Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]

Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The NSA - OFFNOW.org ]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The  NSA - OFFNOW.org ]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis Taxed.com - Income Tax Research ]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis Taxed.com - Income Tax Research ]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Stop Funding Criminal Government - Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Cost of War to the United States

Wednesday, November 25, 2009

PeRsOnAlItY PrOfIlInG and SiMuLaTiOn - BrAiNWaShInG AmErIcA

By Norman D. Livergood

In an earlier article, I reviewed the varied aspects of personality profiling and simulation. While serving as Head of the Artificial Intelligence Department at the U.S. Army War College, 1993-1995, I conducted studies on profiling, psychological programming, and brainwashing. I explored and developed personality simulation systems, an advanced technology used in military war games, FBI profiling, political campaigning, and advertising. Part of my discovery was that:

Unenlightened human minds are combinations of infantile beliefs and emotional patterns


These patterns can be simulated in profiling systems

These profiling systems can be used to program and control people

Personality simulation systems are being used to create political campaigns that apply voter profiles to control their voting behavior. TV commercials and programs use personality simulation to profile viewers to control their purchasing and viewing behaviors. And sophisticated propaganda and brainwashing techniques are being used by the cabal to keep American citizens under control.

The Technology of Thought and Behavior Control


The long evolution of developing procedures to control human behavior all came to a head in the modern world with Pavlov, a Russian scientist. In the early years of the twentieth century, Pavlov made the discovery that you can condition a dog to salivate on command simply by associating food with the ringing of a bell. Once that association is fixed in the dog's mind, the food can be removed and the dog will salivate merely when it hears the bell.

Pavlov carried out the identical experiments on human beings with the same results. Those principles have been adapted to television and motion pictures and can now make Americans salivate in response to a wide array of bells and whistles. We can call it phase one in the evolution of human behavior control.


Phase two was accomplished by the same Russian scientist, Pavlov. Very few people know of this part of his research. During a particularly severe storm in Russia, heavy rains continued for days and Pavlov's laboratories were flooded. Pavlov and his research assistants were able to return to the laboratory only after the flood waters had receded days later. Upon returning, Pavlov discovered something truly remarkable. Before the flood, many of the dogs had been conditioned to respond to various stimuli. Lo and behold, all traces of the conditioning in the dogs had disappeared! Bells, food, nothing could induce the former salivation response that had been so carefully implanted in the dogs' nervous systems.

What mysterious influence could account for this remarkable turn of events, Pavlov wondered. So, being a good scientist, he studied carefully what had transpired while he was away from the dogs. They had been left without food or warmth. They had been isolated for days; some of them had drowned. They had been subjected to extreme stress, never knowing if they would live or die. These were the factors that had produced the washing away of the previous conditioning from the dogs' brains - brain-washing.

Pavlov and other Russians followed up this line of research, but it was the Chinese communists in the 1950s who first saw its real potential for use with human beings. They employed these very principles in brainwashing American and other Allied prisoners of war during the Korean conflict. Isolation, periodic denial of food or water, cold and exposure, extreme stress associated with uncertainty of life or death--these conditions, together with a continual barrage of indoctrination produced the erasing of previous beliefs and behavior patterns in American soldiers in particular. Thus brainwashing became phase two in the evolution of human behavior control.

But brainwashing is not very reliable, as the remarkable film "The Manchurian Candidate" shows. The trigger mechanisms can be tampered with, sometimes even erased, before the desired behavior can be carried out.

These procedures are only used now by the CIA and other intelligence services for programming special assassins (see the movie "Parallax View"). Neither classic Pavlovian conditioning nor brainwashing can produce the general results that black-budget project directors in intelligence services desire: absolute control of a human personality.

===snipped===> "And Ye Shall Know The Truth And The Truth Shall Set You Free"

WAKE UP AMERICA....ITs OUR COUNTRY!!!

Love "Light" and Energy

_Don

References:

[Related: The Torture Matrix Operational Collection Database]

Main Core also allegedly draws on four smaller databases that, in turn, cull from federal, state, and local “intelligence” reports; print and broadcast media; financial records; “commercial databases”; and unidentified “private sector entities.” Additional information comes from a database known as the Terrorist Identities Datamart Environment, which generates watch lists from the Office of the Director of National Intelligence for use by airlines, law enforcement, and border posts. According to the Washington Post, the Terrorist Identities list has quadrupled in size between 2003 and 2007 to include about 435,000 names. The FBI’s Terrorist Screening Center border crossing list, which listed 755,000 persons as of fall 2007, grows by 200,000 names a year. A former NSA officer tells Radar that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to Main Core, as does a Pentagon program that was created in 2002 to monitor anti-war protestors and environmental activists such as Greenpeace etc.

[Using Virtual Reality to Document Human Existence, Gregory Peter Panos, PersonaForm, Beverly Hills:]

www.wtec.org/ConvergingTechnologies/Report/NBIC_report.pdf [Cut and Paste URL to Download]

www.wtec.org/ConvergingTechnologies/1/NBIC_frontmatter.pdf [Cut and Paste URL to Download]

Titan Rain

Titan Rain was the U.S. government's designation given to a series of coordinated attacks on American computer systems since 2003. The attacks were labeled as Chinese in origin, although their precise nature (i.e., state-sponsored espionage, corporate espionage, or random hacker attacks) and their real identities (i.e., masked by proxy, zombie computer, spyware/virus infected) remain unknown. The designation 'Titan Rain' has been changed, but the new name for the attacks is itself classified if connected with this set of attacks.

In early December 2005 the director of the SANS Institute, a security institute in the U.S., said that the attacks were "most likely the result of Chinese military hackers attempting to gather information on U.S. systems." Titan Rain hackers gained access to many U.S. computer networks, including those at Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA.

[Means of Information War, Threaten Democracy and Mankind, by Mojmir Babacek]

[Strategic Personality Simulation: A New Strategic Concept by Dr. Norman D. Livergood]

[Behavioral Influences Analysis Center]

[Strategic Personality Simulation - A New Strategic Concept, Norman D. Livergood, Center for Strategic Leadership, Army War College, Carlisle Barracks, Pennsylvania, 1996:]

[Cognitive engineering and behavior/decision making odeling/prediction:]

[A "V"R oriented approach:]

[Converging Technologies for Improving Human Performance:]

[British Telecom sponsored Soul Catcher project:]

http://news.cnet.com/A-new-memory-chip--for-the-brain/2100-1001_3-218102.html

[A serious proposal for personality transfer/modeling using neural nets:]

[Artificial Metempsychosis. A Search Of Methodology For Personality Simulation; Mikhail Solovyov, Department of Biophysics, St. Petersburg University, Russia, 1992]: www.cryonet.org/cgi-bin/dsp.cgi?msg=2879.2

[The curious Patent Application #20020088467 at www.uspto.gov/patft, Mind personality transfer method, Izumi Arai, Tokyo, Japan, 2002-Mind personality transfer method: Patent Application#20020088467]

[Government Collecting DNA Secretly [WHY]



No comments:

TOPs Blogger Role