\"><a href=\"http:\/\/www.militaryaerospace.com\/articles\/2011\/05\/darpa-chooses-saic.html\">http:\/\/www.militaryaerospace.com\/articles\/2011\/05\/darpa-chooses-saic.html<\/a><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Total Information Awareness<\/i><\/b> &#8211; Under the umbrella of a system known as Total Information Awareness, DARPA spearheaded many of the surveillance programs abused by the NSA. DARPA\u2019s Total Information Awareness concept created a veritable buffet of advanced surveillance and data mining programs, many of which ultimately were folded into NSA\u2019s PRISM. We now know that\u00a0<a href=\"http:\/\/www.eff.org\/deeplinks\/2013\/06\/what-we-need-to-know-about-prism\">PRISM<\/a>\u00a0culled citizens\u2019 personal data from companies like Microsoft, Google, and Facebook, and was later leaked by whistleblower Edward Snowden. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Evidence Extraction and Link Discovery program<\/i><\/b> (EELD)\u00a0\u2013\u00a0Sole purpose is to gather as much information about both terror suspects and average American citizens as possible, using phone records, computer searches, credit card receipts, parking receipts, books checked out of the library, films rented, and more.\u00a0Goal is to assess megadata on 285 million people a day in real-time.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Scalable Social Network Analysis<\/i><\/b> (SSNA)\u00a0\u2013 Program\u00a0monitors telephone calls, conference calls, and ATM withdrawals \u2026 also sought to develop a far more invasive surveillance technology.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Activity Recognition and Monitoring<\/i><\/b> (ARM)\u00a0\u2013\u00a0With England\u2019s CCTV surveillance cameras as a model, ARM created a massive database of people going about their everyday lives. Using advanced facial recognition software, the program highlighted any behavior that was outside the realm of a preprogrammed \u201cordinary,\u201d the definition of which remains classified.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Deep Exploration and Filtering of Text<\/i><\/b> (DEFT)\u00a0\u2013\u00a0Operating on a 28 million dollar budget, this program utilizes advanced computer algorithms to analyze text-based messages in all shapes and forms, from text messages to reports, with the aim being to comprehend\u00a0\u201cimplied and hidden meanings through probabilistic inference.\u201d\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Nexus 7<\/i><\/b>\u00a0\u2013\u00a0With a classified budget, this particularly program studies and tracks social network content. First used in Afghanistan in a defense capacity, when aimed at domestic networks the use of the program is a mystery.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Narrative Networks Program<\/i><\/b> &#8211; Developed classified techniques used to manipulate trust in humans. For its Narrative Networks (N2) program,\u00a0<a href=\"http:\/\/www.darpa.mil\/program\/narrative-networks\">DARPA<\/a>\u00a0collaborated with a CIA agency called the Intelligence Advanced Research Projects Agency (IARPA) to develop methods of overwriting messages in the human mind. The program was described as having two parts: first, to understand what happens in the human mind when someone sees or hears a message; second, to figure out how to control how the brain interprets the message.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>Mind Control Devices from In-Q-Tel and DARPA<\/b><\/span><\/p>\n<h4 class=\"p12\" style=\"padding-left: 60px;\"><span class=\"s1\"><i>\u201cThe secrecy involved in the development of the electromagnetic mind-altering technology reflects the tremendous power that is inherent in it. To put it bluntly, whoever controls this technology can control the minds of men &#8211; all men.\u201d <span class=\"Apple-converted-space\">\u00a0 \u00a0 \u00a0<\/span><\/i><\/span><\/h4>\n<h4 class=\"p12\" style=\"padding-left: 60px;\"><strong><span class=\"s1\">Nexus Magazine 1998<\/span><\/strong><\/h4>\n<p class=\"p5\"><span class=\"s1\"><b><i>Real-time Contextual Overlays for Live Streams<\/i><\/b> \u2013 A system and method for contextualizing and live-updating overlay data for live media streams.<span class=\"Apple-converted-space\">\u00a0 <\/span>Overlays can be generated in real-time and in response to live events.<span class=\"Apple-converted-space\">\u00a0 <\/span>US 20130311595 A1 November 21, 2013.<span class=\"Apple-converted-space\">\u00a0 <\/span>Google Inc. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Method and Apparatus for Remotely Determining Emotional States<\/i><\/b> \u2013 A waveform energy having a predetermined frequency and intensity is generated and wirelessly transmitted towards a subject.<span class=\"Apple-converted-space\">\u00a0 <\/span>Physiological or physical parameters of blood pressure, pulse rate, pupil size, respiration rate and perspiration level are measured for evaluating criminal intent in security sensitive areas.<span class=\"Apple-converted-space\">\u00a0 <\/span>US 5507291 A &#8211; April 5, 1994 <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Sounds of Silence &#8211; The Silent Subliminal Presentation System (SSPS) &#8211; <\/i><\/b>Silent Subliminal Presentation System was developed for commercial use in 1992. A silent communications system in which nonaural carriers, in the very low (ELF) or\u00a0very high audio-frequency (VHF) range or in the adjacent ultrasonic frequency spectrum are amplitude \u2013 or frequency- modulated with the desired intelligence and\u00a0\u00a0propagated acoustically or vibrationally, for inducement in to the brain, typically through the use of loudspeakers, earphones, or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be recorded and stored on mechanical, magnetic, or optical media for delayed or\u00a0repeated transmission to the listener. US Patent#5,159,703<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Flame<\/i><\/b> &#8211; The program is able to turn on a target\u2019s Web cam and record video remotely and without detection.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Multidisciplinary Research Program of the University Research Initiative <\/i><\/b>(MURI),<span class=\"Apple-converted-space\">\u00a0 <\/span>Recognize\/predict social contexts, relationships, networks, and intentions from social media, taking into account non-verbal communication such as gestures, micro-expressions, posture, and latent semantics of text and speech. Create algorithms for prediction and collection of latent signals and their use in predicting social information.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Beware <\/i><\/b>&#8211; Analyses people\u2019s social media activity, property records, the records of friends, family or associates, among other data, to assign suspects a so-called \u201cthreat-score.\u201d That \u201cthreat-score\u201d can then be used by police to pre-judge if a suspect is going to be dangerous, and to adapt their approach accordingly.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Iraqi Silent Sound Program<\/i><\/b> &#8211; US Psy-Ops teams set up FM transmitters, utilizing Iraqi frequencies and overpowered the local station. Along with patriotic and religious music, PsyOps transmitted \u201cvague, confusing and contradictory military orders and information.\u201d<span class=\"Apple-converted-space\">\u00a0 <\/span>A sophisticated electronic system designed to \u2018speak\u2019 directly to the mind of the listener; to alter and entrain his brainwaves, to manipulate his brain\u2019s electroencephalographic (EEG) patterns and\u00a0thus artificially implant negative emotional states &#8211; feelings of intense fear, anxiety, despair and hopelessness were created in the Iraqi troops. This effective subliminal system implants emotions in the minds of the targeted subject.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Nervous system manipulation by electromagnetic fields from monitors &#8211; <\/i><\/b>US Patent and Trade Office,\u00a0<a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-parser?sect1=pto1&amp;sect2=hitoff&amp;d=pall&amp;p=1&amp;u=%252fnetahtml%252fpto%252fsrchnum.htm&amp;r=1&amp;f=g&amp;l=50&amp;s1=6506148.pn.&amp;os=pn%252f6506148&amp;rs=pn%252f6506148\">Patent #6,506,148<\/a>\u00a0on subliminal behavior modification, 1\/14\/2003<b>, <\/b>United States Patent 6,506,148, Loos, January 14, 2003<b>.<span class=\"Apple-converted-space\">\u00a0 <\/span><\/b>Abstract<i>: <\/i>It is possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Physiological effects have been observed in a human subject in response to stimulation of the skin with weak electromagnetic fields that are pulsed with certain frequencies near 1\/2 Hz or 2.4 Hz, such as to excite a sensory resonance. Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is therefore possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">For the latter, the image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream, either as an RF signal or as a video signal.\u00a0The image displayed on a computer monitor may be pulsed effectively by a simple computer program. For certain monitors, pulsed electromagnetic fields capable of exciting sensory resonances in nearby subjects may be generated even as the displayed images are pulsed with subliminal intensity. Inventors: Loos; Hendricus G. (3019 Cresta Way, Laguna Beach, CA 92651), Appl. No.: 872528<span class=\"Apple-converted-space\">\u00a0 <\/span>Filed: June 1, 2001<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Other Projects<\/i><\/b> &#8211; Directed-energy weapons (DEWS), Remote Neural Monitoring (RNM) weapons, Remote EEG Readers, Remote Electro-Muscular Shock\/Incapacitation weapons, Remote Microwave weapons, Remote Voice to Skull weapons, Remote Neural Monitoring technologies, and EMF brain-wave monitoring, tracking, and harvesting technologies.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>Google Created by CIA and Highlands Forum<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">One of the most interesting articles that highlights the way the DoD incubates war-technology is described in great detail by Nafeez Ahmed. <b>This article shows that Google was funded throughout its inception by the CIA. <\/b>Google was created as a weaponized war-tool as indicated by the many new inventions that DARPA and In-Q-Tel are focused on.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Nafeez Ahmed explains the Google-CIA connection in this excellent article:<\/span><\/p>\n<p class=\"p11\"><span class=\"s4\"><a href=\"http:\/\/medium.com\/insurge-intelligence\/how-the-cia-made-google-e836451a959e%23.nu1cd96l3\">http:\/\/medium.com\/insurge-intelligence\/how-the-cia-made-google-e836451a959e#.nu1cd96l3<\/a><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Essentially, the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. <b><i>Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by U.S. intelligence to retain \u2018information superiority.\u2019<\/i><\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The origins of this strategy trace back to a secret Pentagon-sponsored group that for the last two decades has functioned as a bridge between the U.S. government and elites across the business, industry, finance, corporate, and media sectors. The group has allowed some of the most powerful special interests in corporate America to systematically circumvent democratic accountability and the rule of law to influence government policies, as well as public opinion in the US and around the world. The results have been catastrophic: mass surveillance and perception management amidst a permanent state of global war. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The U.S. intelligence community is implicated in nurturing the web platforms we know today, for the precise purpose of utilizing the technology as a mechanism to fight global \u2018information war\u2019\u200a- \u200aa war to legitimize the power of the few over the many. In reality, Google is a smokescreen behind which lurks the US military-industrial complex.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>Highland Forum Dominates U.S. Defense Policy<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">In 1999, <b><i>the CIA created its own venture capital investment firm, In-Q-Tel<\/i><\/b>, to fund promising start-ups that might create technologies useful for intelligence agencies. But the inspiration for In-Q-Tel came earlier, when the Pentagon set up its own private sector outfit. Known as the \u2018Highlands Forum,\u2019 this private network has operated as a bridge between the Pentagon and powerful American elites outside the military since the mid-1990s. Despite changes in civilian administrations, the network around the Highlands Forum has become increasingly successful in dominating US defense policy.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">As mentioned previously, SAIC stands for the U.S. defense firm, Science Applications International Corporation, which changed its name to Leidos in 2013, operating SAIC as a subsidiary. SAIC\/Leidos is among the\u00a0<a href=\"http:\/\/www.bga-aeroweb.com\/top-100-defense-contractors-2014.html\">top 1<\/a>0 largest defense contractors in the US, and works closely with the U.S. intelligence community, especially the NSA. The agency is the company\u2019s largest single customer and SAIC is the NSA\u2019s largest contractor.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Richard Patrick O\u2019Neill, founding president of the Pentagon\u2019s Highlands Forum served his last post as deputy for strategy and policy in the Office of the Assistant Secretary for Defense for Command, Control, Communications and Intelligence, before setting up Highlands.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Since 1973, Andrew Marshall has headed up one of the Pentagon\u2019s most powerful agencies, the Office of Net Assessment (ONA), the U.S. defense secretary\u2019s internal \u2018think tank\u2019 which conducts highly classified research on future planning for defense policy across the US military and intelligence community. Marshall, now 93 years old and nicknamed \u201cYoda\u201d by insiders, as \u201cthe DoD\u2019s most elusive\u201d but \u201cone of its most influential\u201d officials. Vice President Dick Cheney, Defense Secretary Donald Rumsfeld, and Deputy Secretary Paul Wolfowitz are \u200awidely considered the hawks of the neoconservative movement in American politics &#8211; \u200awere among Marshall\u2019s star prot\u00e9g\u00e9s.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The Highlands Forum\u2019s influence on US defense policy has operated through three main channels: its sponsorship by the Office of the Secretary of Defense (around the middle of last decade this was transitioned specifically to the\u00a0<a href=\"http:\/\/dbb.defense.gov\/portals\/35\/documents\/members\/o%2527connor,%2520john.pdf\">Office of the Undersecretary of Defense for Intelligence<\/a>, which is in charge of the main surveillance agencies); its direct link to Marshall\u2019s ONA; and its direct link to DARPA.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The Highlands Forum has served as a two-way \u2018influence bridge\u2019: on the one hand, for the shadow network of private contractors to influence the formulation of information operations policy across U.S. military intelligence; and on the other, for the Pentagon to influence what is going on in the private sector. There is no clearer evidence of this than the instrumental role of the Forum in incubating the idea of mass surveillance as a mechanism to dominate information on a global scale.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">In 1989, Richard O\u2019Neill, then a U.S. Navy cryptologist, wrote a paper for the U.S. Naval War College,\u00a0\u2018Toward a methodology for perception management.\u2019\u00a0 O\u2019Neill\u2019s paper for the first time outlined a strategy for \u201cperception management\u201d as part of information warfare (IW). <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">O\u2019Neill\u2019s proposed strategy identified <b><i>three categories of targets<\/i> <\/b>for IW: adversaries \u2013 so they believe they are vulnerable; potential partners &#8211; so they perceive the cause as just; <b><i>and civilian populations and political leadership &#8211; so they perceive the cost as worth the effort.<\/i><\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><a href=\"http:\/\/www.highlandsgroup.net\/perspectives.php?id=6\">Around 199<\/a>4, the Highlands Group was founded by O\u2019Neill as an official Pentagon project at the appointment of Bill Clinton\u2019s then defense secretary\u00a0<a href=\"http:\/\/www.govexec.com\/magazine\/features\/2006\/05\/start-your-idea-engines\/21898\/\">William Perry<\/a>. In O\u2019Neill\u2019s own words, <b><i>the group would function as the Pentagon\u2019s \u2018<\/i><\/b><a href=\"http:\/\/www.pirp.harvard.edu\/pubs_pdf\/o%2527neill\/o%2527neill-i01-3.pdf\"><b><i>ideas lab<\/i><\/b><\/a><b><i>.\u2019 <\/i><\/b>Total participants in the DoD\u2019s Highlands Forum number over a thousand, although sessions largely consist of small closed workshop style gatherings of maximum 25\u201330 people, bringing together experts and officials depending on the subject. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The Forum has inside access to the chiefs of the main U.S. surveillance and reconnaissance agencies, as well as the directors and their assistants at DoD research agencies, from DARPA, to the ONA and is deeply plugged into the Pentagon\u2019s policy research task forces. In 2001, under the Total Information Awareness Program, President Bush had\u00a0<a href=\"http:\/\/www.nytimes.com\/2005\/12\/15\/politics\/15cnd-program.html?ex=1292302800&amp;en=63736654e4101aee&amp;ei=5090&amp;partner=rssuserland&amp;emc=rss\">secretly authorized<\/a>\u00a0the NSA\u2019s domestic surveillance of Americans without court-approved warrants. From then on, Highlands Forum partner SAIC played a key role in the NSA roll out from inception. SAIC was then among a consortium receiving a $280 million contract to develop one of the NSA\u2019s secret eavesdropping systems. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">This was also the year that the Bush administration drew up its <a href=\"http:\/\/news.bbc.co.uk\/1\/shared\/bsp\/hi\/pdfs\/27_01_06_psyops.pdf\">Information Operations Roadmap<\/a>. Describing the internet as a \u201cvulnerable weapons system,\u201d Rumsfeld\u2019s IO roadmap had advocated that Pentagon strategy \u201cshould be based on the premise that the Department [of Defense] will \u2018fight the net\u2019 as it would an enemy weapons system.\u201d The U.S. should seek \u201cmaximum control\u201d of the \u201cfull spectrum of globally emerging communications systems, sensors, and weapons systems,\u201d advocated the document.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">As of 2006, SAIC had been awarded a multi-million dollar NSA contract to develop a big data-mining project called\u00a0<a href=\"http:\/\/www.nytimes.com\/2007\/06\/25\/opinion\/25keefe.html?pagewanted=all&amp;_r=0\">ExecuteLocus<\/a>, despite the colossal $1 billion failure of its preceding contract, known as \u2018Trailblazer.\u2019 Core components of TIA were being quietly continued under new code names.<span class=\"Apple-converted-space\">\u00a0 <\/span>The new surveillance program was then fully transitioned from DARPA\u2019s jurisdiction to the NSA.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">In addition to the CIA, In-Q-Tel (the CIA\u2019s version of DARPA) has also been backed by the FBI, NGA, and Defense Intelligence Agency, among other agencies. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">O\u2019Neill said his job as Forum president was to scope case studies from real companies across the private sector, like eBay and Human Genome Sciences, to figure out the basis of U.S. Information Superiority\u200a\u2014\u200ahow to dominate the information market\u200a\u2014\u200aand leverage this for what the president and the secretary of defense wanted to do with regard to transformation of the DoD.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">By 2007, Facebook received its second round of $12.7 million worth of funding from Accel Partners. Facebook\u2019s 2008 round of funding was led by Greylock Venture Capital, which invested $27.5 million. Apart from Breyer and Zuckerberg, Facebook\u2019s only other board member is Peter Thiel, co-founder of defense contractor Palantir which provides all sorts of data-mining and visualization technologies to U.S. government, military and intelligence agencies, including the\u00a0<a href=\"http:\/\/uk.businessinsider.com\/palantir-leaked-documents-clients-2015-1\">NSA and FBI<\/a>, and which itself was nurtured to financial viability by Highlands Forum members.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">By 2008, the NSA was effectively\u00a0<a href=\"http:\/\/www.cnet.com\/uk\/news\/nsa-shifts-to-e-mail-web-data-mining-dragnet\/\">resurrecting the TIA project<\/a>\u00a0with a focus on Internet data-mining via comprehensive monitoring of e-mail, text messages, and Web browsing. We also now know (thanks to Snowden) that the NSA\u2019s\u00a0<a href=\"http:\/\/www.hstoday.us\/blogs\/the-kimery-report\/blog\/exclusive-nsas-x-keyscore-does-far-more-than-just-siphon-the-net-but-is-it-working\/f419986393a64eec5bf2630815d3da3e.html\">XKeyscore<\/a>\u00a0\u2018Digital Network Intelligence\u2019 exploitation system was designed to allow analysts to search not just internet databases like emails, online chats and browsing history, but also telephone services, mobile phone audio, financial transactions and global air transport communications\u200a\u2014\u200aessentially the entire global telecommunications grid. Highlands Forum partner SAIC played a key role, among other contractors, in\u00a0<a href=\"http:\/\/arstechnica.com\/information-technology\/2013\/08\/building-a-panopticon-the-evolution-of-the-nsas-xkeyscore\/\">producing<\/a>\u00a0and\u00a0<a href=\"http:\/\/foreignpolicy.com\/2013\/08\/02\/x-keyscore-the-nsa-tool-so-secret-its-advertised-on-job-boards\/\">administering<\/a>\u00a0the NSA\u2019s XKeyscore.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The investment firm responsible for creating the billion dollar fortunes of the tech sensations of the 21st century, from Google to Facebook, is intimately linked to the U.S. military intelligence community. The convergence of these powerful financial and military interests around the Highlands Forum, through George Lee\u2019s sponsorship of the Forum\u2019s new partner, the MIIS Cybersec initiative, is revealing in itself. MIIS Cybersec\u2019s director, Dr, Itamara Lochard, has long been embedded in Highlands.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Dr Itamara Lochard is a senior Highlands Forum member and Pentagon information operations expert. She directs the MIIS CyberSec initiative that now supports the Pentagon Highlands Forum with funding from Goldman Sachs partner George Lee, who led the valuations of Facebook and Google. Dr. Lochard maintains a comprehensive\u00a0<a href=\"http:\/\/fletcher.tufts.edu\/issp\/about_us\/lochard\">database<\/a>\u00a0of 1,700 non-state groups including insurgents, militias, terrorists, complex criminal organizations, organized gangs, malicious cyber actors and strategic non-violent actors, to analyze their organizational patterns, areas of cooperation, strategies and tactics. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Her views disclose much about what the Highlands Forum has been advocating all these years. In 2004, Lochard was co-author of a study for the <a href=\"http:\/\/www.dtic.mil\/cgi-bin\/gettrdoc?ad=ada435193\">U.S. Air Force\u2019s Institute for National Security Studies<\/a>\u00a0on US strategy toward \u2018non-state armed groups.\u2019 The study on the one hand argued that non-state armed groups should be urgently recognized as a \u2018tier one security priority,\u2019 and on the other that the proliferation of armed groups provide strategic opportunities that can be exploited to help achieve policy goals. There have and will be instances where the United States may find collaborating with armed group is in its strategic interests. But sophisticated tools must be developed to differentiate between different groups and understand their dynamics, to determine which groups should be countered, and which could be exploited for US interests. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">In 2009, it also emerged from a Google patent application that the company had deliberately been collecting \u2018payload\u2019 data from private wifi networks that would enable the identification of \u201cgeolocations.\u201d In the same year, we now know, Google had signed an agreement with the NSA giving the agency open-ended access to the personal information of its users, and its hardware and software, in the name of cyber security. It is not just Google that is a key contributor and foundation of the US military-industrial complex: it is the entire internet, and the wide range of private sector companies\u200a\u2014\u200amany nurtured and funded under the mantle of the U.S. intelligence community (or powerful financiers embedded in that community)\u200a\u2014\u200awhich sustain the internet and the telecoms infrastructure; it is also the myriad of\u00a0<a href=\"http:\/\/techonomy.com\/2013\/06\/how-startups-helped-the-nsa-build-prism\/\">start-ups<\/a>\u00a0selling cutting edge technologies to the CIA\u2019s venture firm In-Q-Tel, where they can then be adapted and advanced for applications across the military intelligence community. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Ultimately, the global surveillance apparatus and the classified tools used by agencies like the NSA to administer it, have been almost entirely made by external researchers and private contractors like Google, which operate outside the Pentagon.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">In 2011, the Forum hosted two DARPA-funded scientists, Antonio and Hanna Damasio, who are principal investigators in the \u2018Neurobiology of Narrative Framing\u2019 project at the University of Southern California. Evoking Zalman\u2019s emphasis on the need for Pentagon psychological operations to deploy \u201cempathetic influence,\u201d the new DARPA-backed\u00a0<a href=\"http:\/\/narrative.ict.usc.edu\/\">project<\/a>\u00a0aims to investigate how narratives often appeal \u201cto strong, sacred values in order to evoke an emotional response,\u201d but in different ways across different cultures. The most disturbing element of the research is its focus on trying to understand how to increase the Pentagon\u2019s capacity to deploy narratives that influence listeners in a way that overrides conventional reasoning in the context of morally questionable actions.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The research is based on <b><i>extracting narratives from millions of American, Iranian and Chinese weblogs, and subjecting them to automated discourse analysis<\/i><\/b> to compare them quantitatively across the three languages. The investigators then follow up using behavioral experiments with readers\/listeners from different cultures to gauge their reaction different narratives \u201cwhere each story makes an appeal to a sacred value to explain or justify a morally questionable behavior of the author.\u201d Finally, the scientists apply neurobiological fMRI scanning to correlate the reactions and personal characteristics of subjects with their brain responses.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">DARPA\u2019s goal is to mine millions of American weblogs as part of its \u2018neurobiology of narrative framing\u2019 research.\u00a0As the Pentagon\u2019s extensive funding of propaganda on Iraq and Afghanistan demonstrates, population influence and propaganda is critical not just in far-flung theatres abroad in strategic regions, but also at home, to quell the risk of domestic public opinion undermining the legitimacy of Pentagon policy. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">According to the Securities and Exchange Commission, from 2008 to 2013, the five largest US defense contractors lost 14 percent of their employees, as the winding down of U.S. wars in Iraq and Afghanistan led to lack of business and squeezed revenues. The continuation of the \u2018Long War\u2019 triggered by ISIS has, for now, reversed their fortunes. Companies profiting from the new war include\u00a0<a href=\"http:\/\/in.reuters.com\/article\/2014\/09\/15\/aero-summit-arms-idinl1n0rd1hc20140915\">many<\/a>\u00a0connected to the Highlands Forum, such as Leidos, Lockheed Martin, Northrup Grumman, and Boeing. War is profitable.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Yet in the long-run, the information imperialists have\u00a0<a href=\"http:\/\/www.middleeasteye.net\/columns\/why-war-isis-will-fail-1513487412\">already failed<\/a>. This investigation is based entirely on open source techniques, made viable largely in the context of the same information revolution that enabled Google. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">http:\/\/medium.com\/insurge-intelligence\/how-the-cia-made-google-e836451a959e#.nu8se9bfx<\/span><span class=\"s6\"><br \/>\n<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>US Military Uses PsyOps Weapons on Iraq<\/b><\/span><\/p>\n<h4 class=\"p12\" style=\"padding-left: 60px;\"><span class=\"s1\"><i>&#8220;PSYOPS seek to exploit human vulnerabilities in enemy governments, militaries and populations to pursue national and battlefield objectives&#8230;. The feasibility had been established of projecting large, three-dimensional objects that appeared to float in the air. Washingtonpost.com has learned that a super secret program was established in 1994 to pursue [this] very technology for PSYOPS application. The &#8216;Holographic Projector&#8217; is described in a classified Air Force document as a system to &#8216;project information power from space &#8230; for special operations deception missions.'&#8221;<br \/>\n<\/i><br \/>\n<strong><a href=\"http:\/\/www.washingtonpost.com\/wp-srv\/national\/dotmil\/arkin020199.htm\">Washington Post\u00a0article<\/a>\u00a0on PSYOPS, 2\/1\/1999<\/strong><\/span><\/h4>\n<p class=\"p5\"><span class=\"s1\">For those who don\u2019t believe that the American military will use the \u201cnew weapons\u201d created by DARPA and In-Q-Tel, we offer this article written about the use of electronic warfare on Iraqis that also affected our own soldiers.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b><i>Scalar Weapons Used in Iraq,\u00a0Britain, Microwaving Iraq \u2018Pacifying\u2019 Rays Pose New Hazards In Iraq, <\/i><\/b><i>b<\/i>y William Thomas (www.rense.com ) <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">On the rooftop of a shrapnel-pocked building in the ruins of Fallujah, a team of GI\u2019s stealthily sets up a gray plastic dome about two-feet in diameter. Keeping well back from the sight lines of the street and nearby buildings, they plug the cable connectors on the side of the \u201cpopper\u201d into a power unit. The grunts have no clue what the device does. They are just following orders.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>\u201cMost of the worker-bees that are placing these do not even know what is inside the \u201cdomes\u201d just that they were told where to place them by Intel weenies with usually no nametag,\u201d reports my source, a very well informed combat veteran I will call \u201cHank\u201d.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>The grunts call the plastic devices \u201cpoppers\u201d or \u201cdomes\u201d. Once activated, each hidden transmitter emits a widening circle of invisible energy capable of passing through metal, concrete and human skulls up to half a mile away. \u201cThey are saturating the area with ULF, VLF and UHF freqs,\u201d Hanks says, with equipment derived from US Navy undersea sonar and communications.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>But it\u2019s not being used to locate and talk to submarines under Baghdad. After powering up the unit, the grunts quickly exit the area. It is their commanders, fervent hope that any male survivors enraged by brutal American bombardments that damaged virtually every building in this once thriving \u201cCity of Mosques\u201d, displacing a quarter-million residents while murdering thousands of children, women and elders in their homes &#8211; will lose all incentive for further resistance and revenge.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>A dedicated former soldier, whose experiences during and after Desert Storm are chronicled in my book, <i>Bringing The War Home<\/i>, Hank stays in close touch with his unit serving \u201cin theater\u201d in Iraq. When I asked how many \u201cpoppers\u201d are being used to irradiate Iraqi neighborhoods, he checked and got back to me. There are \u201cat least 25 of these that have been deployed to theater, and used. Some have conked out and been removed, so I do not know how many are currently active and broadcasting.\u201d<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>Hank is concerned that innocent Iraqi families and unsuspecting GIs alike are being used as test subjects for a new generation of \u201cpsychotronic\u201d weapons using invisible beams across the entire electromagnetic spectrum to selectively alter moods, behavior and bodily processes.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>\u201cThe \u201cpoppers, are capable of using a combo of ULF, VLF, UHF and EHF wavelengths in any combination at the same time, sometimes using one as a carrier wave for the others,\u201d Hank explains, in a process called superheterodyning. The silent frequencies daily sweeping Fallujah and other trouble spots are the same Navy \u201cfreqs that drove whales nuts and made them go astray onto beaches.\u201d<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>Microwaving Iraq<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The Gulf War veteran observes that occupied Iraq has become a \u201csaturation environment\u201d of electromagnetic radiation. Potentially lethal electromagnetic smog from high-power US military electronics and experimental beam weapons is placing already hard-hit local populations-particularly children \u2014 at even higher risk of experiencing serious illness, suicidal depression, impaired cognitive ability, even death.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>American troops constantly exposed \u201cup close\u201d to their own microwave transmitters, battlefield radars and RF weapons are also seeing their health eroded by electromagnetic sickness. It\u2019s common, Hank recalls, for GIs to warm themselves on cold desert nights by basking in the microwaves radiating from their QUEEMS communications and RATT radar rigs.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>Constant microwave emissions from ground-sweeping RATT rigs and SINGARS mobile microwave networks are much more powerful than civilian microwave cell phone nets linked in many clinical studies to maladies ranging from asthma, cataracts, headaches, memory loss, early Alzheimer\u2019s, bad dreams and cancer.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>Clinical tests have repeatedly shown how microwaves \u201crev up\u201d incipient cancer cells several hundred times. Triggered by nuclear radiation, and turned rogue by electromagnetic warfare unleashed by US forces, human cancer cells have been found to continue proliferating wildly \u2014 even after the power source is turned off<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>Microwaving Wombs at Greenham Common<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Another harrowing example involves the sudden illness and cancer deaths of US embassy staff in Moscow after being deliberately targeted with very weak pulsed microwaves by Soviet experimenters and fascinated CIA onlookers running \u201cProject Phoenix\u201d in 1962.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>Very Low Frequency (VLF) weapons include the dozens of \u201cpoppers\u201d currently deployed in Iraq, which can be dialed to or \u201clong wave\u201d frequencies capable of traveling great distances through the ground or intervening structures. As air force Lt Col. Peter L. Hays, Director of the Institute for National Security Studies reveals, \u201ctransmission of long wavelength sound creates biophysical effects; nausea, loss of bowels, disorientation, vomiting, potential internal organ damage or death may occur.\u201d<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>GI\u2019s \u201cDriven Nuts\u201d by Electromagnetics in Iraq<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Like so many other American blunders among the ruins of Babylon, the intended microwave \u201cpacification\u201d of rebellious neighborhoods is having unintended effects. In actual \u201cfield-testing\u201d in the Sunni Triangle, Hank has learned that the hidden, dome-shaped devices \u201care removing inhibitions\u201d. Armed individuals, already highly motivated to kill American forces are reportedly \u201closing all restraint\u201d when exposed to the electromagnetic beams.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>According to Hank\u2019s buddies in Baghdad, the frequency-shifting \u201cpoppers\u201d \u201care having some remarkable effects on the locals as well as our own people.\u201d But these effects differ. Possibly, Hank surmises, because Americans come from daily domestic and military environments saturated with electromagnetic frequencies, while many Iraqis still live without reliable electricity in places largely free from electromagnetics before the American invasion.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>According to members of Hank\u2019s former unit, constant exposure to invisible emissions from radar and radio rigs \u2014 as well as to their own microwave weapons \u2014 is backfiring. \u201cOur people are driven nuts,\u201d Hank says. \u201cIt makes them stupid for two or three days.\u201d<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0 <\/span>The Desert Storm veteran compared the emotional effects of constant exposure to military microwaves to a lingering low-pressure weather system that never goes away. \u201cYou feel way down for days at a time,\u201d he emphasizes<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>As a consequence, AWOL rates among \u201cspaced out\u201d US troops are as high as 15%, Hank reports. For many deserters, it is not cowardice or conscience that is causing them to absent themselves from duty. \u201cThey are feeling so depressed,\u201d Hank explains. \u201cThey don\u2019t feel good. So they leave.\u201d<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>According to Hank\u2019s front-line buddies, Iraqis exposed to secret beam weapons \u201cget laid back, confused and mellow, and then blast out in a rage, as opposed to our folks going on what could only be called a \u201cbender\u201d and turning into a mean drunk for a while.\u201d<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>Once they wander away from direct electromagnetic-fire, startled GIs come to their senses. They return to their units, Hank explains, saying, \u201cWhat was I thinking?\u201d<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>The recovery rate among US troops \u201cseems to be about a day or so, where the locals are not getting over it in less than a week or more on average,\u201d Hank has learned.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>It is Hank\u2019s hope that his revelations will prompt public debate over the secret use of electromagnetic weapons in Iraq. But lost in the arguments over these supposedly \u201cnon-lethal\u201d weapons is a much bigger question: What are Americans doing there?<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0 <\/span>Whether soldier or civilian at home, it is our imperative duty to stop supporting those responsible for ongoing \u201cweapons tests\u201d in Iraq. As electrochemical \u201cbeings of light,\u201d the strongest electromagnetic force on Earth is human conscience, acted upon.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><a href=\"http:\/\/www.rense.com\/general62\/mciro.htm\">http:\/\/www.rense.com\/general62\/mciro.htm<\/a><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>Where Do We Go From Here?<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Now that we have the answer to the original question: Who owns and controls the military industrial complex, we need to ask another question.\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Who are these Corporate and Banking Warlords in a war with?<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Unfortunately, it is very clear that Americans are the target of the long, soft war of terrorism.<span class=\"Apple-converted-space\">\u00a0 <\/span>Each American is a potential terrorist or at least a possible dissenter who doesn\u2019t support the current administration\u2019s policies. Hundreds of war-tools have lined the pockets of the Corporate and Banking Warlords while the military puts civilians in the cross-hairs. American Democracy has been taken over by transnational greed and power. <\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>We pay taxes so that the DoD can create war-tools that are used against US, the citizens of the U.S.\u00a0<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">These realities are a basis for declaring a patriotic war on the following transnational corporations and agencies that have already declared war on American citizens. The following list represents some of the people who need to be investigated and brought to justice:<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The Department of Defense<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The National Security Agency<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">DARPA<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">In-Q-Tel<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Highlands Group and all attendees of Highlands Forums<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The Federal Reserve<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The Counsels on Foreign Relations<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The International Monetary Fund<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The World Bank<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The International Court of Settlements<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">All Transnational Corporations and Banks<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The Bank of England<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The Vatican Bank<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">The Knights of Malta<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">Any of these corporations found guilty should be held responsible for the crimes and banned from further business in the United States of America; their principals should be tried for the crimes that have perpetrated, whether it is treason, crimes against humanity, insider trading, or murder.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">There is an internal war going on in America. But with the military use of the war-tools described above, perception management is controlled and no one even asks how the president and the Department of Defense are able to wage this war. In a previous article, <i>False Flags are Legal Propaganda<\/i>, we spelled out in great details the way the National Defense Authorization Act has been modified each year to empower this war against Americans.\u00a0<\/span><\/p>\n<p class=\"p11\"><span class=\"s4\"><a href=\"http:\/\/themillenniumreport.com\/2016\/01\/false-flags-are-legal-propaganda-produced-by-the-department-of-defense\/\">http:\/\/themillenniumreport.com\/2016\/01\/false-flags-are-legal-propaganda-produced-by-the-department-of-defense\/<\/a><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">In another posting, we showed readers an example of how false flag events can be used against Americans through the techniques of perception management.<\/span><\/p>\n<p class=\"p11\"><span class=\"s4\"><a href=\"http:\/\/themillenniumreport.com\/2015\/12\/was-the-san-bernardino-mass-shooting-a-false-flag-within-a-false-flag\/\">http:\/\/themillenniumreport.com\/2015\/12\/was-the-san-bernardino-mass-shooting-a-false-flag-within-a-false-flag\/<\/a><\/span><span class=\"s1\"><span class=\"Apple-converted-space\">\u00a0\u00a0<\/span><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">We swallow their lies whole without question as they used our tax money to develop psychological warfare devices that we have described in our posts. How can we awaken our fellow countrymen and the world when subliminal perception management has made us passive to their evil?\u00a0<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">This is a call for action for all patriots involved in any aspect of the following treasonous war against American democracy to stand up and refuse to participate in this criminal activity. We must file lawsuit after lawsuit based upon whistle-blower complaints that bring to light the dark evil of the Warlords. Resist your programming and help slow down the machinations of the rich and warlike used against citizen. Demand authorities to be transparent. Demand to know the truth and fight against the forces of greed and selfishness that drives evil war-machines. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>Appendix<\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><b>US Patents for Mind Control Devices<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">USP #\u00a0<a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-parser?sect1=pto1&amp;sect2=hitoff&amp;d=pall&amp;p=1&amp;u=%252fnetahtml%252fpto%252fsrchnum.htm&amp;r=1&amp;f=g&amp;l=50&amp;s1=3,951,134.pn.&amp;os=pn\/3,951,134&amp;rs=pn\/3,951,134\">3,951,134<\/a>\u00a0(April 20, 1976),\u00a0<b><i>Apparatus &amp; Method for Remotely Monitoring &amp; Altering Brain Waves<\/i><\/b><br \/>\nAbstract:\u00a0Apparatus for and method of sensing brain waves at a position remote from a subject whereby electromagnetic signals of different frequencies are simultaneously transmitted to the brain of the subject in which the signals interfere with one another to yield a waveform which is modulated by the subject&#8217;s brain waves. The interference waveform &#8230; is re-transmitted by the brain to a receiver where it is demodulated and amplified. The demodulated waveform also can be used to produce a compensating signal which is transmitted back to the brain to effect a desired change in electrical activity therein.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">USP #\u00a0<a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-parser?sect1=pto1&amp;sect2=hitoff&amp;d=pall&amp;p=1&amp;u=%252fnetahtml%252fpto%252fsrchnum.htm&amp;r=1&amp;f=g&amp;l=50&amp;s1=5,159,703.pn.&amp;os=pn\/5,159,703&amp;rs=pn\/5,159,703\">5,159,703<\/a>\u00a0(Oct. 27, 1992),\u00a0<b><i>Silent Subliminal Presentation System<\/i><\/b><br \/>\nAbstract:\u00a0A silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">USP #\u00a0<a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-parser?sect1=pto1&amp;sect2=hitoff&amp;d=pall&amp;p=1&amp;u=%252fnetahtml%252fpto%252fsrchnum.htm&amp;r=1&amp;f=g&amp;l=50&amp;s1=5,017,143.pn.&amp;os=pn\/5,017,143&amp;rs=pn\/5,017,143\">5,017,143<\/a>\u00a0(May 21, 1991),\u00a0<b><i>Method and Apparatus for Producing Subliminal Images<\/i><\/b><br \/>\nAbstract:\u00a0A method and apparatus to produce more effective visual subliminal communications. Graphic and\/or text images, presented for durations of less than a video frame, at organized rhythmic intervals, the rhythmic intervals intended to affect user receptivity, moods or behavior.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">USP #\u00a0<a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-parser?sect1=pto1&amp;sect2=hitoff&amp;d=pall&amp;p=1&amp;u=%252fnetahtml%252fpto%252fsrchnum.htm&amp;r=1&amp;f=g&amp;l=50&amp;s1=6,052,336.pn.&amp;os=pn\/6,052,336&amp;rs=pn\/6,052,336\">6,052,336<\/a>\u00a0(April 18, 2000),\u00a0<b><i>Apparatus and Method of Broadcasting Audible Sound Using Ultrasonic Sound as a Carrier<\/i><\/b> &#8211; Abstract:\u00a0An ultrasonic sound source broadcasts an ultrasonic signal which is amplitude and\/or frequency modulated with an information input signal originating from an information input source. The modulated signal, which may be amplified, is then broadcast via a projector unit, whereupon an individual or group of individuals located in the broadcast region detect the audible sound.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">USP #\u00a0<a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-parser?sect1=pto1&amp;sect2=hitoff&amp;d=pall&amp;p=1&amp;u=%252fnetahtml%252fpto%252fsrchnum.htm&amp;r=1&amp;f=g&amp;l=50&amp;s1=5,539,705.pn.&amp;os=pn\/5,539,705&amp;rs=pn\/5,539,705\">5,539,705<\/a>\u00a0(July 23, 1996),\u00a0<b><i>Ultrasonic Speech Translator and Communications System<\/i><\/b><br \/>\nAbstract:\u00a0A wireless communication system, undetectable by radio-frequency methods, for converting audio signals, including human voice, to electronic signals in the ultrasonic frequency range, transmitting the ultrasonic signal by way of acoustic pressure waves across a carrier medium, including gases, liquids and solids, and reconverting the ultrasonic acoustic pressure waves back to the original audio signal. This invention was made with government support under Contract DE-ACO5-840R2l400, awarded by the US Department of Energy to Martin Marietta Energy Systems, Inc.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">USP #\u00a0<a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-parser?sect1=pto2&amp;sect2=hitoff&amp;p=1&amp;u=%252fnetahtml%252fpto%252fsearch-adv.htm&amp;r=1&amp;f=g&amp;l=50&amp;d=pall&amp;s1=7629918.pn.&amp;os=pn\/7629918&amp;rs=pn\/7629918\">7,629,918<\/a>\u00a0(Dec. 8, 2009),\u00a0<b><i>Multifunctional radio frequency directed energy system<\/i><\/b><br \/>\nAbstract:\u00a0An RFDE system includes an RFDE transmitter and at least one RFDE antenna. The RFDE transmitter and antenna direct high power electromagnetic energy towards a target sufficient to cause high energy damage or disruption of the target. The RFDE system further includes a targeting system for locating the target. The targeting system includes a radar transmitter and at least one radar antenna for transmitting and receiving electromagnetic energy to locate the target.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">USP #\u00a0<a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-parser?sect1=pto1&amp;sect2=hitoff&amp;d=pall&amp;p=1&amp;u=%252fnetahtml%252fpto%252fsrchnum.htm&amp;r=1&amp;f=g&amp;l=50&amp;s1=6,488,617.pn.&amp;os=pn\/6,488,617&amp;rs=pn\/6,488,617\">6,488,617<\/a>\u00a0(Dec. 3, 2002),\u00a0<b><i>Method and Device for Producing a Desired Brain State<\/i><\/b><br \/>\nAbstract:\u00a0A method and device for the production of a desired brain state in an individual contain means for monitoring and analyzing the brain state while a set of one or more magnets produce fields that alter this state. A computational system alters various parameters of the magnetic fields in order to close the gap between the actual and desired brain state. This feedback process operates continuously until the gap is minimized and\/or removed.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">USP #\u00a0<a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-parser?sect1=pto1&amp;sect2=hitoff&amp;d=pall&amp;p=1&amp;u=%252fnetahtml%252fpto%252fsrchnum.htm&amp;r=1&amp;f=g&amp;l=50&amp;s1=6,239,705.pn.&amp;os=pn\/6,239,705&amp;rs=pn\/6,239,705\">6,239,705<\/a>\u00a0(May 29, 2001),\u00a0<b><i>Intra-Oral Electronic Tracking Device<\/i><\/b><br \/>\nAbstract:\u00a0An improved stealthy, non-surgical, biocompatible electronic tracking device is provided in which a housing is placed intraorally. The housing contains microcircuitry. The microcircuitry comprises a receiver, a passive mode to active mode activator, a signal decoder for determining positional fix, a transmitter, an antenna, and a power supply. Upon receiving a coded activating signal, the positional fix signal decoder is energized, determining a positional fix. The transmitter subsequently transmits through the antenna a homing signal to be received by a remote locator.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">USP #\u00a0<a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-parser?sect1=pto1&amp;sect2=hitoff&amp;d=pall&amp;p=1&amp;u=%252fnetahtml%252fpto%252fsrchnum.htm&amp;r=1&amp;f=g&amp;l=50&amp;s1=6,091,994.pn.&amp;os=pn\/6,091,994&amp;rs=pn\/6,091,994\">6,091,994<\/a>\u00a0(July 18, 2000),\u00a0<b><i>Pulsative Manipulation of Nervous Systems<\/i><\/b><br \/>\nAbstract:\u00a0Method and apparatus for manipulating the nervous system by imparting subliminal pulsative cooling to the subject&#8217;s skin at a frequency that is suitable for the excitation of a sensory resonance. At present, two major sensory resonances are known, with frequencies near 1\/2 Hz and 2.4 Hz. The 1\/2 Hz sensory resonance causes relaxation, sleepiness, ptosis of the eyelids, a tonic smile, a &#8220;knot&#8221; in the stomach, or sexual excitement, depending on the precise frequency used. The 2.4 Hz resonance causes the slowing of certain cortical activities.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">USP #\u00a0<a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-parser?sect1=pto1&amp;sect2=hitoff&amp;d=pall&amp;p=1&amp;u=%252fnetahtml%252fpto%252fsrchnum.htm&amp;r=1&amp;f=g&amp;l=50&amp;s1=5,507,291.pn.&amp;os=pn\/5,507,291&amp;rs=pn\/5,507,291\">5,507,291<\/a>\u00a0(April 16, 1996),\u00a0<b><i>Method and an Associated Apparatus for Remotely Determining Information as to Person&#8217;s Emotional State<\/i><\/b> &#8211; Abstract:\u00a0In a method for remotely determining information relating to a person&#8217;s emotional state, a waveform energy having a predetermined frequency and a predetermined intensity is generated and wirelessly transmitted towards a remotely located subject. Waveform energy emitted from the subject is detected and automatically analyzed to derive information relating to the individual&#8217;s emotional state.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\">USP #\u00a0<a href=\"http:\/\/patft.uspto.gov\/netacgi\/nph-parser?sect1=pto1&amp;sect2=hitoff&amp;d=pall&amp;p=1&amp;u=%252fnetahtml%252fpto%252fsrchnum.htm&amp;r=1&amp;f=g&amp;l=50&amp;s1=4,877,027.pn.&amp;os=pn\/4,877,027&amp;rs=pn\/4,877,027\">4,877,027<\/a>\u00a0(Oct. 31, 1989),\u00a0<b><i>Hearing System<\/i><\/b><br \/>\nAbstract:\u00a0Sound is induced in the head of a person by radiating the head with microwaves in the range of 100 megahertz to 10,000 megahertz that are modulated with a particular waveform. The waveform consists of frequency modulated bursts. Each burst is made up of 10 to 20 uniformly spaced pulses grouped tightly together. The burst width is between 500 nanoseconds and 100 microseconds. The bursts are frequency modulated by the audio input to create the sensation of hearing in the person whose head is irradiated.<\/span><\/p>\n<h3 class=\"p5\">Continue reading this series at:<br \/>\n<a href=\"http:\/\/themillenniumreport.com\/2016\/04\/who-really-owns-and-controls-the-military-industrial-complex-part-ii\/\">Who Really Owns and Controls the Military-Industrial Complex? Part II<\/a><\/h3>\n<p class=\"p5\">___<br \/>\n<a href=\"http:\/\/stateofthenation2012.com\/?p=34801\">http:\/\/stateofthenation2012.com\/?p=34801<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":0,"footnotes":""},"categories":[3,1],"tags":[],"class_list":["post-14071","post","type-post","status-publish","format-standard","hentry","category-featured-posts","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=\/wp\/v2\/posts\/14071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14071"}],"version-history":[{"count":0,"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=\/wp\/v2\/posts\/14071\/revisions"}],"wp:attachment":[{"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cosmicconvergence.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}