Gang Stalking Redefined

Gang Stalking is a covert investigation that is opened on an individual, or a list that a Targeted Individual is placed on.

Jane Clift

Mrs Clift’s name in the “Violent Person Register”. She was rated as medium risk, her name to remain on the register for 18 months.

Individuals can be placed on such lists designating them as potentially Violent Person’s or persons who have displayed inappropriate behaviours, and it flags them as individuals to be watched. An innocent person can be added to a Violent Person’s Registry without knowing it, and given a Violent Person Designation, which will flag and send their names out to every area they visit. Jane Clift was targeted this way and spent four year clearing her name.

Individuals without their knowledge are being placed on lists. In many countries these lists fall under Occupational Safety and Health.

http://www.wcb.pe.ca/photos/original/wcb_wpviolence.pdf
The Canadian Center of Occupational Health and Safety

Workers have the ’ right to know ‘ all risks and safe work procedures associated with the job. This may involve identifying individuals with a history of unpredictable or violent behavior.

The identity of the person and the nature of the risk must be given to staff likely to come into contact with that person. While workers have the right to know the risks, it is important to remember that this information cannot be indiscriminately distributed.

Other countries have such lists or similar lists. It seems that employers, educational facilities, and community centers are in some cases placing innocent individuals on such lists as a means of retaliation, silencing, or controlling members of society.

http://www.harassment101.com/Article5.html

They both are victims of an increasingly popular employer weapon against whistleblowers: the psychiatric reprisal.

The individual is then placed under overt and covert forms of surveillance. Everywhere the Targeted Individual goes, their name is flagged. In a big city this could mean that thousands upon thousands of people are getting a flag with the targets information. The person is followed around 24/7. Foot patrols and vehicle patrols are used to follow the Individual around, as part of the monitoring process. During these patrols a one handed sign language is used to assist the citizen informants with communicating to each other. They will use this to silently communicate to any business the target enters, or other areas.

Gang Stalking can be viewed by the Targeted Individual as a systemic form of control, which seeks to control every aspect of a Targeted Individuals life. Gang Stalking has many similarities to workplace mobbing, but takes place outside in the community. It called Gang Stalking, because the target is followed around and placed under intrusive and directed surveillance by groups of organised “Covert Human Intelligence Sources” also known as Citizen Informants 24/7. Using anti-terror laws to spy on ordinary people.

Many Targeted Individuals are harassed and placed under surveillance in this way for months or even years before they realise that they are being targeted by an organised protocol of harassment.

What happens during this surveillance is very similar to what happened to many innocent individuals in the former East Germany or Activists and Dissidents in Russia. Many innocent people in the former East Germany would be targeted for these harassment programs, and then their friends, family, and the community at large would be used to monitor, prosecute, and harass them. The same persecutions and harassments are now happening in democratic countries.

Once a person is flagged the community becomes hypervigilant, and within this structure there is a targeted and illegal protocol of harassment that happens. Electronic means are used to monitor, harass and torture the target. When the target tries to describe what is happening to them, it sounds as if they have had a mental breakdown. The reality is electronic means are being used to make it appear as if the target has had a breakdown.

In Russia similar means were used by the state to declare activist, dissidents or anyone they thought to be an enemy of the state as mentally unfit and many were institutionalised using this form of systemic control.

The closest thing to Gang Stalking that democratic countries have seen before this is McCarthyism, Cointelpro, and RED SQUAD programs. Red Squad programs were used for monitoring, and harassment of various groups. They have been in place for over a hundred years, and they also employed Covert Human Intelligence Sources.

Civilian Spies, also known as “Covert Human Intelligence Sources” are recruited from every level and sector of society. Remember anyone the Targeted Individual comes into contact with gets a warning about the target.

Just like with Cointelpro investigations, everyone in the targets life is made a part of this ongoing never ending, systemic psychological harassment and manipulation of the target. These actions are specifically designed to control the target and to keep them in line. These actions are also designed to destroy the target over years, make them look crazy and leave them with no form of support. The individuals around the target carry out actions and tasks as they are instructed, without realising that the structure is psychologically designed to break the target down.

For the targets of this harassment, Gang Stalking is experienced as a covert psychological, emotional and physical attack, that is capable of immobilizing and destroying a target over time. For the state it’s a way to keep the targets in line, control them, or destroy them.

Worldwide programs of control and conformity have been used with equal success and lethality. What we are seeing now is a global co-ordinated and organised effort of control and conformity. Many countries around the world are currently using a model of policing called: Community Oriented Policing. It’s described as a systemic approach to policing. It focuses on instilling a sense of community within a geographically located neighborhood. Communities come together and discuss what values they would like to have in their community, community development, and it’s also a time to discuss any problems that might be happening in a specific area. If a problem is identified an investigation might be opened. These local programs in many countries have been forming partnerships with other government run programs at, provincial, state and federal levels.

http://news.cnet.com/8301-13578_3-20000550-38.html

With agents going undercover, state and local police coordinate their online activities with the Secret Service, FBI and other federal agencies in a strategy known as “deconfliction

A process called Deconfliction allows them to share information. Reports of Gang Stalking are not only coming in from democratic countries, but they are coming in from many other countries as well.

http://www.eff.org/files/filenode/social_network/20100303__crim_socialnetworking.pdf

The modern day systemic form of control could only be funded at governmental levels, just like it has in other societies where these similar types of harassment programs have been implemented. It’s all part of a system of control and conformity that has been in place for many years. A system of control with many local groups and appendages taking part. Many targets report that their information is passed and shared between country boarders, and that the surveillance continues even when they travel.

What are the goals of Gang Stalking?

The official goal is listed as a means of flagging or investigating dangerous, or potentially dangerous individuals. The real goal however seems to be to isolate the target from all forms of support, so that the target can be set up in the future for arrest, institutionalisation, or forced suicide. Other goals of this harassment is to destroy the targets reputation and credibility. Make the target look crazy or unstable.

Other goals involve sensitizing the target to everyday stimuli’s as a form of control, which is used to control targets when they get out of line. Once the target is sensitized, the Citizen Informants have an easier time identifying the Targeted Individual in public. The targets sensitivity is most likely added to their file as a warning marker and sign to watch for future reactions to.

These programs are designed to make the targets of this harassment vulnerable, they want to make them destitute. The secondary goals seems to be to make the target homeless, jobless, give them a breakdown, and the primary goals seems to be to drive the target to forced suicide, just like what they did with some of the targets of Cointelpro. It’s a useful way of eliminating perceived enemies of the state.

What are other Names for Gang Stalking?

There are many names for this form of systemic control and harassment. Under the Gang Stalking label you will also find such terms as Violent Person’s Registry, Organised Stalking, Cause Stalking, Multi-Stalking, Community Mobbing, but it’s all part of the same harassment protocol. What many people do not realise is that Gang Stalking is just one appendage of this systemic form of control. There are other forms of control used to repress, and keep individuals in line. Other forms or appendages include, but are not limited to: Mobbing, Cointelpro, The Buzzsaw, Covert War, Electronic Harassment, etc. These are the just some of the names being given to a very old game, that is once again being played by governments on their unsuspecting citizens.

How are targets chosen?

Officially targets can be flagged and investigated for suspected, or reported behaviours. Unofficially the Targets can be chosen because of many other reasons. They can be chosen for political views. They can be chosen for whistle-blowing. They can be chosen because they belong to a dissident movement. They can be chosen because they asserted there rights at work. They can be chosen because they made the wrong enemy. Were considered to be too outspoken, unwittingly investigated something that the state did not want investigated, signed a petition, wrote a letter. They were deemed as suspicious by a civilian spy/snitch and their names were handed over.

It’s becoming apparent that targets might be chosen for this systemic form of control, if they are not already in some way a part of this controlled system. Eg. Many Targeted Individuals seem to be unaware that large chunks of our society are now being used as Citizen Informants.

Who gets targeted?

Targeting can happen to anyone in society. In the past primary targets of programs such as Cointelpro have been minorities. Targeting however can happen to anyone. Individuals are often targeted for being outspoken, whistle blowers, dissidents, people who go up against wealthy corporations, woman’s groups, (single) women, minorities, extremists, conspiracy theorists, anti-war proponents, individuals identified or targeted as problems at these community meetings, and other innocent individuals. The majority of the targets are often not aware that they are being targeted in this way. When a target moves, changes jobs, the harassment still continues, because they are still flagged. Every time the target moves, the same information, lies, and slander will be spread out into the new community and the systemic monitoring and harassment will continue.

http://gangstalkingworld.com/Forum/YaBB.pl?num=1205738832/0

Who takes part?

People from all walks of life are being recruited to be the eyes and ears of the state. People from all races, ages, genders. Every sector of society that you can think of is a part of this. Civilian Spies/Snitches include, but are not limited to: General labourers, the wealthy, bikers, drug dealers, drug users, street people, punks, hip hop culture, KKK, black activists, church groups, youth groups, Fire Fighters, police officers, lawyers, health care workers, store keepers, maids, janitors, cable installers, phone repair persons, mail carriers, locksmiths, electricians, etc. There really is no minimum or maximum age range. An article came out recently in the UK, saying they were recruiting children as young as eight years old to be Covert Human Intelligence Sources.

Public individual that the Targeted Individual comes in contact with are given this warning. Some of these citizens might be recruited via programs such as Citizen Corp, Weed and Seed, Citizens On Phone Patrol, (COPP), City Watch, T.I.P.S. Many started with good intentions to help patrol and monitor their cities and neighbourhoods. Others are recruited via their families, others at school, others at work. Since every sector, class, race in society takes part, recruitment is multi-faceted.

Many do not understand or care that the end consequence of this flagging, this harassment protocol is to destroy a person.

Why people participate in Gang Stalking?

There are many reasons that someone takes part in this activity.

1. Some do it for the sense of power that it gives them.

2. Others do this as a way to make friends and keep friends. It’s something social and fun for them to do. Many in society use the one handed sign language to communicate and it’s very effective in breaking down race, gender, age, social barriers.

3. Others are forced or black mailed by the State or the police into taking part.

4. They are told that they are part of homeland or national security. They are told that they are being used to help keep and eye on dangerous or emotionally disturbed individuals. They see themselves as heroic spies for the state.

Civilian spies can come from a variety of different programs such as the Citizen Corp, Citizen On Phone Patrol COPP, Weed and Seed, T.I.P.S., City Watch or some other centralized government program used for patrolling and monitoring cities.

5. Others are just local thugs or Informants who are already being used for other activities, and their energies are just diverted over into these community spy programs. Eg. Some may be given the choice of Spying for the State or the police vs going to jail.

6. Others are told outright lies and slander about the target to get them to go along with ruining the targets life.

7. Many are however just average citizens who have been recruited by the state the same way citizens were recruited in the former East Germany and other countries. It’s the way the society is.

What are some techniques used against targets?

A few of the most common techniques are listed below.

a) Classical conditioning.

Getting a Targeted Individual sensitized to an everyday stimuli. The targeted individual over a period of months, or even years is negatively sensitised to an everyday stimuli, which is then used to harass them. It’s used out in public to let them know they are constantly being harassed and monitored. Some examples of everyday stimulus that might be used include: sounds, colors, patterns, actions. Eg. Red, white, yellow, strips, pens clicking, key jangling, loud coughing, loud whistling, loud smacking of clapping of hands together, cell phones, laptops, etc.

b) 24/7 Surveillance This will involve flagging and following the target everywhere they go. Learning about the target. Where they shop, work, play, who their friends and family are. Getting close to the target, moving into the community or apartment where they live, across the street. Monitoring the targets phone, house, and computer activity. Surveillance Policy.

c) Isolation of said target.

This is done via reports. The reports are meant to warn the community, but they act as little more than slander campaigns. They present a one sided assessment of the targets behavior and activity. The target is never allowed to tell their side of the story or to clear their name. This one sided assessment can include false reports, lies, and legitimate incidents where the target was set up. Eg. People in the targets community are told that the target is crazy, dangerous, a thief, into drugs, a prostitute, pedophile, in trouble for something, needs to be watched. This very flagging in and of itself is capable of creating paranoia, and false interpretation of everyday incidents.

Files will even be produced on the target, shown to neighbours, family, store keepers.

d) Noise and mimicking campaigns.

Disrupting the targets life, sleep with loud power tools, construction, stereos, doors slamming, etc. Talking in public about private things in the targets life. Mimicking actions of the target. Basically letting the target know that they are in the targets life. Daily interferences, nothing that would be too overt to the untrained eye, but psychologically degrading and damaging to the target over time.

e) Everyday life breaks and street theatre.

Flat tires, sleep deprivation, drugging food, putting dirt on targets property. Mass strangers doing things in public to annoy targets. These strangers might get text messaged to be at a specific time and place, and perform a specific action.

It might seem harmless to these Citizen Informants, but it could be causing great psychological trauma for the target. Eg. Blocking targets path, getting ahead of them in line, cutting or boxing them in on the road, saying or doing things to elicit a response from targets. Etc. It’s like the death of a thousand paper cuts. One or two minor incidents will not cause any harm to the target, but over time the target is slowly worn down.

Where does the support or funding for this come from?

Though the systemic harassment that Targeted Individuals refer to as Gang Stalking is immoral and unethical in nature, programs such as this in democratic countries, and none democratic countries have always been funded by the Government. They are the only ones with enough money, coordination, and power to keep such a system in place. These Co-ordinated efforts then join hands with others for this systemic form of control and harassment.

“Ruling the community with an iron fist. “Savvy law enforcement types realized that under the community policing rubric, cops, community groups, local companies, private foundations, citizen informants and federal agencies could form alliances without causing public outcry.” Covert Action Quarterly, summer 1997.”

Ruling the community

“You mean to tell me that it is legal for corporations from the private sector to team up with local law enforcement officials in efforts to spy on innocent members of our society? You also mean to tell me that the synthesis of law enforcement authority and the drive of for-profit companies operate under little to no guidelines or restrictions and it is unclear to whom they are responsible to?”

ACLU Blog

What can you do to help?

1. If you know someone who is being targeted in this way please don’t go along with it. Don’t assume that the person is guilty or a bad person. Many innocent people are currently being targeted, and people are being told lies. This form of harassment is systemic and it’s about state control and conformity. The express goal of this harassment is to destroy the individual over time.

2. If you are aware of someone being harassed in this way, subtly direct them to websites that deal with Gang Stalking, or sites for Targeted Individuals. Knowledge is power.

3. You can subtly offer your support to someone who is being unfairly treated, in very small little ways.

4. You can bring up the subject of Gang Stalking or Targeted Individuals.

6. You can subtly suggest that your local newspapers or community papers print articles about Targeted Individuals or even an write an objective piece about Gang Stalking.

How do participants communicate?

Communication happens in a number of ways. When on the street or in cars patrolling, they use baseball or Stasi like signals. Citizen Informants also seem to get verbal ques via cellphone and earphones.

These include things like tapping the side of the nose, corner of the eye, brushing back the hair 3 times, the infamous double blink, etc.

http://gangstalkingworld.com/Media/2010/02/informant-signals/

Here is a list of signals that the former East German Secret Police the Stasi used. http://www.nthposition.com/stasiland.php

SIGNALS FOR OBSERVATION

1. Watch out! Subject is coming – touch nose with hand or handkerchief

2. Subject is moving on, going further, or overtaking – stroke hair with hand, or raise hat briefly

3. Subject standing still – lay one hand against back, or on stomach

4. Observing Agent wishes to terminate observation because cover threatened – bend and retie shoelaces

5. Subject returning – both hands against back, or on stomach

6. Observing Agent wishes to speak with Team Leader or other Observing Agents – take out briefcase or equivalent and examine contents.

Books:

1. GmB Bailey, “Bridging The Gap.”

2. Gloria Naylor. “1996″

3. Kristina Borjesson “Into the Buzzsaw”

4. Jim Redden “Snitch Culture”

5. Noa Davenport “Mobbing: Emotional Abuse in the American WorkPlace”

6. Ward Churchill, Jim Vander Wall “Cointelpro Papers”

7. Anna Funder “Stasiland”

8. Protectors of Privilege: Red Squads and Police Repression in Urban America

9. Victor Santoro “GASLIGHTING How To Drive Your Enemies Crazy “

10. Anthony Brina “Suburban Spies”

11. Stephen Knight “The Brotherhood”

12. Alex Constantine “The Covert War Against Rock”

13. Frank Donner “The Age of surveillance”

14. Niki F. Raapana “2020″

15. Dr. Andrew M. Lobaczewski. Political Ponerology: The science on the Nature of Evil.

16. Community Oriented Policing. A Systemic approach.

Movies:

1. The lives of others. http://www.imdb.com/title/tt0405094/ (A movie about covert investigations in the former East Germany)

2. The Matrix. (Sci-fi Movie.) Neo a target wakes up and realises not only is he being watched without knowing why, but that the world is a lie, that has been created to pull the truth over people’s eyes.

Electronic Harassment

Attribution:

http://www.abovetopsecret.com/forum/thread1143/pg1

ultra_phoenix
Newly De-Classified US Electronic Harassment Technologies

January 19, 1998

This page lists articles from technology publications which show how these technologies are being marketed in commercial form, and have also been and are being used to harass covert weapons testing victims:

The reader is asked to remember that ANNOUNCED inventions with potential for “national security” use are ALWAYS already in use covertly when announced. The SR-71 “Blackbird” surveillance aircraft was in use for many years before the public saw it.

This page lists articles from technology publications which show how these technologies are being used to harass covert weapons testing victims, and are now coming out in commercial form, or have been announced to the public:

1. Aviation Week & Space Technology, March 10, 1997 “Radar Warns Birds of Impending Aircraft”

This article by Bruce Nordwall (Washington bureau) describes research being carried on by the USAF Wright Laboratory at Dayton Ohio. The article describes the use of MODULATED radar signals to produce AUDIBLE SOUND within the brains of birds near airport runways to cause them to fly away and avoid collisions with landing aircraft.

Other references on work with animals or humans with “audible microwaves”:

Science, vol. 181, 27 July 73, page 356 Nature, vol. 216, DEC 16 1967, page 1139 Nature, vol. 210, May 7 1966, page 636 Journal Acoustical Society of America, June 1982, page 1321 Bioelectromagnetics conference, 1992, 13:323-328 (pages 323-328)

This list was furnished by the lab at Wright- Patterson Air Force Base where this type of unclassified development is now in progress.

** The transmission via MODULATED microwave pulses carrying voices to selected weapons testing victims has been carried on for more than two decades, as reported by the victims. There has been little published about this phenomenon, and since direct-to-skull voice transmissions are consistently mis-interpreted by psychiatrists as ‘schizophrenia’, getting this information to the public needs concerted attention.

2. Electronic Business Today, February 1997 “Business Trends” section, page 20

Inventor Elwood Norris, and his small company, (American Technology Corp., Poway CA) have designed a market ready device called an “acoustical heterodyne”.

This device sends out two sound signals in the ultrasonic (above-human-hearing) range which, when they impact a surface, which may be a living creature, then and only then produce a sound at a frequency equal to the DIFFERENCE (“heterodyne”) of the two ultrasound frequencies.

** This technology has been used extensively by harassers who follow a walking or driving victim and bounce raucous, unnatural bird calls and other strange sounds off surfaces near the victim. This type of sound is tape recordable.

ATC Corporate Headquarters 13114 Evening Creek Dr. S. San Diego, CA 92128 (800)41-RADIO (417-2346) (619)679-2114 (619)679-0545 FAX atc-info@atcsd.com http:/www.atcsd.com

3. New York Times, April 7, 1997, “Devices May Let Police Find Hidden Guns on Street” article

This article, with photos supplied by Millitech Corporation, describes recently unclassified “millimeter wave” cameras (and some other see- thru technologies less well developed.)

These units operate like camcorders, giving the user a real-time thru-clothing, thru- luggage image for detecting weapons and drugs.

Technology like this does not just pop out of nowhere overnight, and it probably has its roots in the 1960′s classified microwave weapon “renaissance” – about the same time as the U.S. embassy staff in Moscow discovered they were being bathed in Soviet microwave signals.

OEM Magazine, February 1997, page 20 “Electronic Dipstick” article

This article describes “micropower impulse radar” or “MIR” radar, developed at Lawrence Livermore Lab in California, and licensed to several large companies for consumer products. Basically, this radar uses the highest radio frequencies and does not require the supporting hardware like rotary antennas which ‘conventional’ radar does.

Uses include vehicle blind-spot sensors, traffic control sensors, heart muscle response monitors, and ** see thru plaster ** stud finders.

** Thru the wall radar has been covertly used for a number of years on weapons testing victims. One common use has been to detect where the victim is standing or walking in their apartment, and ‘follow’ the victim’s position by rapping floor, walls, or ceiling from an adjacent apt. This is designed to let the victim know he/she is under constant surveillance.

4. Defense Electronics, July 1993, page 17

DOD, INTEL AGENCIES LOOK AT RUSSIAN MIND CONTROL CLAIMS

Federal law enforcement officials considered testing a Russian scientist’s acoustic mind control device on cultist David Koresh a few weeks before the fiery conflagration that killed the Branch Davidian leader and 70 of his followers in Waco, Texas, DEFENSE ELECTRONICS has learned.

In a series of closed meetings beginning March 17 in suburban northern Virginia with Dr. Igor Smirnov of the Moscow Medical Academy, FBI officials were briefed on the Russian’s decade- long research on a computerized acoustic device allegedly capable of implanting thoughts in a person’s mind without that person being aware of the source of the thought.

His account of the meetings was confirmed by Psychotechnologies Corp., a Richmond, Virginia based firm that owns the American rights to the Russian technology.

[Not necessarily unclassified, but at least made known to a limited segment of the public]

5. Dan Rather’s CBS Evening News, Dec. 9, 1997

Police helicopters were the topic, and one of the features soon to be added to police heli- copters was “an electromagnetic ray gun which can stop speeding cars dead.”

While this is primitive technology compared with that used to manipulate the minds and nervous systems of e-weapons victims of the 1990′s, it does demonstrate quite clearly that government is putting substantial re- sources into electromagnetic weapons devel- opment.

6. Canadian version, Discovery Channel, “Invention” segment, Thursday December 25, 1997

During part of the show, it was stated that the current development of polygraphs (lie detectors) using massive computer-aided database comparisons was now a reality and these machines were making substantial progress towards near- perfect accuracy.

The final statement in that segment was: It is expected that the next stage in polygraph devel- opment will be REMOTE MICROWAVE detection of bodily functions, which will mean the polygraph can then be used SECRETLY, at a distance.

7. Associated Press: (Dec. 2, 1997)

TOKYO – Tired of reaching for the remote control every time you surf the channels? Help is on the way – at a price. A Japanese company plans to market a device that changes television channels and activates household appliances at the flicker of a brain wave. The price: roughly 600,000 yen ($4,800). The product, called the Mind Control Tool Operating System, or MCTOS, is the result of a collaboration between the Technos Japan Co. and the Himeji Institute of Technology in southwestern Japan.

Say you want to turn on the air conditioner. Simply focus on that icon on the MCTOS computer display menu while wearing a pair of beta-wave trapping goggles. Then, according to Technos spokesman Sadahiro U#ani, say something like “Ei!!” inside your head. Soon your air conditioner will be pumping cool air into the room.

MCTOS is scheduled to go on sale in April, 1998.

8. On Jan. 19 the Washington Post had an article about a device for remotely detecting heartbeats by detecting the electromagnetic pulses emitted by beating hearts.

URL: www.washingtonpost.com… 1998-01/19/017l-011998-idx.html

An excerpt:

“The pumping of the human heart is controlled by electrical signals, which doctors measure in electrocardiograms. The heart’s activity generates an irregular, ultralow-frequency electric field that extends in a circle around the body.

“The field is faint, but it can pass through almost any physical barrier. The LifeGuard can pick up on the strongest part of the field, the heart, through barriers including concrete walls, heavy foliage and rocks. Company officials say the LifeGuard can detect a person in less than five seconds and can pinpoint his or her location with a high degree of accuracy.”

The company is marketing the device for potentially locating people in need of rescue, or detecting where individuals are located inside a building.

– submitted by: Allen L. Barker www.cs.virginia.edu

Here is more info on this type of device:

69. VSE – Life Assesment Detector System DATE 020597 93% (Nasdaq: VSEC) LIFE ASSESMENT DECTECTOR SYSTEM (LADS) Patent Pending The Life Assessment Detector System (LADS), a microwave Doppler movement measuring device, can detect human body surface motion, including heartbeat and respiration, at ranges up.. www.vsecorp.com… 3296 bytes, 08Feb97 –

9. Nature magazine, Vol 391, January 22, 1998, page 316, “Advances in neuroscience may threaten human rights” by Declan Butler

(PARIS – Pasteur Institute – Speech by Chairman of the French national bioethics committee Jean-Pierre Changeaux)

“But neuroscience also poses potential risks, arguing that advances in cerebral imaging make the scope for invasion of privacy immense.

“Although the equipment needed is still highly spec- ialized, it will become commonplace and capable of being used at a distance, he predicted. That will open the way for abuses such as invasion of personal liberty, control of behaviour, and brainwashing.”

“These are far from being science-fiction concerns, said Changeaux, and constitute a serious risk to society.”

Also in that article:

“Denis LeBihan, a researcher at the French Atomic Energy Commission, told the meeting that the use of imaging techniques has reached the stage where we can almost read people’s thoughts.”

NOTE: These scientists are speaking ONLY about the UNCLASSIFIED scientific arena. Classified technology can always be assumed well ahead of unclassified.
ourworld.cs.com…

Follow

Get every new post delivered to your Inbox.