Organized Stalking – The New Enemy
This new war is being waged against a wide range of potential threats. According to the DOD and other sources there is a new enemy that lives among the people. These threats to US national security are “complex and ill-defined” the Los Alamos National Laboratory tells us.
Regarding these new enemies, the Unconventional Warfare publication put out by the US Army in September 2008, proclaimed: “Adversaries threaten the United States throughout a complex operational environment, extending from critical regions overseas to the homeland.”
The US Army’s Strategic Studies Institute revealed in its June 15, 1998 report, Nonlethality and American Land Power that in the future, military forces will be facing opponents who were schooled in America.
“[We] must also focus on non-traditional threats at home,” mentioned the US Army War College in its April of 2002 report, Defending the Homeland. “The country must refocus and fix its attention … on defending the homeland against a wide array of threats.”
This new enemy includes groups and individuals that are not members of a military force. “We’re not in a war against nations or big armies, we’re in a war against individuals,” proclaimed US Air Force Lt. Col. John Forsythe in a February 8, 2005 Defense Daily article.
In an article entitled, Man-Hunting, Nexus Topography, Dark Networks, and Small Worlds, which appeared in the winter, 2006 issue of Iosphere, Chief Warrant Officer 3, John R. Dodson announced: “The asymmetrical threats currently challenging U.S. national policies are not that of large standing armies. They are individuals and groups of like-minded individuals.”
The enemies are seldom states, says Toffler Associates, in a report published for the Defense Intelligence Agency. Instead, they are individuals and groups who are threats to national security and must be neutralized.
The US Army declared that this war will be waged against confirmed enemies as well as a wide range of other potential threats. The multinational force will rely heavily on the civilian population to neutralize the new enemy that lives among them. “New asymmetric threats have emerged,” announced the Department of Defense in its 2007 Annual Report. “This is an enemy that lives and hides among the civilian population,” they emphasized.
“Today’s threats” revealed Applied Energetics, a government defense contractor, “are often characterized by a non-state enemy who operates among a civilian population, in urban and congested areas.” The new enemies have been described as: insurgents, nonstate actors, asymmetric threats, irregular threats, adversaries, etc. Before we examine the new enemy in more detail, let’s have a look at the various terms used to describe them.
Labels of the New Enemy
Adversary
The February 27, 2008, US Army Field Manual Operations defines an adversary this way: “An adversary is a party acknowledged as potentially hostile to a friendly party and against which the use of force may be envisaged.” Adversaries also include members of the local populace who sympathize with the enemy. So, an adversary is someone who might be hostile or people who support them.
Irregular Enemy
The US Army’s 2008 Unconventional Warfare document describes an irregular enemy in the following manner: “Irregulars, or irregular forces, are individuals or groups of individuals who are not members of a regular armed force, police, or other internal security force.” They are usually nonstate-sponsored and unconstrained by sovereign nation legalities and boundaries. Irregular enemies use unconventional or asymmetric methods to counter US advantages.
The Army says that irregular enemies include but are not limited to: specific paramilitary forces, contractors, individuals, businesses, foreign political organizations, resistance or insurgent organizations, expatriates, transnational terrorists, disillusioned transnational terrorism members, black marketers, and other social or political “undesirables.”
Nonstate Actor
Nonstate actors (NSAs) are those who operate outside the control of states or governments recognized by the United Nations. They include but are not limited to, terrorists, vigilante groups, civil defense groups that are not under government control, and insurgents. Other types of NSAs are dissident armed forces, guerrillas, liberation movements, freedom fighters, rebel opposition groups, farmers’ cooperatives, local militias, and some individuals.
In addition, all of the various organizations in the NGO category can be considered nonstate actors if they are not under state or corporate control. The RAND Corporation further describes an NSA as, “those who seek to confound people’s fundamental beliefs about the nature of their culture, society, and government.” Other adversaries, according to RAND, are “civil-society activists fighting for democracy and human rights.” RAND then links these social activists to state-run militant anarchist groups such as the black block, thereby labeling them domestic terrorists.
The book Network Centric Warfare, authored by David S. Alberts, John J. Garstka, and Frederick P. Stein, and sponsored by the Department of Defense, explains actors as: “entities that have the primary function of creating ‘value’ in the form of ‘combat power’ in the battlespace. Actors employ both traditional (lethal) and nontraditional (nonlethal) means.”
In another RAND publication released in 2005, written by Deborah G. Barger, entitled, Toward a Revolution in Intelligence Affairs, a nonstate actor is described as anyone who either acts or plans against US national security interests. Individuals using such asymmetric approaches, says RAND, will become the dominant threat to the US homeland.
Insurgent
The August 1, 2007, Air Force Doctrine document on irregular warfare, defines an insurgency as “an organized movement aimed at the overthrow of a constituted government through use of subversion and armed conflict.”
An insurgency is a revolutionary war, says the US Army. According to the DOD’s Dictionary of Military and Associated Terms, an insurgent is a “member of a political party who rebels against established leadership.” Insurgencies usually occur when a population is oppressed and are waged by people who orchestrate what the Air Force calls an information operation (IO), which is basically the dissemination of information. Insurgents use the news media and the internet for communicating, training, recruiting, and funding.
They also blame the ruling entity as the cause of latent widespread social, political, or even religious grievances. They may use violent or nonviolent methods to convince the population that their cause is moral. Some insurgencies are international.
Insurgents are those who try to persuade the populace to accept political change. If persuasion doesn’t work they may use intimidation, sabotage, propaganda, subversion, military force, or terror. Some insurgents attempt to organize the population into a mass movement, according to the Air Force, to separate from or overthrow the existing government.
If all of these conditions must exist in order for someone to be labeled an insurgent, then those using nonviolent methods to cause change may not be included. However, if only a few nonviolent actions, such as influencing a population, compelling a ruling party to change its behavior, spreading information (IO campaigns), or organizing a mass movement against oppression are required to meet this explanation, then those resisting tyranny may be considered insurgents.
A New Enemy for a New World War
As official sources mentioned earlier, these descriptions of the new enemy are indeed vague allowing for many possible interpretations as to who the enemy is. According to these definitions, the enemy does not necessarily use violence to promote political change. Their methods may be nonviolent.
The primary consideration here is that they are groups or individuals who are not under government control, are against the established leadership, and may influence the population to promote political change. Then there are the potential enemies who will be targeted because of an action they might take in the future. We’ll discover in the next chapter that nonviolent protesters are being labeled terrorists. These enemy variations will be referred to throughout this book as the new enemy.
Resistance to Global Movement
“The most pressing threats of the new security environment are violent reactions to the world’s movement toward a single international system,” revealed the Department of Defense in its November 2002 report, Effects Based Operations: Applying Network Centric Warfare in Peace, Crisis, and War. “The overt hostility toward what is perceived to be a heavily American globalization,” it added, “make it plain that this evolution will be neither easy nor without significant peril.”
Likewise, the CFR had this to say regarding the resisters of this global movement: “In the transformation of a process … there are often elements less subject to evolution.” According to the CFR these evolutionary resisters are using a dispersed resistance movement that is concealed within the civilian population. They suggest that the US military change its tactics to neutralize these resisters.
“As globalization increases world integration,” explained the US Army, “the scope of threats to US security and public safety becomes more global.” “The enemies of integration,” advised Toffler Associates, “pose the most serious threat to world order.” The security forces, therefore, will be increasingly locating and neutralizing these threats to globalization, according to the US Army.
So, these government think tank and military reports are telling us that the new enemy includes groups and individuals with particular political views who are standing in the way of human development as our society evolves into a global civilization.
Information Warfare
These new enemies exist all over the planet. According to the US military and government defense contractors, they use computers, the internet, fax machines, cell phones and public media to convey their messages. The internet is used for communications, propaganda, funding, and training, they tell us.
The enemies use their position within a state’s military, political, or social structure to further their objectives. They use information operations to influence state forces within the population. In various publications, the act of transmitting information has been called netwar, information operations, information warfare, information attacks, etc. According to the RAND Corporation, most of this netwar is waged through the media, including newspapers, magazines, TV, faxes, and particularly the internet.
Information attacks, according an article called, A Theory of Information Warfare, that appeared in the spring, 1995 issue of Airpower Journal, are attacks aimed at the knowledge or belief systems of adversaries. Information operations (IO) have also been called cyberwar, information warfare (infowar), network centric warfare (netwar, NCW), and command and control warfare (C2W).
The DOD describes IO as: “The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own.”
Because there is no reference to the use of IO by enemies in this definition, when an enemy is said to be engaging in IO, it can be considered that their activities meet this definition. However, the context with which IO, and its related terms have been used by official sources suggests that the act of simply conveying information, alone, can be described as an IO.
The following definition of infowar appeared in a 1999 edition of Air and Space Power Journal, in an articled called What is Information Warfare?: “Information Warfare is any action to deny, exploit, corrupt or destroy the enemy’s information and its functions; protecting ourselves against those actions and exploiting our own military information functions.” So, information attacks, information operations, command and control warfare, information war, etc., are all basically the same.
The new war is one fought for political purposes. It is done for the support and influence of the population. “Its battles are fought amongst the people,” the US Marine Corps tells us, “and its outcomes are determined by the perceptions and support of the people.”
What makes this new type of warfare different, says the DOD, is the focus of its operations, which is a relevant population, as well as its purpose, which is to gain or maintain control or influence over, and support of, that relevant population. The focus is on the legitimacy of a political authority to control or influence a population.
Because the multinational force must be perceived as legitimate by the civilians whom it relies on, information is a devastating weapon. The ideas which influence a person’s perception are transmitted by information. “Information warfare techniques,” explained Steven J. Lambakis in Joint Force Quarterly’s Reconsidering Asymmetric Warfare article, “pose asymmetric threats to the United States and its interests.” This new war is a “war of ideas and perception,” as described by the US Marine Corps.
The book, The Information Revolution and National Security, published by the Strategic Studies Institute describes information warfare as a type of virus or cognitive agent that infects people with a unit of informatioThis new war is being waged against a wide range of potential threats. According to the DOD and other sources there is a new enemy that lives among the people. These threats to US national security are “complex and ill-defined” the Los Alamos National Laboratory tells us.
Regarding these new enemies, the Unconventional Warfare publication put out by the US Army in September 2008, proclaimed: “Adversaries threaten the United States throughout a complex operational environment, extending from critical regions overseas to the homeland.”
The US Army’s Strategic Studies Institute revealed in its June 15, 1998 report, Nonlethality and American Land Power that in the future, military forces will be facing opponents who were schooled in America.
“[We] must also focus on non-traditional threats at home,” mentioned the US Army War College in its April of 2002 report, Defending the Homeland. “The country must refocus and fix its attention … on defending the homeland against a wide array of threats.”
This new enemy includes groups and individuals that are not members of a military force. “We’re not in a war against nations or big armies, we’re in a war against individuals,” proclaimed US Air Force Lt. Col. John Forsythe in a February 8, 2005 Defense Daily article.
In an article entitled, Man-Hunting, Nexus Topography, Dark Networks, and Small Worlds, which appeared in the winter, 2006 issue of Iosphere, Chief Warrant Officer 3, John R. Dodson announced: “The asymmetrical threats currently challenging U.S. national policies are not that of large standing armies. They are individuals and groups of like-minded individuals.”
The enemies are seldom states, says Toffler Associates, in a report published for the Defense Intelligence Agency. Instead, they are individuals and groups who are threats to national security and must be neutralized.
The US Army declared that this war will be waged against confirmed enemies as well as a wide range of other potential threats. The multinational force will rely heavily on the civilian population to neutralize the new enemy that lives among them. “New asymmetric threats have emerged,” announced the Department of Defense in its 2007 Annual Report. “This is an enemy that lives and hides among the civilian population,” they emphasized.
“Today’s
threats” revealed Applied Energetics, a government defense
contractor, “are often characterized by a non-state enemy who
operates among a civilian population, in urban and congested areas.”
The new enemies have been described as: insurgents, nonstate actors,
asymmetric threats, irregular threats, adversaries, etc. Before we
examine the new enemy in more detail, let’s have a look at the
various terms used to describe them.
Nonstate actors (NSAs) are those who operate outside the control of states or governments recognized by the United Nations. They include but are not limited to, terrorists, vigilante groups, civil defense groups that are not under government control, and insurgents. Other types of NSAs are dissident armed forces, guerrillas, liberation movements, freedom fighters, rebel opposition groups, farmers’ cooperatives, local militias, and some individuals.
Organized Stalking – The New War
Part of this RMA includes a change in competing forces because most nations can’t challenge the US with a direct military force. Now that most nations have been conquered, either by military might or economic subversion, the regular state-to-state type of warfare will be phased out.
The US and its allies will now be waging war against individuals and groups all across the planet. The global military campaign being used to wage this new type of warfare has been called the global war on terror (GWOT), and the long war (LW). It was explained by the RAND Corporation in the book, In Athena’s Camp, this way: “In the future, few rational opponents will be likely to challenge, or will even be capable of challenging, the US in a contest with large, multi-dimensional military forces.”
Such an adversary, says RAND, will not seek to destroy the US with military power, but to ruin its core values, particularly if those values are not consistent with their deeply held religious, cultural, or ideological beliefs.
The United States Army’s School of Advanced Military Studies mentioned in its May 22, 2003 report, Deterring and Responding to Asymmetrical Threats: “Due to the conventional military dominance, the United States will most likely face regional threats that will challenge it through asymmetric approaches, such as area denial strategies, economic competition, and information warfare.”
Specific names given to the small wars that will be waged globally include, asymmetric warfare (AW), fourth generation warfare (4GW), third wave warfare (3WW), network centric warfare (NCW, netwar), NATO networked enabled capability (NNEC), and military operations other than war (MOOTW). Others are low-intensity conflict (LIC), irregular warfare (IW), and unconventional warfare (UW). Related terms include effects-based operations (EBO), civil-military operations (CMO), and peace operations (PO).
There is a variety of terms and definitions used to describe this type of warfare. The definition of a single term may be overlapping or contradictory, when multiple sources are observed. Some sources portray a particular type of warfare as synonymous with other types, thereby associating its characteristics with those other kinds.
Some terms that have been replaced by more recent ones may still be used by some authors. Some are more or less theories than they are types of warfare. However, there is a pattern of strategies and tactics that these methods of warfare share, which I refer to as shared characteristics.
For the scope of this study, the types of warfare just mentioned are synonymous because they have been described as such by credible sources and because I’ve noticed that each contain most of the shared characteristics, which are:
- They are international, protracted, political wars that are fought among the people.
- They are an interagency joint effort between the military, federal law enforcement, and local and state law enforcement, which is known globally as the multinational force (MNF), as well as nongovernmental organizations (NGOs) and intergovernmental organizations (IGOs).
- They use the civilian population and private sector of the host nation (HN) during civil-military operations (CMO) against a state’s internal enemies.
- They must be perceived as legitimate by the host nation’s civilian population in order to gain their cooperation.
- They rely on psychological operations, isolation, and nonlethal weapons, typically for the destruction of the enemy’s will.
- They use synchronization of tactics and strategies.
Unity of Effort/Interagency
These wars are interagency, international operations that use a combined, highly coordinated and synchronized approach to achieve unity of effort, also called unified action, during attacks. The organizations that are involved include local and state law enforcement, which cooperates with federal agencies and the host nation’s military. In the United States this means the FBI, NSA, CIA, and FEMA.
The military forces of most countries are participating through an allied military force called the North Atlantic Treaty Organization (NATO). They are working with the civilian population as part of civil support, also called civil-military operations (CMO). Non-military participants include: nongovernmental organizations (NGO), private voluntary organizations (PVO), and intergovernmental organizations (IGO). Nationally, this combined force is called the interagency; globally it’s called the multinational force (MNF).
The private sector is also involved. So, this includes not just people in communities, but workplaces, stores, restaurants, businesses, etc. Basically all of the core entities that compose a nation are involved. Some of these activities are being directed by the United Nations (UN).
Because of the advancements in communication, this interagency, international force, which is fused with the civilian population, functions as a single unit, or what the US Army refers to as unified action. Their activities on the strategic, operational, and tactical level are closely synchronized due to technological advancements.
Synchronization
Synchronization is a type of unified action which consists of multiple operations conducted simultaneously in the battlespace, usually at a high tempo. It is an ancient military tactic where the speed and sequence of attacks is arranged to achieve victory. It is a product of C4ISR (which will be explained shortly) and an important concept in this new type of warfare.
The US Army explains unified action as: “the synchronization, coordination, and/or integration of the activities of governmental and nongovernmental entities with military operations to achieve unity of effort. It involves the application of all instruments of national power, including actions of other government agencies and multinational military and nonmilitary organizations.”
Synchronization is an international, interagency function involving the UN, NATO, NGOs, government contractors, the private sector, as well as a HN’s military, local, state, and federal government agencies.
The idea is that launching multiple attacks or a series of attacks done in a particular sequence will have a multiplying effect that will “immobilize, suppress, or shock the enemy,” according to the US Army. Synchronization occurs on the strategic, operational, and tactical level.
It consists of a vertical and horizontal sharing (harmonizing) of information. On the vertical level, the type of environment, objective, and forces determine the guidance and flexibility necessary for an operation. Synchronization occurs horizontally across the battlespace on the tactical level between forces and organizations. The MNF uses automated computerized methods to synchronize information. The transmission of this information occurs frequently and quickly.
The activities that are synchronized continually change in relation to any new information obtained by intelligence. It involves the rapid processing and transmission of information gained by intelligence to commanders, planners, and forces in the battlespace.
Because of the speed at which the processing and transmission of information occurs, the attacks which are directed at an enemy may be the result of near-real-time, or even real-time intelligence. In the past, force maneuvers were delayed by the transmission of information. Now, due to technological advances, it is the commanders who must wait for their previous instructions to be executed before instantaneously transmitting the next set of commands, which may be the result of real-time intelligence.
The book, Understanding Information Age Warfare, by David S. Alberts, John J. Garstka, Richard E. Hayes, and David A. Signori, sponsored by RAND and MITRE Corporations, explains it this way: “In fact, as the speed of decisionmaking and information flows associated with the C2 process increase, the dynamics [attacks and movements] associated with the force elements in the physical domain will define the limits of overall synchronization.”
Expanded Battlefield
The battlefield for this new type of warfare has expanded into the civilian sector. For this reason, it’s now called the battlespace. The battlespace is global. The battles take place among the civilian population where the military uses civilians as irregular forces.
The physical architecture of the battlespace has several levels. At the top is the space level which includes satellites. The near-space level has UAVs and high-flying aircraft. Then there is the maneuver level which contains people, robots, vehicles, ships, and low-flying aircraft.
“Defense of the Homeland involves a global, multi-domain battlespace,” proclaimed the Department of Defense in its June 2005, Strategy for Homeland and Civil Support report. “The global reach of potential and existing adversaries necessitates a global perspective.”
The civilian population is playing an important role in the expanded battlespace, according to the DOD. In order to succeed in these new missions, the actions of the military and civilian organizations will be coordinated far more closely than they were in the past. In its Network Centric Warfare publication of 2000 the DOD had this to say regarding the civilian population being used by the military: “Although civilians have been involved as victims and in supporting [combat] roles throughout history, they will play an increasingly important role in the battlespaces of the future.”
“The operational environment will expand to areas historically immune to battle,” the US Army tells us in its February 27, 2008 Field Manual Operations report, “including the continental United States and the territory of multinational partners, especially urban areas.” “All operations,” it continued, “will be conducted ‘among the people’ and outcomes will be measured in terms of effects on populations.”
According to the Army, the new enemy will increasingly seek protection among the civilian population. The essential “struggle of the future” they say, will take place primarily among civilians and will therefore require US security dominance in these areas.
New World War: Revolutionary Methods for Political Control – Mark M. Rich
Mark M. Rich introduces the Street-Level Organized Stalking Weapons & Tactics.
The development of the technology followed a very traceable history which began in the early 1960’s at the height of the cold war. In 1961, Dr. Allen Frey wrote, “Our data to date indicates that the human auditory system can respond to electromagnetic energy in at least a portion of the radio frequency (RF) spectrum. Further, this response is instantaneous and occurs at low power densities, densities which are well below that necessary for biological damage. For example, the effect has been induced with power densities 1/60 of the standard maximum safe level for continuous exposure.” This observation had incredible ramifications because it meant that within certain ranges of RF people could create a sound perceived in the brain of a person at energy concentration levels considered too small to be significant.
Later that year a patent was issued to Dr. Puharich which stated in part, “The present invention is directed to a means for auxiliary hearing communication, useful for improving hearing, for example, and relates more specifically to novel and improved arrangements for auxiliary hearing communications by effecting the transmission of sound signals through the dental structure and facial nervous system of the user.”162 This crude device produced a signal which could be heard in the brain by inducing a vibration which was transferred through the bone into the inner ear where it was then carried to the brain via the nervous system. Puharich continued researching along this line, gaining an additional patent in 1965 (US Patent #3.170.993). Both of these inventions required physical contact with the head of the subject.
By 1962, Dr. Allan Frey had advanced his work and was able to create sound at a distance from the subject using a pulsed (modulated) radio transmitter. “Using extremely low average power densities of electromagnetic energy, the perception of sounds was induced in normal and deaf humans. The effect was induced several hundred feet from the antenna the instant the transmitter was turned on, and is a function of carrier frequency and modulation.” What was occurring in this research were the first attempts to “tune” into the brain of a human in the same manner as “tuning” into a radio station. The same energy was being used, it was just at a different frequency with a slight vibration (pulse-modulation) on the carrier wave which delivered the signal. This system is wireless.
In 1968, a patent was issued for a device which also required physical contact with the skin of the test subject. “This invention relates to electromagnetic excitation of the Nervous system of a mammal and pertains more particularly to method and apparatus for exciting the nervous system of a person with electromagnetic waves that are capable of causing that person to become conscious of information conveyed by the electromagnetic waves (US Patent No. 3.393.279).” This invention was much different than what others had created by that time because this device actually sent a clear audible signal through the Nervous system to the brain. The device could be placed anywhere on the body and a clear voice or music would appear in the head of the subject. This was a most unbelievable device which had actually been invented in the late 1950’s. It had taken years to convince patent examiners that it worked. The initial patent was only was only granted after the dramatic demonstration of the device on a deaf employee of the United States Patent Office. In 1972, a second patent was issued to the same researcher after being suppressed by the military for four years. This device was much more efficient in that it converted a speech waveform into “a constant amplitude square wave in which the transitions between the amplitude extremes are spaced so as to carry the speech information (U.S Patent No. 3.647.970).” What this did is utilize the frequency code or timing sequences necessary for efficient transfers into the nervous system where the signals could be sent to the brain and decoded as sound in the same way that normal sound is decoded. The result was a clear and understandable sound.
In 2003, Robert Thiedemann of Munich, Germany, advanced the technology even further with the creation of the Holophon® in Germany and the Earthpulse Soundwave™ in the United States. This technology advanced the old design with higher fidelity and clarity in the sound transfer with a number of interesting effects being reported. The device was released in Europe and is scheduled for United States production beginning in early fall 2006. This device is used for positive applications by individuals and fully described in Part II of this book.
In 1971, a system was designed which would allow troops to communicate through a radio transmitter that rendered the enemy deaf and disoriented while allowing “friendly” combatants to communicate at the same time. The device was described as follows: “Broadly, this disclosure is directed to a system for producing aural and psychological disturbances and partial deafness of the enemy during combat situations. Essentially, a highly directional beam is radiated from a plurality of distinct transducers and is modulated by a noise, code, or speech beat signal. The invention may utilize various forms and may include movable radiators mounted on a vehicle and oriented to converge at a desired point, independently positioned vehicles with a common frequency modulator, or means employed to modulate the acoustical beam with respect to a fixed frequency. During combat, friendly forces would be equipped with a reference generator to provide aural demodulation of the projected signal, thereby yielding an intelligible beat signal while enemy personnel would be rendered partially deaf by the projected signal as well as being unable to perceive any intelligence transmitted in the form of a modulated beat signal (US Patent No. 3.566.347).” What this says simply is that at-a-distance personal communication could be achieved by one’s own forces while simultaneously denying it to adversaries using a wireless pulse-modulated signal.
In 1974, using a microwave, it was noted that the signal was changed ( transduced ) by the receiver into an acoustic signal. This was the signal that was “heard” inside or just behind the head. The report stated: “…it was noticed that the apparent locus of the ‘sound’ moved from the observer’s head to the absorber. That is, the absorber acted as a transducer from microwave energy to an acoustic signal. This observation, to the best of our knowledge, has not been described in the literature and may serve as a mechanism mediating the hearing of pulsed microwave signals.”
By 1989, the science took another leap forward with the combination of the modulated signal on a microwave carrier. This provided a much more efficient delivery of the sound. It was reported that, “Sound is induced in the head of a person by radiating the head with microwaves in the range of 100 megahertz to 10,000 megahertz that are modulated with a particular waveform. The waveform consists of frequency modulated bursts. Each burst is made up of ten to twenty uniformly spaced pulses grouped tightly together. The burst width is between 500 nanoseconds and 100 microseconds. The pulse width is in the range of 10 nanoseconds to 1 microsecond. The bursts are frequency modulated by the audio input to create the sensation of hearing in the person whose head is irradiated (US Patent No.4,877,027).” Two patents were tiled that year which addressed this breakthrough. The first “invention relates to devices for aiding of hearing in mammals. The invention is based upon perception of sounds which is experienced in the brain when the brain is subjected to certain microwave radiation signals (US Patent No.4.858.612).” And the second confirmed the earlier observations by stating that “Sound is induced in the head of a person by radiating the head with microwaves in the range of 100 megahertz to 10,000 megahertz that are modulated with a particular waveform. The waveform consists of frequency modulated bursts. Each burst is made up of ten to twenty uniformly spaced pulses grouped tightly together (US Patent No.4,877,027).”
In 1992, another patent described: “A silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain, typically through the use of loudspeakers, earphones or piezoelectric transducers (US Patent No. 5.159.703).” This device had limited practicality in that it required that the person be in contact or close proximity to the sending device. When examined together, each of these patents are seen to be discrete steps toward a new weapons system.
These are the ways that the frequency codes of the human body are introduced in order to achieve the desired “controlled effect.”
In 1995, it was reported that in the early research, clear sound signals had been sent and received. It is difficult now to determine what level of military or other research was being advanced in these areas. History was clear from Congressional Reports that this entire area was of great interest to the intelligence communities. “Drs. Allan Frey and Joseph Sharp conducted related research. Sharp himself took part in these experiments and reported that he heard and understood words transmitted in pulse-microwave analogs of the speakers sound vibrations. Commenting on these studies, Dr. Robert Becker, twice nominated for the Nobel Peace Prize, observed that such a device has obvious applications in covert operations designed to drive a target crazy with voices, or deliver undetectable instructions to a potential assassin.”
Later, in 1996 came the development of “A wireless communication system undetectable by radio frequency methods for converting audio signals, including human voice, to electronic signals in the ultrasonic frequency range, transmitting the ultrasonic signal by means of acoustic pressure waves across a carrier medium, including gases, liquids, or solids, and reconverting the ultrasonic acoustical pressure waves back to the original audio signal (US Patent No. 5.539705).” Although this was meant to be used with both receiving and sending hardware, what was determined were the modulation methods for transferring the signal. Wireless electronic telepathy had been invented.
The real work was yet to be made public in the form of patents. However, the military claims in the arena were starting to surface. What was known from experience was that patents were being held back by the government and confiscated by the military. When this intellectual property is seized the inventors are given a choice – work for the government or you cannot continue your research on or even talk about the invention under a national security order. Those who do not cooperate have their work effectively shut down.
Recent Comments