A Beastiary of Military Terms for the New War (Against Civilians); Its Weapons Systems, and Perpetraitors
(From Mark M. Rich’s “New World War: Revolutionary Methods for Political Control,” 2011)
Epigraph Quotes:
The evils of tyranny are rarely seen but by him who resists it. – John Hay (1872)
Unwitting Americans and the citizens of other nations are facing a destabilization operation…. one designed to bring down the existing world governments and to institute a one-world-government fascist dictatorship in its place.
Marshall Thomas, author of “MONARCH, The New Phoenix Program”
… Front groups for the British Crown and Wall Street are actively pursuing plans for global domination…. Aggressive efforts are now underway to remove existing freedoms…. As they consolidate control of the planet, they have extended the battlefield into your neighborhoods. Their primary enemies are those resisting their political agenda, all of whom will be identified, isolated, and destroyed. An inclusion of the pathological factor, however, suggests that a more general class of people who are considered their natural enemies, will be attacked as well.
Evidence suggests that the US government has been entirely overthrown by a network of groups exhibiting psychopathic traits that have disguised themselves using humanitarian fronts. They are facilitating a revolution which will result in them having control of the entire planet. Using the multinational force, they are waging a worldwide war against civilians to accomplish this.
In order to maintain a dictatorship it is absolutely critical that control is established on the neighborhood level. In the US this network has existed since 1917 and has been used to harass and spy on people that have been labeled subversive. It is now entirely fused into our society, just as it was in East Germany and Communist Russia.
… It is no exaggeration to say that the Anglo-American Establishment is using the military to reach down into your neighborhoods, single people out, and silently torture them, while using the mental health system, congress, media, and NGOs to conceal their attacks.
….. The(ir) utopia is only possible when the enemy is removed. A portion of the population is recruited to assist in accomplishing that. Directed-energy weapons, including microwaves, lasers and acoustic frequencies, will be used on the enemy. PsyOp attacks are transmitted through every possible channel of communication that the TA (targeted audience) uses.
It would be the ultimate dream for any average psychopath to be able to use the resources of the state to place people under surveillance, torture them from a safe distance with weapons that leave no evidence of their use, and sit back and have a good laugh while they watch them suffer in real-time. It would be even better if they controlled the very institutions which proclaimed to exist to expose such activities.
Their widespread, systematic, consistent vile activities, which have spanned multiple realms over the course of decades and have been committed against the human race in general, would be considered a crime against humanity in any civilization run by decent people.
Mark M. Rich, New World War
Key terms
I. The New Enemy- aka adversaries, insurgents, non-state actors (NSAs), dissidents, terrorists, asymmetrical threats, irregular threats, potential enemies, etc.
TA – Target Audience
TI – targeted individual
Insurgents – those who try to persuade the populace to accept political change. The enemy does not necessarily use violence to promote social change. Their methods may be nonviolent. These are groups of individuals not under government control, against the established leadership, who will be targeted because of an action they might take in the future. These may include nonviolent protesters who are labeled as terrorists. They may ‘wrap themselves in nationalism.’
Aka- non-state actors (NSAs), enemies, adversaries, terrorists, asymmetric threats, irregular threats, the new enemy, potential enemies, etc.
II. The New “Battlespace” (includes the world and your hometown)
AO- Area of Operation- the expanded battlefield, aka “battlespace,” includes air, space, land and sea. The battlespace is global and takes place among the civilian population where the military uses civilians as irregular forces.
AOR – Area of Responsibility- portion of AO under control of a particular PsyOp unit.
III. Military/Warfare Terms in the New War/“Information War”
3WW- Third Wave Warfare- Alvin Toffler’s Third Wave theory is based on the ideology and revolutionary assumption that globalization, aka “The New World Order,” is an evolutionary necessity in the new (post 1970’s) information/technology era. Hence. all nations must be merged into a global government. The goal is implementation of a word-wide fascist, neo-feudal, corporate-run state.
(Note, however, the one-world-government ideology traces back thousands of years- and hence, Toffler’s evolutionary model is a pretext. In Toffler’s model, the First Wave coincides with the agricultural revolution and the Second Wave coincides with the industrial revolution)
4GW – Fourth Generation Warfare- is a form of political/information warfare waged against civilians by a state or other entity. It utilizes civilians and the military, indeed all of society, to target civilian adversaries (aka “domestic state enemies,” “insurgents,” extremists, non-state actors, “cells of fanatics,” citizen “terrorists”) who value national sovereignty and/or pose some perceived threat to the state’s interests. Anyone disseminating information contrary to the state’s (“national security”) interests may become an enemy. The goal of the New War is the psychological collapse of the new enemies using a combination of tactics. Defeating the new enemies involves the synchronized use of non-lethal directed energy weapons, isolation, deprivation, and PsyOps against individuals and groups (aka TA, target audience and TI, targeted individuals). 4GW is more or less synonymous with unconventional warfare (UW), irregular warfare (IR), asymmetric warfare (AW), low-intensity conflict (LIC), military operations other than war (MOOTW), and network-centric warfare (NCW). This new war involves international, interagency cooperation between the military, federal and local law enforcement, non-governmental organizations (NGOs), intergovernmental organizations (IGOs), the civilian population/private voluntary organizations (PVOs), and private government contractors. This multinational force (MNF), involving NATO (North Atlantic Treaty Organization) and the UN, is termed civilian-military operations (CMO).
In its “Unconventional Warfare” manual, the US Army states that these New Enemies will be hunted down, isolated, denied critical services, and attacked. This will happen all over the planet, in your cities and towns, anywhere “pockets of resistance remain.”
In his “Non-Lethal Weapons to Gain Relevancy in Future Conflicts” article (2002 issue of “National Defense”), John Alexander aid that terrorists who live among the civilian population in densely populated cities around the world will be identified and attacked with NLW,: “Tactically, the United States must find, fix, isolate, and destroy terrorist cells… and hostile command and control networks as quickly as they are identified. The only solution is to eradicate the entire organism….”
In its 1995 report, “Non-Lethal Technologies: Military Options and Implications,” the CFR suggested that in a covert war against a global enemy, secrecy must be used to preserve the effectiveness of these new weapons and to create confusion as to the source of the attacks.”
In his 1970 book, “Between Two Ages: The United States in the Technetronic Era,” Trilateral Commission co-founder Zbigniew Brzezinski notes that new technologies, including directed energy weapons, will be available to leaders of the developed nations to conduct “secret warfare,” of which only a small number of security forces would be needed.
(1st generation warfare began in 1648 with Treaty of Westphalia which ended 30 years war and extended to about 1860. It grew out of the invention of gunpowder and consisted of mass armies armed with muskets, using line and column tactics. Battles were formal.) Examples include the American Civil War and the Napoleonic Wars).
2nd generation warfare began about 1860 and emerged out of technological improvements from the Industrial Revolution. It was based on massive firepower, indirect artillery fire, and used an attrition-style. It preserved the military culture of order, uniforms, drills, ranks, etc. This peaked during WWI and America used it in Vietnam and uses it still as the dominant form of warfare in Iraq and Afghanistan.
3rd generation was developed in Germany in 1918. It peaked during the Cold War and uses maneuver, speed, surprise, mental and physical dislocation of enemy forces.)
ACERT – Adaptive Cognition Enhanced Radio Teams
AO- Area of Operation- The battlefield for this new type of warfare has expanded into the civilian sector. It is now called the “battlespace.” The battlespace is global and takes place amongst the civilian population where military uses civilians as irregular forces. The battlespace includes space (satellites), the atmosphere (planes, helicopters, etc.) land, vehicles, sea (boats), people and robots.
AI – Artificial Intelligence-
AW – Asymmetric Warfare- an interagency, international operation which takes place among the civilian population. US Army refers to this as “population-centric war” because civilians are used as surrogate forces. It includes military, federal agencies, local law enforcement, and NGSs, who form an alliance with the HN’s civilian population. The 2006 “Defining Asymmetrical Warfare” report (in “Warfare Papers”) defined AW as “Asymmetric approaches are attempts to circumvent or undermine U.S. strengths while exploiting U.S. weaknesses using methods that differ significantly from the United States’ expected method of operations.”
C2- Command and Control Center- military term for a station which allows the planning, direction, and control of operations, monitoring, decision-making, and execution.
C2 Constellation – Command and Control Constellation is portion of GIG used by the Air Force for NCW (network centric warfare). Allows for planning and synchronization of attacks by integrating and collaboration of different nodes including satellites, weapons platforms, vehicles, and aircraft, down to small devices such as PDAs. C2 Constellation uses JTRS (joint tactical radio systems) to form MANETs (mobile ad hoc networks).
C2W- Command and Control Warfare
C3- Command, Control and Communications Center
C4ISR- Command, Control, Communications, Computer Center that utilizes Intelligence Surveillance and Reconnaissance. Multiple interacting components of C4ISRs include battlespace monitoring, awareness, understanding, sense making, command intent, battlespace management, synchronization, and information systems. C4ISR centers can be mobile or stationary, or virtual, or strictly computer-based. Each military service has its own tactical mobile C4ISR system; The Navy and Marines use ForceNet, the Air Force uses Command Control Constellation (C2 Constellation), the Army uses LandWarNet and WIN-T. Each type of C4ISR system is connected to GIG (global information grid).
The C4ISR system instructs human nodes interacting with the TI in real time.
CMO – Civilian-Military Operations- combines military, federal agencies, NGOs, civilian organizations and authorities, and the civilian population. CMO is used in friendly, neutral, or hostile operational areas, including populated civilian areas in which no other military activity is conducted. It is used to deal with domestic threats in the New War. The controlling faction of these PsyOp/CMO activities includes the military, federal agencies, NGOs, regional organizations, and international organizations that work with civil authorities. (In the US, this means the controlling faction is FEMA, DOJ, CIA, and other federal agencies (FBI, DHS, etc.). Civilians are used as irregular forces. CMO are interagency and global in nature. In the US, they are used as part of Homeland Security.
CMOC – Civilian-Military Operations Centers- is established in the civilian sector for exchanging ideas. It may be a physical meeting place or a virtual one through online networks. Daily meetings are attended by representatives of the military, NGOs, the private sector, and local officials. Discussions at these meetings may include any ongoing campaigns against domestic threats in the area of operation.
In addition to using the civilian population and private sector, the military will temporarily take over the functions of the local government to address these threats. These takeovers have been described as “comprehensive use” of intergovernmental, regional, national, local government, nongovernmental, and private sector organizations. These takeovers may be performed in the absence of any other military activity. I.e., this may be done in times of peace, and may not necessarily include a visible military presence. The operations may be performed by designated civil affairs units, military forces or a combination.
After dealing with irregular threats, the military hands back control of the organization back over to its civilian managers. During the occupation, the tactics used against irregular threats may include civic actions (use of civilian forces) and/or PsyOp, which is a vital part of CMO. CMO seeks in general to remove the influence that an adversary has on a population.
CIMICs- Civil-Military Cooperation Centers – C4ISR centers- what NATO calls the CMOCs. They are located in the civilian sector and there may be more than one in a city. These centers are connected to the GIG (Global Information Grid). Daily meetings occur between representatives of the military, NGOs, IGOs, private sector business, civilian leaders, local officials, and government agencies.
CIMICs (CMOCs) receive and validate information regarding domestic threats in the AO. It then forwards the requests to the local civil-military force for action. The CMOC coordinates the activities of the civilian-military forces at the tactical level, and is in constant contact with these forces.
Covert Vigilante Network- (aka hidden political subculture) – nationwide citizen informant network that silently and secretly spies upon and harasses targeted individuals (TIs). It works with federal agencies, local law enforcement, and the DOJ.
CR – Cognitive Radio- (a kind of JTRS, or Joint Tactical Radio System) that consists of a computer which has AI (artificial intelligence). CR is an intelligent device that is aware of itself, the needs of the user, and the environment. It can understand and learn. DARPA helped create CRs through programs like the Adaptive Cognition-Enhanced Radio Teams (ACERT), and Situation Aware Protocols in Edge Network Technologies (SAPIENT).
DOD CCRP –Department of Defense Command Control Research Program
DR – digital radios- aka SDR or soft-ware defined radio, allow the creation of MANETs (mobile ad hoc networks). JTRS (Joint Tactical Radio System) is the military version of DR.
EBO – Effects-Based Operations- DOD describes EBO as “coordinated sets of actions directed at shaping the behavior of friends, neutrals, and foes in peace, crisis and war.” EBO uses attrition-based approach for the slow physical and psychological destruction of the enemy. The goal is to break the will of the enemy.
ForceNet – the robust, reliable C4ISR system used by the Navy and Marines. Links nodes such as people, sensors, networks, and weapons into a networked combat force. It allows for synchronized attacks by decision-makers, warfighters and allied forces throughout the battlespace (which could be your home town).
GIG – Global Information Grid- developed partially by the MITRE Corporation, has been called DOD’s global C4ISR unit for netwar. It can quickly track down an adversary (target) anywhere on earth and attack them via DEW (directed energy weapons) and other forms of electronic warfare (EW). GIG uses existing commercial satellite and ground-based systems as well as GIG nodes such as aircraft, vehicles, and ships equipped with DR (JTRS). GIG is connected to all communications systems used by coalition and allied forces.
GWOT – Global War on Terror- use of 2nd, 3rd, and 4th generation warfare to achieve political/military objectives of the American Empire and New World Order.
IO – Information Operation- aka “cyber war,” information warfare,” network centric warfare (netwar, NCW) and command and control warfare (C2W).
In terms of activities of the internal enemy,” official sources suggest the act of simpoly conveying information alone can be described as IO. In this case, it is usually waged by people within oppressed populations.
In terms of government/military use of IO, DOD defines IO as: “The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations security, in concert with specific supporting and related capabilities, in influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own.”
The 1999 “Air and Space Power Journal,” in an article called “What is Information Warfare?” states: Information Wafare is any action to deny, exploit, corrupt or destroy the enemy’s information and its functions; protecting ourselves against those actions and exploiting our own military information functions.”
This new war is fought for political purposes and revolves around the issue of gaining the support and influence of the population.
What makes this new type of warfare different, says the DOD, is the focus of its operations, which is a relevant population, as well as its purpose, which is to gain or maintain control or influence over, and support of, that relevant population. The focus is on the legitimacy of political authority to control or influence a population.
IW- Information Warfare- According to US Military and Defense Contractors, the “new enemy” use computers, the internet, fax machines, cell phones and public media to advance their objectives. They use “information operations” to influence state forces with the population. Various publications term the act of transmitting information “netwar,” “information operations,” “information warfare,” “information attacks,” etc.
Professor George J. Stein in “Information Warfare,” which appeared in Airpower Journal, stated: The target of information warfare, then, is the human mind…. The battle remains, the battle for the mind.”
What all this means is that the New War is an information war.
Insurgent- The DOD’s “Dictionary of Military and Associated Terms” defines an “insurgent” as a “member of a political party who rebels against established leadership.” They are those who try to persuade the population to accept political change. Those who resist tyranny non-violently may be considered insurgents. RAND states that the new enemies are those using “information attacks” to strike against the large corporate or trade or political institutions. Most are non-state actors. The CFR stated: “In the transformation of a process, … there are often elements less subject to evolution.” They suggest that the US military change its tactics to neutralize these resisters.
The US Army states: “As globalization increases world integration, the scope of threats to US security and public safety becomes more global.” Toffler Associates states: “The enemies of integration pose the most serious threat to world order.”
IR – Irregular Warfare- consists of violent, low visibility, clandestine struggles between a country and its internal enemies. Air Force document, “Irregular Warfare” defines it as: “a violent struggle among state and non-state actors for legitimacy and influence over the relevant population.” Potential enemies are those who use the internet and IO (information operation) campaigns to undermine the legitimacy of a government for cultural, political, economic, or religious motives. Enemies include state and non-state actors and those labeled political, religious, or ethnic extremists. According to DOD’s “Irregular Warfare” document, if you are trying to influence the population in a manner which does not support the interests of the US or its allies, you are an adversary. This is because the appearance of legitimacy is necessary for this type of conflict. IW, says the US Army, requires that the government is perceived to be legitimate in the eyes of the population.
IW uses C4ISR and is global in its reach. Attrition-based tactics used to erode the will of the enemy include diplomatic, military, and law enforcement actions, economic-financial, informational, political and civic actions (Civil-Military Operations), methods to discredit, PsyOp, NLW, threats, intimidation, and physical and psychological isolation.
Terrorism will be used by the MNF (multi-national force) if necessary. Terrorism is an act of violence against a civilian population to achieve a political objective. This means a HN (host nation) government, including the U.S., will carry out large-scale acts of violence against its own population to achieve political objectives. (Examples include 9/11.)
JTRS – Joint Tactical Radio System- a computer that can be programmed to imitate a radio. They are multi-band, multi-mode, multi-channel radios with computer networking capabilities. JTRSs can access range of frequencies from 2MHz to 2 GHz, including from HF to UHF. These allow for wireless transmission of data, voice, and multimedia files between nodes in the battlespace using MANETS. JTRS are connected to GIG and communicate with satellites using GPS receivers. JTRS can be placed on ships, aircraft, vehicles, tiny robots, worn on clothing, and used in handheld devices.
LIC – Low-Intensity Conflict- is a political-military confrontation that takes place between states or groups below what is considered conventional warfare. LIC is a protracted struggle of competing principles and ideologies, and often occurs during revolutions and counterrevolutions.
It’s methods of attack include combinations of PsyOp and directed energy weapons. The term LIC is being phased out and IW is now considered the proper term.
LandWarNet- one of the Army’s C4ISR systems. It is a mobile, tactical communications network that provides reliable, secure, seamless video, data, image, and voice transfer during combat. It is the Army’s tactical portion of GIG that allows continuous communications on the move with joint, allied, and coalition forces. Commanders using it can conduct multiple simultaneous missions. It is built by General Dynamics, Lockheed Martin, Cisco Systems, and BAE Systems. The backbone for the network consists of existing terrestrial, airborne, and satellite communications systems.
LW – long war (= GWOT)- to be fought by interagencies using these technologies and weaons.
MANET – mobile ad hoc network- is wireless, self-configuring and is based on the mesh network standard. Each device/node contains a wireless router and is capable of sending and receiving data, and forms a flexible strategic and tactical communications system in which nodes can move. Nodes can be placed on aircraft, boats, vehicles, and people. This technology was developed by mid-1990s.
MIG – Military Intelligence Group
MILDEC – Military Deception
MOOTW – Military Operations Other Than War
NCW- network centric warfare (or netwar)- uses geographically dispersed and organizationally complex units consisting of relatively small forces and requires extensive information capability to quickly track down an adversary that can be anywhere on the planet.
NLW- Non-Lethal Weapons- have also been called non-injurious, disabling measures, immobilizers, strategic immobilizers, discriminate force, less-than lethal, pre-lethal, mission kill, new age weapons, soft kill weapons, slow kill weapons, silent kill weapons, limited-effects technology, neutralizing technology, reduced lethality weapons, low-collateral damage weaponry, etc.
DOD defines them as: “weapons that are explicitly designed and primarily employed so as to incapacitates personnel or material, while minimizing fatalities, permanent injury to personnel and undesired damage to property and the environment…. Non-lethal weapons employ means other than gross physical destruction to prevent the target from functioning.”
They include biological and chemical warfare, directed-energy weapons, communications warfare, information warfare (IW) and psychological operations (PsyOp).
NW – Neocortical warfare- information war.
OPSEC- Operations Security
PO – Peace Operations- the new war (4GW, IR, UW, etc.)- aka “peacekeeping operations” by the UN, are international, interagency missions to contain conflict, maintain peace, and form a legitimate government. Most are run by DPKO (Department of Peacekeeping Operations) of the UN. The US Army lists them as a type of MOOTW.
PolWar- Political Warfare- a translation of the German term, “weltanschuauugskrieg” (worldview warfare), which means the scientific application of terror and propaganda as a way of securing ideological victory over an enemy.
PsyOp- Psychological Operations, a major part of the New War and a core part of CMO (civilian military operations) that is combined with EW (electronic warfare) and CNO. PO involve syngergistic coordination of PsyOp, MILDEC, OPSEC, and EBO. PsyOp units work with the civilian population as irregular forces to attack target audience (TA) in the area of operation (AO). PsyOp operators profile TAs and TIs and devise themes to attack their TAs (target audience), which include TIs (targeted individuals). Ultimate goal of PsyOp is to modify the behavior of the TA by destroying their will using a relentless attack consisting of painful triggers. A type of audiovisual product known as PsyAct includes agents of action who carry out plays in the presence of the TA. Every single channel of communication the TA uses for information is interfered with.
Some researchers use the terms PO and propaganda interchangeably.
Controlling faction of PsyOp combines military, federal agencies, NGOs, civilian organizations and authorities, and the civilian population (FEMA, DOJ, CIA, etc.)
PsyWar – Psychological Warfare- synonymous with PsyOp and PolWar (Political Warfare).
SDR – Software-Defined Radio, basically same as DR (digital radio)
SAPIENT – Situation Aware Protocols in Edge Network Technologies
SIAF – Small Independent Action Forces- (aka 4GW Forces)- small, dispersed, agile forces, with little or no reliance on centralized logistics. They hunt down and neutralize a nations’ irregular threats using PsyOp and directed-energy weapons. William S. Lind, in his Modern War Symposium Articles (including “The Changing Face of War: Into the Fourth Generation”) advocates formation of a global volunteer citizen militia, not under control of the federal governments, that would maintain domestic order. The most important 4GW function would be Neighborhood Watch.
TPT-
TMN/DR- Tactical Mobile Networks/Digital Radios include MANET (mobile ad hoc network), that is based on the mesh network standard. Developed by DARPA, the US Army, and Office of Naval Research (ONR). Each node contains wireless routers and
Omni-directional antennas and can send and receive data. Mobile nodes create mobile mesh network with each other. Each node can move independently.
UC – Unconventional Warfare- US Army’s “Unconventional Warfare” report defines UW as “Operations conducted by, with, or through irregular forces.” These irregular forces include a significant portion of the civilian population of the HN (host nation).
WIN-T – Warfighter Information Network – one of the Army’s C4ISR systems. Facilitates real-time organization of battlespace nodes using JTRS which creat MANETS to keep mobile forces connected and synchronized. tactical
Note: AW, 4GW, 3WW, NCW, NNEC, MOOTW, LIC, IW, UW, EBO, CMO, and PO all describe the new type of warfare in which small wars are waged globally against groups and individuals (civilians).
IV. The Warfighters
CA – civil affairs personnel
CIA – Central Intelligence Agency
COINTELPRO – FBI’s Counter Intelligence Program, from 1956 to 1971 the FBI conducted massive covert domestic spying program to neutralize internal dissent in this program. Individuals and organizations were placed under surveillance and secretly attacked. The program attacked alleged “communists”, nonviolent individuals, antiwar community, and religious groups. The Church Senate Committee (1975) concluded that: “the arsenal of techniques used against foreign espionage agents was transferred to domestic enemies.” The FBI worked with local police and employed an army of secret agents and informers to harass people.
CONARC – Continental Army Command. Worked under CONUS in late 60s and was responsible for coordinating all military intelligence activities domestically, including civil disturbances and surveillance of civilians.
CONUS – Continental United States Intelligence. In the late 60s this military bureaucracy conducted widespread surveillance on civilians using multiple groups under its command (as per Operation Phoenix in Vietnam).
DARPA – Defense Advanced Research Projects Agency
DHS – Department of Homeland Security
DCDPO – Directorate of Civil Disobedience and Planning (DCDPO)
DOD – Department of Defense
DOD’s OFT – Office of Force Transformation
DOJ – Department of Justice
FEMA – Federal Emergency Management Agency
FBI – Federal Bureau of Investigation
JTTF- Joint Terrorism Task Force- partnership between various local, state, and federal agencies, and private organizations that are charged with taking action against terrorism, which includes the investigation of crimes such as wire fraud and identity theft. The agencies that a JTTF comprises generally include the FBI, DHS, USCG (Coast Guard), ICE (US Immigration and Customs), U.S. Customs and Border Protection (CBP), the Transportation Security Administration (TSA), and the U.S. Secret Service (USSS), the U.S. Armed Forces, and the Department of State (DOS)’s Diplomatic Security Service (DSS)), state and local law enforcement agencies, and specialized agencies, such as railroad police. JTTFs engage in surveillance, electronic monitoring, source development and interviews in their pursuits.
POTF – Joint Psychological Operations Task Force
INSCOM – U.S. Army Intelligence and Security Command
ISA – Intelligence Support Activity (provides Human Intelligence- HUMINT- and Signal Intelligence – SIGINT
MIG – Military Intelligence Group
NATO- North Atlantic Treaty Organization – allied military force
NSA – National Security Agency
NIJ – National Institute of Justice
POAT – PsyOp Assessment Team
POG – Psychological Operations Group
4th POG – US Army’s Fourth Psychological Operations Group- (strategic core of the PsyOp community located at Fort Bragg, North Carolina)
POTF- PsyOp Task Force- usually the highest organization that performs PsyOp in the battlespace. It may be part of a joint psychological operations task force (JPOTF) if other services or agencies are included. It plans, develops, designs, produces, and distributes PsyOp products. This includes the various media, themes, and messages transmitted to the TA (target audience). It provides an in-depth profile analysis of the TA’s in an AO (area of operation). It recommends products to influence the TA and evaluates their effect. SOCOM is usually the supporting command structure of a POTF.
SOCOM – United States Special Operations Command – established in 1987, it is a unified special operations command that oversees special operations groups of the Army, Navy, Marines, and Air Force. It is headquartered at MacDill Air Force Base in Tampa, Florida. SOCOM conducts global overt and covert missions including unconventional warfare. SOCOM has multiple units, or special operations forces (SOF), including the First Special Warfare Development Group (DEVGRU, the Navy Seals). SOCOM is supporte by an intelligence faction known as the Intelligence Support Activity (ISA) which provides Human Intelligence (HUMINT) and Signal Intelligence (SIGINT). SOCOM conducts PsyOp, civil affairs operations (CMO), counterterrorism, and other functions. Two SOCOM units that specialize in PsyOp include the 193rd Special Operations Wing (193 SOW) of the Pennsylvania Air National Guard, and the Army’s 4th Psychological Operations Group (4th POG).
SOF – Special Operations Forces
SSA – DOE’s Office of Security and Safety Performance Assurance
V. The New Weapons
ABL- Airborne Laser
ATL- Advanced Tactical Laser systems
ADS – Active Denial System – adjustable from 100 Kw to 100MW (type of ADT)- a type of ADT. It operates in the 95 GHz frequency of the radio band of the EMS. ADS focuses an invisible beam of millimeter waves to cause an intolerable heating sensation on a person’s skin. It is powered by 100 kW ultra-high radio frequency transmitter. The 95 GHz radio frequency that it shoots is created from an electric gyrotron generator that can be adjusted. It fires 4-second bursts, can be used in the night-time, and is simple to point and shoot. The power level and duration of the beam is controlled by a computer. It can also cause resonance within the body. It passes through clothing, unshielded walls, and travels at the speed of light.
The Defense Science Board’s 2004 report, “Future Strategic Strike Forces,” says that for neutralizing individuals, lasers can be used at long ranges and ADS are best for short ranges. In its NLW report of 2005, the CFR states: “With it long range and rapid, universal, and reversible effect, ADS has many potential military applications.” ABC news report of 2008 re: “Army Orders Pain Ray Trucks: New Report Shows Potential for Death” states the ADS can be used as a “flesh-frying killer.”
These can be mounted on vehicles or hand-held. Raytheon is developing these for National Institute of Justice.
Multiple masers sue ADT- including the Vehicle Mounted Active Denial System (VMADS), Silent Guardian, Portable Active Denial System (PADS, also called ADS2) Project Sherriff, a type of compound directed energy weapon with multiple lethal and nonlethal weapons. All of these weapons were developed by Raytheon for agencies such as the DOE and NIJ/DOJ with the cooperation of the Air Force.
ADT- Active Denial Technology- type of maser which operates in millimeter wave band, which approaches the far infrared (FIR) portion of non-visible light. Instead of using energy from the light portion of the electromagnetic spectrum, it uses energy from the radio wave portion of the spectrum, which is a lower frequency. ADT was developed by Raytheon Corporation in cooperation with the US Air Force Research Laboratory (AFRL). ADT was developed in complete secrecy for 10 years and much of its testing results are still classified.
Chemical and Biological Weapons- include calmatives, nanotechnology, malodorants, and anti-material Chemicals
Citizen Informants- (aka “agents of action,” “covert vigilante network” and “hidden political subculture”) include private citizens who unofficially work for the government, either as part-time, full-time paid employees, or as volunteers. They are forbidden to reveal their connection to the government. Government informants are used to instill fear, disrupt activities, and infiltrate movements and organizations in order to control them.
Communist Russia (Committee for State Security, or KGB) and East Germany (the Ministry for State Security, MfS, or Stasi) used massive networks of citizen informants to stalk, encircle, and harass their internal enemies. One out of 6.5 citizens in East Germany, including children, worked for the Stasi police. The E. German Stasi program was termed Zersetzung (literally, “decomposition”) which used psychological warfare to destroy citizens without physically harming them. They were followed and stalked everywhere.
Citizen spy networks were also used in Czechoslovakia (Czechoslavak State Security, StB), Ministry of Public Security (MBP) in Poland, State Protection Authority (AVH) in Hungary, and International and State Defense Police (PIDE) in Portugal. Targets of these dictatorships were harassed, threatened, confined to mental institutions, tortured, blackmailed, and framed. Their friends and family were co-opted to persecute them.
In America, networks of citizen spies go back to 1917, when the MID (Military Intelligence Division) had cooperation of federal, state, and local government agencies as well as “private vigilante networks” of patriotic citizens. This network surveilled and “neutralized” citizens deemed “unpatriotic.” .
The Boston Glob reported in May, 2003, that DHS (Department of Homeland Security) hoped to recruit 100 million American citizens as citizen spies.
COIL – Chemical Oxygen Iodine Laser (CW- continuous wave)
Compound Directed Energy Weapon
Computer Attacks-
CNO- Computer Network Operations- aka NW Ops, or network operations/NetOps) are information warfare attacks used to deny, deceive, degrade, and disrupt networks and computers used by the enemy. These are used in conjunction with PO (PsyOps) and EW (electronic warfare). This includes destruction of hardware and software (degrading, attacking) and spoofing (deceiving). The battlespace includes the internet. Internet applications that can convey PsyOp messages include email, websites, and chat rooms. When a TI goes online, they are entering the battlespace.
Web spoofing allows an attacker to create a copy of the worldwide web. The Air Force mentioned that an enemy’s internet could be spoofed to conceal one of its weather attacks: “Spoofing options create virtual weather in the enemy’s sensory and information systems, making it more likely for them to make decisions producing results of our choosing rather than theirs.”
DEW- Directed Energy Weapons- used to damage or destroy people, equipment, and facilities, include microwave, millimeter waves, lasers, bright lights, holographic projections, and acoustic weapons (audible, infrasound, and ultrasound). These weapons are silent and traceless. They cause a variety of effects, including tiredness, dizziness, nausea, vomiting, abdominal pain, convulsions, epileptic seizures, temporary paralysis, vibration of internal organs, cooking of organs, cataracts, burning sensation on the skin, hyperthermia (heating of body), headaches, loss of short-term memory, interruption of cognitive processes, cardiac arrest, and cancer.
These weapons can easily pass through most unshielded structures.
In their “Electronic Warfare” publication, DOD defines DEW as: “DE (directed energy) is an umbrella term covering technologies that produce a beam of concentrated EM energy or atomic or subatomic particles. A DE weapon is a system using DE primarily as a direct means to damage or destroy adversary equipment, facilities, and personnel. DE warfare is military action involving the use of DE weapons, devices, and countermeasures to either cause direct damage or destruction of adversary equipment, facilities, and personnel, or to determine, exploit, reduce, or prevent hostile use of the EMS through damage, destruction, and disruption.”
DEW include microwaves, lasers, bright lights, holographic projections, and acoustics.
The two basic types of DEWs include microwaves and lasers. (Wavelengths of lasers are about 10,000 times smaller than microwaves). Both are part of the electromagnetic spectrum. The two main types of microwave weapons are millimeter wave devices such as the Active Denial System (ADS) and the electromagnetic bomb (e-bomb, which is the emission of a non-nuclear electromagnetic explosion or pulse).
DEW travel at the speed of light, are surgically accurate, can operate in all weather, are scalable, are silent and invisible (offering plausible deniability), their energy can pass through walls at distances of hundreds of meters to miles, and have long distance projection (tens of miles).
These weapons are mounted on platforms which can be a missile, aircraft, ship, vehicle, suitcase, radio, etc.
DF – megawatt deuterium fluoride laser e-bomb- electromagnetic bomb
DSR – Directed Stick Radiator- a small portable acoustic weapon which fires a focused, painful, audible sound up to 100 yards. It is a 1-m long, battery operated stick made of polymer that operates in the 10 kHz region and is adjustable up to 140 decibels. It has a series of internal amplifiers that amplify the original pulse. Elwood Norris, chairman of American Technology Corporation, which developed the weapon, stated: “It shoots out a pulse of sound that’s almost like a bullet.”
DSR can transmit speech and other sounds. It can knock someone back and cause migraine headaches. In addition to being able to remotely incapacitate a person, it can be also be used for Psychological Operations, according to the BBC and Business Wire. Similar devices include the person-portable Sonic Firehose developed by SARA and the Acoustic Defender developed by Universal Guardian Holdings.
EEG – electroencephalography
EPIC- Electromagnetic Personnel Interdiction Control- a portable acoustic weaon created by Invocon Incorporated. The US Navy notes this interferes with a person’s equilibrium by sending acoustic pulses of energy which disrupt the chemical and mechanical processes of the vestibular system (part of the inner ear that determines how sound and positions are processed by the brain). It results in disorientation, confusion, extreme motion sickness, and vomiting. It operates through walls and other protective mediums that now provide cover for combatants in urban warfare situations.
EROS – event-related optical signal maser- microwave amplification by stimulated emission of radiation (uses energy from radio part of electromagnetic spectrum)
ESP – Emotional Social Intelligence Prosthetic- infers a person’s emotional state by analyzing the combinations of subtle facial movements and gestures.
F2C- face to face contact
Rumor campaigns – (involves the source, the rumor, and R2- the receiver-repeater)
EW- Electronic Warfare
Financial Destruction- The US Army’s “Unconventional Warfare” report of 2008 states: “many declared or potential adversaries can be persuaded or dissuaded by economic or financial means.” This includes the blatant use of bribery and financial sanctions and disruption of the enemy’s credit system.
fMRI – functional magnetic resonance imaging GRP – Ground Penetrating Radar
HAARP – High Active-Frequency Auroral Research Program- is a multi-purpose tool that can detect underground structures and identify subsurface natural resources via EPT (earth penetrating tomography), communicate with submarines, disrupt and modify satellite communications, deliver billions of watts of energy to particular portions of the earth’s surface or atmosphere, cause earthquakes, droughts, and floods, and potentially, entrain the minds of billions of human beings to particular energy frequencies. DOD says HAARP is used to enhance the performance of C4ISR systems. It is one of about 20 ionospheric heaters around the world. It is primary component is a radio transmitter called the Ionospheric Research Instrument (IRI), also called a phased array, that consists of 180, 72’ tall towers that collectively transmits a narrow beam of energy from 2.8 to 10 MHz. Energy generated by the ISI is combined into a single focused steerable beam that heats and lifts exact portions of the ionosphere (atmospheric layer from 40 to 500 miles above the earth). This beam can make a series of invisible “ionospheric mirrors” which create a conduit for energy transfer over great distances. Diagnostic instruments at HAARP include ELF and VLF receivers, a digital HF ionosonde, magnetometers, photometers, a VLF sounder, and VHF riometer. It also has HF receivers, UHF and VHF radars, optical and infrared cameras, and other sensing equipment.
The facility at Gukona, Alaska, was designed by British Aerospace Systems (BAES) and Raytheon Corporation, on contracts from the Air Force, Navy, and DARPA. It is managed by the US Air Force’s Research Laboratory (AFRL), the Office of Naval Research (ONR), DARPA, and the University of Alaska’s Geophysical Institute.
In low frequency conversion mode, HAARP has tunable frequency range of 0.001 Hz to 40kHz which allows for low-frequency weaves such as ELF (including infrasound), ULF, and VLF. In high-frequency conversion mode it can generate infrared and visible light, that is, frequencies in the terahertz (THz) range. The ELF waves can be transmitted over thousands of kilometers covering a significant portion of the earth through a waveguide, a type of virtual pathway (earth-ionosphere cavity) between the ground and ionosphere. These waves will pass through every non-shielded structure on the planet.
HAARP can transfer massive amounts of energy (1.8 GW or nearly 2 billion watts) to specific points on the planet by creating a virtual conduit consisting of a series of ionospheric mirrors. These are called Artificial Ionospheric Mirrors (AIMs) or lenses by the Air Force. These allow over-the-horizon communication.
Dr. Bernard Eastland, the physicist who developed the concepts for HAARP in several patents in the 1980s was retained by APTI (Advanced Power Technologies Incorporated) as a consultant. Eastland’s patents, according to many, are directly related to those of Nikola Tesla, the Serbian-American genius who invented alternating current, wireless energy transmission, a “death ray,” and many believe, free energy. Some researchers believe that HAARP can function as the “death ray.”
By directing large amounts of electromagnetic energy to zones of geomorphological and climatic instability, HAARP can cause droughts, floods, hurricanes, tornadoes, earthquakes, volcanic eruptions, and light the skies with immense power. It can destroy electronic systems of aircraft, missiles, and space satellites and also disrupt radio, TV, and radar signals. The 1996, U.S. Air Force publication: “Weather as a Force Multiplier: Owning the Weather in 2025” states: “Weather-modification offers the warfighter a wide-range of possible options to defeat or coerce an adversary…. (as well as) complete dominance of global communications and counterspace control.”
Also, ELF waves that HAARP can produce include the exact same dominant frequencies on which the human brain functions. It is documented that these waves can entrain the human brain to induce negative emotions such as anger, fear, disgust, rage, and depression.
HPM – High-Powered Microwaves – include two main technologies; the electromagnetic pulse bomb (e-bomb) and the microwave amplification by stimulated emission of radiation (maser) which uses millimeter wave technology. Both weapons produce power in the megawatt range. At low levels HPM can confuse sensors and at high levels they can burn electronic circuitry. Many aspects of HPM are classified.
IO – Information Warfare-
Infrasonic and ultrasonic weapons- Infrasonic and ultrasonic generators, also called emitters and VLF modulators, are weaponized devices consisting of a directional antennae dish which can send acoustic pulses to a general or specific area. In 1972 France was using infrasonic generators which operated at 7 Hz on its civilian population. By 1973, the British was using the Squawk Box in Northern Ireland. This directional weapon could target specific individuals by producing an audible sound at about 16Hz which turned into infrasound at 2Hz when it coupled with the ears.
In early 1990s, Russia developed a 10 Hz VLF modulator adjustable up to lethal levels, capable of targeting individuals over hundreds of meters, causing pain, nausea, and vomiting.
As far back as 1997, the US DOD has been creating generators in the infrasound and ultrasound ranges (7 Hz and 20-35 Hz, respectively) which can cause these same effects.
These weapons can target the brain, causing changes in brain chemistry which influence thoughts and emotions. Particular frequencies and modulations will trigger precise chemical reactions in the brain, which produce specific emotions in the targeted individual.
Infrasound- Occurs within ELF range from a few hertz up to about 20Hz, which is the lowest limit of human hearing. From 1 to 250 Hz the pain/damage threshold seems to increase with frequency as well as power. Frequency determines what kind of damage occurs whereas power determines how much damage occurs.
Infrasound easily passes through buildings and travels great distances. Natural examples include avalanches, earthquakes, volcanoes, and waterfalls. Whales, elephants, hippopotamuses, and rhinoceros use infrasound to communicate over great distances…. For whales, hundreds of miles. An electronic example would be a large subwoofer. Infrasound is thought to be superior to ultrasound because it retains its frequency when it hits the body.
From about 100 to 140 decibels infrasound causes a variety of biological symptoms. Effects include fatigue, pressure in the ears, visual blurring, drowsiness, imbalance, disorientation, vibration of internal organs, severe intestinal pain, nausea, and vomiting. Higher power levels can liquefy bowels, and resonate internal organs to death. It can also cause feelings of pressure in the chest, choking, irregular breathing patterns and respiratory incapacitation.
High powered, low frequency sound from about 30 Hz to about 100 Hz (just beyond infrasound) causes fatigue, blurred vision, bowel spasms, pain or damage to internal organs, feelings of fullness in the chest cavity, chest wall vibration, difficulty breathing, difficulty swallowing, choking and respiratory impairment. Psychological effects include loss of concentration, disgust, apathy, sadness, depression, fear, anxiety, and panic attacks.
Isolation- isolating people from their support structure and discrediting them are standard part of PsyOp. PsyOp units conduct counterpropaganda in the AO (area of operation). They attempt to diffuse any influence that the TA has on the civilian population in that area. They also seek to establish their own legitimacy. They deny the TA (TI) political, financial, human, informational, and other types of support. The following types of human needs are denied: physiological, safety/security, esteem/value, self-realization, and belongingness.
Lasers- can be IR, UV, and X-ray
LRAD- Long-Range Acoustic Device- aka as the Sound of Force Protection, developed by American Technology Corporation (ATCO), emits a tightly-focused beam of audible sound to an individual or group at up to 1 km. This focused beam is inaudible to others in the area. The power level is up to 150 db. It is portable and can be equipped with an autonomous tacking feature. Intended uses are crowd control and area denial. At high power levels it can cauase loss of equilibrium, migraines, nausea, and vomiting. It is now in use by the military.
Micro-wave hearing- aka “synthetic telepathy,” “Voice of God,” and V2K, Existing radar units can be modified to transmit a beam of pulsed microwave energy into a person’s skull which causes sounds like ticks, buzzes, hisses, knocks, chirps, and words. The sounds originate from within, above, or behind the head and are transmitted to the inner ear via bone conduction (thermal expansion). (Bone conduction is another pathway for sound transmission in humans and other mammals). There is no external noise. It can be applied from hundreds of meters away from a target using man-portable transmitters.
Dr. Allen Frey invented the technology in 1958. The transmitters use pulse-modulated waves at extremely low average power levels. In 1975, Dr. Joseph Sharp proved that correct modulation of microwave energy can result in wireless and receiverless transmission of audible speech.
US Patent 4877027-Hearing System (October 1998) noted that sound can be induced the head of an individual using microwaves in the range of about 100 MHz to 10 GHz. It is effective regardless of the person’s hearing ability. Other patents (US Patent 4858612 and 6587729, 1989 and 2003, respectively) are based on similar scientific principles.
NATO and the US Army consider microwave hearing to be a NLW. Dr. Robert Becker, noted that microwave hearing could be used to drive a person insane.
MIRACL – Mid-Infrared Advanced Chemical Laser
MMW- millimeter waves (frequency range of 30 to 300 GHz, like X rays which can see through walls)
MTHEL- Mobile Tactical High-Energy Laser
Neuro-Imaging Devices
NLP – Neuro-Linguistic Programming
NLW- Non-Lethal Weapons- have also been called non-injurious, disabling measures, immobilizers, strategic immobilizers, discriminate force, less-than lethal, pre-lethal, mission kill, new age weapons, soft kill weapons, slow kill weapons, silent kill weapons, limited-effects technology, neutralizing technology, reduced lethality weapons, low-collateral damage weaponry, etc.
DOD defines them as: “weapons that are explicitly designed and primarily employed so as to incapacitates personnel or material, while minimizing fatalities, permanent injury to personnel and undesired damage to property and the environment…. Non-lethal weapons employ means other than gross physical destruction to prevent the target from functioning.”
They include biological and chemical warfare, directed-energy weapons, communications warfare, information warfare (IW) and psychological operations (PsyOp). Other types include Computer Attacks and Weather Modification.
NLW are to be used in combination. The CFR states: “These weapons must be deployed coherently in synergistic coordination with information/psychological warfare technologies.” Similarly, NATO, in their 2004 and 2006 reports, “Non-Lethal Weapons and Future Peace Enforcement Operations” and “Human Effets of Non-Lethal Technologies” indicates that NLW should be used in combination to increase their effectiveness. The US Military states that the goal is overwhelm the target by attacking all five senses, plus motor and cognitive functions.
Neuroimaging Devices-
PADS – Portable Active Denial System (ADS2)
PEP – Pulsed-Energy Projectile – is DF
Products- PsyOp- Psychological Operations personnel use products to attack TAs. A product is an action, event, or media used to get the attention of a TA and transmit a message. It is expected to provoke a response in the TA to achieve psychological objectives. Products are used as part of a line of communication known as a theme to convey a PsyOp message to a TA.
Project Sheriff- aka “Full-Spectrum Effects Platform (FSEP)- vehicle mounted ADS developed by Raytheon in 2005 for DOD’s Office of Force Transformation (OFT) and the DOE’s Office of Security and Safety Performance Assurance (SSA). It contains a suite of lethal and nonlethal weapons mounted on a single weapons platform. Nonlethal arsenal includes two weapons that can focus tight beams of sound and light. The Long-Range Acoustic Device (LRAD) can transmit intensely focused beam of noise directly into the ear.
The lethal weapon is called the gunslinger- and contains acoustic and infrared sensors to detect the exact location of sound and movement.
PsyActs – psychological actions- aka “F2C”- are audiovisual products consisting of “agents of action” who deliver messages to a TA (target audience or individual). Agents of action follow a set of guidelines while “play acting” to deliver the messages. PsyActs usually utilize multiple people to transmit messages. Themes are presented in a performance similar to a play or movie production. (Hence, the term “surveillance role player”). Words like sets, props, performance, theatre, actors, cast, script, audience, etc. are used.
The military sometimes actually employs people from theatre actor guilds and modeling agencies. PsyActs can occur during rallies, rumor campaigns, group meetings, lectures, theatre, plays, speeches, dances, banquets, fiestas, festivals, religious activities, talks with individuals during interviews on talk radio shows, and other social activities. Messages may be subtly transmitted during these events. Agents of action follow general scripts that can be modified as needed. This type of communication includes “key words” or phrases spoken by the actors in the presence of the TA.
PO- PsyOp- Psychological Operations, – US Military states that the ultimate goal of PO is to modify the behavior of the TA (TI) by destroying their will. This is brought about by continually inflicting pain. This is accomplished by a relentless campaign used to demoralize the TI that will create perpetual feelings of intense fear and hopelessness. The DOD describes this as an “attrition-based approach:” “Attrition is the product or gradual erosion of the will. The victim of this psychological attrition gradually becomes convinced that nothing he can do will yield a satisfactory outcome to a situation.”
In PO, themes are used to transmit painful stimuli (also called triggers) through all his/her channels of communication which a TA (TI) has been sensitized to. Triggers/themes are understood at the strategic, operational, and tactical levels of the campaign and they are passed to various commanders of particular AO if the TA moves towards that portion of the battlespace.
The triggers are part of a behavior modification program called NLP (neuro-linguistic programming) which uses anchors and triggers to promote change. An anchor is created when an emotional state is linked to something such as an object, person, sound, smell, place, color, etc. Once the anchor is established, whatever the individual was exposed to during the anchoring process becomes the stimulus (trigger) that will provoke the emotion. So basically, PO is simply a series of “stimulus-response” interactions.
PO= aka or “information operations,” military deception (MILDEC), effects-based operations (EBO), neocortical warfare, political warfare (PolWar), and psychological warfare (PsyWar), aka command and control warfare (C2W), are a major part of the New War and a core part of CMO (civilian-military operations) that is combined with EW (electronic warfare) and CNO.
Po’s are a planned process of conveying messages to a target audience (TA) to promote certain attitudes, emotions, and behavior. These messages are typically conveyed using a line of persuasion known as a theme. TA (target audience) can be a group or an individual.
PO involve syngergistic coordination of PsyOp, MILDEC (military deception), OPSEC (operations security), and EBO (effects-based operations). And they are in MOOTW, CMO, IW, UW, LIC operations such as counterterrorism and peacekeeping.
The DOD and CFR consider PsyOp a NLW to be used on civilians. PsyOp units work with the civilian population as irregular forces to attack target audience (TA) in the area of operation (AO). PsyOp operators profile TAs and TIs and devise themes to attack their TAs (target audience), which include TIs (targeted individuals). Ultimate goal of PsyOp is to modify the behavior of the TA by destroying their will using a relentless attack consisting of painful triggers. A type of audiovisual product known as PsyAct includes agents of action who carry out plays in the presence of the TA. Every single channel of communication the TA uses for information is interfered with.
In “gang stalking/electronic harassment,” PsyOp is synchronized with EW (electronic warfare with directed-energy-weapons), CNO (computer network operations), and all other instruments of national power. The battlespace is your neighborhood and the war is global.
Early PsyOp research was done by a small private network of think tanks, foundations, and academic institutions, which went into partnership with government agencies and kept most of the results of their studies secret. Some of the institutions that conducted these studies were known to be subversive. Thus, much of the modern PsyOp was built by a small group of private interests, using the social sciences to install a global government. Some of these are the exact same groups promoting the use of PsyOp on civilians.
RF – Radio Frequency Weapons
Rumor Campaigns- used by PsyOp units to isolate TIs. Primary elements include the source, the rumor, and the receiver-repeater (R2).
SBL – Space-Based Lasers
Silent Subliminals- SSSS- or SSSP- considered a NLW by the Army, Navy, and Air Force. The Russian government perfected a type of subliminal-mind control technology, termed “psycho-correction,” in experiments dating back to the 1970s, that could be used to suppress riots, control dissidents, and demoralize opposing forces. It consisted of powerful subliminal messages transmitted by infrasound into the subconscious without interfering with conscious mental functions. Messages are transmitted below the range of human hearing.
US Patent 5159703 (Silent Subliminal Presentation System- aka Silent Sound and Clear Channel) issued. Silent sound can be sent acoustically or vibrationally into the human brain. It is received by the ear but not detected by the conscious mind. It is immediately decoded by the subconscious to influence thoughts and emotions.
Messages can be transmitted over Public Address (PA) systems or standard radio and TV broadcasts.
The Whole Brain Learning Institute (WBLI), noted how the use of Silent Sound by the US DOD during the first Gulf War resulted in the surrender of many Iraqi soldiers. Their Silent Sound products include NLP (neuro-linguistic programming) techniques. The Naval Law Review’s article, “A Primer on the Employment of Non-Lethal Weapons” of 1998 mentions how subliminal mind control is to be used as a NLW. SS can be projected using a hand-held device.
Solid state lasers- usually are pulsed lasers
Sonic projectiles- ELF modulators can function as sonic rifles and canons which can transmit invisible energy over hundreds of meters, causing a blunt impact. Nazis supposedly developed sonic canons capable of shooting down allied bombers. In early 1990s, the Russians developed a 10Hz sonic canon, consisting of an infrasonic generator connected to a radar dish, that projected invisible projectiles the size of a baseball hundres of meters that create a blunt force on a target. This could be adjusted to produce various effects from physical discomfort to death. Effects include nausea, abdominal pains, bone resonation and vomiting.
US has developed these; ABC News on 7/16/2002 announced in their “Sonic Bullets: Acoustic Weapons of the Future” that the US military possessed a sonic canon: “This new technology is likely to affect almost every aspect of our lives, in ways we can only begin to imagine.”
Surveillance- (aggressive surveillance)- any system that can monitor or track the movements of individuals or their property. These include satellites, UAVs, millimeter waves, radar, x-rays, radio waves, various sensors and nanosensors, smart dust, etc..
Aka – “global persistent surveillance”
Swarming (aka “battleswarm” or “tactical swarm”)- It includes various dispersed nodes moving in unison at a fast pace from all directions to form an intense assault on a target. This rapid movement of nodes upon a target is known as a “pulse.” Electronic devices connect each node to an intelligence and surveillance system and each node can receive instructions from a commanding faction (the C4ISR system). The MITRE Corporation has worked on creation of a battleswarm algorithm for the DOD which can optimize, engineer, and automize the swarm by computer and/or artificial intelligence (AI). (MITRE also worked on the GIG for DOD).
TA Profile- experts in the behavioral sciences, religion, culture, politics, linguistics and other subject areas help profile the TA (target audience).
THEL – Tactical High Energy Laser
Themes- PsyOp units deliver
UAVs- Unmanned Aerial Vehicles (drones)
Ultrasound- is sound that occurs beyond human hearing, or about 20kHz. Animals such as dogs, dolphins, and bats can hear ultrasound. Some whales and dolphins use ultrasound to detect their prey and to stun them. Ultrasonic weapons produce the following effects depending on frequency and power; tickling in the mouth/nose area, discomfort, heating of the skin, nausea, abdominal pains, vomiting, and bone resonation.
1997 article entitled, Non-Lethal Weapons for Military Operations Other Than War, by the Federation of American Scientists, state: “Aimed at the head, the resonating skull bones have caused people to hear voices.”
VMADS – Vehicle Mounted Active Denial System
Terrorism- The US and its allies will terrorize the civilian population to achieve political objectives. The DOD stated: “Some IW activities, such as terrorism and transnational crime, violate international law. US law and national policy prohibit US military forces or other government agencies (OGAs) from engaging in or supporting such activities. However, since our adversaries employ terrorism and transnational criminal activities against the interests of the United States and its partners, these activities are included… as examples of the range of operations and activities that can be conducted as part of IW.”
Similarly, the US Marine Corps document, “Multiple-Service Concept for Irregular Warfare” (2006) states: “frightening the population into inactivity is sufficient to (achieve) our goals.”
TPD – Tactical PsyOp Detachment- team of about 13 personnel with a captain and staff sergeant. It is comprised of several TPT (Tactical PsyOp Teams) and provides tactical PsyOp support to brigade and battalion-sized units in support of Special Forces. TPT conducts mission assessment, determines distribution priorities, and tracks the various products that have been distributed throughout the AO. All teams maintain contact with each other. And the TPD is in constant communication with other forces such as the TPDD, POTF, or TPT during the entire operation.
TPT- Tactical PsyOp Team- small group including team leader, his assistant, and a PsyOp specialist.
TPDD – Tactical Product Development Detachment
USAINTC – USA Intelligence Command. Various MIGs were combined to form USAINTC in 1965, which took over job of spying on American citizens and dissidents. Was connected with various local law enforcement all over America.
Local law enforcement
Private contractors such as InfraGard
That ‘portion of the population recruited’ are controlled via a Sentient World Simulation. Remember the NSA spying scandals? They created a mirror world of all of us in a super computer. The reasons the US Government is causing torture, pain and fear might surprise you, too. According to a recent post on Dr. Robert Duncan’s Facebook timeline, he states its his neural network simulator is netting brains and cloning minds and its necessary to converge us human animals faster via directed energy to converge the entire system. He states that the government did this to us and explains why satanic occult mythology of torture was necessary to fool you so as to misdirect blame and further states that the Bible warned us citing ‘Many will be fooled’ He even mentions that his simulator is working great and there might not be any intelligent life in existence for future social engineers, all by the NSA and various universities, the DHS & DoD. I took a screenshot if you’re interested in seeing it.
US Govt Develops a Matrix-Like World Simulating the Virtual You
https://web.archive.org/web20170905001521/http://cointelegraph.com/web/20170905001521oe_/https://cointelegraph.com/news/us-govt-develops-a-matrix-like-world-simulating-the-virtual-you.
Quote: “This not only invades our privacy but can also causes severe damage to society. Knowing that there is a copy of each of us in the virtual world, that can think and behave like us, and whose actions can be predicted by the authorities is a far more intimidating invasion. This will have a negative impact on societies by reducing trust between citizens and government, as well as among people — altering normal human behavior, since the populace will be conscious of the fact that there is a copy of them in a virtual world without their consent.
Another thing in the back of everyone’s minds could also be the possibility of a virtual copy doing something that you are doing right now. Perhaps a simulated version of me has actually written this article? The line between actual reality and virtual reality will surely blur as more and more information is collected.”
How the Government Predicts The Future – Inside the “Sentient World Simulation” The Corbett Report https://www.corbettreport.com/how-the-government-predicts-the-future-inside-the-sentient-world-simulation/.
FAQ: What is Sentient World Simulation? – https://www.raptureready.com/faq-what-is-sentient-world-simulation/. The program is called Sentient World Simulation. Defense, intelligence and homeland security officials are constructing a parallel world, on a computer.
Sentient World Simulation and NSA Surveillance – Exploiting Privacy to Predict the Future? | Emerj – Artificial Intelligence Research and Insight
https://emerj.com/ai-future-outlook/nsa-surveillance-and-sentient-world-simulation-exploiting-privacy-to-predict-the-future/
Microsoft Word – SWS-Concept Paper-Short-Aug22-2006.doc – AC2_100606.pdf
https://krannert.purdue.edu/academics/MIS/workshop/papers/AC2_100606.pdf.
US Govt Develops a Matrix-Like World Simulating the Virtual You
https://web.archive.org/web20170905001521/http://cointelegraph.com/web/20170905001521oe_/https://cointelegraph.com/news/us-govt-develops-a-matrix-like-world-simulating-the-virtual-you