Sei sulla pagina 1di 16

PSYCHOTRONICS & PSYCHOLOGICAL WARFARE!

Top secret government harassment programs against citizens!!


HOME ABOUT

Category Archives: Human Experimentation


Synthetic telepathy also known as techlepathy or psychotronics
SEP 6 Posted by (Geeldon)

RECENT POSTS
SOOL SANAAG CAYN = South China Sea: offshore exploration and territorial tension Exit polls show Enrique Pea Nieto winning Mexicos presidency | ANA KOURNIKOVA PRESIDENCY Death of the Birds and the Bees Across America Pentagon establishes Defense Clandestine Service, new espionage unit for Africa Space Mirror in Russia ( Father of HAARP in USA)

The following article is an entry that appeared on Wikipedia. Within the last 24 hours a major edit war broke out and it appeared, at least to me, that the information was being suppressed. The article goes into depth about a field of espionage that employs a technology known as silent sound or Synthetic telepathy. If youre interested in high tech espionage, this makes for a very good read. Synthetic telepathy Synthetic telepathy also known as techlepathy or psychotronics is a term used to describe the process in braincomputer interfaces by which human thought (as electromagnetic radiation) is intercepted, processed by computer and a return signal generated that is perceptible by the human brain. (ref 1,2,3,4) ==History== In 1967, Edmond M. Dewan published a paper in Nature demonstrating the control of Alpha waves, turning them on and off, to produce Morse code. (ref 5) Using an EEG machine, Dewan and his fellow researchers were able to send words and phrases by thought alone. In 1976, Robert G. Malech was awarded United States Patent 3951134 for remotely monitoring and altering brainwaves using radio.(ref 6) This patent makes reference to demodulating the waveform, displaying it to an operator for viewing and passing this to a computer for further analysis. In 1988, Farwell, L.A. & Donchin, D. produced a paper describing a method of transmitting linguistic information using the P300 response system. (ref 7) This system combined matching observed information to what the subject was thinking of. In this case, being able to select a letter from the alphabet that the subject was thinking of. In theory, any input could be used and a lexicon constructed. United States Patent 6,011,991, granted January 4, 2000, describes a method of monitoring an individuals brain waves remotely, for the purposes of communication. Filed December 7, 1998, the patent outlines a system that monitors an individuals brainwaves via a sensor, then transmits this, specifically by satellite, to a computer for analysis. This analysis would determine if the individual was attempting to communicate a word, phrase, or thought corresponding to the matched stored normalized signal.(ref 8) ==Theory== Approaches to synthetic telepathy can be categorized into two major groups, passive and active. Like sonar, the receiver can take part or passively listen. Passive reception is the ability to read a signal without first broadcasting a signal. This can be roughly equated to tuning into a radio station, the brain generates electromagnetic radiation which can be received at a distance. That distanced is determined by the sensitivity of the receiver, the filters used and the bandwidth required. Most universities would have limited budgets and receivers such as EEG (and similar devices) would be used. A related Generated with www.html-to-pdf.net military technology is the surveillance system TEMPEST, the effective range of which is classified. (ref 9) Given that US Congress attempted to enact a bill in Oct 2001 banning these

Mercury News: Man with defibrillator wants to know what his heart is saying NSA & Artificial Thought Control ( IBM Blue Beam) THUGOCRACY: U.S. FEDPOLICE VIGILANTES PERSECUTE CITIZEN TARGETS BRAIN AND SATELLITE SURVEILLANCE, ASSAULT AND TORTURE The New Torture / Murder Surveillance of America Russian spy agency targeting western diplomats using Zersetzung Conditioning: Aversion therapy & Desensitization The scientific foundation of no touch torture Interview with a CIA nonconsensual human behavioral modification project Synthetic Telepathy or Psychotronics Movie (Nowhere Man Episode 4)

ARCHIVES
July 2012 June 2012 March 2012 January 2012 October 2011 September 2011 August 2011 June 2011 May 2011 February 2011 January 2011 December 2010 November 2010 October 2010 September 2010 August 2010 July 2010

EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog Page 1 / 16 and receive notifications of new posts by email.

radiation which can be received at a distance. That distanced is determined by the sensitivity of the receiver, the filters used and the bandwidth required. Most universities would have limited budgets and receivers such as EEG (and similar devices) would be used. A related military technology is the surveillance system TEMPEST, the effective range of which is classified. (ref 9) Given that US Congress attempted to enact a bill in Oct 2001 banning these type of devices as space weapons, (ref 10) may indicate that fluctuations in the human magnetic field can be intercepted by satellite. Robert G. Malechs approach requires a modulated signal to be broadcast at the target. The method uses an active signal which is interfered with by the brains modulation. Thus, the return signal can be used to infer the original brainwave. This approach does expose the transmitter, but is ultimately required for generating return signals that can be processed by the brain. The research of Farwell, L.A. & Donchin, D, is the first public revelation that could lead to a generic lexicon being developed, however, this is implied in the work of Robert G. Malech in 1976. ==Current research== Current research, as of 2010, is being driven by military for covert speech, however, given that much of this is unclassified, it would suggest that the bulk of the research was performed much earlier and dedicated to the field of intelligence gathering during the cold war. Additional reports suggest that a version is deployed in combat zones to demoralize enemy troops and a smaller number of reports indicate a potential use to undermine governments and cause public unrest. (ref 11, 12) Today, the driving force appears to be silent communication with battlefield troops. A mere $4 million was provided to DARPA for the fiscal year 2009/2010 to develop such a system called Silent Talk. (ref 13) Much of the research is being conducted at The Cognitive NeuroSystems Lab at UC Irvine. (ref 14) A further $4 million was allocated by the Army to the University of California to investigate computermediated synthetic telepathy.(ref 15) The research aims to detect and analyze the wordspecific neural signals, using EEG, which occur before speech is vocalized, and to see if the patterns are generalizable. (ref 16) The research is part of a wider $70 million project that began in 2000 which aims to develop hardware capable of adapting to the behavior of its user.(ref 17) Quite apart from linguistic information, images have been extracted from the brain. Researchers at Japans ATR Computational Neuroscience Laboratories have been able to reconstruct images that a subject can currently see. The ultimate goal of the unclassified project is to view both retinal and imagined images in realtime, including dreams. (ref 18) ==Computer mediation== Computer mediation falls into two basic categories, interpretative and interactive. Interpretative mediation is the passive analysis of signals coming from the human brain. A computer reads the signal then compares that signal against a database of signals and their meanings. Using statistical analysis and repetition, falsepositives are reduced over time. Interactive mediation can be in a passiveactive mode, or activeactive mode. In this case, passive and active denote the method of reading and writing to the brain and whether or not they make use of a broadcast signal. Interactive mediation can also be performed manually or via artificial intelligence. Manual interactive mediation involves a human operator producing return signals such as speech or images. A.I. mediation leverages the cognitive system of the subject to identify images, prespeech, objects, sounds and other artifacts, rather than developing A.I. routines to perform such activities. A.I. based systems may incorporate natural language processing interfaces that produce sensations, mental impressions, humor and conversation to provide a mental picture of a computerized personality. Not only can this A.I hold a conversation via the internal monologue but it may also perform routing of information to and from specific groups or individuals. This provides a broad range of potential applications from acting as a communications system to conducting interrogations. This latter form is currently being researched at UC Irvine for an unclassified US military project. (ref 19) Given the high value to espionage and counterterrorism, it is likely that such a system is already deployed in a classified manner. ==Military uses== In a military context, the first obvious uses is to both read and write information to the Generated with www.html-to-pdf.net internal monologue. This provides two major areas of interest, the first being twoway communication for field agents and the second is the intelligence gathering and interrogation.

EMAIL SUBSCRIPTION
Enter your email address to subscribe to this blog and receive notifications of new posts by email. Join 72 other followers

Signmeup!

CATEGORIES
Brainwashing Gaslighting Group Stalking Human Experimentation Implantable Microchips Psychiatric Reprisal Remote Neural Monitoring Surveillance Synthetic Telepathy Through Wall Surveillance Torture Uncategorized Zersetzung

January 2014
M 6 13 20 27 Jul T 7 14 21 28 W 1 8 15 22 29 T 2 9 16 23 30 F 3 10 17 24 31 S 4 11 18 25 S 5 12 19 26

BLOGROLL
Artificial Telepathy Bad Experiment Center for Victims of Torture COINTELPRO Original Documents Freedom from covert harassment Gang Stalking Journal Jane Departing Joel B H File No Stasi in America People Zapper Singapore MC Victim Spy Chips Swedish Victims

CATEGORIES
Brainwashing Gaslighting Group Stalking Human Experimentation Implantable Microchips Psychiatric Reprisal Remote Neural Monitoring Surveillance Synthetic Telepathy Through Wall Surveillance Torture Uncategorized Zersetzung

META
Page 2 / 16
Register

==Military uses== In a military context, the first obvious uses is to both read and write information to the internal monologue. This provides two major areas of interest, the first being twoway communication for field agents and the second is the intelligence gathering and interrogation. A fundamental problem arises when using the system for communication purposes, in that, it is impossible to authenticate the source of the transmission. Synthetic telepathy has limited uses as a communication system unless directcontact headset systems are used and supported by encrypted channels. As such, standard radios are more effective in combat situations. Synthetic telepathy also requires the thought stream to be processed which results in a minor lapse of attention, rather like a daydream, that could have deadly consequences on the battlefield. With respect to intelligence gathering and interrogations, synthetic telepathy has a wide range of drawbacks and limitations. Contrary to popular belief, synthetic telepathy does not provide the ability to read a persons mind or memories. What it does provide is the ability to read the internal monologue (or anything that causes electrical change/radiation) and the trick is to get the subject to voice their memories and crossreference that with their emotional state. In other words, basic psychological manipulation is a key factor and makes the technology not much more reliable than a standard liedetector test. In practice, passive monitoring of the internal monologue over a long time period (monthsyears) is probably the most effective method of intelligence gathering. The capability to put a person into a state of hypnosis is often touted by conspiracy theorists. In actual fact, the suggestive capabilities of synthetic telepathy use a different mechanism, basic impulses and sensations. This is merely a different form of writing to the brain. To formulate thought, the brain has a pipeline through which information is processed. (ref 20) At its most basic, impulses guide human behavior and manipulation of these impulses provides a strategic advantage in both combat and political situations. By altering the motivational factors of a target subject or group, it makes it easier to guide their higher level decision making processes. Crowd or riot control can be achieved by generating impulses that are essentially common to all humans, resulting in the dispersion of crowds or a willingness to cooperate with authorities. This type of synthetic telepathy is arguably a political tool as it suppresses dissent. (ref 21) Amnesia (retrograde and anterograde) can be induced as any active signal is essentially interferring with normal operations of the brain. Thus, transfer from shortterm to longterm memory can be inhibited. (ref 22) Vision and auditory systems could also be compromised, as with any neural processing system, corruption of the inputs would result in halucinations, much like the effects of LSD. With a proper interface to such regions, events such as alien abductions or seeing God could be faked quite readily and mental illness used as a cover for the extraction of information. (ref 23, 24, 25) ==Silent Sound Spread Spectrum (SSSS/SQuad)== ITV News Service, in March 1991, produced a report of ultrasound piggybacked on a commercial radio broadcast (100Mhz) aimed at entraining the brains of Iraqi troops and creating feelings of despair. (ref 26) This has been related to United States Patent 5,159,703 awarded to Oliver M. Lowery which refers to a silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain, typically through the use of loudspeakers, earphones or piezoelectric transducers.(ref 27) Human hearing is roughly in the range of 20Hz20,000Hz (20 kHz), although a human adult will lose the ability to hear the higher ranges as they grow older. In addition, most cheap radios have a limited frequency response range (ref 28) that will be unable to reproduce silent sound as encoded originally making it ineffective. As such, an alternative explanation for the effectiveness of SQuad is provided in human biology: 1. Cells amplifying radio signals at certain frequencies. 2. Cells can demodulate voice on a basic carrier wave. This is not as strange as it seems, it has been noted for a long time that fillings, or dental braces, can result in radio stations being heard in the mouth of an individual. (ref 29) ==Mind control==

META
Register Log in Entries RSS Comments RSS WordPress.com

Generated with www.html-to-pdf.net Conspiracy theory and popular science fiction would have the world believe that the human mind can be remotely controlled. That individuals can be turned into mindless automatons and

Page 3 / 16

==Mind control== Conspiracy theory and popular science fiction would have the world believe that the human mind can be remotely controlled. That individuals can be turned into mindless automatons and directly controlled by computers to produce sleepers or assassins. (ref 30) The reality is much less clear. Interfacing remotely to write to the brain is performed using electrical interference rather like crosstalk (electronics). (ref 31) Much like a drill next to a television, the interference pattern is processed by the brain as information, a variant which induces sensations and feelings is known as Transcranial Magnetic Stimulation. (ref 32) As such, an externally generated monologue will be weaker than the internal monologue of the target subject due to a lesser signal strength. An overpowering signal would interrupt a wide range of neural functions that could impact critical autonomic systems resulting in death. Two possible methods exist that could result in an individual killing another through the use of synthetic telepathy. The first is to leverage the natural behavior of the target subject, that is, use an individual who would kill another. The second is to induce psychotic symptoms and diminish their mental control (ref 33, 34) In both cases, the underlying mechanics are the same, to provide impulses and sensations that urge the individual to commit murder. This is not hypnosis, but merely physiological manipulation without the knowledge of the target. Another area of interest and arguably more feasible, is the manipulation of political figures. (ref 35)Thoughts, sensations and impulses can be combined to influence political and personal decision making processes. A similar process can be used to effect the population at large to drive agendas or to maintain power for certain groups, undermining free will and self expression. (ref 36) As the technology matures and expands to regimes throughout the globe, this will be a major source of concern for governments worldwide. Finally, we come to the area of interrogations which can be conducted remotely whilst an individual or groups is conducting their normal daily business. The internet is saturated with such reports (ref 37) and as a possible sideeffect is psychosis, it is quite likely that at least some of them are accurate. ==In law== The term psychotronic, short for psychoelectronic ( ref 38) was used in the proposed Bill H.R. 2977 Space Preservation Act of 2001, which listed psychotronic as a list of possible spaceborne weapons which would be banned by the Act (ref 39) In 2001, President Vladimir V. Putin signed into law a bill making it illegal to employ electromagnetic, infrasound radiators and other weapons of psychotronic influence with intent to cause harm. As a completely unnatural event, it is arguable that this type of technology when employed in interrogations would be classified as cruel or unusual. Further to this, A.I. mediated events such as mock executions or death threats would also violate the Geneva convention, International law and laws of most nations in the developed world. Counterclaims focusing on National Security would be invalid as criminal activity is, in itself, a gross violation of National Security The European Parliament adopted a resolution on January 28, 1999[38], 28.1.99 Environment, security and foreign affairs A40005/99: 23. Calls on the European Union to seek to have the new nonlethal weapons technology and the development of new arms strategies also covered and regulated by international conventions 27. Calls for an international convention introducing a global ban on all developments and deployments of weapons which might enable any form of manipulation of human beings ==In the media== 60 Minutes correspondent Lesley Stahl interviewed Tom Mitchell of Carnegie Mellon University on his work in Thought Identification using fMRI. (ref 40) The segment, published Jan. 4, 2009 and available on the CBS website, shows associate producer Meghan Frank having his thoughts identified by computer. (ref 41) The segment shows that a generalizable pattern exists in the human brain that can be used to identify thoughts without training a computer for each individual with 100% accuracy. ==Further reading== Dr Nick Begich Controlling the Human Mind, Earth Pulse Press Anchorage isbn=189069354 Generated 5}} with www.html-to-pdf.net Walter Bowart http://www.scribd.com/doc/24531011/OperationMindControl

Page 4 / 16

==Further reading== Dr Nick Begich Controlling the Human Mind, Earth Pulse Press Anchorage isbn=189069354 5}} Walter Bowart http://www.scribd.com/doc/24531011/OperationMindControl John Marks In Search of the Manchurian Candidate, publisher WW Norton & Co, 1979, isbn=0 393307948 ==References== 1. http://www.msnbc.msn.com/id/27162401/ Army developing synthetic telepathy 2. http://timesofindia.indiatimes.com/HealthSci/US_army_developing_synthetic_telepathy/ articleshow/3596708.cms US army developing synthetic telepathy 3.url= http://io9.com/5038464/armysinksmillionsintosynthetictelepathyresearch Army Sinks Millions Into Synthetic Telepathy Research 4. http://io9.com/5065304/tipsandtricksformindcontrolfromtheusmilitary Tips and Tricks for Mind Control from the US Military 5. http://cnslab.ss.uci.edu/muri/research.html#Dewan MURI: Synthetic Telepathy 6. http://v3.espacenet.com/publicationDetails/biblio?CC=US&NR=3951134&KC=&FT=E Apparatus and method for remotely monitoring and altering brain waves 7. http://cnslab.ss.uci.edu/muri/research.html#FarwellDonchin MURI: Synthetic Telepathy 8. http://v3.espacenet.com/publicationDetails/biblio?CC=US&NR=6011991&KC=&FT=E Communication system and method including brain wave analysis and/or use of brain activity 9. http://www.sst.ws/tempstandards.php?pab=1_1 TEMPEST measurement standards 10. http://www.govtrack.us/congress/billtext.xpd?bill=h1072977 Space Preservation Act of 2001 11. http://www.raven1.net/silsoun2.htm PSYOPS WEAPONRY USED IN THE PERSIAN GULF WAR}} 12. Wall, Judy, Military Use of Mind Control Weapons, NEXUS, 5/06, OctNov 1998 13. SoldierTelepathy Drummond, Katie Pentagon Preps Soldier Telepathy Push http://www.wired.com/dangerroom/2009/05/pentagonprepssoldiertelepathypush 14. http://cnslab.ss.uci.edu/muri/research.html MURI: Synthetic Telepathy 15. SoldierTelepathy Drummond, Katie Pentagon Preps Soldier Telepathy Push http://www.wired.com/dangerroom/2009/05/pentagonprepssoldiertelepathypush 16. SoldierTelepathy Drummond, Katie Pentagon Preps Soldier Telepathy Push http://www.wired.com/dangerroom/2009/05/pentagonprepssoldiertelepathypush 17. Noah, Shachtman Pentagons PCs Bend to Your Brain http://www.wired.com/dangerroom/2007/03/the_us_military 18. http://pinktentacle.com/2008/12/scientistsextractimagesdirectlyfrombrain/ Scientists extract images directly from brain 19. http://cnslab.ss.uci.edu/muri/research.html#Overview MURI: Synthetic Telepathy Overview 20. http://cnslab.ss.uci.edu/muri/research.html#ImaginedSpeechProduction MURI: Synthetic Telepathy 21. http://www.slavery.org.uk/Bioeffects_of_Selected_NonLethal_Weapons.pdf Bioeffects of selected nonlethal weapons 22. http://www.informaworld.com/smpp/content~db=all~content=a785359968 Partial Amnesia for a Narrative Following Application of Theta Frequency Electromagnetic Fields 23. http://www.wired.com/wired/archive/7.11/persinger.html This Is Your Brain on God 24. http://www.charlesrehn.com/charlesrehn/books/aconversationwithamerica/essays/myessays The NSA & Synthetic Telepathy 25. http://www.uwe.ac.uk/hlss/research/cpss/Journal_PsychoSocial_Studies/v2 2/SmithC.shtml Journal of PsychoSocial Studies Vol 2 (2) 2003 On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology by Dr. Carole Smith 26. http://www.bibliotecapleyades.net/ciencia/ciencia_nonlethalweapons02.htm Eleanor White New Devices That Talk To The Human Mind Need Debate, Controls 27. http://patft.uspto.gov/netacgi/nphParser? Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/netahtml/PTO/srchnum.htm&r=1&f=G&l=50&s1=5 Silent subliminal presentation system 28. http://www.audioholics.com/education/loudspeakerbasics/understandingloudspeaker frequencyresponse | Understanding Loudspeaker Frequency Response 29. http://answers.google.com/answers/threadview?id=367925 Q: Radio signals picked up by tooth fillings 30. http://cbcg.org/gjcs1.htm| Gods Judgment Cometh Soon 31. http://www.patentgenius.com/patent/6587729.html Apparatus for audibly communicating speech using the radio frequency hearing effect 32. http://www.psychology.nottingham.ac.uk/staff/lpxdts/TMS%20info.html Transcranial Magnetic Stimulation 33. http://www.scribd.com/doc/6508206/SYNTHETICTELEPATHYANDTHEEARLYMINDWARS Generated with www.html-to-pdf.net SYNTHETIC TELEPATHY AND THE EARLY MIND WARS 34. http://newdawnmagazine.com.au/Article/Brain_Zapping_Part_One.html Brain Zapping

Page 5 / 16

32. http://www.psychology.nottingham.ac.uk/staff/lpxdts/TMS%20info.html Transcranial Magnetic Stimulation 33. http://www.scribd.com/doc/6508206/SYNTHETICTELEPATHYANDTHEEARLYMINDWARS SYNTHETIC TELEPATHY AND THE EARLY MIND WARS 34. http://newdawnmagazine.com.au/Article/Brain_Zapping_Part_One.html Brain Zapping 35. http://genamason.wordpress.com/2009/10/18/moreonsynthetictelepathy/ More on synthetic telepathy 36. http://newdawnmagazine.com.au/Article/Brain_Zapping_Part_One.html Brain Zapping 37. http://daprocess.com/01.welcome.html DaProcess of A Federal Investigation PG 1 of 4 38. , http://www.uwe.ac.uk/hlss/research/cpss/Journal_PsychoSocial_Studies/v2 2/SmithC.shtml Journal of PsychoSocial Studies Vol 2 (2) 2003 On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology by Dr. Carole Smith 39. http://www.govtrack.us/congress/billtext.xpd?bill=h1072977 Space Preservation Act of 2001 40. http://www.cbsnews.com/stories/2008/12/31/60minutes/main4694713.shtml 60 Minutes: Incredible Research Lets Scientists Get A Glimpse At Your Thoughts 41. http://www.cbsnews.com/video/watch/?id=5119805n&tag=related;photovideo 60 Minutes: Video Mind Reading http://en.wikipedia.org/wiki/Synthetic_telepathy
Posted in Human Experimentation, Synthetic Telepathy Tags: citizen spies, DEW, directed energy weapons, espionage, Organized stalking, psychotronics, synthetic telepathy Leave a Comment

What is Gang Stalking?


SEP 6 Posted by (Geeldon)

Gang Stalking FAQ What is Gang Stalking? A Simple Definition Under Occupational Health and Safety laws, individuals are being flagged and placed on community notification lists. This is happening without the targets knowledge. In many countries these community notifications are being used by companies and others to target innocent individuals such as whistleblowers, the outspoken, etc. In conjunction with these notifications, companies and others are in some cases using a practice that was used in the former soviet union called the psychiatric reprisal. This is used as a means of retaliation, blacklisting, silencing, or controlling members of society. Once on the notification system, warnings about the targets are sent out to every individual the target comes in contact with, thus poisoning their associations, and socially annexing the targeted individual. Full Definition Gang Stalking is a systemic form of control, which seeks to destroy every aspect of a Targeted Individuals life. Once a target is flagged a notification is sent out to the community at large, and the target is followed around 24/7 by the various communities that they are in. The community notifications will go out to various places. Apartment rentals, future employers, stores and communities where the target visits, will be notified. Doctors offices, fire departments, police, etc. A covert investigation might also be opened, and electronic, means used by the civilian spies/snitches as part of the overt and covert monitoring and surveillance process. Individuals can be flagged designating them as having a history of aggressive or inappropriate behavior. This notification system will follow the target if they move, change jobs, visit other areas. It lets the community believe that the target is a person who needs to be watched or monitored. In the service sector this may require identifying to employees persons who have a history of aggressive or inappropriate behavior in the store, bar, mall or taxi. The identity of the person and the nature of the risk must be given to staff likely to come into contact with that person. While workers have the right to know the risks, it is important to remember that this information cannot be indiscriminately distributed. Community health and safety

Generated with www.html-to-pdf.net A woman named Jane Clift in the U.K. went through a very similar type of flagging system. A warning marker was placed against her name designating her as potentially violent.

Page 6 / 16

Community health and safety A woman named Jane Clift in the U.K. went through a very similar type of flagging system. A warning marker was placed against her name designating her as potentially violent. She sensed that, everywhere she went, there was whispering, collaboration, people scurrying about. Everywhere I went hospitals, GPs, libraries anywhere at all, even if I phoned the fire service, as soon as my name went on to that system, it flagged up violent person marker, only to be seen in twos, medium risk. Violent Persons Registry Jane Clift was targeted this way and spent four year clearing her name. Individuals are being flagged without their knowledge. In many countries these community notifications might fall under community safety and health laws. It seems that employers, educational facilities, and community centers are in some cases flagging innocent individuals as a means of retaliation, silencing, or controlling members of society. Maria Buffa, a former salaried employee in the personnel department at Ford World Headquarters in Dearborn, Michigan, said she, too, was sent to a psychiatrist after she filed a sexual harassment complaint in February 1999 against a woman coworker. You think, maybe I am the problem, else why would they be sending me to a psychiatrist, she said. The psychiatrist Ford selected, Dr. Edward Dorsey of Midwest Health Center, made a report that said the only psychiatric symptom Buffa displayed was anxiety. Dorseys report said that the referral came from Fords medical department and was at least in part due to her complaints of sexual harassment. He also noted that the Ford doctor who referred Buffa cited a couple of incidents: She was seen yelling at someone, and she had shown up at a fitness center wearing less than the usual amount of clothing for that physical activity. In April 1999, Buffas boss fired her for the good of the company, she recalled being told. Psychiatric Reprisal The individual is then placed under overt and covert forms of surveillance. Everywhere the Targeted Individual goes, their name is flagged. In a big city this could mean that thousands upon thousands of people are getting a notification about the target. The person is followed around 24/7. Foot patrols and vehicle patrols are used to follow the Individual around, as part of the monitoring process. During these patrols a one handed sign language is used to assist the citizen informants with communicating to each other. They will use this to silently communicate to any business the target enters, or other areas. Gang Stalking is experienced by the Targeted Individual as psychological attack, that is capable of immobilizing and destroying them over time. The covert methods used to harass, persecute, and falsely defame the targets often leave no evidence to incriminate the civilian spies. Its similar to workplace mobbing, but takes place outside in the community. It called Gang Stalking, because groups of organized community members stalk and monitor the targets 24/7. Many Targeted Individuals are flagged, harassed and placed under surveillance in this way for months or even years before they realize that they are being targeted by an organized protocol of harassment. What happens during this monitoring and surveillance is very similar to what happened to many innocent individuals in the former East Germany or Activists and Dissidents in Russia. Many innocent people in the former East Germany would be targeted by the state, and then their friends, family, and the community at large would be used to monitor, prosecute, and harass them. The same persecutions and harassments are now happening in democratic countries. Once a person is flagged or has a warning marker placed on their file, the community becomes hypervigilant, and within this structure there is a targeted and illegal protocol of harassment that happens. Electronic means are used to monitor, harass and torture the target. When the target tries to describe what is happening to them, it sounds as if they have had a mental breakdown. The reality is electronic means are being used to make it appear as if the target has had a breakdown. Electronic Harassment This System is the MOSQUITO that is used in the UK to break up groups of unruly people. Creates A Protective Shield Of High Pressure Complex Ultrasonic Shock Waves.

Generated with www.html-to-pdf.net The Mosquito device is being considered for banning by the European Union, cause it infringes on the human rights of children.

Page 7 / 16

This System is the MOSQUITO that is used in the UK to break up groups of unruly people. Creates A Protective Shield Of High Pressure Complex Ultrasonic Shock Waves. The Mosquito device is being considered for banning by the European Union, cause it infringes on the human rights of children. Produces a power field of ultrasonic shock wave energy. The frequency range is adjustable from 7kHz to 25kHz, with the PCC30 putting out 140db of sound (135db for the PPF40) measured at 30cm. Intended for mounting to vehicles for potential crowd control applications. Also excellent for keeping out pests from gardens, etc. Hearing protection recommended when in use. Many of these devices are easy to access, and almost impossible for an unaware target to describe in a credible manner, without sounding as if they have had a mental breakdown. Unauthorized intruders are exposed to a feeling of intense paranoia, discomfort, disorientation, nausea and other undesirable effects. Government research is currently investigating the weapons potential and may soon classify these devices! In Russia similar means were used by the state to declare activist, dissidents or anyone they thought to be an enemy of the state as mentally unfit and many were institutionalized using this form of systemic control. The closest thing to Gang Stalking that democratic countries have seen before this is McCarthyism, Cointelpro, and RED SQUAD programs. Red Squad programs were used for monitoring, and harassment of various groups. They have been in place for over a hundred years, and they also employed Informants. Civilian Spies, who can also be termed Covert Human Intelligence Sources come from every level and sector of society. Remember anyone the Targeted Individual comes into contact with gets a warning about the target. Just like with Cointelpro investigations, everyone in the targets life is contacted, advised as to why the individual has been flagged, advised not to discuss the notification and asked to be a part of the ongoing, never ending monitoring (systemic psychological harassment and manipulation of the target) process. This process is covertly designed to control the targets, keep them in line, or destroy the target over time, leaving them with no form of support. These actions are specifically designed to mimic a psychological operation. This psychological harassment of the target is designed to destroy them over years, making them look crazy and leave them with no form of support. The individuals around the target carry out actions and tasks as they are instructed, without realizing that the structure is psychologically designed to break the target down. Worldwide programs of control and conformity have been used with equal success and lethality. What we are seeing now is a coordinated and organized effort of control and conformity. Many countries around the world are currently using a model of policing called: Community Oriented Policing. Its described as a systemic approach to policing. It focuses on instilling a sense of community within a geographically located neighborhood. Communities come together and discuss what values they would like to have in their community, community development, and its also a time to discuss any problems that might be happening in a specific area. If a problem is identified an investigation might be opened. These local programs in many countries have been forming partnerships with other government run programs at, provincial, state and federal levels. A process called Deconfliction allows them to share information. Reports of Gang Stalking are not only coming in from democratic countries, but they are coming in from many other countries as well. The modern day systemic form of control could only be funded at governmental levels, just like it has in other societies where these similar types of harassment programs have been implemented. Its all part of a system of control and conformity that has been in place for many years. A system of control with many local groups and appendages taking part. Many targets report that their information is passed and shared between country boarders, and that the surveillance continues even when they travel. What are the goals of Gang Stalking? The official goal is listed as a notification for the community, to alert them of individuals who have been flagged, or have had a warning marker placed on their file. Its officially used as a means of investigating or monitoring individuals who have displayed inappropriate, or violent behaviours. The real goal in some cases however seems to be to isolate the target from all forms of support, so that the target can be set up in the future for arrest, institutionalization, or forced suicide. Other goals of this harassment is to destroy the targets reputation and credibility. Make the target look crazy or unstable. Generated with www.html-to-pdf.net Other goals involve sensitizing the target to everyday stimulis as a form of control, which is

Page 8 / 16

forms of support, so that the target can be set up in the future for arrest, institutionalization, or forced suicide. Other goals of this harassment is to destroy the targets reputation and credibility. Make the target look crazy or unstable. Other goals involve sensitizing the target to everyday stimulis as a form of control, which is used to control targets when they get out of line. Once the target is sensitized, the Citizen Informants have an easier time identifying the Targeted Individual in public. The targets sensitivity is most likely added to their file as a warning marker and sign to watch for future reactions to. The structure of this type of notification makes the targets vulnerable. Once a community goes into monitoring mode, they unofficially work towards driving the target from the community. This can be done by making the target destitute. Secondary goals include making the target homeless, jobless, giving them a breakdown, and the primary goals seems to be to drive the target to forced suicide. This is the same thing that was done to targets of the Stasi and Cointelpro investigations. Its a useful way of eliminating perceived enemies of the state. What are other Names for Gang Stalking? There are many names for this form of systemic control and harassment. Under the Gang Stalking label you will also find such terms as Community Mobbing, Community Stalking, Stalking by Proxy, Organized Stalking, Cause Stalking, MultiStalking, but its all part of the same community notification harassment protocol. What many people do not realize is that Gang Stalking is just one appendage of this systemic form of control. There are other forms of control used to repress, and keep individuals in line. Other forms or appendages include, but are not limited to: Mobbing, Cointelpro, The Buzzsaw, Covert War, Electronic Harassment, etc. These are the just some of the names being given to a very old game, that is once again being played by governments on their unsuspecting citizens. How are targets chosen? Officially targets can be flagged and investigated for suspected, or reported behaviours. Unofficially the Targets can be chosen because of many other reasons. They can be chosen for political views. They can be chosen for whistleblowing. They can be chosen because they belong to a dissident movement. They can be chosen because they asserted their rights at work, or filed a complaint. They can be chosen because they made the wrong enemy. Were considered to be too outspoken, unwittingly investigated something that the state did not want investigated, signed a petition, wrote a letter. They were deemed as suspicious by a civilian spy/snitch and their names were handed over. Its becoming apparent that targets might be chosen for this systemic form of control, if they are not already in some way a part of this controlled system. Eg. Many Targeted Individuals seem to be unaware of this community notification, flagging and monitoring system. Some targets also seem to be unaware that large chunks of our society are now being used as Citizen Informants. Who gets targeted? Targeting can happen to anyone in society. In the past primary targets of programs such as Cointelpro have been minorities. Targeting however can happen to anyone. Individuals are often targeted for being outspoken, whistle blowers, dissidents, people who go up against wealthy corporations, womans groups, (single) women, minorities, extremists, conspiracy theorists, antiwar proponents, individuals identified or targeted as problems at these community meetings, and other innocent individuals. The majority of the targets are often not aware that they are being targeted in this way. When a target moves, changes jobs, the harassment still continues, because they are still flagged, and a notification is still going out to everyone they come in contact with. Every time the target moves, the same information, lies, and slander will be spread out into the new community and the systemic monitoring and harassment will continue. Traits of those targeted Who takes part? People from all walks of life are a part of this system, because once a target is flagged, their information is distributed to a wide range of people, organizations, and communities. People from all races, ages, genders. Every sector of society that you can think of is a part of this. Civilian Spies/Snitches include, but are not limited to: General laborers, the wealthy, bikers, drug dealers, drug users, street people, punks, hip hop culture, KKK, black activists, church groups, youth groups, Fire Fighters, police officers, lawyers, health care workers, store keepers, maids, janitors, cable installers, phone repair persons, mail carriers, locksmiths, electricians, etc. There really is no minimum or maximum age range. An article came out recently in the UK, saying they were recruiting children as young as eight years old to be Covert Human Intelligence Sources. Generated with www.html-to-pdf.net Public individuals that the Targeted Individual comes in contact with are given this warning. These community notifications started with good intentions. Workers and the community at

Page 9 / 16

electricians, etc. There really is no minimum or maximum age range. An article came out recently in the UK, saying they were recruiting children as young as eight years old to be Covert Human Intelligence Sources. Public individuals that the Targeted Individual comes in contact with are given this warning. These community notifications started with good intentions. Workers and the community at large do have a right to be notified if they are going to encounter persons who have violent, inappropriate histories. Citizens want to be able to protect themselves and their communities, however what is happening is that this program is also being used to falsely target innocent people. Many do not understand or care that the end consequence of this flagging, this harassment protocol is to destroy a person. Many people in todays society are scared, they are willing to give up personal freedoms, for a false sense of security, and if that means taking away the rights of another individual to accomplish this, they have no problem doing this. Why people participate in Gang Stalking? There are many reasons that someone takes part in this. 1. Some do it for the sense of power that it gives them. They feel in control. Many wholeheartedly believe that this lets them know who is bad and who they need to protect themselves and their communities from. 2. Others do this as a way to make friends and keep friends. Its something social and fun for them to do. They love that special feeling of monitoring and protecting their community. Many in society use the one handed sign language to communicate and its very effective in breaking down race, gender, age, social barriers. Many believe that it also lets them know who is on their side, vs who could be the potential target. 3. Others are forced or blackmailed by the State or the police into taking part. I have seen a few people pressured into taking part. 4. They are told that they are part of homeland or national security. They are told that they are being used to help keep and eye on dangerous or emotionally disturbed individuals. They see themselves as heroic spies for the state. 5. Others are just local thugs or Informants who are already being used for other activities, and their energies are just diverted over into these community health and safety programs. Eg. Some may be given the choice of monitoring a Targeted Individual for the community or the police vs going to jail. 6. Others are told outright lies and slander about the target to get them to go along with ruining the targets life. Eg. Many caring families are told that the individuals has displayed mental health issues, or other socially unacceptable behaviours and might be a danger to themselves or the community at large, and that the notification is necessary for keeping the community safe. They are asked not to disclose this. 7. Many are however just average citizens who in the course of going about their day to day jobs, are being used to keep an eye out, and if a flagged target does come into their vicinity, they are asked to watch, monitor and observe the target. Its the way the society is. What are some techniques used against targets? A few of the most common techniques are listed below. a) Classical conditioning. Getting a Targeted Individual sensitized to an everyday stimuli. The targeted individual over a period of months, or even years is negatively sensitized to an everyday stimuli, which is then used to harass them. Its used out in public to let them know they are constantly being harassed and monitored. Some examples of everyday stimulus that might be used include: sounds, colors, patterns, actions. Eg. Red, white, yellow, strips, pens clicking, key jangling, loud coughing, loud whistling, loud smacking of clapping of hands together, cell phones, laptops, etc. b) 24/7 Surveillance This will involve flagging and following the target everywhere they go. Learning about the target. Where they shop, work, play, who their friends and family are. Getting close to the target, moving into the community or apartment where they live, across the street. Monitoring the targets phone, house, and computer activity. Surveillance Policy. c) Isolation of said target. This is done via reports. The flagging is meant to warn the community, but they act as little more than slander campaigns. They present a one sided assessment of the targets behavior Generated with www.html-to-pdf.net and activity. The target is never allowed to tell their side of the story or to clear their name. This one sided assessment can include false reports, lies, and legitimate incidents where the

Page 10 / 16

This is done via reports. The flagging is meant to warn the community, but they act as little more than slander campaigns. They present a one sided assessment of the targets behavior and activity. The target is never allowed to tell their side of the story or to clear their name. This one sided assessment can include false reports, lies, and legitimate incidents where the target was set up. Eg. People in the targets community are told that the target is crazy, dangerous, a thief, into drugs, a prostitute, pedophile, in trouble for something, needs to be watched. This very flagging in and of itself is capable of creating paranoia, and false interpretation of everyday incidents. Files will even be produced on the target. Its been shown that community notifications of any kind can and do create a sense of paranoia within a community. Some people might argue that they would feel more secure if they were aware of the identities of dangerous offenders in their neighborhoods, but widespread community notification actually serves to heighten fear of victimization. In a large metropolitan area, hundreds of thousands of people are notified of a dangerous offenders release, while only hundreds will come into contact with him in the community. This blanket notification propagates the belief that there are more predators in the community than ever before, and fearful attitudes among members of the public are reinforced. A vicious cycle results: widespread notification leads to an increase in the communitys fear of crime which, in turn, leads to more calls for notification. We would also argue that the use of inflammatory language such as predator by politicians and officials also works to heighten fear and increase calls for more punitive action. Community Notification d) Noise and mimicking campaigns. Disrupting the targets life, sleep with loud power tools, construction, stereos, doors slamming, etc. Talking in public about private things in the targets life. Mimicking actions of the target. Basically letting the target know that they are in the targets life. Daily interferences, nothing that would be too overt to the untrained eye, but psychologically degrading and damaging to the target over time. e) Everyday life breaks and street theatre. Flat tires, sleep deprivation, drugging food, putting dirt on targets property. Mass strangers doing things in public to annoy targets. These strangers might get text messaged to be at a specific time and place, and perform a specific action. f) Electronic Harassment. Electronic means can be used to create the illusion that the target is having a mental breakdown, when in fact they are being targeted and harassed by a community that is trying to get them to move, because they believe that the person is a danger, or an undesirable. This flagging system allows the community to treat the target as less than, someone they are allowed to harass, and victimize. It gives them a license to do unspeakable things to innocent targets, and their families. This is not just another revenge book. This is the ultimate revenge bookhigh tech recipes for madness concocted by the author in collaboration with the experts. Scott French interviewed engineers, bank tellers, phone operators, computer technicians, radio and TV managers, and asked them point black, How would you get even with somebody? What he came up with is a collection of electronics, chemicals, and common sense designed to push anybody over the edge. Discover how to induce insanity with lasers, shockers, breakers, and blowers; clear beaches with silent sound; zap computer disks from a distance, bypas computer passwords, blast boomboxes and bother banks. In short learn to harass the forces of science and technology and excercise your Godgiven right to get even with anybody, anytime. Hightech Harassment These actions might seem harmless to these Citizen Informants, but in reality the actions could be causing great psychological trauma for the target. Eg. Blocking targets path, getting ahead of them in line, cutting or boxing them in on the road, saying or doing things to elicit a response from targets. Etc. Its like the death of a thousand paper cuts. One or two minor incidents will not cause any harm to the target, but over time the target is slowly worn down. Where does the support or funding for this come from? Though the systemic harassment that Targeted Individuals refer to as Gang Stalking is immoral and unethical in nature, programs such as this in democratic countries, and none democratic Generated with www.html-to-pdf.net countries have always been funded by the Government. They are the only ones with enough money, coordination, and power to keep such a system in place. These Coordinated efforts

Page 11 / 16

Though the systemic harassment that Targeted Individuals refer to as Gang Stalking is immoral and unethical in nature, programs such as this in democratic countries, and none democratic countries have always been funded by the Government. They are the only ones with enough money, coordination, and power to keep such a system in place. These Coordinated efforts then join hands with others for this systemic form of control and harassment. Ruling the community with an iron fist. Savvy law enforcement types realized that under the community policing rubric, cops, community groups, local companies, private foundations, citizen informants and federal agencies could form alliances without causing public outcry. Covert Action Quarterly, summer 1997. Ruling the community You mean to tell me that it is legal for corporations from the private sector to team up with local law enforcement officials in efforts to spy on innocent members of our society? You also mean to tell me that the synthesis of law enforcement authority and the drive of forprofit companies operate under little to no guidelines or restrictions and it is unclear to whom they are responsible to? ACLU Blog What can you do to help? 1. If you know someone who is being targeted in this way please dont go along with it. Dont assume that the person is guilty or a bad person. Many innocent people are currently being targeted, and people are being told lies. This form of harassment is systemic and its about state control and conformity. The express goal of this harassment is to destroy the individual over time. 2. If you are aware of someone being harassed in this way, subtly direct them to websites that deal with Gang Stalking, or sites for Targeted Individuals. Knowledge is power. 3. You can subtly suggest that your local newspapers or community papers print articles about Targeted Individuals or even an write an objective piece about Gang Stalking. 4. If you are a law maker, you can petition for changing the laws. Ensure targets who are flagged in this way have proper notification letting them know that they are flagged. Convicted criminals have this right, why not targets? Many of whom are innocent members of the public. Petition for better oversight of these programs. As it stands Communities are getting away with serious human rights abuses, and complaints are not being heard. Authority figures such as the police in many cases are not taking the reports seriously due to the type of warning markers attached to a targets file. 5. If you are a lawyer our community needs lawyers who are skilled in helping targets access Freedom Of Information files. Lawyers who can help targets get their files reviewed, or corrected. Lawyers who can work with the existing privacy laws to limit who and where the targets information is disseminated to. We need human rights lawyers who can address the complaints of abuses that are happening to people listed or flagged in this manner. Illegal surveillance, illegal access of mail and electronic communications, and torture via electronic monitoring. 6. Mental health professionals can recognize that there is illegal harassment happening to individuals who are flagged, listed or have warning markers placed against their names. Community notifications can and do create paranoia within communities. This notification makes targets prime for harassment, and community mobbing. They can objectively investigate the complaints, and become familiar with the Electronic means of monitoring and harassment that are being used. Laws are just starting to catch up to the technology. Eg. Europe is considering a ban on the mosquito device, because it infringes on the human rights of children. 7. You can subtly offer your support to someone who is being unfairly treated, in very small little ways. 8. You can bring up the subject of Gang Stalking or Targeted Individuals. How do participants communicate? Communication happens in a number of ways. When on the street or in cars patrolling, they use a one handed sign language. Citizen Informants also seem to get ques via cellphone and some via earphones. Their one handed sign language include things like tapping the side of the nose, corner of the Generated with www.html-to-pdf.net eye, brushing back the hair 3 times, the infamous double blink, etc.

Page 12 / 16

some via earphones. Their one handed sign language include things like tapping the side of the nose, corner of the eye, brushing back the hair 3 times, the infamous double blink, etc. Here is a list of signals that the former East German Secret Police the Stasi used. These signals below are not gang stalking signals, they were used in the former East Germany. http://www.nthposition.com/stasiland.php SIGNALS FOR OBSERVATION 1. Watch out! Subject is coming touch nose with hand or handkerchief 2. Subject is moving on, going further, or overtaking stroke hair with hand, or raise hat briefly 3. Subject standing still lay one hand against back, or on stomach 4. Observing Agent wishes to terminate observation because cover threatened bend and retie shoelaces 5. Subject returning both hands against back, or on stomach 6. Observing Agent wishes to speak with Team Leader or other Observing Agents take out briefcase or equivalent and examine contents. Books: 1. GmB Bailey, Bridging The Gap. 2. Gloria Naylor. 1996 3. Kristina Borjesson Into the Buzzsaw 4. Jim Redden Snitch Culture 5. Noa Davenport Mobbing: Emotional Abuse in the American WorkPlace 6. Ward Churchill, Jim Vander Wall Cointelpro Papers 7. Anna Funder Stasiland 8. Protectors of Privilege: Red Squads and Police Repression in Urban America 9. Victor Santoro GASLIGHTING How To Drive Your Enemies Crazy 10. Anthony Brina Suburban Spies 11. Stephen Knight The Brotherhood 12. Alex Constantine The Covert War Against Rock 13. Frank Donner The Age of surveillance 14. Niki F. Raapana 2020 15. Dr. Andrew M. Lobaczewski. Political Ponerology: The science on the Nature of Evil. 16. Community Oriented Policing. A Systemic approach. Movies: 1. The lives of others. http://www.imdb.com/title/tt0405094/ (A movie about covert investigations in the former East Germany) 2. The Matrix. (Scifi Movie.) Neo a target wakes up and realizes not only is he being watched without knowing why, but that the world is a lie, that has been created to pull the truth over peoples eyes.
Posted in Group Stalking, Human Experimentation, Synthetic Telepathy Tags: community mobbing, community notification, Organized stalking Leave a Comment

Human Experimentation and Human Subject Protections


JUL 3 Posted by (Geeldon)

Generated with www.html-to-pdf.net


Human Experimentation and Human Subject Protections

Page 13 / 16

JUL 3

Posted by (Geeldon)

Human Experimentation and Human Subject Protections The Bush administrations legal framework to protect CIA interrogators from violating US statutory and treaty obligations prohibiting torture47 effectively contravened wellestablished legal and ethical codes that, had they been enforced, should have protected prisoners against human experimentation, and should have prevented the EIP itself from being initiated in the first place. This strategy therefore may have effectively employed one criminal act to protect against liability for another, as illegal and nonconsensual human experimentation can constitute a war crime and a crime against humanity, when its perpetration is systematic and widespread. The Nuremberg Code International and US prohibitions restricting human experimentation were developed in response to some of the most serious human rights violations of the 20th century. Following the trials of German health professionals at Nuremberg after World War II, international attention was focused on the practice of human experimentation inflicted upon vulnerable human subjects. The fundamental right of individuals to choose not to be subjected to human experimentation was first codified in the form of the Nuremberg Codea direct response to atrocities that took place during the war. Among other protections, the Nuremberg Code states that the voluntary informed consent of the human subject in any experiment is absolutely essential, and that volunteer subjects should always be at liberty to end their participation in the experiment. In addition, the Nuremberg Code states that any experiment should be conducted so as to avoid all unnecessary physical and mental suffering and injury. Implementation of the Nuremberg Code was neither immediate nor consistent. Despite the experiences of World War II, human experimentation on vulnerable populations without the participants consent continued in the United States into the second half of the 20th century. One of the most egregious examples was the Tuskegee syphilis experiment, in which poor AfricanAmerican men in the South were denied treatment for syphilis so that researchers could study the natural progression of the untreated disease. The National Commission In the wake of public outrage surrounding these nonconsensual experiments, the US Congress created the National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research (National Commission), a group of leading experts in medicine, law, and ethics, charged with developing guidelines on human subject research based on ethical principles. The National Commission made its recommendations in the Belmont Report, establishing respect, beneficence and justice as principles guiding the ethical conduct of research, including the right of informed consent.51 The Belmont Report established the concept that the ethical conduct of research required that volunteer subjects be informed about the risks and benefits, if any, that might accrue to them before they gave their consent. Additional protections were established for vulnerable populations, such as prisoners, whose ability to give truly informed consent may be problematic. As further protection for human subjects, the National Commission called for establishment of institutional review boards within medical and scientific organizations. These bodies comprise combinations of researchers, ethics experts, and laypeople that oversee study design based upon ethical principles. The Common Rule These human subject protections became codified in federal regulations,52 as well as in codes of professional conduct. Collectively, these regulations are known as the Common Rule. The Common Rule applies to all federally funded human subject experimentation, including all research conducted by the CIA and the DoD. By the end of the 20th century, therefore, all people who were subject to US experimentation were protected by three interconnected bodies of law: customary international law,

Generated with www.html-to-pdf.net US federal statute, and federal regulations specifically, the Common Rule. Although the Nuremberg Code is a code of conduct and not, by its terms, a treaty binding explicitly named

Page 14 / 16

subject to US experimentation were protected by three interconnected bodies of law: customary international law, US federal statute, and federal regulations specifically, the Common Rule. Although the Nuremberg Code is a code of conduct and not, by its terms, a treaty binding explicitly named parties, in the decades following the 1947 articulation of Nuremberg, prohibitions against human experimentation without the informed consent of the volunteer subjects have been deemed by international legal scholars to be part of customary international law. This makes human experimentation without the informed consent of volunteer subjects one of a small number of acts (including genocide and torture) that are so heinous that they are universally considered to be crimes against humanity.
Posted in Human Experimentation, Uncategorized Tags: common rule, experimentation, harassment Leave a Comment

Experiments on Detainees
JUL 3 Posted by (Geeldon)

CIA medics ran experiments on detainees, group charges By William Fisher | Last updated: Jun 21, 2010 4:57:44 PM

NEW YORK (IPS/GIN) A major human rights organization claims it has uncovered evidence indicating that the administration of former U.S. President George W. Bush conducted illegal and unethical human experimentation and research on detainees in CIA custody. The group, Physicians for Human Rights (PHR), claims the apparent experimentation and research appear to have been performed to provide legal cover for torture, as well as to help justify and shape future procedures and policies governing the use of the enhanced interrogation techniques. Its new report, Experiments in Torture: Human Subject Research and Evidence of Experimentation in the Enhanced Interrogation Programme, claims to be the first to provide evidence that CIA medical personnel engaged in the crime of illegal experimentation after 9/11, in addition to the previously disclosed crime of torture. This evidence indicating apparent research and experimentation on detainees opens the door to potential additional legal liability for the CIA and Bushera officials. There is no publicly available evidence that the Department of Justices Office of Legal Counsel determined that the alleged experimentation and research performed on detainees was lawful, as it did with the enhanced techniques themselves, PHR contends. The CIA appears to have broken all accepted legal and ethical standards put in place since the Second World War to protect prisoners from being the subjects of experimentation, said Frank Donaghue, PHRs chief executive officer. Not only are these alleged acts gross violations of human rights law, they are a grave affront to Americas core values. PHR is calling on President Barack Obama to direct the attorney general to investigate these allegations, and if a crime is found to have been committed, to prosecute those responsible. Additionally, the group said, Congress must immediately amend the War Crimes Act to remove changes made to the act in 2006 by the Bush administration that allow a more permissive definition of the crime of illegal experimentation on detainees in U.S. custody. The more lenient 2006 language of the act was made retroactive to all acts committed by U.S. personnel since 1997. In their attempt to justify the war crime of torture, the CIA appears to have committed another alleged war crimeillegal experimentation on prisoners, said Nathaniel A. Raymond, director of PHRs Campaign Against Torture and lead report author. Justice Department Generated with www.html-to-pdf.net lawyers appear to never have assessed the lawfulness of the alleged research on detainees in CIA custody, despite how essential it appears to have been to their legal cover for torture.

Page 15 / 16

In their attempt to justify the war crime of torture, the CIA appears to have committed another alleged war crimeillegal experimentation on prisoners, said Nathaniel A. Raymond, director of PHRs Campaign Against Torture and lead report author. Justice Department lawyers appear to never have assessed the lawfulness of the alleged research on detainees in CIA custody, despite how essential it appears to have been to their legal cover for torture. PHR says its report is relevant to presentday national security interrogations, as well as Bush era detainee treatment policies. As recently as February 2010, President Obamas then director of national intelligence, Admiral Dennis Blair, disclosed that the U.S. had established an elite interrogation unit that will conduct scientific research to improve the questioning of suspected terrorists. Admiral Blair declined to provide important details about this effort. If health professionals participated in unethical human subject research and experimentation they should be held to account, said Scott A. Allen, MD, a medical advisor to Physicians for Human Rights and lead medical author of the report. Any health professional who violates their ethical codes by employing their professional expertise to calibrate and study the infliction of harm disgraces the health profession and makes a mockery of the practice of medicine. Several prominent individuals and organizations in addition to PHR planned to file an early June complaint with the U.S. Department of Health and Human Services Office for Human Research Protections and call for an investigation of the CIAs Office of Medical Services. The PHR report indicates that there is evidence that health professionals engaged in research on detainees that violates the Geneva Conventions, The Common Rule, the Nuremberg Code and other international and domestic prohibitions against illegal human subject research and experimentation. Declassified government documents indicate that: Research and medical experimentation on detainees was used to measure the effects of largevolume waterboarding and adjust the procedure according to the results. After medical monitoring and advice, the CIA experimentally added saline, in an attempt to prevent putting detainees in a coma or killing them through overingestion of large amounts of plain water. Health professionals monitored sleep deprivation on more than a dozen detainees in 48, 96 and 180hour increments. This research was apparently used to monitor and assess the effects of varying levels of sleep deprivation to support legal definitions of torture and to plan future sleep deprivation techniques. Health professionals appear to have analysed data, based on their observations of 25 detainees who were subjected to individual and combined applications of enhanced interrogation techniques, to determine whether one type of application over another would increase the subjects susceptibility to severe pain. The alleged research appears to have been undertaken only to assess the legality of the enhanced interrogation tactics and to guide future application of the techniques. The Experiments in Torture report is the result of six months of investigation and the review of thousands of pages of government documents. PHR says it has been peerreviewed by outside experts in the medical, biomedical and research ethics fields, legal experts, health professionals and experts in the treatment of torture survivors.
Posted in Human Experimentation, Uncategorized Tags: experimentation, fumes, gassing Leave a Comment

Newer Posts

Blog at WordPress.com. The Mystique Theme.

Follow

Generated with www.html-to-pdf.net

Page 16 / 16

Potrebbero piacerti anche