Neurophysiologic and Electronic No-Touch Torture Report (Dr. Robert Duncan, 2015)
The Executive Summary: Neuropsychological and Electronic No-Touch Torture Report Based on “The Torture Memos” and the Senate Intelligence Committee’s Declassified “Torture Report”
By Robert Duncan, A.B., S.M., M.B.A., Ph.D. 04/2015
Download: PDF, DOCX | Visit drrobertduncan.com.
Torture is a horrific topic and most minds will turn away from it because it can’t be
comprehended that humans can be motivated, or computer programs can be run to do this to
other sentient beings. Just when we believed we were becoming more civilized as a culture, the
technology for torture has advanced more than a hundred fold in recent decades.
This summary will get into ‘the minds of the dishonorable monsters’ of the psychology of
torture. Those like Dick Cheney who helped authorize it under certain administrations and
regimes of the U.S. government which have been proven to be criminal under U.S. law, treaties,
and the International Criminal Court. There are many people involved in the conspiracy and
cover-up including General Hayden.
The full report discloses the spectrum of techniques of interrogation and torture used by
the U.S. and its allies. The United States government will officially deny the claims of this “no-
touch torture report” but in time it will stand firm.
The technologies used are still classified as state secrets and will not be discussed in this
summary. The torture methods have been leaked through thousands of American citizens who
have survived the no-touch torture programs. The research and testimony has been accumulated
since 2002 and merely used as examples but the names of the victims are withheld.
This report will not use skewed, misleading language such as “enhanced interrogation” to
describe the torture techniques.
Why torture? The CIA claims it works. The assumption is that it works to gain actionable
intelligence. Torture is often used for revenge, punishment, interrogation, and behavior
modification. In other terms torture is used to remove the continuity of thought to confuse the
target to reveal information, erase brain patterns such as values and beliefs, or to break down the
human spirit to make them submit and obey their handlers.
The downside of torture is that the countries that do it lose “moral soft power” in world
politics. Without due process, over 25% of those reported in the Senate Torture Report were
declared innocent. Blowback is always a repercussion of torture. Torture often takes a long time
to affect the target from months to years. Torture has shown to be unreliable except for getting
false confessions and bad information but the U.S. and its allies are improving on their tactics
and techniques.
The purpose of this report is to draw the parallels between physical torture techniques and
no-touch torture methods used in secret by governments who possess the technologies that still
go on today. This is a brief summary of offensive psychological and information warfare
methods using traditional methods and modern cybernetic techniques while exploring hyper-
game theory to walk the target to the desired path: leak intelligence, commit assassinations, or
change beliefs.
Numerated Torture Methods for Interrogation and Behavior Modification
(A comparison between physical and no-touch torture tactics)
1. Induction of Depressive/Manic states
The idea is to shake up the emotional states of the target because different information can be
accessed at each state. Making the target feel despair and helplessness is the objective. This
cycle of hope building and then breaking is done in many ways. The techniques between the
physical methods and the no-touch technological methods are similar. Speech is very important
during this process of emotional manipulation. Such examples are, “We have imprisoned you
without due processes or hope of it. You are indefinitely detained.” Hope building examples
include, “Sorry. We have mistaken you for someone else. You will be compensated for false
imprisonment and torture.” The main difference between the cybernetic technology and
physical is that emotional state clusters can be entrained into the target mind which speeds up the
process. The communication is done differently but perceived as human speech. In the no-touch
torture methods it is helpful if the target is labeled with mental illness that is being created for
discrediting purposes so as not to draw human rights groups’ attention.
2. Memory Erasure
The military and CIA have been researching memory erasing drugs for half a century. The focus
of this summary report is on interrogation. Memory erasure is an important technique during
interrogation. It is used in combination with sleep deprivation. There are many drugs that have
been developed for physical memory erasure. One such interrogation method requires acquiring
information from the target while on these drugs and recording the subject. After a sleeping
cycle, the interrogator claims that the target has confessed. Of course the target remembers
nothing of their conversation. The interrogator will play samples of the subject’s conversation
back to them making the subject believe that the interrogator knows more than they do. Similar
techniques are used in the wireless, no-touch torture and interrogation programs. The cybernetic
methods of memory erasure have additional purposes. The memory erasure can be used on the
cybernetic target to make the target believe people have broken in and moved their belongings.
While physical black bag jobs do occur, it is a way to make the target more paranoid.
3. Electricity and Shocks
Pain and fear of death are common tactics during interrogation. Shocking by electricity is a
traditional method of torture and exposed in the CIA’s secret prisons. Shocking the testicles and
nipples are the most common due to their sensitivity. Interestingly, the thousand of interviews of
no-touch torture involves “stings” and “shocks” to various parts of their bodies over long
durations.
4. Fear and Terror
There are many techniques to induce extreme fear in the target. In physical renditions dogs,
power drills, guns, insects, mutilation, blow torches, water boarding, suffocation, mock burials,
and mock executions are just a few the United States government have used. Remember that
many targets of torture die from the physical effects. It is torture to death.
Let us compare the no-touch torture methods used to inflict the same terror and mental
anguish. In several of these techniques the target needs to hear their handler’s voice. This report
does not describe the technologies used to broadcast voices to the target at a distance. While the
subject can be broadcast mental images to their mind using hypnosis and other suggestions as
well as visual entrainments, the more invasive controls of the brain manipulation technologies
can be used to entrained the brain’s autonomic nervous systems such as not breathing causing the
target to not be able to sleep from fear of suffocation equivalent to water boarding. The neural
linguistic programming can add fears such as heart attack, stroke, and cancer threats. Even motor
cortex mapping can cause twitches in any part of the body. One example used a swift neck
movement with a voice transmission, “We are trying to break your neck.” Directed energy
effects such as Active Denial System can make the target feel that they are on fire indefinitely
without the target dying from burns. Maximum pain and torture weapons have been evolving.
Every drug effect can be artificially induced into the target mind including those of poisons.
5. Imprisonment and Isolation
Isolation is commonly used as punishment in prisons. Many whistleblowers like Bradley
Manning suffer this condition. In soft interrogation it is used to get the target to talk to their
interrogator since humans have the need for companionship. In no-touch torture the target is
driven from their friends and family using different techniques in order to isolate them so that the
electronic mind control has more effect on their psyche. Like in Guantanamo, the target
becomes isolated losing their job and medical care. Part of the method involves slander in their
community. They end up on the most part in poverty and paranoid about doctors and other
people from false correlations that are purposefully induced into their lives. Isolation is also a
form of sensory deprivation which will be discussed later. Days and weeks lose their meaning.
6. Sexually Disturbing Tailored Pornography
The Summary of the Senate Torture Report disclosed the disgusting revelations that in the secret
torture prisons the targets were forced to perform homosexual acts on each other against their
will and religion in order not to be beaten or killed. This is a common break down tactic of belief
systems and the human will. In no-touch torture the techniques are more psychologically
specialized for each target. Most common examples include homosexual targets that are forced
with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are
forced to view child pornography in their minds. And vice versa is true, that heterosexual targets
are forced to view homosexual sexual acts like in the secret U.S. torture prisons.
7. Mutilation
Also mentioned in the declassified report on torture was mutilation of the human. Cutting the
naked target’s penis and scrotum, pulling nails or teeth is common. In no-touch torture
mutilation is done by trickery. Let us look at a couple examples. There have been several targets
who believed that the microwave hearing effect and other voice induction methods were done by
microchips implanted in their teeth or ears. They had all their teeth pulled because they believed
it was a technology called bone conductance. Others have poked out their ear drums in the belief
they had micro implants in their ears. There are many more examples of trickery used to make
the targets mutilate themselves.
8. Personal and Spiritual Defamation
In physical torture the CIA and other groups use propaganda and defamation of character for
those they oppose. For detainees they try to disenfranchise the target from their religion. They
will defecate on their Bible or Koran for example. They might say, “Why is your God not saving
you?” In no touch torture and behavior modification they might try to make an atheist believe in
god. It is just a mechanism to alter belief systems for control and experimentation. Perhaps the
target may wish to confess their secrets to a “voice of god weapon”. Information warfare covers
the gamut of electronic communication as well. The government training exercise uses language
like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”,
“use deception”, “ruin business relationships”, and “post negative information on appropriate
forums” – in a malicious effort to target bloggers, activists, journalists, social event organizers
and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.
9. Psychological Intimidation
This is a topic for a target at the beginning of the trials and programs. Physical break-ins are
common even if the target has an alarm system. The NSA has used stalking of foreign officials in
the past for economic gain. The FBI does black bag jobs to invade a home without a warrant.
The point is to let the target know they are being watched and to increase their paranoia. The
NSA easily hacks all computer systems and causes harm to the victim’s intellectual property and
their relationships from that endpoint. In the no touch torture false correlations between pain and
a neighbor coming home can be induced.
10. Rape
Rape is a common practice in torture. It causes much psychological trauma. In the United States
methods of rape in their military and CIA secret prisons it is often relabeled. It is commonly
done by prods but “rectal rehydration” is the more common misnomer. Often they call it forced
feeding through the rectum but it is meant to induce psychological scaring and trauma. Several
have died from the technique due to rectal bleeding. In no-touch torture the psychological
trauma of simulated rape takes on different forms. Using technique often called EEG-
heterodyning the targets will receive molestation effects of their genitals. In men this can be the
anus and genitals. Similarly women can be wirelessly raped by the analogous function of
perception.
11. Dietary Manipulation, Forced Weakness and Sickness
The idea behind dietary manipulation is to weaken the target. This is easily done in a physical
setting but in no-touch the hunger trigger needs to be suppressed. Sometimes a false correlation
between eating food and sickness is induced to make the target believe they are being poisoned.
However, poisoning is common in physical renditions too.
12. Repetition
Verbal breakdown is most important during interrogations and torture. Obviously speaking the
language of the target is necessary. This is why there are interrogators in all languages.
Repetition is an important neural linguistic programming interrogation tactic to influence the
target mind. During the breakdown process, threats to kill and to torture the target’s family or
friends are common. Repetitious questioning and breakdown phrases are automated in both the
physical and no-touch versions of torture. An interesting technology that is used for no-touch
torture is called chatter bots. Chatter bots, an artificial intelligence program, automate much of
the repetition so that the interrogators don’t drive themselves crazy during the neural linguistic
torture and programming phases. Let us not forget the Chinese Water Torture, a single drop of
water on the forehead of the detainee for months. Repetition is a form of torture.
13. Sensitization of Pain Impulses
While the reverse can be obtained, optimizing perceived pain and misery is the objective in
torture. Each trauma adds to the overall misery throughout life. Optimization of pain has been
studied by the military and intelligence agencies. In the past the CIA has used drugs such as
LSD to enhance fear and terror in the subject. Other methods such as hypnosis can increase
perceived pain and the power of suggestion such as telling the subject his pinky finger is going to
be cut off before it is done. In no-touch torture the same psychological manipulations are
exerted. Subliminal and overt suggested are often told to the subject before the directed energy or
EEG heterodyning pain inductions in order to maximize their effectiveness.
14. Sensory Overload and Deprivation
Again, this technique of overloading or depriving the human of sensory stimulus is ubiquitous in
torture around the world not just in U.S. secret prisons. Torture subjects in the United States have
reported the use of repetitive bad music and noise campaigns. An unusual torture technique used
in the U.S. secret prisons was of a use of a plastic suit filled with ice while they beat the
target. Ultra bright lights for days on end in the prison and hot/cold temperature changes in the
environment are frequent. In no-touch torture, the target’s brain is forced to release dopamine
which causes pupil dilatation. This acts as a sensory overload. For example the non-lethal
microwave weapons research done by a professor in University of Nevada has shown this
capability. Body metabolism can be altered with these weapons causing cold and hot
flashes. Targets of no-touch torture often hear endless tinnitus.
15. Sexual Humiliation and Lack of Privacy
Often used in common prisons is a lack of privacy. It is both necessity for security and a form of
sexual humiliation. Also in prison many people are raped. No-touch torture offers the same
sexual humiliation and lack of privacy by using through wall radar, cameras, and EEG visual
cloning to let the target know they are being watched. Degrading comments are often used on the
no-touch torture subjects while they are naked or in the bathroom.
16. Maximum Sensory Pain Techniques
Basic torture involves brutalization, i.e. physical strikes, kicks in the groin, pepper spray or tear
gas, etc. Anything that involves maximum pain is the objective. Amazingly, these same basic
tortures can be done wirelessly into the human mind. All forms of sickness have been reported
without any real illness behind the suffering. All suffering can be entrained into the minds of no-
touch torture subjects.
17. Sleep Deprivation
This is the number one torture method along with the popularity in the press of water
boarding. This is done in every country that uses torture. The United States is number one in
torture since they are currently the world’s only superpower. A repetitive sleep deprivation cycle
is generally done 180 hrs/7.5 days at a time in the physical renditions, or in no-touch torture five
days awake and two days of sleep. Sleep deprivation accomplishes the objective of memory loss
during interrogation and induces hallucinations which help with the interrogation process. In
behavior modification and programming it is necessary too.
18. Stress Positions
Keeping detainees handcuffed above their head and to walls so that they must stand for days is a
common ploy in torture. These types of poses are called stress positions. They can be mimicked
in no-touch torture. An example of one such trick requires the target to believe they can deflect
radar energy using pots or pans and that it is directional. The target is being given an ample
amount of pain until their hands and arms are spread apart holding the pans trying to block the
signals. They must maintain that position in order to get any relief from the torture signals.
However the stress position itself is physical torture. Often accompanying this technique are
voices saying to the target, “You are doing it to yourself.”
We will finish off this summary of U.S. and its allies’ torture, interrogation, and behavior
modification experimentation with ideas of why they are done to the general public and falsely
accused detainees. Anyone can be put into these programs. Justice and rule of law does not exist
at the highest levels of government. Treaties are worthless because the #1 agreement in the rules
of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead
by example.
No-touch torture uses the same interrogation tactics as physical interrogations but with
some new twists. Techniques such as “Jeff and Mutt” a.k.a. “Good Cop Bad Cop” are used. The
bad cop tortures the target and the good cop tries to gain their trust. In mind control, trust games
are commonly employed to manipulate the beliefs of the target. Creating hatred of groups
through false correlations and deception is a common CIA method of trickery.
In the CIA programs, the target is put through these phases as written in the
documentation, “Disorient and confuse the target. Use them for our purposes, and then dispose
of them in any way possible.” We can only surmise by our sample set of a thousand people what
“dispose” means: prison, suicide, or perhaps a mental hospital. Coercing and torturing people to
suicide is very common. Both tactics in physical or no-touch torture involves plausible
deniability.
The no-touch interrogations are better than physical rendition techniques for exposing
support networks. Traditional NSA tracking of email and phones calls are useful but if the targets
are taken into a secret prison they can’t contact their networks. In no-touch torture, the target will
contact everyone who might help them. Then those relationships can be destroyed to isolate the
target. All these techniques rely on the target having a fear of death and pain.
Deception is very important during interrogation. In physical interrogations the targets
are often drugged. This creates the confusion necessary to pull off certain trickery. In terrorist
interrogations, for example, the CIA uses fake newspapers to make the target believe whatever
event they were suspected of plotting had already happened, obviously looking for a
confession. Sometimes the government in charge of the torture is looking for a political gain
through a false confession. None-the-less false flag operations are commonly used in both forms
of torture and interrogation. The trick is to make the target believe another foreign country is
doing it to them. In no-touch torture the trick is to make them believe someone related to them is
behind their suffering.
Voice transformation and morphing is an interesting technology also used in both
physical and wireless interrogations. It is a form of deception used against a target to trick them
into believing that they are speaking to real people that they know. It has been used in war to
trick generals. Obviously spoofing email and other identities on internet forums can be used in
this manner too.
Finally, the topic of human experimentation for improving weapons, torture,
interrogation, and social disruption methods will be breached. Most of the techniques mentioned
above work most effectively if the target has no SERE training (Survival, Evasion, Resistance
and Escape) or psychological understanding of the methods to influence the human mind.
Unfortunately, every sample point in the world’s society needs to be studied to improve the
weapons systems. This is why many random people are put into the torture and mind control
experiments. There are some devious uses of a secret army of remote controlled assassins in
every country in the world. The samples must include different education, language, culture, and
economic factors. Obviously, silencing dissidents, oppositions of political parties, and
whistleblowers are included in the lists of applications. The most disturbing of the trends in
torture is testing and improving it. No-touch torture is much more complex than physical torture.
Testing design flaws and weaknesses of the signal intelligence is one reason why it is necessary
to test on innocent targets. Often the subject will be taunted by the statement, “Try to stop us.”
This statement forces the torture subject to try to figure out shielding and jamming techniques to
stop the wireless torture and helps the weapons designers to improve on the system.
However, the psychological and perceived physical pain is only half the story with no-
touch torture. It also involves a set of scripts, mind games if you will, to walk the target to
murder and/or suicide. This is called “Hyper Game Theory”. It is used in war games to
determine how to control your enemies and targets. Game Theory can be used on governments,
individuals, or for determining propaganda to alter cultures. The experiments on the public
provide a means to test the efficacy of these scripts and determine under what circumstances to
use them.
One last comment on why “We must guard against the acquisition of unwarranted
influence, whether sought or unsought, by the military industrial complex” as President
Eisenhower warned. During these torture programs run by the United States and its allies,
accurate “truth” data points need to be used to judge the efficiency of the interrogation methods.
This is why there is a dispute between the CIA and Senate Intelligence Committee reports about
the usefulness of torture. Subterfuge by the CIA hacking into the senate oversight committee’s
computers is a big deal; a rogue agency has been formed. Data fusion centers, Homeland
Security Data Fusion Centers, NSA, and FBI collect data on Americans. This data in turn is used
during torture and interrogation of Americans in no-touch torture.