When Seeing and Hearing Isn't Believing
By William M. Arkin Special to washingtonpost.com
Monday, Feb. 1, 1999
'Gentlemen! We have called you together to inform you that we are going
to overthrow the United States government.' So begins a statement being
delivered by Gen. Carl W. Steiner, former Commander-in-chief, U.S. Special
Operations Command. At least the voice sounds amazingly like him. But it
is not Steiner. It is the result of voice 'morphing' technology developed at the Los Alamos National Laboratory in New Mexico.
By taking just a 10-minute digital recording of Steiner's
voice, scientist George Papcun is able, in near real time, to clone speech
patterns and develop an accurate facsimile. Steiner was so impressed, he
asked for a copy of the tape. Steiner was hardly the first or last victim
to be spoofed by Papcun's team members. To refine their method, they took
various high quality recordings of generals and experimented with creating
fake statements. One of the most memorable is Colin Powell stating 'I am
being treated well by my captors.' 'They chose to have him say something
he would never otherwise have said,' chuckled one of Papcun's colleagues.
A Box of Chocolates is Like War
Most Americans were introduced to the tricks of the digital age in the movie
Forrest Gump, when thecharacter played by Tom Hanks appeared to
shake hands with President Kennedy. For Hollywood, it is special effects.
For covert operators in the U.S. military and intelligence agencies, it
is a weapon of the future. [ A weapon to be used against ANYONE who is considered
ENEMY OF THE STATE ]
'Once you can take any kind of information and reduce it into ones and zeros,
you can do some pretty interesting things,' says Daniel T. Kuehl, chairman
of the Information Operations department of the National Defense University
in Washington, the military's school for information warfare. Digital morphing
- voice, video, and photo - has come of age, available for use in psychological
operations. PSYOPS, as the military calls it, seek to exploit human vulnerabilities
in enemy governments, militaries and populations to pursue national and
To some, PSYOPS is a backwater military discipline of leaflet
dropping and radio propaganda. To a growing group of information war technologists,
it is the nexus of fantasy and reality. Being able to manufacture convincing
audio or video, they say, might be the difference in a successful military
operation or coup.ÊÊ [Your head on Lee Harvey Oswald's body
- you ARE guilty and a jury of YOUR PEERS will convict YOU 'for them'!]
Allah on the Holodeck
Pentagon planners started to discuss digital morphing after Iraq's invasion
of Kuwait in 1990.
Covert operators kicked around the idea of creating a computer-faked videotape
of Saddam Hussein crying or showing other such manly weaknesses, or in some
sexually compromising situation. The nascent plan was for the tapes to be
flooded into Iraq and the Arab world.[NO - they did it DURING DESERT STORM
- see DSWCC 'The voice of God'] The tape war never proceeded, killed, participants
say, by bureaucratic fights over jurisdiction,
skepticism over the technology, and concerns raised by Arab coalition partners.
[ BUZZZ - it proceeded, tested - perfected. ] But the 'strategic' PSYOPS
scheming didn't die. What if the U.S. projected a holographic image of Allah
floating over Baghdad urging the Iraqi people and Army to rise up against
Saddam, a senior Air Force officer asked in 1990? According to a military
physicist given the task of looking into the hologram idea, the feasibility
had been established of projecting large, three-dimensional objects that
appeared to float in the air. But doing so over the skies of Iraq? To project
such a hologram over Baghdad on the order of several hundred feet, they
calculated, would take a mirror more than a mile square in space, as well
as huge projectors and power sources. And besides, investigators came back,
what does Allah look like?
The Gulf War hologram story might be dismissed were it not the case that
washingtonpost.com has learned that a super secret program was established
in 1994 to pursue the very technology for PSYOPS application. The 'Holographic
Projector' is described in a classified Air Force document as a
system to 'project information power from space ... for special operations
War is Like a Box of Chocolates
Voice-morphing? Fake video? Holographic projection? They sound more like
Mission Impossible and Star Trek gimmicks than weapons. Yet for each, there
are corresponding and growing research efforts as the technologies improve
and offensive information warfare expands. Whereas early voice morphing
required cutting and pasting speech to put letters or words together to
make a composite, Papcun's software developed at Los Alamos can far more
accurately replicate the way one actually speaks. Eliminated are the robotic
intonations. The irony is that after Papcun finished his speech cloning
research, there were no takers in the military. Luckily for him, Hollywood
is interested: The promise of creating a virtual Clark Gable is mightier
than the sword. Video and photo manipulation has already raised profound
questions of authenticity for the journalistic world. With audio joining
the mix, it is not only journalists but also privacy advocates and the conspiracy-minded
who will no doubt ponder the worrisome mischief that lurks in the not too
future. 'We already know that seeing isn't necessarily believing,' says
Dan Kuehl, 'now I guess hearing isn't either.' William M. Arkin, author
of 'The U.S. Military Online,' is a leading expert on national security
and the Internet. He lectures and writes on nuclear weapons, military matters
and information warfare. An Army intelligence analyst from 1974-1978, Arkin
currently consults for Washingtonpost.Newsweek Interactive, MSNBC and the
Natural Resources Defense Council.ÊÊ
GET READY: Emails re-arranged to seem like a death or bomb
threat, your telephone conversations re-arranged after you use words to
describe a movie you saw and over 'time' with ECHELON recording your conversations,
they will have your vocabulary of words in YOUR VOICE and now when they
want to prosecute you of a crime THEY COMMIT - suddenly they can have audio
recordings and video footage of you being in some location and
the jury hear you say what your enemies want them to hear. GUILTY - OFF
WITH HIS HEAD, DEATH! A jury of your peers will believe and convict you.
We are coming full in this civilization where all deception will become
the way of life, all lies will become truth, and truth will no longer exist.
IT WILL BE TOTAL ILLUSION NOW OVERT based on Evil. DSWCC > http://www.nonwo.com/dswcc/
Introducing Project Blue Beam Patrol
In cooperation with TRW Space and Technology, NASA and other world space
agencies, the Bilderberg group has developed a series of three stationary
satellites with advanced laser technology that enable them to project
holographic images onto the earth's surface from outer space!
This amazing technology allows Project Blue Beam Patrol to create holographic
decoys of Police Officers that will patrol our city streets along with and
among our own finest. The criminals will not be able to tell which are the
real officers and which are the holograms.
BLUE BEAM PROJECT
by Jim Seabourn (firstname.lastname@example.org)
This is an article from CONTACT! [August 11, 1998-page 8-9]
WHAT IS THE 'BLUE BEAM PROJECT'?
From the INTERNET, courtesy of Calvin Burgin, email@example.com>
It involves two things. A technologically simulated 'second coming' and
the re-emergence of the new 'MONTAUK'-type projects that have the ability
to take up a whole bunch of people as in a 'rapture' type of situation and
whisk the whole bunch into never-never land. Ironically, portions of the
holographic projections have the potential for changing the planet into
oneness with God. Unfortunately, this operates on the premise that Man shall
somehow become God in human form and control other Men and dictate all actions
The calculated resistance to the new religion, the New World Order and the
new 'Messiah' will entail human loss on a massive scale in the ensuing 'holy
wars'. The 'BLUE BEAM PROJECT' will pretend to be the universal fulfillment
of the prophecies of old; as major an event as that which took place 2000
years ago. In principle, it will make use of the sky as a holographic projection
screen for space-based laser-generating satellites [star wars]. These projectors
will project simultaneous images to the four corners of the planet, in every
language by region. It deals with the religious aspect of the New World
Order. The system has already been tested. Holographic projections of the
'Christ Image' have already been seen in some remote desert areas. These
have only been reported in tabloid papers, so they are instantly rendered
moot. They can also project images of aliens, monsters, angels - you name
it. Computers will coordinate the satellites and software will run the show-and-tell.
Holography is based on very nearly identical signals combining to produce
image, or hologram, with depth perception. This is equally applicable to
acoustic [ELF, VLF, LF] waves as it is optical phenomena. Specifically,
the 'show' will consist of laser projections of multiple holographic images
to different parts of the planet, each receiving different images according
to the predominating regional religious faith. Not a single area will be
excluded. With computer animation and sound effects appearing to come from
the depths of space, astonished followers of the various creeds will witness
their own returned Messiah in spectacularly convincing lifelike realness.
The various images of Christ, Mohammed, Buddha, Krishna, etc., will merge
into ONE after 'correct explanation' of the mysteries, prophecies and
revelations are disclosed. This 'ONE GOD' will in fact function as the Anti-Christ',
who will 'explain' that the various scriptures 'have been misunderstood'
- that the religious of old are responsible for turning brother against
brother, nation against nation - that the religions of the world must be
abolished to make way for the GOLDEN AGE [NEW AGE] of the One World Religion,
representing the One God they see before them.
Naturally, this superbly staged, full-scale production will
result in social and religious disorder on a massive scale. Wonder what
the television transmitters of religious networks will be doing on that
day? But before all this, they have to go through four different steps in
order to get to Project Blue Beam.
1: The first step concerns the breakdown of all archaeological knowledge.
It deals with staging earthquakes at certain precise locations
around the planet where supposed new 'discoveries' will finally explain
[for them] that the meaning of the basic doctrines of all the world's
major religions are 'wrong'. This falsification will be used to make the
population believe that all religious doctrine has been misunderstood
and misinterpreted. The falsification started with the film 2001:
A Space Odyssey, the TV-series STAR TREK, the INDEPENDENCE DAY film,
E.T., all of which deal with space 'invasion' and 'protection'. JURASSIC
PARK was to push the theory of evolution.
2: The second step deals with the gigantic space
show: 3D optical holograms and sounds, laser projections of multiple
holographic images in different parts of the world, each receiving a different
image, according to its predetermined original national religious faith.
This new 'god' image will talk in all languages. As an example, the Soviets
have manufactured the advanced computers and have programmed them with
the minute psychological particles based upon their studies of the anatomy
and biology of the human body, as well as their studies on the anatomy,
chemistry and electricity of the human brain. These computers have also
been fed with the different languages of the world.
3: The third step deals with the telepathic electronic two-way
communications, where ELF [Extra Low Frequency], VLF [Low Frequency] waves
will reach the people of the Earth through the insides of their brains,
making each person believe that his own God is speaking to him from within
his own soul. Such rays, from satellites, are fed from the memory of computers
that store much data about the human being and his languages. These rays
will then interlace and interweave with the natural thinking processes
to form what we call the ARTIFICIAL TALK.
4: The fourth step involves universal supernatural manifestations
using electronic means. This step contains three different orientations:
The first one is to make mankind believe that an alien
invasion is about to occur upon every major city on the Earth. This
is to push each major nation into using its nuclear capability to strike
back. In this manner, it would put each of these nations in a state
of full disarmament before the United Nations after the false attack.
The second is to make the 'Christian' believe that a major
rapture is occurring, with a simple 'played' divine intervention of
an alleged 'good' alien force coming to save the good people from a
brutal satanic attack. Its goal is to get rid of all significant opposition
to the NEW WORLD ORDER.
The third orientation is a mixture of electronic and supernatural
forces. The waves [frequencies] used at that time will allow supernatural
forces through fiber optics cable, coaxial cable, electric and telephone
lines in order to penetrate all electronic equipment and appliances
that will by then all have a special microchip installed. The goal of
this step deals with the materialization of satanic ghosts, spectres,
and poltergiests all across the globe in order to push all populations
to the edge of a wave of suicide, killing and permanent psychological
After that night of the THOUSAND STARS, HUMANITY IS BELIEVED
TO BE READY FOR THEM TO ENTER IN A 'NEW MESSIAH' TO REESTABLISH PEACE
EVERYWHERE AT ANY COST, EVEN AT THE COST OF FREEDOM.
NOTICE FROM WILLIAM KERN: The report above was pirated from
Serge Monast who was killed while researching Project Blue Beam. Any copyright
of this material belongs to Serge Monast or his family, NOT Cornell University.
Blue Beam Part 1.
'David Esur' - a military soldier who actually released secrets
from the NSA (it is believed). Last reported as 'he is worried for his life'
because of releasing it, he has disappeared from my email list. But then
again, I never really was able to contact him to begin with - he contacted
me, once. He released: 'Subliminal Implanted Posthypnotic Suggestions and
Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic
Commands without Somnambulistic Preparation in the Subject for Intelligence
and Counterintelligence Applications by the United States National Security
Agency.' I think he disappeared....like Ross Adey.... and I think that the
writer of the article below, Timothy Thomas, may have too. But who knows?
Foreign Military Studies Office 101 Meade Ave Fort Leavenworth, KS 66027-1351
WARNING! The views expressed in FMSO publications and reports
are those of the authors and do not necessarily represent the official policy
or position of the Department of the Army, Department of Defense, or the
The Mind Has No Firewall
Mr. Timothy L. Thomas Foreign Military Studies Office,
Fort Leavenworth, KS.
This article first appeared in the Spring 1998 issue of Parameters
'It is completely clear that the state which is first
to create such weapons will achieve incomparable superiority.' -Major
I. Chernishev, Russian Army.
1 The human body, much like a computer, contains myriad data
processors. They include, but are not limited to, the chemical-electrical
activity of the brain, heart, and peripheral nervous-system, the signals
sent from the cortex region of the brain to other parts of our body, the
tiny hair-cells in the inner ear that process auditory signals, and the
light-sensitive retina and cornea of the eye that process visual activity.
2 We are on the threshold of an era in which these data processors
of the human body may be manipulated or debilitated. Examples of unplanned
attacks on the body's data-processing capability are well-documented. Strobe-lights
have been known to cause epileptic seizures. Not long ago in Japan, children
watching television cartoons were subjected to pulsating lights that caused
seizures in some and made others very sick.
Defending friendly and targeting adversary data-processing capabilities
of the body appears to be an area of weakness in the US approach to information
warfare theory, a theory oriented heavily toward systems data processing
and designed to attain information dominance on the battlefield. Or so it
would appear from information in the open, unclassified press. This US shortcoming
may be a serious one, since the capabilities to alter the data processing
systems of the body already exist. A recent edition of U.S. News and World
Report highlighted several of these 'wonder weapons' (acoustics, microwaves,
lasers) and noted that scientists are 'searching the electromagnetic and
sonic spectrums for wavelengths that can affect human behavior.'
3 A recent Russian military article offered a slightly different
slant to the problem, declaring that 'humanity stands on the brink of a
psychotropic war' with the mind and body as the focus. That article discussed
Russian and international attempts to control the psycho-physical condition
of man and his decision making processes by the use of VHF-generators, 'noiseless
cassettes,' and other technologies. An entirely new arsenal of weapons,
based on devices designed to introduce subliminal messages or to alter the
body's psychological and data processing capabilities, might be used to
incapacitate individuals. These weapons aim to control or alter the psyche,
or to attack the various sensory and data-processing systems of the human
organism. In both cases, the goal is to confuse or destroy the signals that
normally keep the body in equilibrium. This article examines energy-based
weapons, psychotropic weapons, and other developments designed to alter
the ability of the human body to process stimuli. One consequence of this
assessment is that the way we commonly use the term 'information warfare'
falls short when the individual soldier, not his equipment, becomes the
target of attack.
Information Warfare Theory and the Data-Processing
Element of Humans
In the United States the common conception of information warfare focuses
primarily on the capabilities of hardware systems such as computers, satellites,
and military equipment which process data in its various forms. According
to Department of Defense Directive S-3600. 1 of 9 December 1996, information
warfare is defined as 'an information operation conducted during time
of crisis or conflict to achieve or promote specific objectives over a
specific adversary or adversaries.' An information operation is defined
in the same directive as 'actions taken to affect adversary information
and information systems while defending one's own information and information
systems.' These 'information systems' lie at the heart of the modernization
effort of the US armed forces and other countries, and manifest themselves
as hardware, software, communications capabilities, and highly trained
Recently, the US Army conducted a mock battle that tested these systems
under simulated combat conditions. US Army Field Manual 101-5-1, Operational
Terms and Graphics (released 30 September 1997), defines information warfare
as 'actions taken to achieve information superiority by affecting a hostile's
information, information based-processes, and information systems, while
defending one's own information, information processes, and information
systems.' The same manual defines information operations as a 'continuous
military operation within the military information environment that enables,
enhances, and protects friendly forces' ability to collect, process, and
act on information to achieve an advantage across the full range of military
operations. [Information operations include] interacting with the Global
Information Environment . . . and exploiting or denying an adversary's
information and decision capabilities.'
4 This 'systems' approach to the study of information warfare
emphasizes the use of data, referred to as information, to penetrate an
adversary's physical defenses that protect data (information) in order to
obtain operational or strategic advantage. It has tended to ignore the role
of the human body as an information- or data-processor in this quest for
dominance except in those cases where an individual's logic or rational
thought may be upset via disinformation or deception. As a consequence little
attention is directed toward protecting the mind and body with a firewall
as we have done with hardware systems. Nor have any techniques for doing
so been prescribed. Yet the body is capable not only of being deceived,
manipulated, or misinformed but also shut down or destroyed - just as any
other data-processing system. The 'data' the body receives from external
sources - such as electromagnetic, vortex, or acoustic energy waves - or
creates through its own electrical or chemical stimuli can be manipulated
or changed just as the data (information) in any hardware system can be
altered. The only body-related information warfare element considered by
the United States is psychological operations (PSYOP). In Joint Publication
3-13. 1, for example, PSYOP is listed as one of the elements of command
and control warfare. The publication notes that 'the ultimate target of
[information warfare] is the information dependent process, whether human
or automated .... Command and control warfare (C2W) is an application of
information warfare in military operations.... C2W is the integrated use
of PSYOP, military deception, operations security, electronic warfare and
5 One source defines information as a 'non-accidental signal
used as an input to a computer or communications system.'
6 The human body is a complex communication system constantly
receiving non-accidental and accidental signal inputs, both external and
internal. If the ultimate target of information warfare is the information-dependent
process, 'whether human or automated,' then the definition in the joint
publication implies that human data-processing of internal and external
signals can clearly be considered an aspect of information warfare. Foreign
researchers have noted the link between humans as data processors and the
conduct of information warfare. While some study only the PSYOP link, others
go beyond it. As an example of the former, one recent Russian article described
offensive information warfare as designed to 'use the Internet channels
for the purpose of organizing PSYOP as well as for 'early political warning'
of threats to American interests.'
7 The author's assertion was based on the fact that 'all mass
media (especially TV "programming" - JAH) are used for PSYOP .
. . [and] today this must include the Internet.' The author asserted that
the Pentagon wanted to use the Internet to 'reinforce psychological influences'
during special operations conducted outside of US borders to enlist sympathizers,
who would accomplish many of the tasks previously entrusted to special units
of the US armed forces. Others, however, look beyond simple PSYOP ties to
consider other aspects of the body's data-processing capability. One of
the principal open source researchers on the relationship of information
warfare to the body's data-processing capability is Russian Dr. Victor Solntsev
of the Baumann Technical Institute in Moscow. Solntsev is a young, well-intentioned
researcher striving to point out to the world the potential dangers of the
computer operator interface. Supported by a network of institutes and academies,
Solntsev has produced some interesting concepts.
8 He insists that man must be viewed as an open system instead
of simply as an organism or closed system. As an open system, man communicates
with his environment through information flows and communications media.
One's physical environment, whether through electromagnetic, gravitational,
acoustic, or other effects, can cause a change in the psycho-physiological
condition of an organism, in Solntsev's opinion. Change of this sort could
directly affect the mental state and consciousness of a computer operator.
This would not be electronic war or information warfare in the traditional
sense, but rather in a non-traditional and non-US sense. It might encompass,
for example, a computer modified to become a weapon by using its energy
output to emit acoustics that debilitate the operator. It also might encompass,
as indicated below, futuristic weapons aimed against man's 'open system.'
Solntsev also examined the problem of 'information noise,' which creates
a dense shield between a person and external reality. This noise may manifest
itself in the form of signals, messages, images, or other items of information.
The main target of this noise would be the consciousness of
a person or a group of people. Behavior modification could be one objective
of information noise; another could be to upset an individual's mental capacity
to such an extent as to prevent reaction to any stimulus. Solntsev concludes
that all levels of a person's psyche (subconscious, conscious, and 'super-conscious')
are potential targets for destabilization. According to Solntsev, one computer
virus capable of affecting a person's psyche is Russian Virus 666. It manifests
itself in every 25th frame of a visual display, where it produces a combination
of colors that allegedly put computer operators into a trance. The subconscious
perception of the new pattern eventually results in arrhythmia of the heart.
Other Russian computer specialists, not just Solntsev, talk openly about
this '25th frame effect' and its ability to subtly manage a computer user's
perceptions. The purpose of this technique is to inject a thought into the
viewer's subconscious. It may remind some of the subliminal advertising
controversy in the United States in the late 1950s.
US Views on 'Wonder Weapons': Altering
the Data-Processing Ability of the Body
What technologies have been examined by the United States that possess
the potential to disrupt the data-processing capabilities of the human
organism? The 7 July 1997 issue of U.S. News and World Report described
several of them designed, among other things, to vibrate the insides of
humans, stun or nauseate them, put them to sleep, heat them up, or knock
them down with a shock wave. 9 The technologies include dazzling lasers
that can force the pupils to close; acoustic or sonic frequencies that
cause the hair-cells in the inner ear to vibrate and cause motion-sickness,
vertigo, and nausea, or frequencies that resonate the internal organs
causing pain and spasms; and shock-waves with the potential to knock down
humans or airplanes and which can be mixed with pepper-spray or chemicals.
10 With modification, these technological applications can
have many uses. Acoustic weapons, for example, could be adapted for use
as acoustic rifles or as acoustic fields that, once established, might
protect facilities, assist in hostage rescues, control riots, or clear
paths for convoys. These waves, which can penetrate buildings, offer a
host of opportunities for military and law enforcement officials. Microwave
weapons, by stimulating the peripheral nervous-system, can heat up the
body, induce epileptic-like seizures, or cause cardiac-arrest. Low-frequency
radiation affects the electrical activity of the brain and can cause flu-like
symptoms and nausea. Other projects sought to induce or prevent sleep,
or to affect the signal from the motor cortex portion of the brain, overriding
voluntary muscle movements. The latter are referred to as pulse-wave weapons,
and the Russian government has reportedly bought over 100,000 copies of
the 'Black Widow' version of them.
11 However, this view of 'wonder weapons' was contested by
someone who should understand them. Brigadier General Larry Dodgen, Deputy
Assistant to the Secretary of Defense for Policy and Missions, wrote a letter
to the editor about the 'numerous inaccuracies' in the U.S. News and World
Report article that 'misrepresent the Department of Defense's views.'
12 Dodgen's primary complaint seemed to have been that the
magazine misrepresented the use of these technologies and their value to
the armed forces. He also underscored the US intent to work within the scope
of any international treaty concerning their application, as well as plans
to abandon (or at least redesign) any weapon for which countermeasures are
known. One is left with the feeling, however, that research in this area
is intense. A concern not mentioned by Dodgen is that other countries or
non-state actors may not be bound by the same constraints. It is hard to
imagine someone with a greater desire than terrorists to get their hands
on these technologies. 'Psycho-terrorism' could be the next buzzword.
Russian Views on 'Psychotropic War'
The term 'psycho-terrorism' was coined by Russian writer N. Anisimov
of the Moscow Anti-Psychotronic Center. According to Anisimov, psychotropic
weapons are those that act to 'take away a part of the information which
is stored in a man's brain. It is sent to a computer, which reworks it
to the level needed for those who need to control the man, and the modified
information is then reinserted into the brain.' These weapons are used
against the mind to induce hallucinations, sickness, mutations in human
cells, 'zombification,' or even death. Included in the arsenal are VHF
generators, X-rays, ultrasound, and radio waves. Russian army Major I.
Chernishev, writing in the military journal Orienteer in February 1997,
asserted that 'psy' weapons are under development all over the globe.
Specific types of weapons noted by Chernishev (not all of which have prototypes)
were: A psychotropic generator, which produces a powerful electromagnetic
emanation capable of being sent through telephone lines, TV, radio networks,
supply pipes, and incandescent lamps. An autonomous generator, a device
that operates in the 10-150 Hertz band, which at the 10-20 Hertz band
forms an infrasonic oscillation that is destructive to all living creatures.
A nervous system generator, designed to paralyze the central nervous systems
of insects, which could have the same applicability to humans. Ultrasound
emanations, which one institute claims to have developed. Devices using
ultrasound emanations are supposedly capable of carrying out bloodless
internal operations without leaving a mark on the skin. They can also,
according to Chernishev, be used to kill.
Chernishev claims that the Japanese have developed the ability to place
infra-low frequency voice patterns over music, patterns that are detected
by the subconscious. Russians claim to be using similar 'bombardments'
with computer programming to treat alcoholism or smoking.
The 25th-frame effect, alluded to above, a technique wherein each 25th
frame of a movie reel or film footage contains a message that is picked
up by the subconscious. This technique, if it works, could possibly be
used to curb smoking and alcoholism, but it has wider, more sinister applications
if used on a TV audience or a computer operator. Psychotropics, defined
as medical preparations used to induce a trance, euphoria, or depression.
Referred to as 'slow-acting mines,' they could be slipped into the food
of a politician or into the water supply of an entire city. Symptoms include
headaches, noises, voices or commands in the brain, dizziness, pain in
the abdominal cavities, cardiac arrhythmia, or even the destruction of
the cardiovascular system.
There is confirmation from US researchers that this type
of study is going on. Dr. Janet Morris, co-author of The Warrior's Edge,
reportedly went to the Moscow Institute of Psycho correlations in 1991.
There she was shown a technique pioneered by the Russian Department of Psycho-Correction
at Moscow Medical Academy in which researchers electronically analyze the
human mind in order to influence it. They input subliminal command messages,
using key words transmitted in 'white noise' or music. Using an infra-sound,
very low frequency transmission, the acoustic psycho-correction message
is transmitted via bone conduction.
13 In summary, Chernishev noted that some of the militarily
significant aspects of the 'psy' weaponry deserve closer research, including
the following non-traditional methods for disrupting the psyche of an individual:
ESP research: determining the properties and condition of objects without
ever making contact with them and 'reading' peoples' thoughts Clairvoyance
research: observing objects that are located just beyond the world of the
visible - used
for intelligence purposes Telepathy research: transmitting thoughts over
a distance - used for covert operations Telekinesis research: actions involving
the manipulation of physical objects using thought power, causing them to
move or break apart - used against command and control systems, or to disrupt
the functioning of weapons of mass destruction Psychokinesis research: interfering
with the thoughts of individuals, on either the strategic or tactical level
While many US scientists undoubtedly question this research,
it receives strong support in Moscow. The point to underscore is that individuals
in Russia (and other countries as well) believe these means can be used
to attack or steal from the data-processing unit of the human body. Solntsev's
research, mentioned above, differs slightly from that of Chernishev. For
example, Solntsev is more interested in hardware capabilities, specifically
the study of the information-energy source associated with the computer-operator
interface. He stresses that if these energy sources can be captured and
integrated into the modern computer, the result will be a network worth
more than 'a simple sum of its components.' Other researchers are studying
high-frequency generators (those designed to stun the psyche with high frequency
waves such as electromagnetic, acoustic, and gravitational); the manipulation
or reconstruction of someone's thinking through planned measures such as
reflexive control processes; the use of psychotronics, parapsychology, bioenergy,
bio fields, and psycho energy;
14 and unspecified 'special operations' or anti-ESP training.
The last item is of particular interest. According to a Russian TV broadcast,
the strategic rocket forces have begun anti-ESP training to ensure that
no outside force can take over command and control functions of the force.
That is, they are trying to construct a firewall around the heads of the
At the end of July 1997, planners for Joint Warrior Interoperability Demonstration
'97 'focused on technologies that enhance real-time collaborative planning
in a multinational task force of the type used in Bosnia and in Operation
The JWID '97 network, called the Coalition Wide Area Network (CWAN), is
the first military network that allows allied nations to participate as
full and equal partners.'
15 The demonstration in effect was a trade fair for private
companies to demonstrate their goods; defense ministries got to decide where
and how to spend their money wiser, in many cases without incurring the
cost of prototypes. It is a good exampleof doing business better with less.
Technologies demonstrated included:
16 Soldiers using laptop computers to drag cross-hairs over
maps to call in air strikes Soldiers carrying beepers and mobile phones
rather than guns Generals tracking movements of every unit, counting the
precise number of shells fired around the globe,and inspecting real-time
damage inflicted on an enemy, all with multicolored graphics
17 Every account of this exercise emphasized the ability of
systems to process data and provide information feedback via the power invested
in their microprocessors. The ability to affect or defend the data-processing
capability of the human operators of these systems was never mentioned during
the exercise; it has received only slight attention during countless exercises
over the past several years. The time has come to ask why we appear to be
ignoring the operators of our systems. Clearly the information operator,
exposed before a vast array of potentially immobilizing weapons, is the
weak spot in any nation's military assets. There are few international agreements
protecting the individual soldier, and these rely on the good will of the
combatants. Some nations, and terrorists of every stripe, don't care about
This article has used the term data-processing to demonstrate
its importance to ascertaining what so-called information warfare and information
operations are all about. Data-processing is the action this nation and
others need to protect. Information is nothing more than the output of this
activity. As a result, the emphasis on information-related warfare terminology
('information dominance,' 'information carousel') that has proliferated
for a decade does not seem to fit the situation before us. In some cases
the battle to affect or protect data-processing elements pits one mechanical
system against another. In other cases, mechanical systems may be confronted
by the human organism, or vice versa, since humans can usually shut down
any mechanical system with the flip of a switch. In reality, the game is
about protecting or affecting signals, waves, and impulses that can influence
the data-processing elements of systems, computers, or people. We are potentially
the biggest victims of information warfare, because we have neglected to
Our obsession with a 'system of systems,' 'information dominance,'
and other such terminology is most likely a leading cause of our neglect
of the human factor in our theories of information warfare. It is time to
change our terminology and our conceptual paradigm. Our terminology is confusing
us and sending us in directions that deal primarily with the hardware, software,
and communications components of the data-processing spectrum. We need to
spend more time researching how to protect the humans in our data management
structures. Nothing in those structures can be sustained if our operators
have been debilitated by potential adversaries or terrorists who - right
now - may be designing the means to disrupt the human component of our carefully
constructed notion of a system of systems.
1. I. Chemishev, 'Can Rulers Make 'Zombies' and Control the World?' Orienteer,
February 1997, pp. 58-62.
2. Douglas Pasternak, 'Wonder Weapons,' U.S. News and World Report, 7 July
1997, pp. 3846.
3. Ibid., p. 38.
4. FM 101-5-1, Operational Terms and Graphics, 30 September 1997, p. 1-82.
5. Joint Pub 3-13.1, Joint Doctrine for Command and Control Warfare (C2W),
7 February 1996, p. v.
6. The American Heritage Dictionary (2d College Ed.; Boston: Houghton Mifflin,
1982), p. 660, definition 4.
7. Denis Snezhnyy, 'Cybemetic Battlefield & National Security,' Nezavisimoye
Voyennoye Obozreniye, No. 10, 15-21 March 1997, p. 2.
8. Victor I. Solntsev, 'Information War and Some Aspects of a Computer Operator's
Defense, ' talk given at an Infer Conference in Washington, D.C., September
1996, sponsored by the National Computer Security Association. Information
in this section is based on notes from Dr. Solntsev's talk.
9. Pasternak, p. 40.
10. Ibid., pp. 40-46.
12. Larry Dodgen, 'Non-lethal Weapons,' U.S. News and World Report, 4 August
1997, p. 5.
13. 'Background on the Aviary,' Nexus Magazine, downloaded from the Internet
on 13 July 1997 from http://www.execpc.com/vjentpr/nexusavi.html
> , p.7.
14. Aleksandr Cherkasov, 'The Front Where Shots Aren't Fired,' Orienteer,
May 1995, p. 45. This article was based on information in the foreign and
Russian press, according to the author, making it impossible to pinpoint
what his source was for this reference.
15. Bob Brewin, 'DOD looks for IT 'golden nuggets,'' Federal Computer Week,
28 July 1997, p. 31, as taken from the Earlybird Supplement, 4 August 1997,
p. B 17.
16. Oliver August, 'Zap! Hard day at the office for NATO's laptop warriors,'
The Times, 28 July 1997, as taken from the Earlybird Supplement, 4 August
1997, p. B 16.
All information posted on this web site is
the opinion of the author and is provided for educational purposes only.
It is not to be construed as medical advice. Only a licensed medical doctor
can legally offer medical advice in the United States. Consult the healer
of your choice for medical care and advice.