Documents

CIA AR 2-2 (U) LAW AND POLICY GOVERNING THE CONDUCT OF INTELLIGENCE ACTIVITIES (Pages 18-20 “HUMAN EXPERIMENTATION”)

thumbnail of C06235713 AR 2 2 Law and Policy Governing the Conduct of Intel Activities_0

A key CIA regulation — titled “AR 2-2” — governs the conduct of the CIA’s activities, which include domestic intelligence collection.  AR 2-2 includes rules governing a wide range of activities, including surveillance of U.S. persons, human experimentation, contracts with academic institutions, relations with journalists and staff of U.S. news media, and relations with clergy and missionaries.

Annex B and the CIA-FBI memorandum of understanding comport with past reporting that the Foreign Intelligence Surveillance Court authorized the FBI to work with the CIA to collect Americans’ financial records in bulk under Patriot Act Section 215.

In addition, Annex B explains that the CIA may “use a monitoring device within the United States under circumstances in which a warrant would not be required for law enforcement purposes if the CIA General Counsel concurs.”

But what qualifies as a “monitoring device”? And how exactly does monitoring differ from “electronic surveillance,” which the CIA is prohibited from doing domestically? We don’t know. In the newly released documents, the definition of “monitoring” (as distinct from “electronic surveillance”) is redacted.​

Tactical Psychological Operations Tactics, Techniques, and Procedures; Headquarters Department of the Army (October 2005)

thumbnail of fm3-05-302

The most unsettling portion of this document can be found on Page 9 that clearly shows that PSYOPS operates actively in the United States and therefore targets United States citizens as well as citizens of foreign countries. The image caption states under the umbrella term “Homeland Security (Within the United States)”– “Defense–Offense-Civil Support” and the other caption states “Civil Support–Offense-Defense”. The image can be viewed below.

1-4. Doctrine addresses the range of Army operations across the spectrum of conflict. Commanders at all echelons may combine different types of operations simultaneously and sequentially to accomplish missions in war and military operations other than war (MOOTW). For each mission, commanders determine the emphasis forces place on each type of operation (offense, defense, stability and reconstruction, and civil support) (Figure 1-1). Likewise, PSYOP are conducted throughout the range of full-spectrum operations and are key to achieving U.S. objectives. PSYOP are inherently joint and frequently combined operations that include conventional forces and special operations forces (SOF). The RAND Corporation (“Research ANDevelopment”)[8] is an American nonprofit global policy think tank[1] created in 1948 by Douglas Aircraft Company to offer research and analysis to the United States Armed Forces. It is financed by the U.S. government and private endowment,[6] corporations,[9]universities[9] and private individuals, such as Defense Contractors.[9] The RAND Corporation is the main research artery of Military operations other than war (MOOTW).

Psychological Operations Process Tactics, Techniques, and Procedures; Headquarters Department of the Army (August 2007)

thumbnail of PsyOpsTactics

This extremely disturbing document created by the 8th Psychological Operations Group of the United States Army is basically a blueprint for Voice-to-skull gaslighting techniques that not only I’ve experienced and continue to experience, but also have heard from many others in the Targeted Individuals community. It’s basic principles is lying through various mediums for “Persuasion and Influence”, which are describe as “tools of PSYOP”. Ironically the term Targeted Audience with the abbreviations “TA” are contained throughout the document. The Targeted Individuals community frequently uses the initials “TI” for the phrase “Targeted Individuals” to describe those on the Directed Energy Weapon and Voice-to-skull program, which can be found all over within the entirety of this website.

It mentions and details using audio devices and the media to persuade and influence those who are considered the “Targeted Audience (TA). Another portion on Pages 68-71 goes into the exact “Techniques” used for the objective, all of which exactly matches many of the methods within the “Techniques” page of this website.  I’ve suspected that the PSYOPS division of the United States Army might be involved and this document as well as the one above made me file an FOIA Requests asking about the “Testing or use of Directed Energy Weapons on United States citizens.” which will be added to this website once a response is received. Many Constitutional Rights, laws, and treaties are being broken via these domestic PSYOPS programs, but as always the Department of Defense supersedes these all of by the passing of laws such as the PATRIOT ACT. The PSYOPS Techniques can be found in the link below, which were directly copied from the document.

A Method for Encoding & Transmitting Speech by Means of the Radio Frequency Hearing Phenomena, DISCLOSURE AND RECORD OF INVENTION ; United States Air Force

thumbnail of rf-speech-02

This document is one the United States Air Force released in 1994 pertaining to a microwave hearing device that can transmit voices into a single human beings brain, while not being heard by those nearby. As mentioned throughout this website, the Air Force Research Laboratory created all Directed Energy Weapons and voice to skull technologies. Within the document is the phrasing “The uses of the invention by the Government are:” with the first applicable use being “(a) A useful Psychological Warfare communications tool.” This can found on Page 2 of the document. Below is the description of the device and it’s historical scientific discovery:

“The “RF (Radio Frequency) Hearing Effect” has been known since World War II. It was first noticed when individuals heard “clicks” when exposed to high power RADAR transmitter signal Since WWII many studies and investigations on the effect have been made. It was generally concluded that the effect was due to a thermal interaction caused by RF heating in the head. A unique feature of the RF hearing effect is that the stimulation of the sense of hearing occurs without the use of any devices or equipment on behalf of the subject; the incident RF is converted to a subjective sound by the natural physiological system. It has been demonstrated that audio tones, when modulated on an RF carrier, can be perceived by human test subjects when exposed to such an RF signal. However, here-to-fore, attempts to encode speech on an RF carrier such that human subjects can intelligibly receive the speech message by means of the RF hearing effect have not been successful. The invention, provides a means of encoding speech on an RF carrier such that human subjects can intelligibly receive the speech message by means of the RF hearing effect. The invention is. based on a thermal theory and model of the RF hearing effect. By means of the theoretical model it can be shown that clicks and tones can be perceived when encoded on an RF carrier by means of standard AM (Amplitude Modulation), which is consistent with previous experiments by others. The model also shows that a severe distortion exist which dcejnot impair the perception of clicks or tones but render speech unintelligible. Study and analysis of the modulation and distortion processes provided an insight and understanding of the speech iifel&gibility problems which eventually lead the inventors to recognize that a combination of filtering, biasing and nonlinear processing of the speech signal and the use of suppressed carrier AM modulation provides a means for the encoding of speech which will be intelligible to a human subject by means of the RF hearing effect.”

JOHN St. Clair AKWEI vs. NSA, Ft. Meade,MD,USA

thumbnail of akwei

Those researching electronic harassment will no doubt come across the case of John Akwei v. NSA. Mr. Akwei alleges the NSA used it resources, including remote physiological devices, to illegally harass and surveil him for over a decade. Mr. Akwei brought his case before the US District Court in Washington DC in 1992 only to have it dismissed due to the Court being unable to identify any legal cause of action. In 1996 Nexus Magazine published Mr. Akwei’s evidence dossier which he compiled after the ruling.

 

The Specification Language TimeML (NSA/CIA/DHS AQUAINT Thought Reading Question/Answer Program’s Programming Language)

thumbnail of Pustejovsky2

According to the image below and the PHP script below, which I’ve included, my second gangstalkers (I have only experienced and only believe in audible gangstalkers), my brain would be defined as X=0, Y=0, and Z=0 (where X,Y, and Z meet). My gangstalkers were heard as neighbors, which would yell and threaten me at all hours of day (How could a human being be awake 24/7 and especially not be working?) in an upper adjacent apartment, this sound projected to my brain would be a transmitted sound (inaudible to other people) that would be defined as the endpoint A, where A and Az meet. I will try to recreate my script with a gangstalkers variables and the variables included with the Voice-output function included.

<?php
/*3D Space coordinates based upon the Cartesian coordinate system*/
$X= X-coordinates;
$Y= Y-coordinates;
$Z= Z-coordinates;

/* All things being equal, $X=0 $Y=0 and $Z=0, such as the center of the Cartesian plane (origin), would be the Targeted Individual. The fMRI/EEG brain sending/reading satellite would input/output from the top of your brain, which would be the case with direct voice-to-skull to only target the individual’s brain. This is more complex when the individual moves, which would change the X,Y,Z values. This becomes more also complex when an individual heard sounds are from other areas, such as a nearby apartment, which would then involve this theory being angle based sounds being inputted to the individual and would be best explained using Euclidean coordinate system, which I will later attempt to recreate. */

$VOICE1= Perp1Voice; /* High pitched male voice */
$VOICE2= Perp2Voice; /* Female montone computer-generated sounding voice */
$VOICE3= Perp3Voice; /* Deep commanding male voice */

Michael Thomas
<EVENT eid=”e1″ class=”OCCURRENCE”>
walks
</EVENT>
<3D-Movement=”X,Y,Z”>
<MAKEINSTANCE eiid=”ei1″
eventID=”e1″ tense=”PAST” aspect=”PERFECTIVE”/>
<TIMEX3 tid=”t1″ type=”DURATION” value=”P2D”
temporalFunction=”false”>
3 seconds
</TIMEX3>
<SIGNAL sid=”s1″>
towards
<SIGNAL>
his vehicle
<EVENT
eid=”e2″ class=”OCCURRENCE”>
function Voice-output { $Voice1=”Michael,you better stay home and not go to work!” }
</EVENT>
<MAKEINSTANCE eiid=”ei2″ eventID=”e2″
tense=”NONE” aspect=”NONE”/>.
Michael Thomas
<EVENT eid=”e3″ class=”OCCURRENCE”>
walks away
</EVENT>
<3D-Movement=”X,Y,Z”>
<MAKEINSTANCE eiid=”ei1″
eventID=”e4″ tense=”PAST” aspect=”PERFECTIVE”/>
<TIMEX3 tid=”t1″ type=”DURATION” value=”P2D”
temporalFunction=”false”>
5 seconds
</TIMEX3>
<SIGNAL sid=”s1″>
towards
<SIGNAL>
his house
<EVENT
eid=”e5″ class=”OCCURRENCE”>
function Voice-output { $Voice2=”Good. Do not go to work and lay in your bed. If you go to work, I’ll shock your heart again.” }
</EVENT>
<MAKEINSTANCE eiid=”ei2″ eventID=”e2″
tense=”NONE” aspect=”NONE”/>.
Michael Thomas
<EVENT eid=”e6″ class=”OCCURRENCE”>
goes to his bed
</EVENT>
<3D-Movement=”X,Y,Z”>
<MAKEINSTANCE eiid=”ei1″
eventID=”e7″ tense=”PAST” aspect=”PERFECTIVE”/>
<TIMEX3 tid=”t1″ type=”DURATION” value=”P2D”
temporalFunction=”false”>
1 minute
</TIMEX3>
<SIGNAL sid=”s1″>
lays down
<SIGNAL>
on his bed
<EVENT
eid=”e8″ class=”OCCURRENCE”>
function Voice-output { $Voice3=”Michael, stay in your bed. If you get up from your bed and go to work, I will give you muscle spasms.”}
</EVENT>
<MAKEINSTANCE eiid=”ei2″ eventID=”e2″
tense=”NONE” aspect=”NONE”/>.
?>