Sunday, 15 April 2007

Building WTC to detonate it

CONNECTING THE DOTS: Rockefeller Trilateral Terrorism of 1976, building WTC to detonate it

author: connecting some dots

http://portland.indymedia.org/en/2007/03/356342.shtml

Previously noted was formal court RICO suit of 2004 by Pentagon brass McNiven against Bush Senior, CIA head, & his 1976 state terror plan to hit WTCs --- Update: WTCs designed as bolted steel instead of welded steel because they were wanting to demolish them by explosives even as they were being built; they were pre-designed by traitors in USA government and financial circles to effect and suffer easy demolition collapse; this was expected to occur as early as 1976, self-inventing a justification for a U.S. neofascist police state. As they were built, WTCs designed to be the ultimate Hollywood set in a pre-planned live action state terror/detonation operation. This is a timeline, approx. 1970-2001.

Paul: "Well, I knew exactly why [the trade towers came down]... people talked about Building 7 coming down at the same time, I knew why. Because, when I was there, there were these engineers from Saudi Arabia, actually part of the Bin Laden construction company, because Yamasaki [WTC main architect] worked with them and built them up...and they started in Arabia and worked for Yamasaki, and was doing all kinds of things for them, airports, schools, doing very large projects...and he just brought them over. And I saw these guys...these swarthy looking guys wandering around, and some of them were asking me "where would you put demolition devices?" "Well, I'm not really an engineer, but I'm curious to know [laughing] why, why would you put things in to demolish it, when it's not even built?" Then he replied "Well, that's the way things are going now." Here's why.

David and Nelson Rockefeller, #1 and #2; Towers even called 'David and Nelson'
David and Nelson Rockefeller, #1 and #2; Towers even called 'David and Nelson'
Lights, Camera, Action! Building stage of McNiven preplanned terrorstrike of '76
Lights, Camera, Action! Building stage of McNiven preplanned terrorstrike of '76
David Rockefeller's Trilateral 'American branch' prominent in 9-11 perps list
David Rockefeller's Trilateral 'American branch' prominent in 9-11 perps list

ten dots to connect:

summary:

1 Bin Laden Construction Company working for Minoru Yamasaki on the WTCs, asking around "where would you put the demolition charges"--back during the building construction (1966-1973)?

2 RICO suit in federal court: U.S. Army devised a plan commissioned by Congress to bring down the WTC [in 1976 by terrorism]...McNiven, who first went public in an affidavit included in a 9/11-related federal conspiracy (RICO) lawsuit filed against Bush and others in 2004, claims his unit was ordered to create the "perfect terrorist plan" [in 1976] using commercial airliners as weapons and the Twin Towers as their target.....publicized version of the study, commissioned by Congress, was to identify security lapses and submit corrective measures to lawmakers. However, McNiven claims the real purpose of the study was to brainstorm how to pull off the perfect terrorist attack using the exact same 9/11 scenario. [And then utilize them as the mechanism for killing thousands of Americans by detonating the towers after their U.S. Army planned planes crashed into them.] The study [of 1976], commissioned to C-Battery 2/81st Field Artillery, U.S. Army, stationed in Strassburg, Germany in 1976, specifically devised the scenario of the Twin Towers being leveled by Middle Eastern terrorists using commercial airliners and even plastic box cutters to bypass security. To silence critics, McNiven has successfully passed a credible lie detector test regarding his participation in the study as well as other specific orders given to him by his superiors in case of a real attack on the Twin Towers. The head of the 1976 mock terrorist plan was Lt. Michael Teague of Long Island, who McNiven says was given specific orders by higher-ups in the military to use the Twin Towers as the terrorist target. McNiven said he has been unable to contact Lt. Teague, but was interested in his opinion now that "the 9/11 attacks happened the way we planned them in 1976."

3 David and Nelson Rockefeller involvement preparatory to construction and in the first few years after construction.

4 David Rockefeller "builds his own Bilderberg," called the Trilaterals in July 1973 starting only two months after WTCs completed in April 1973 (which he and his brother Nelson organized the construction and financing for in New York City). American perps involved in the state terrorism side of the WTCs demolition are predominately David Rockefeller Trilaterials.

5 WTC post construction difficulties: terror plan failed to come off right in 1976; regrouping, organizing the plan and personnel for state terror; meanwhile the WTCs are beginning to experience galvanic corrosion since they were not built to remain up for very long...only to be destroyed in state terror relatively quickly.

6 the police state plan postponed: explains how they thought they could seriously rewrite the U.S. Constitution in 1976 and remove the Bill of Rights, to set up totally appointed frameworks of legislature and removal of trial by jury. Kid you not. This was connected to Rockfellers as well

7 explains the strange history of 'mini-state terrorisms over the years in the United States, linked to a rogue traitorous (in)security team: With the WTC "stage set" increasingly found to be unstable though without personnel in place to conduct the state terrorism cover up, other 'smaller state terrorisms' are invented, or are involved in attempting to set up their perps in the proper cover up places beforehand

8 explains how directly after this Bush/Clinton 1993 attempt that failed to take down the WTCs and lauch the US police state, the Bush family get down to (dirty treasonous) business buys up the WTC security contracts to get it right "next time".

9 explains how in early 2001, the whole 1976 team were put into power once more through Bush family appointments: Baby Bush appoints his father's 1976 friends to power once more: Cheney (Bush Senior's Secretary of State for the Gulf War I, Halluburton connections, and Cheney was Ford's 1976 Chief of Staff), Rumsfeld (appointed Secretary of State in 2001, was appointed Secretary of State in 1976 for appointed Ford as well...), and appointing George W. Bush (a proxy for his father coming back into power from his "interrupted" 1976 CIA Directorship), and the appointing of another GHW Bush right hand man, Meuller, as FBI director. Then they were set to unleash their hit on the United States. Which they did. Which they still are.

10 explains the exact 9-11 prediction of another Rockefeller: Nicholas Rockefeller where he predicted eleven months in advance a massive US terror strike, and he predicted THE EXACT "response" that occurred in advance as well.



details:


PART 1

"The WTC were quite remarkable structures. The strongest elements were their massively reinforced cores and the sheer faces of the buildings themselves with the weight of the floors distributed evenly between them. The holes the planes made in those exteriors were insignificant to say the very least."

Not sure if this is ever mentioned as I've not seen it discussed on any CT blogs (or elsewhere, actually).

During a recent interview with Mike Hagan on his radio show,
http://www.mikehagan.com/2012/mp3/021207_PAUL_LAFFOLEY.mp3

Paul Laffoley had a moment during this massive brain-dump on art, imagination, creativity, time-travel, multi-dimensional klein bottles, living houses, architecture, painting, diagrams, etc. to drop these nuggets from when he (briefly) was involved with the WTC design/construction.

He starts talking about the trade centers around the 36th minute.


[Paul is describing how the project was behind, and how the engineering contractors started cutting certain corners...]

Paul: "...so they started doing things like, instead of welding steel together, they _bolted_ it..."

Mike: "What did you think of that when that happened?"

Paul: "Well, I knew exactly why [the trade towers came down]... people talked about Building 7 coming down at the same time, I knew why. Because, when I was there, there were these engineers from Saudi Arabia, actually part of the Bin Laden construction company, because [WTC architect Minoru] Yamasaki worked with them and built them up... and they started in Arabia and worked for Yamasaki, and was doing all kinds of things for them [there], airports, schools, doing very large projects... and he just brought them over. And I saw these guys... these swarthy looking guys wandering around, and some of them were asking me:

'where would you put demolition devices?'

[Paul replied then:] 'Well, I'm not really an engineer, but I'm curious to know [laughing] why, why would you put things in to demolish it, when it's not even built?' You know? It was so strange to me.

And he said, 'well, that's the way things are going now.'

So, in a certain sense, the reason they came down, the Bin Laden construction company knew exactly where all the, places were, that they put demolition devices, because New York in the 60s..."

Mike: "So you believe it was demolished, it was brought down?"

Paul: "Well, in the early 60s and 70s in New York, buildings were going up and down, like every six months. You go away, and come back and there's a new building."

Mike: "So they build them with charges built into them."

Paul: "Build it so, so it would come down. So those guys knew the whole story. And so it was very easy for them, to you know, do that. And uh, it actually came down from extreme capitalism. [laughs]"


Paul then talks about how he suggested building walkways between the buildings to help support the structure (since things were bolted).

Then he gets fired the next day for suggesting a ugly (yet structurally superior, given the weakened joints) change to Yamasaki's design "pure form".

I believe Paul's statement to be true (as I've heard him on a couple of times after 9/11 state this when speaking) and I certainly do not feel like he is consciously a disinfo agent. Guy has his own future agenda at work to be bothered with government agencies, me thinks. Anyone not familiar with Paul, certainly take the time to fully comprehend the scope of his artistic and creative vision: ( http://www.laffoley.com )

Just another angle I thought needed a bit more light.

And in any case, everyone should listed to the (long, but constantly mind-blowing) interview with Paul - oodles of great topics and next-level brain-food.

http://rigint.blogspot.com/2007/03/its-real-thing.html#comments


PART 2

Fits interestingly with several other points:

20.Mar.2005 06:18
9.11 investigation

US DoD McNiven RICO SUIT! BUSH SENIOR, CIA head, & his 1976 state terror plan to hit WTCs!

A LIVE COURT CASE! DEAL WITH IT! WELCOME TO REALITY.

Our own U.S. Army devised a plan commissioned by Congress to bring down the WTC...McNiven, who first went public in an affidavit included in a 9/11-related federal conspiracy (RICO) lawsuit filed against Bush and others in 2004, claims his unit was ordered to create the "perfect terrorist plan" [in 1976] using commercial airliners as weapons and the Twin Towers as their target.....publicized version of the study, commissioned by Congress, was to identify security lapses and submit corrective measures to lawmakers. However, McNiven claims the real purpose of the study was to brainstorm how to pull off the perfect terrorist attack using the exact same 9/11 scenario. [And then utilize them as the mechanism for killing thousands of Americans by detonating the towers after their U.S. Army planned planes crashed into them.]

The study [of 1976], commissioned to C-Battery 2/81st Field Artillery, U.S. Army, stationed in Strassburg, Germany in 1976, specifically devised the scenario of the Twin Towers being leveled by Middle Eastern terrorists using commercial airliners and even plastic box cutters to bypass security. To silence critics, McNiven has successfully passed a credible lie detector test regarding his participation in the study as well as other specific orders given to him by his superiors in case of a real attack on the Twin Towers. The head of the 1976 mock terrorist plan was Lt. Michael Teague of Long Island, who McNiven says was given specific orders by higher-ups in the military to use the Twin Towers as the terrorist target.

McNiven said he has been unable to contact Lt. Teague, but was interested in his opinion now that "the 9/11 attacks happened the way we planned them in 1976."

http://portland.indymedia.org/en/2005/03/313859.shtml


PART 3

updated comments:


this explains several other things:

preparatory to construction and in the first few years after construction:

1. Rockefellers there: The World Trade Center in New York City (sometimes informally referred to as the WTC or the Twin Towers) was a complex of seven buildings, mostly designed by American architect Minoru Yamasaki and developed by the Port Authority of New York and New Jersey. It was initiated in 1960 by a Lower Manhattan Association created and chaired by David Rockefeller, who had the original idea of building the Center, with strong backing from the then New York governor, his brother, Nelson Rockefeller. Groundbreaking for the construction of the World Trade Center was on August 5, 1966.[11] The construction was under the auspices of the semi-autonomous Port Authority of New York and New Jersey. In 1970, construction was completed on One World Trade Center, with its first tenants moving into the building in December, 1970. Tenants first moved into Two World Trade Center in January 1972.[12] When the World Trade Center twin towers were completed, the total costs to the Port Authority had reached $900 million.[13] The ribbon-cutting ceremony was on April 4, 1973.[14]

2. Bin Laden Construction Company working with Minoru Yamasaki, the WTC main architect, according to Paul Laffoley. The group hired and walking around were openly walking around attempting to figure out "where would you put the demolition devices?" Note: Al-Queda, the CIA creation, didn't exist at the time.

3. Bin Laden's and Bushes are close friends particularly from the CIA funded invasion of Afghanistan from 1979, and the Bushes and the bin Ladens share(d) investment proxies like James Bath; both Bushes and bin Ladens were investors in the Bush crony corporation the Carlyle Corporation, which made incredible war profiteering wealth for itself and its investors after 9-11. Bin Ladens had been a rich Saudi family helping out the British Empire, long before the American empire, by the way.

4. David Rockefeller provides funding for WTCs. His brother, Nelson when Governor of New York, organized the rewriting of New York real estate and building codes. WTCs constructed basically as what was illegal before because of dangerous heights. [cite: Divided We Stand]

5. Makes little sense since, New York City was already with an abundance of unused real estate, which WTCs only compounded and remained mostly empty for the first few years. [cite: Divided We Stand]

6. Worried that their planned terror strike would not kill anyone, Nelson authorizes moving many state workers into the WTCs to help fill them up. WTCs remain an economic failure however. [cite: Divided We Stand]

7. note: The ribbon-cutting ceremony was on April 4, 1973.[14]

8. note: The Trilateral Commission is a private organization, founded in July 1973, at the initiative of David Rockefeller, WTC organizer, who pushed the idea of including Japan at the Bilderberg meetings but was rebuffed.


PART 4

So David Rockefeller "builds his own Bilderberg", called the Trilaterals:

This explains several things, like Trilateral/Rockefeller personnel of Americans involved in 9-11 state terror are majoritatively Trilaterals:

1. Trilateral Organization founded soon after WTCs completed in 1973. "The Trilateral Commission is a private organization, founded in July 1973, at the initiative of David Rockefeller, who pushed the idea of including Japan at the Bilderberg meetings he was attending but was rebuffed. Along with Zbigniew Brzezinski and a few others, including from the Brookings Institution, Council on Foreign Relations and the Ford Foundation, he convened initial meetings out of which grew the Trilateral organization."

The three current chairmen are:

* Tom Foley: North America (Democratic Congressman, former speaker of the [pedophile wing of the] U.S. House of Representatives and ambassador to Japan);
* Peter Sutherland: Europe (Irish businessman and former politician associated with the Fine Gael party; former Attorney General of Ireland and European Commissioner in the first Delors Commission; former director general of the General Agreement on Tariffs and Trade, the precursor to the World Trade Organization; Chairman of BP and Goldman Sachs International);
* Yotaro Kobayashi: Pacific Asia (chairman of the Fuji Xerox company).

Others who are or have been members, and who have interesting 9-11 links are:

* George H.W. Bush: Former President of the U.S.; CIA Director [9-11 perp linked]
* Jimmy Carter: Former President of the U.S.
* Dick Cheney: Current vice-president of the U.S. [9-11 perp linked]
* Bill Clinton: Former President of the U.S. [9-11 perp linked, or pre 1993 attempt at it, linked: 1993 WTC attack happened one month into Bush's sponsored Clinton Presidency; people on Bush's campaign then went to work for Clinton even. Bush and Clinton's campaign managers after 1992 campaign against each other...really got married.]
* Hank Greenberg: Former chairman and CEO of American International Group (AIG), the world's largest insurance and financial services corporation. [9-11 perp linked IN MANY WAYS; goes right into Abramoff as well as the money laundering on Florida SunCruz Lines that links right into 9-11 and false flagger Mohammad Atta who loved to visit SunCruz Lines owned by Abramoff, a partner in the Greenberg Traurig lawfirm of which Hang Greenberg is a part of as well]
* Lee Raymond: Former CEO and Chairman, ExxonMobil, vice chairman of the Board of Trustees of the American Enterprise Institute, [9-11 perp linked] director of J.P. Morgan Chase & Co., [9-11 perp linked] director and member of the Executive Committee and Policy Committee of the American Petroleum Institute.
* David Rockefeller: Founder of the Commission [and selects all members privately to suit him since he invented the organization]; Chairman of the Chase Manhattan Bank board from 1969 to 1981; Chairman of the Council on Foreign Relations from 1970 to 1985, [9-11 perp linked] now honorary Chairman; a life member of the Bilderberg Group. [9-11 perp linked]
* Henry Kissinger: U.S. diplomat, National Security Advisor and Secretary of State in the Nixon and Ford administrations; former Chairman of the International Advisory Committee of JP Morgan Chase. [9-11 perp linked]
* Zbigniew Brzezinski: U.S. National Security Advisor to U.S. President Jimmy Carter from 1977 to 1981. [possibly 9-11 perp linked]
* Paul Volcker: Chairman of the U.S. Federal Reserve [9-11 perp linked, actually his later position holder, Peter Peterson] from 1979 to 1987, Chairman of the Board of Trustees of the Group of Thirty.
* Paul Wolfowitz: President of the World Bank, former U.S. Deputy Secretary of Defense and a prominent member of the neo-conservatives in Washington. [9-11 perp linked]
* Gerald M. Levin: Former CEO of Time Warner, a member of the Council on Foreign Relations. [possibly 9-11 perp linked]
* Robert Zoellick: Deputy Secretary of State, formerly the U.S. Trade Representative. [9-11 perp linked]
* Frank Carlucci: President of Carlyle Group, U.S. Secretary of Defense from 1987 to 1989. [9-11 perp linked]
* William Cohen: Republican Congressman and Senator, U.S. secretary of Defense under President Clinton.
* Mary Robinson: President of Ireland from 1990 to 1997 as a candidate for the Labour Party; United Nations High Commissioner for Human Rights from 1997 to 2002.
* Sergei Karaganov: Presidential Advisor to Boris Yeltsin and Vladimir Putin; member of the International Advisory Board of the Council on Foreign Relations from 1995 to 2005.
* Jim Balsillie: Chairman and Co-CEO of Research In Motion.
* Georges Berthoin: International Chairman of the European Movement from 1978-1981.
* Ritt Bjerregaard: Danish Social Democrat MP, member of various cabinets; European Commissioner for Environment, Nuclear Safety and Civil Protection in the Santer Commission from 1995 to 1999.
* John H. Bryan: former CEO of Sara Lee bakeries, affiliated with the World Economic Forum and a director on the Boards of Sara Lee, Goldman Sachs [9-11 perp linked], General Motors, British Petroleum and Bank One.
* James E. Burke: CEO of Johnson & Johnson from 1976 to 1989.
* Catherine Ann Bertini: Former United Nations Under Secretary General in Management, former Director of World Food Program. [9-11 perp linked, that food program and its personnel has figured interestingly in some 9-11 money laundering studies]
* Gerhard Casper: Constitutional scholar, faculty member at Stanford University; successor trustee of Yale University and part of the Board of Trustees of the Central European University in Hungary.
* Tim Collins: CEO of Ripplewood Holdings LLC investment company; also part of the Yale Divinity School and Yale School of Management board of advisors and U.S.-Japan non-profit organizations.
* Bill Emmott: Former editor of The Economist magazine.
* Dianne Feinstein: Democratic U.S. Senator, former mayor of San Francisco, member of the Council on Foreign Relations; ranking member of the U.S. Senate Judiciary Subcommittee on Terrorism, Technology and Homeland Security. [oragnization is 9-11 perp linked]
* Martin Feldstein: Professor of economics at Harvard University; president and CEO of the National Bureau of Economic Research (NBER); chairman of the Council of Economic Advisers from 1982 to 1984; former director of the Council on Foreign Relations; member of the Bilderberg Group and of the World Economic Forum.
* Hugh Fletcher: Chancellor of Auckland University and CEO of Fletcher Challenge.
* David Gergen: [Bohemian Grover] Political consultant and presidential advisor during the Republican administrations of Nixon, Ford and Reagan; also served as advisor to Bill Clinton.
* Allan Gotlieb: Canadian ambassador to Washington from 1981 to 1989, chairman of the Canada Council from 1989 to 1994.
* Bill Graham: former Canadian Minister of National Defence and Minister of Foreign Affairs under Paul Martin; since 2006, interim parliamentary leader of the Liberal Party.
* Mugur Isarescu: Governor of the National Bank of Romania since 1990 and prime minister from December 1999 to November 2000; he worked for the Minister of Foreign Affairs then for the Romanian Embassy in the U.S. after the 1989 Romanian revolution.
* Otto Graf Lambsdorff: Chairman of the German Free Democratic Party from 1993 to 1998; Economic Minister for West Germany from 1977 to 1984.
* Liam Lawlor: Irish politician who resigned from the Fianna Fáil party; died in a car-crash in Moscow in 2005.
* Pierre Lellouche: French MP of the conservative Union for a Popular Movement party led by [neofascist] Nicolas Sarkozy.
* Jorge Braga de Macedo
* Kiichi Miyazawa: Japanese Prime minister in 1991-1993; Minister of Foreign Affairs from 1974 to 1976, Chief Cabinet Secretary from 1984 to 1986, Minister of Finance in 1987 and again from 1999 to 2002.
* Akio Morita: Co-founder of Sony Corporation; vice-chairman of the Keindanren (Japan Federation of Economic Organizations) and member of the Japan-U.S. Economic Relations Group.
* Andrzej Olechowski: Polish director of Euronet, USA; on the supervisory boards of Citibank Handlowy and Europejski Fundusz Hipoteczny; president of the Central European Forum; deputy governor of the National Bank of Poland from 1989 to 1991; minister of Foreign Economic Relations from 1991 to 1992; minister of Finance in 1992 and of Foreign Affairs from 1993 to 1995; economic advisor to president Lech Wałęsa from 1992 to 1993 and in 1995, etc.)
* Carl Palme
* Lucas Papademos: European Central Bank Vice-president.
* Gerard C. Smith: First U.S. Chairman of the Commission; chief U.S. delegate to the Strategic Arms Limitation Talks of 1969.
* Jessica Stern: Former NSC staff member, author, and lecturer at the Harvard Kennedy School of Government.
* George Vasiliou: President of the Republic of Cyprus from 1988 to 1993, founder and leader of the Cypriot United Democrats party.
* Francisco Pinto Balsemão
* Maldonado Gonelha
* Marcelo Rebelo de Sousa: Leader of the Social Democratic Party (Portugal) from 1996 to 1999.
* Miguel Sousa Soares: Management Consultant, EMPORDEF, MDN (Portugal) from 2005.
* Isamu Yamashita
* Lorenzo Zambrano: Mexican chairman and CEO of CEMEX since 1985, the third largest cement company of the world; member of the board of IBM and Citigroup.

Many of Americans Trilaterals are additionally in the PNAC group, the Project for a New American Century, which officially publicly and documentedly signed off on wishing for a "new Pearl Harbor terrorism event" that would let them seize control.


PART 5

post construction: organizing the plan and personnel for state terror:

1. choosing to bolt instead of weld WTCs together--and moreover people walking around asking "where would we put the demolition charges?" back during construction--was easer for their state terror operation later.

2. According to the RICO suit against Bush and others, "later" only meant from around 1976 or so. The U.S. Army was the one terror drilling to perpetrate the act back from 1976, making the "drill go live" like so many other "drills gone live" connected to the Bushes (Bush Senior was in charge of a "Presidential Assassination Drill on Reagan". Just the next day after the drill, the Reagan Assassination in 1980 happened just a two months into Reagan's first term, though Reagan didn't die and Bush Senior didn't get to be direct President. With ex-CIA head Bush Senior as the President from 1981 it was hoped by them, they would have the formal institutional capacity to cover up their crimes. They were less sure of Reagan, and Reagan was obviously not in on the state terror operation, even though he was in on everything else particularly the CIA-Contra-Bush Senior drug running.

3. In other words, no one expected state terror strikes to be postponed for 25 years or more. During this time galvanic corrosion of the WTC sets in.

4. Strange "strike of newspapers" in NYC....happens exactly during a hurried 'fix up WTC' welding done, with massive sparks all up and down the face of the buildings. After the patch up (or perhaps further ease of destabalization?) is done, the newspapers are back on line, though they fail to mention the background to what just occurred conveniently during the strike. [cite: Divided We Stand]

5. secret studies in the 1980s on 'how much longer do these intentional lemons have' to last before the galvanic corrosion between the different metals of the bolts and the steel (with sea humid air/water between) make the structure unstable? Studies additionally ask "how much would it simply cost to take them down legally?" That is key: they would hardly be conducting studies on how to disassemble them piece by piece in the late 1980s...if demolition on the construction site itself (talked above in the Hogan program) was meant to be a LEGAL demolition. WTCs were additionally well beyond 'spec' and code with asbestos and would cost billions there as well. So the 'demolition from the start' mentioned in the interview was the illegal demolition they were talking even as they were bolting the huge erector set of the WTCs together.

more after construction issues/personnel for the state terror operation:

6. explains how the whole 1976 staffing was put back in place (Rumsfeld, Secretary of State in 1976; Bush Senior, CIA Director in 1976, Nelson Rockefeller as Vice President and almost President after three failed assassination attempts on appointed Ford; Cheney was chief of staff for President Ford in 1976. These three came back together under the son of Bush Senior when George W. Bush was installed by the Supreme Court in 2000. Then Bush Senior really back in control once Bush Senior's right hand man, Meuller, was placed as head of the FBI weeks before the 9-11 self hit.

7. explains why postponed: Bush removed from CIA position by Carter, plan postponed. Regroup....

8. explains 'delay' when Nelson Rockfeller both fails to become president like he wanted in 1976. Then he dies in 1979.


PART 6

1. explains how they thought they could seriously rewrite the U.S. Constitution in 1976, to set up totally appointed frameworks of the legislature. Kid you not. This was connected to Rockfellers as well. [cite: Trilaterals over America, by Antony Sutton]

After the state terror of 1976, here's what they thought they could do: turn the U.S. into a police state and revoke the Bill of Rights. This was all planned out in advance, similar to how the "Patriot Act" was written up in advance and delivered with a whiff of treasonous U.S. governmental perpetrated anthrax (from Ft. Detrick, Maryland--and under a top secret 'anthrax weaponization' patent issued ONLY to the CIA) on the Congress.

not from that book though another QUOTE:

Study Offers New U.S. Constitution [to be introduced after 1976 state terror, already written up]
By Fred P. Graham
New York Times - Sept. 8, 1970, front page

In Santa Barbara, California, the Center for the Study of Democratic Institutions [that's a laugh of a name] has drafted a better U.S. Constitution. The current one is outdated.

*Rex Tugwell, former member of Roosevelt's "brain trust."

*Robert M. Hutchins, chairman.

*Harry S. Ashmore, senior Fellow of the center.

*Warren Burger (opposed to trial by jury).

This new version:

*20 or less "republics" instead of 50 states.

*a stronger Presidency & federal powers, instead of individual sovereign states.

*6 branches instead of 3.

- the regulatory branch would share its authority with private industry, could join multi-company groups to set standards.

*No more Supreme Court, weaker judicial powers.

*President serves 1 nine year term only.

*Senators

- not elected but chosen by other branches of government. They would consist of former Presidents & other former high officials.

*2 Vice Presidents instead of 1.

- 1 for general affairs. [This was the plan back in the 1930s for the fascist coup to have a Secretary for General Affairs as the 'dictator' who could be appointed by powers behind the scenes instead of be forced to go through elections to get executive power, cite: The Plot to Seize the White House, by Jules Archer. These were the fascists in the 1930s banking corporate elite of the USA then working on that.]

- 1 for internal affairs.

*No more Bill of Rights, but many of the same fundamental safeguards. [sure...]

- no right to a trial by jury. [Which is what neofascist Bush is doing]

- no right to bear arms. [which is what neofascist Bush is doing]

*Instead of 2/3 vote of Congress to amend the Constitution, amendments would be proposed by a council of judges approved by the President & Senate, and ratified by a majority in a [vote frauded] national election.

*After 5 presidential terms, the entire Constitution may be rewritten and submitted & ratified by a majority in a national election.

END QUOTE

Perhaps the terror hit that was planned was to be done in a few years to introduce this neofascist constitution, mentioned by the New York Times back in 1970. Same plan exactly as the U.S. Patriot Act nonsense that should be repealed in its ENTIRETY since it is criminal to and contradictory to the Bill of Rights' Constitutionally secured liberty protections.

2. explains the Trilateral/Rockefeller pressures around introducing the neofascist constitution back in the 1970s, as well as these Trilaterals issues: Nelson got half his wish by basically dominating all appointments of the Carter Administration with Trilaterals, a clique of banker/internationalists (which included George Bush by the way) all hand picked by his brother David Rockefeller. Trilaterals were started up by David Rockefeller. Mr. Grand Chessboard himself, Zbigniew Brezesinki, was a Trilateral, who in late 1990s wrote of "requirements" for a "new pearl harbor" because U.S. democracy 'lacks the will to be an empire without such events, history has shown'. Carter one of the first Trilaterals as well. Bush Senior was a Trilateral.

3. explains why the WTCs were chosen to even be constucted in the first place when economics or requirements of real estate were not even an issue in New York City then: they were designed to be illegally demolished during the U.S. Army created 1976 terror events which would serve as an alibi to their destruction, as described by McNiven. The WTCs were created simply for the Rockefeller desire of destroying them.

7. After all, the WTCs were constructed under Nelson Rockefeller himself (as Governor of New York), with help from his brother on financing, David Rockefeller (founder of the Trilaterals). These would be the very people who thought they would be in charge directly after Ford Assassination attempts. However, all these failed.


PART 7

1. Increasingly found to be unstable, though without the personnel in place to conduct the state terrorism cover up, other 'smaller state terrorisms' are invented:

2. explains surrogate hit on Three Mile Island to "jump start" FEMA as a back up plan, in 1979. FEMA is actually 'activated' three days early, before it is even authorized, to be in place for the fake hit on Three Mile Island. FEMA allows total media seal off and vetting of all events through the federal government. The state terror test successful.

3. explains why Bush Senior so anxious to get into the Presidency in 1980.

4. explains why he is willing to murder Reagan to do it, when his Vice President, in 1981, mere months into Reagan's first term. THE ATTEMPTED COUP D'ETAT OF MARCH 30, 1981 (87,300 bytes) http://www.tarpley.net/bush17.htm

5. explains the later 1993 FBI sponsored attempts, months into Bush proxy William Jefferson Clinton (drug dealing connections) to destory the Towers thorugh surrogate terrorists they actually told what to hit and how to hit it. However, the Towers failed to fall down.


PART 8

1. explains how directly after this failed attempt to take down the towers, the Bush family buys up the WTC security contracts. Soon, Marvin Bush head of Security (Securatec) for the WTC. (The reality is a bit more complicated, though shows Bush company (Kuwaiti-American) in charge of security at the WTC's after a failed attempt.

PART 9

1. explains how in early 2001, the whole 1976 team were put into power once more through Bush family appointments: Baby Bush appoints his father's 1976 friends to power once more: Cheney (Bush Senior's Secretary of State for the Gulf War I, Halluburton connections, and Cheney was Ford's 1976 Chief of Staff), Rumsfeld (appointed Secretary of State in 2001, was appointed Secretary of State in 1976 for appointed Ford as well...), and appointing George W. Bush (a proxy for his father coming back into power from his "interrupted" 1976 CIA Directorship), and the appointing of another GHW Bush right hand man, Meuller, as FBI director. Then they were set to unleash their hit on the United States. Which they did. Which they still are.

PART 10

2006.11.04 12:14
9-11 Insider Nicholas Rockefeller's Proprietary Cashless Society Technology and Databases

Description: The Very Visible Nicholas Rockefeller's Invisible Panopticon: His United Nations Aired Ideas for a Private Proprietary Database and Technology for a Global Wireless Cashless Consumer Panopticon, all under Nicholas Rockefeller, a 9-11 Insider. 9-11 "security" issues only set up wider "state driven appeal" for the his proprietary technology platform for a cashless society. 9-11 Insider Nicholas Rockefeller, predicts 9-11 justified Middle East invasions a year in advance--and only months before 9-11 sees fit as well to start up a pilot project for a cashless society. He has additionally been involved in THREE separate global people monitoring database corporations detailed below. "The cashless society will be controlled by the Rockefellers, and it will be microwave based, wireless, and controlled off the phone tower network"--if he has his way. China is his model. See what he is doing in China below, and see how there is huge synergy between his fingers and his minions' fingers in the corporations US Search, Zebasearch, and GlobalAgora--all linked to him.
http://portland.indymedia.org/en/2006/11/348680.shtml

NICHOLAS ROCKEFELLER AS 9-11 INSIDER ELEVEN MONTHS IN ADVANCE OR MORE

Nicholas Rockefeller predicted in early 2000 to a friend he found "un-recruitable to the CFR", Aaron Russo (which probably led in the past several years for Russo to rush through making America: Freedom to Fascism), that an event would soon happen to allow for a Caspian pipeline, an Afghanistan invasion, and an Iraq invasion.

Eleven months later, Russo said, Nicholas Rockefeller got his wish: the 9-11 events happened and sure enough, soon there was a Caspian pipeline, an Afghanistan invasion, and an Iraq invasion.

Nicholas Rockefeller Predicted "Event" To Trigger War Eleven Months Before 9/11
Hollywood director Russo recalls remarkable "forecast" of coming attack

Paul Joseph Watson/Prison Planet.com | October 28 2006

Hollywood director and documentary film maker Aaron Russo, currently receiving a wave of plaudits for his latest release, America: From Freedom to Fascism told The Alex Jones Show that Nicholas Rockefeller had personally assured him there was going to be an "event" that would trigger the invasions of Afghanistan and Iraq eleven months before 9/11 took place.

Saying he had been approached many times by the Rockefellers and other members of the CFR elite in an attempt to recruit him, Russo recalled a conversation that would come home to roost on September 11, 2001.

"Here's what I do know first hand - I know that about eleven months to a year before 9/11 ever happened I was talking to my Rockefeller friend (Nicholas Rockefeller) and he said to me 'Aaron there's gonna be an event' and he never told me what the event was going to be - I'm not sure he knew what the event was going to be I don't know that he knew that," said Russo.

Russo related how Rockefeller knew precisely what the event would lead to and which countries would be militarily targeted by the elite.

"He just said there's gonna be an event and out of that event we're gonna invade Afghanistan so we can run pipelines through the Caspian sea, we can go into Iraq to take the oil and establish bases in the middle east and to make the middle east part of the new world order and we're going to go after Venezuela - that's what's going to come out of this event."

"Eleven months to a year later that's what happened....he certainly knew that something was going to happen."

"In my relationships with some of these people I can tell you that it's as evil as it really gets - this is it - this is the game," stated Russo - also relating how members of the elite were routinely obsessed by creating a world identification society where people had to carry ID cards and prove who they were at all times.

link to prisonplanet.com

===========================
watch America: From Freedom to Fascism for free. This film Russo rushed through production likely right after he realized his close "Rockefeller friend" was a clear accessory to mass murder in the 9-11 events, as fascist plots were being hatched from the U.S. military and the Bush/Cheney clique around 9-11. However, Russo's film starts this slow fascist coup back in 1913, toward how the Federal Reserve began to create the perfect totalitarian monitored society--of which Nicholas Rockefeller's additions to this totalitarian society are detailed and coming out into the open only from Summer 2001 to the present (in the article below).

Google once censored Russo's film and deleted it--until Aaron Russo himself authorized its uploading for people to watch for free. Google hacks remain silent--for now. The film has moved steadily up after Google stopped censoring it:

Today Yesterday
49 39
Aaron Russo's _America Freedom to Fascism_ Authorized version

http://video.google.com/videoplay?docid=-4312730277175242198

http://portland.indymedia.org/en/2006/11/348680.shtml

Remote Mind Control

Remote Mind Control

Reach out and touch someone,
by Steven J. Smith

http://www.geocities.com/electrogravitics/rmc.html

1.1.0
Introduction:
Since the dawn of civilization, governments have sought means to manipulate the thoughts and perceptions of its citizens. For example, every dictator wants to feel safe from, and loved by, those he dictates to. Even democratic governments use the techniques of public relations, spin doctoring, and press conferences, to shape the perceptions and opinions of their constituency. These techniques are so widespread that most human languages have a word dedicated to its description. In English, that word is "propaganda". The reason for this emphasis on human thought and perceptual management is quite simple. It takes far less effort to change someone's mind, than to change their living, working, or economic conditions. Furthermore, since the citizenry always out number those who exercise authority, it is critical that a majority of the people are satisfied with their leadership, or at least believe that no better alternative is available. Any government that fails to follow this maxim, be it a democracy, republic, monarchy, military junta, or dictatorship, is doomed to a quick and ignominious demise. It follows that ALL governments have an intense interest in, and are willing to expend vast sums of money on, ANY method or technology that holds the promise of enhancing the manipulation of human thought and/or perception.

With the rise of competitive nation states and international trade, a second application for human perceptual/opinion management has emerged. The use of propaganda to modify the perceptions and opinions within neighboring nation states, and thereby gain some political, economic, or military advantage, generally to the detriment of those who are manipulated. In the 20th century, a new and novel avenue for manipulating the human mind made its first appearance. The use of EM (electromagnetic) energy to directly modify human thought process. Its first application was electro-convulsive therapy (ECT) also known as electro-shock treatment. While being a crude, brute force method, it none the less opened the door to more tantalizing and subtle possibilities.

What follows is a detailed exposé on the development, deployment, and ongoing use, of a covert EM mind control technology that spans the entire planet. You already know its name, if not its capabilities.

You call it the Cell Phone Network...


1.1.1
Early developments:
Starting in the 1950s, working under the now infamous MK Ultra project, dozens of government grants were awarded for research into different aspects of human thought and/or perceptual manipulation. Some of these grants involved the development and testing of psychoactive drugs (LSD for instance). Other grants involved the physical modification of the human brain via surgery. Still other grants involved the use of EM energy to alter brain chemistry, with the ultimate goal being covert injection of perceptions or thoughts directly into the human mind. It is this last category of research that we shall focus upon in this paper.

It is unlikely that we'll ever know the true extent of, or the full results derived from, human mind control research conducted under the auspices of MK Ultra. However all is not lost, there are non-classified research papers from that era. Also a body of circumstantial evidence exists, that can be used to gain further insight into the subject. And of course, we have the fully deployed remote mind control system itself, available for our review and analysis. All we have to do is connect the dots...

Lets start with a 60 year old piece of circumstantial evidence.

During the development and deployment of Radar (in WWII), there were reports from radar technicians of auditory stimulus (artificial sounds) coincident with exposure to microwave radiation. It was generally assumed that mechanical movement within the ear or surrounding bone structure, created by rapid changes in temperature from exposure to microwaves, was the most likely cause. However, when deaf subjects also reported "hearing" microwaves, it became clear that a more subtle mechanism or phenomena must be responsible for the effect.


1.1.2
Allen H. Frey:
Cornell University (Ithaca New York), 1962. Allen H. Frey publishes a research paper in the Journal of Applied Physiology entitled, "Human auditory system response to Modulated electromagnetic energy". In his paper Mr. Frey describes the use of EM energy at average power levels measured in microwatts per square centimeter. I quote directly from his research paper:

The perception of various sounds can be induced in clinically deaf, as well as normal, human subjects at a distance of inches up to thousands of feet from the transmitter.

With somewhat different transmitter parameters, we can induce the perception of severe buffeting of the head, without such apparent vestibular symptoms as dizziness or nausea. Changing transmitter parameters again, one can induce a "pins-and-needles" sensation.

The transmitter modulation method employed in Mr. Frey's experiments was "pulse modulation", later known as digital modulation (figure 1 in Mr. Frey's paper). A further observation by Mr. Frey is relevant to this discussion. The EM frequency spectrum for greatest absorption by the human head, and therefore lowest threshold of auditory perception. In other words, what part of the EM spectrum is most efficient (requires the least transmitted power) to produce an auditory response? Referring to Mr. Frey's paper, the graph in Fig. 5 indicates the frequency spectrum from 500 Mhz to 5000 Mhz is most efficient, with peak efficiency near 1000 Mhz.

Click Here to view a full copy of Allen H. Frey's research paper (opens in a new browser window).


1.1.3
Cell Phone frequency spectrums:
The frequency spectrums assigned to the Cell Phone Network fall within 840 to 960 Mhz (low band) and 1710 to 2170 Mhz (high bands). Figure 1 is a reproduction of Mr. Frey's graph, with the positions of cell phone frequency bands outlined in red.


Figure 1
(reproduction of Mr. Frey's graph with cell phone frequency bands included)


As you can see, the frequency bands assigned by the FCC (federal communications commission) for use by Cell Phone Networks are at or near the peak of Mr. Frey's graph (showing most efficient absorption of EM energy by the human head), a graph taken from a 40+ year old research paper entitled: "Human auditory system response to Modulated electromagnetic energy" (see 1.1.2 above).

What a remarkable coincidence! Or is it?

As a side note, the frequency assigned for use by microwave ovens (2450 Mhz) is also in this same part of the EM spectrum.


1.1.4
Cell Phone base transceiver stations:
Everybody's seen them and hates them. They dot the urban landscape like a plague, and they seem to pop up like weeds. I'm talking about Cell Phone towers (see figure 2 below). These towers are just the most visible part of a Cell Phone BTS (Base Transceiver Station). At the bottom of each tower is a small building that houses the actual BTS electronics.


Figure 2, a typical Cell Phone BTS tower
(picture courtesy of tuberose.com)


One might assume that each Cell Phone conversation (channel) has an independent transmitter dedicated (or assigned) for the duration of the call. In reality three sets of broadband transmitters known as an MCPA (Multi-Carrier Power Amplifier) are used, with each Cell Phone conversation (channel) summed together with other Cell Phone conversations (channels), and the entire group broadcast (transmitted) by a particular MCPA set. The reason three MCPA sets are used is that most Cell Phone BTS sites divide their coverage area into three 120 degree sectors, with each MCPA set assigned to one particular sector. These 120 degree coverage sectors are why the Cell Phone BTS tower has that distinctive triangular antenna arrangement (as shown above).

Since each MCPA set handles all the Cell Phone conversations for a 120 degree coverage sector, it follows that although the transmitted power for any particular Cell Phone conversation is specified as 10 watts, the TOTAL power output of an MPCA set ranges from 180 watts to 360 watts. Furthermore, the antenna configuration shapes (or focuses) the radiated EM pattern such that the total ERP (effective radiated power) ranges from 9,000 watts to 18,000 watts per 120 degree coverage sector (17db or 50x antenna gain). Therefore the total ERP for a Cell Phone BTS site (360 degree coverage) is on the order of 27,000 to 54,000 watts! And of course there are multiple Cell Phone companies, each with its own network of BTS sites. Consequently any particular urban area will be subjected to EM radiation of approximately 81,000 to 216,000 watts (3 to 4 cell phone companies). To put this in perspective, the average AM radio station transmitter is 50,000 watts.

Click Here to view the product specification sheet for a typical MCPA (requires Adobe Acrobat reader - opens in a new window).
Click Here to view the product specification sheet for a typical Cell Phone BTS antenna (requires Adobe Acrobat reader - opens in a new window).

Under normal operation, each Cell Phone company uses a different portion of the Cell Phone Network frequency spectrum. However the actual frequencies used are determined by computer controlled DSP (digital signal processors) which like any computer controlled device, can be reprogrammed in fractions of a second. The transmitted signal uses TDMA (time division multiple access) or CDMA (code division multiple access) encoding. Both encoding methods produce a series of digital (on-off) pulses, just like Mr. Frey's original experiments (see 1.1.2 above).

It would seem the modern Cell Phone BTS is tailor made to reproduce Mr. Frey's experimental results (see 1.1.2, 1.1.3 above).


1.1.5
Touch someone:
Modern radar systems employ a non-mechanical steering technique known as a phased array. Essentially, a set of independently controlled microwave transmitters are synchronized such that their signals will combine constructively at one particular location, while canceling at other locations (see figure 3 below).


Figure 3, phased array radar
(courtesy of USN)


An easy way to visualize this technique is to imagine ripples, caused by dropping several small pebbles into a lake at slightly different locations and times. If done precisely, the peaks of the ripples would all combine at one location. While at other locations, the peak from one ripple would combine with the trough of another, thereby canceling each other. In a similar manner, the EM radiation (electromagnetic waves) from multiple BTS sites could be synchronized to create a large effect at one particular location. When combined with GPS (global positioning satellites), targeting would be very precise. In practical terms, an agent provocateur (CIA, NSA, or DIA - take your choice) would use a computer equipped with a modem or internet connection to access a special phone number, then enter the target coordinates. The Cell Phone network would be reprogrammed to bring all DSP's of BTS sites near the target location into synchronized phase with each other, and to transmit in a single narrow frequency spectrum, thereby allowing up to 200,000 watts (see 1.1.4 above) of microwave radiation to be targeted at the unsuspecting victim. Optimally, this would take place between 11:00PM and 5:00AM because the Cell Phone Network call traffic is minimal during these hours.

A further refinement of targeting capabilities took place in 2002, when Lucent Technologies announced "per-user intelligent antenna processing". With this technique, and I quote:

The base station sends a separate, dedicated, narrower beam to each active user, which adaptively follows them as they move through the base station's coverage area.

In other words, a BTS site equipped with this technology can focus a narrow "beam" of microwave energy at a particular cell phone, and will "follow" that cell phone as it moves from one location to another.

Click Here to view the Lucent Technologies intelligent antenna processing, press release (opens in a new browser window).


1.2.1
Such a nice boy:
His mother said, "he was such a nice boy, he never caused any trouble". Until he walked into a fast food restaurant, pulled out a gun, and started shooting everyone in sight. Sadly, he also shot himself, so now we'll never know why he committed such a shocking criminal act. Sound familiar? Of course it does. These days, it happens with depressing regularity. Then there was the Texas mother who drowned her children in the bathtub. She said, "the voice of god told me to do it".

Psychologists tell us these seemingly random acts of violence result from economic pressures and breakdowns in inter-personal relationships, caused by the stress of modern society. I contend what we are witnessing in these wonton acts of violence, is nothing less than experimental tests of remote mind control, accomplished using the Cell Phone BTS sites to inject post hypnotic commands directly into the human mind (1.1.2, 1.1.3, 1.1.4, 1.1.5).

How do I support this conclusion?

Synthesizing the human voice from a digital noise source is proven technology, dating back to the 1960s (Bell Labs 1962). The technique is called Formant Synthesis, and was used in the movie 2001, when HAL 9000 sang "Daisy". The Cell Phone transmission method uses digital pulses (1.1.4), and according to Mr. Frey's observations, the perceived sound most closely matched that of the EM modulation i.e. a series of digital pulses (1.1.2). As any audio engineer will attest, such a series of digital pulses, when reproduced by an audio amplifier, are perceived as a "buzzing" noise, just as required for input to Formant Synthesis of the human voice. It is quite reasonable to assume that in the 40+ years since Mr. Frey published his paper, use of digitally modulated EM energy to inject the auditory perception of human voices, directly into the human mind, has been perfected. Especially when you consider the value any government would place on such technology (1.1.0).

Sleep learning, also known as hypnopaedia, is another proven technology with roots dating back to the 1950s. Spoken phrases are repeated over and over, while the person sleeps, which then facilitate recall when the subject is awake. Many believe hypnopaedia is not very effective, since the memories are not fully integrated into the subjects general conscious state. However, from the perspective of injecting posthypnotic suggestions to perform violent criminal acts, this supposed drawback is actually beneficial because it allows the person to disconnect or disassociate form performance of the criminal activity. This leads to another common thread among many contemporary crimes of violence. i.e. when questioned, the suspect said: "it was like I was watching someone else commit the crime". The technique of hypnopaedia could be further enhanced by use of EM modulation methods that induce an emotional bias or hormonal response in conjunction with the posthypnotic suggestion, thereby creating trauma based imprinting of the suggestion (see 1.2.3 below). The common name for trauma based imprinting is Brain Washing.

While there is no direct evidence of Cell Phone BTS sites being used in the manner described herein. As I have so amply shown, the BTS site architecture and capabilities are a perfect match to the required specifications of a fully functional mind control network (1.1.2, 1.1.3, 1.1.4, 1.1.5). And when considered in the context of government propensity to coerce rather than cajole citizen behavior, it is hard to imagine that if such mind control technology is feasible, that it was not built into the Cell Phone BTS sites.

Click Here to visit the Wikipedia article on Speech Synthesis, including the Formant technique (opens in a new browser window).
Click Here to visit the Wikipedia article on sleep learning (opens in a new browser window).


1.2.2
American foreign policy:
It is a well known fact (at least outside of America) that American foreign policy is dedicated to the manipulation and economic subjugation of other sovereign nations. Furthermore, while American foreign policy favors democracies, dictatorships and military juntas are also routine recipients of American foreign aid and trade concessions. Next, according to the CIA fact book, most third world and developing nations have more Cell Phones in use than conventional land line phones. The reason being that Cell Phone Networks require less installation, and incur less maintenance costs.

Click Here to visit the CIA World Fact Book (opens in a new browser window).

Now consider a hypothetical dictatorship. The dictator is receiving so called American foreign aid (which he's depositing in numbered Swiss bank accounts). In return, he's allowing American multinational corporations to exploit his nations natural resources, with complete disregard for the environmental damage, and consequent human suffering caused by such exploitation. As the plight of these people deteriorates, how is this dictator (and his American backers) going to keep the subjugated populace from rising up, and deposing the dictator? American supplied guns (and military advisors) worked well in the past, but such bellicose behavior is frowned upon in this enlightened, post millennium era. Suppose instead the Cell Phone BTS sites are used every night to inject hypnotic suggestions of tranquility and well being, directly into the minds of a sleeping populace.

But what if, despite the best efforts at population mind control, some opposition leader should arise to challenge the despotic rule of our hypothetical dictator?

His mother said, "he was such a nice boy, never caused any trouble". Until he picked up a gun, and assassinated the wildly popular opposition leader during a political rally in the capital city today. When questioned by the authorities he is reported to have said, "the voice of god told me to do it".

Later, in a written press release, the local representative from the U.N. High Commission on Human Rights said he is investigating possible involvement by government secret police, but so far no proof has been found. The White House press secretary also issued a statement on behalf of the President, strongly condemning the incident as a senseless act of violence, and reaffirming the President's unwavering commitment to democracy, the rule of law, and universal human rights...

Of course if our hypothetical dictator should ever decide to double cross America, and cut a better deal with the Europeans or China, the Cell Phone BTS sites will transmit hypnotic suggestions of discontent and anger. Then within a month or two, the White House press secretary will be issuing another statement on behalf of the President, asking for calm during this troubling time of transition, and pledging support for the new leader.


1.2.3
Beyond voices:
Mr. Frey's paper describes two other (non-auditory) phenomena that can be evoked by modulated EM energy (1.1.2). The perception of severe head buffeting, and the sensation of "pins-and-needles". In the context of coercing specific behavioral response, both phenomena would be useful in and of them selves. However, beyond their direct usefulness, these two phenomena imply the possibility of a much wider constellation of hallucinatory sensations. Furthermore, the autonomic feedback loop from sensory to motor nervous system networks within the mammalian brain, would indicate that remote control of musculature is also a distinct possibility.

What follows is based on reports from targeted subjects.

Physical sleep disturbances:
bulletPhysical restlessness. Inability to get, or stay comfortable.
bulletLocalized physical hot spots, generally discovered when getting out of, or returning to bed in the middle of the night. (see 1.1.3 reference to microwave ovens)
bulletWaking up feeling dehydrated, or with very dry mouth, or sinuses. (see 1.1.3 reference to microwave ovens).
bulletStartling awake for no apparent cause. Sometimes accompanied by the impression that someone had just spoken.
bulletSweating, for no apparent reason, sometimes in unusual patterns. For instance, only on one leg or arm.
bulletMuscle twitch similar to the involuntary knee jerk elicited by a doctor during examination, but involving every muscle in a leg or arm, or sometimes the whole body in a single massive spasm.
bulletMuscle rigidity, often accompanied by whole body muscle tremors.

Mental sleep disturbances:

bulletDisruption of REM sleep over multiple nights, leading to overall decline in physical health.
bulletDream hijacking. Having a dream suddenly change from pleasant to frightening or threatening.
bulletUp-Down syndrome. Getting up because you can't sleep, and then immediately starting to yawn because you're tired. With pattern repeating multiple times in a single night.
bulletWaking up with general or specific feelings of fear, dread or anger, and no memory of a cause or reason for such feelings.
bulletWaking up from a dream in which you did something, or acted in ways that are contrary to your normal behavior. Sometimes accompanied by feelings of shame, or self loathing.

The above lists are NOT exhaustive, but merely intended to illustrate the types of physical and/or mental disturbances that can be triggered by modulated EM energy, when used as a covert weapon.

Defense lawyers, when confronted with a defendant who's actions seem completely at odds with their previous patterns of behavior, should carefully question their client as to any recent sleep disturbances they may have experienced. Furthermore, a defendants claim of hearing voices that compelled them to commit a criminal act, should not be lightly dismissed, especially if a clinical examination of defendant shows no sign of mental defect. In such cases, hypnotic regression may prove useful in uncovering the root causes of their aberrant criminal behavior.

Psychologists, and psychiatrists should also take the time to familiarize themselves with this new and sinister form of induced mental illness. It just may be that your mentally disturbed patient of today who is hearing voices in their head, will become tomorrows mass murderer.


1.3.1
Countermeasures:
The obvious solution to covert attack by targeted microwave energy is metallic shielding. While several companies offer products specifically intended to shield against microwave energy, ordinary aluminum foil works very well, and is much less expensive. Furthermore, at least one of the companies that offer microwave shielding products is owned by individuals with ties to the government intelligence community (CIA, NSA, DIA), and therefore should be carefully avoided. Another useful shielding material is fine mesh window screening, however make sure it is metallic, and NOT plastic.

There are two basic approaches to EM energy shielding.
bulletWhole room shielding.
bulletSelective shielding.

Whole room shielding is by far the preferred solution, but more expensive to implement. Selective shielding is less expensive, but also less convenient and depending on the exact nature of its construction, less effective. Whole room shielding entails covering all walls, and depending on physical location, the floor and ceiling, with aluminum foil or fine mesh window screening. Selective shielding entails the use of folding room dividers covered in aluminum foil or fine mesh window screening, and placed around the bed.

One other method is suggested by figure 6, in Mr. Frey's paper (see 1.1.2). That is the use of a head shield. While portrayed as a "tin foil hat" in the popular media and belittling jokes, the use of fine mesh window screening, sandwiched between two light weight cloth stocking caps would be far more comfortable, and far less noticeable by others. This method would be useful in locations and circumstances where other shielding methods discussed herein are impractical (a motel room for instance). However, the author must caution that use of a head shield is far less effective than other methods discussed in this section.

Another useful adjunct to EM shielding is a microwave leakage meter. These meters are used to measure the level of EM leakage from devices such as microwave ovens. Many consumer versions are available for less than $50. However, since the meter is intended to measure leakage from microwave ovens operating at 2450 Mhz, rather than Cell Phone Networks operation at slightly lower frequencies, the meter should be tested by holding it near an operating Cell Phone during a call. A more accurate (and expensive) version known as an RF field meter is available from Scientific Meters (link opens in a new browser window), for $320. An RF field meter, with an audio alarm function that could be set to trigger at a specific threshold level would be ideal. The meter could be located next to the bed, and would wake the victim up, at the commencement of any directed EM energy attack.

In closing, during the last 10 years, there has been a plethora of whacko jokes, derogatory comments and movie plots involving the use of tin foil hats. These should be viewed as an attempt to discredit the whole idea of attack by directed EM energy. Comments and movies of this type should also be considered as yet another piece of circumstantial evidence that such attacks are in fact, taking place on a daily basis. And finally, that those individuals and organizations responsible for attacks by directed EM energy, also exercise influence over the mass media, and other forums of public opinion.


1.3.2
Further investigations:
A consequence of flooding the urban environment with high energy microwave radiation is the steady rise of non-specific sleep disorders in the general population. This may be an unintended side effect, or it may be quite intentional. Either way, a study of sleep disturbances, correlated with Cell Phone BTS site distribution would prove very helpful. The study should also explore the temporal relationship between Cell Phone BTS site growth, and the rise of reported sleep disturbances. Furthermore, it is the author's conjecture that a positive correlation between leukemia and Cell Phone BTS site geographic and temporal growth will also be evident.

Another useful study would be the correlation between the rise of violent criminal activity and Cell Phone BTS site density. Both geographic and temporal correlations should be considered. It is the authors opinion that a positive correlation will be found.

For those organizations that have the technical capabilities, reverse engineering the BTS computer firmware would lead to incontrovertible proof that Cell Phone BTS sites are in fact mind control weapons. Reverse engineering would also provide the necessary information to block the weapon functions, while leaving the communications functions intact. This project would be a good undertaking for some enterprising company in an emerging nation (India for instance). They need not worry about legal liability arising from charges of patent or copyright infringement. Charges of this type would inevitably lead to disclosure of the pertinent facts, and it is most unlikely that any corporation would wish to take public responsibility for developing such a vile and pernicious weapon.

Several recent incidents within the EU would seem to warrant further investigation. The unexpected and widespread uprising of disgruntled youth in France is a good example, especially given the strained diplomatic relations with America, over the Iraq invasion.


1.3.3
Summary:
The development and deployment of a remote mind control network, based on Cell Phone BTS technology as described herein, does not require some grand conspiracy with hundreds of corporations, and thousands of individuals. The number of people who were directly involved in the development is most likely less than 100. The vast majority of individuals who manufacture, market, sell, and install Cell Phone BTS sites are ignorant of the networks true capabilities. It is unknown how many people within the American intelligence community (CIA, NSA, DIA, etc.) that have direct knowledge of the systems capabilities. However, given the operational requirements, this number may range upwards of 10,000. It is also not known how many individuals in other countries (such as those within the EU intelligence communities) are cognizant of the remote mind control capabilities built into Cell Phone BTS sites.

While many will choose to view this paper as an exercise in paranoid fantasy, others will recognize symptoms or behaviors I have described, and take the appropriate precautions. Still others will read this document, and over time, as they watch events unfold in the world around them, come to know the truth of my words. Despots and dictators will desire to possess this technology, while the free and righteous will desire to ban its use. By your actions, each of you will help create mankind's future, and each of you will have to live within that future you have created. Choose wisely...


1.3.4
Disclaimer:
ALL information contained herein is derived from public sources, widely accepted scientific principles, and/or authors first hand experience. The author has NO written or verbal agreement with ANY governmental agency forbidding disclosure of the information contained herein. In disclosing this information, the author is exercising his right to free speech as a private citizen of the United States of America. While the author advocates the discovery and disclosure of Cell Phone based remote mind control technology, NO ATTEMPT should be made to interfere in any way whatsoever with the personnel and/or operations of said technology. The proper method for achieving discontinuance of these activities is through court ordered injunctive relief.

Unmanned aircraft systems roadmap

Unmanned aircraft systems roadmap

Remote brain wave analysis and modification

Remote brain wave analysis

and modification

Communication system and method including brain wave analysis and/or use of brain activity

US Patent Issued on January 4, 2000

http://www.patentstorm.us/patents/6011991-fulltext.html

Found by Onehoop

Abstract

A system and method for enabling human beings to communicate by way of their monitored brain activity. The brain activity of an individual is monitored and transmitted to a remote location (e.g. by satellite). At the remote location, the monitored brain activity is compared with pre-recorded normalized brain activity curves, waveforms, or patterns to determine if a match or substantial match is found. If such a match is found, then the computer at the remote location determines that the individual was attempting to communicate the word, phrase, or thought corresponding to the matched stored normalized signal.


Claims

I claim:

1. A method of communicating comprising the steps of:

providing a first human being at a first location;

providing a computer at a second location that is remote from the first location;

providing a satellite;

providing at least one sensor on the first human being;

detecting brain activity of the first human being using the at least one sensor, and transmitting the detected brain activity to the satellite as a signal including brain activity information;

the satellite sending a signal including the brain activity information to the second location;

a receiver at the second location receiving the signal from the satellite and forwarding the brain activity information in the signal to the computer;

comparing the received brain activity information of the first human being with normalized or averaged brain activity information relating to the first human being from memory; and

determining whether the first human being was attempting to communicate particular words, phrases or thoughts, based upon the comparing of the received brain activity information to the information from memory.

2. The method of claim 1, further including the following steps:

asking the first human being a plurality of questions and recording brain activity of the first human being responsive to the plurality of questions in the process of developing said normalized or averaged brain activity information relating to the first human being stored in the memory.

3. The method of claim 2, wherein the plurality of questions are the same question.

4. The method of claim 2, wherein the plurality of questions are different questions.

5. The method of claim 2, further comprising the step of normalizing or averaging recorded brain activity responsive to a given question or set of questions in developing the normalized or averaged brain activity information relating to the first human being.

6. A method of communicating words from a first location to a second location, the method comprising the steps of:

providing a first human being at the first location;

providing a computer at the second location that is remote from the first location;

providing at least one sensor on the first human being;

detecting brain activity of the first human being using the at least one sensor wherein the brain activity is indicative of words to be communicated by the first human being, and forwarding the detected brain activity indicative of words to be communicated to the computer at the second location;

comparing the received brain activity of the first human being indicative of words to be communicated with normalized or averaged brain activity information relating to the first human being from memory; and

determining words being communicated by the first human being based upon the comparing of the received brain activity information to the information from memory.

7. The method of claim 6, further including asking the first human being a plurality of questions and recording brain activity of the first human being responsive to the plurality of questions in a process of developing the normalized or averaged brain activity information relating to the first human being.

8. The method of claim 6, further comprising the step of the computer outputting words determined in said determining step to a second human being so that words thought or stated by the first human being are communicated by the first human being to the second human being via the computer.

Description

This invention relates to a system and method for enabling human beings to communicate with one another by monitoring brain activity. In particular, this invention relates to such a system and method where brain activity of a particular individual is monitored and transmitted in a wireless manner (e.g. via satellite) from the location of the individual to a remote location so that the brain activity can be computer analyzed at the remote location thereby enabling the computer and/or individuals at the remote location to determine what the monitored individual was thinking or wishing to communicate.

In certain embodiments this invention relates to the analysis of brain waves or brain activity, and/or to the remote firing of select brain nodes in order to produce a predetermined effect on an individual.

BACKGROUND OF THE INVENTION

It is known to monitor brain activity by way of electroencephalograph (EEG) methods, magnetoencephalograph (MEG) methods, and the like. For example, see U.S. Pat. Nos. 5,816,247 and 5,325,862, the disclosures of which are both hereby incorporated herein by reference. As discussed in the '247 patent, an EEG may be recorded from a number of pairs of scalp electrodes and processed according to known software. Such software and/or hardware acquires both processed and unprocessed EEG data and may record it on a disk. The records may be replayed and statistics of the on-line measures made on suitable sections placed in categories predefined by a user. This may utilize the form of database of statistical measures of brain activity. Unfortunately, neither the '862 nor the '247 patents disclose or suggest any methods by which humans can communicate with one another by way of monitoring brain activity.

U.S. Pat. No. 5,719,561 discloses a communications device and method, the entire disclosure of the '561 patent hereby being incorporated herein by reference. The '561 patent discusses a method and device for vibromechanical tactile communications adaptable for use by individuals to recognize alpha numeric messages in a language or in other symbols known to them. The '561 patent discusses using a series of sequentially firing vibromechanical stimulators vibrating against a suitably tactile sensitive surface of the wearer (e.g. skin) to induce a phenomenon of illustration of linear continuity. Unfortunately, the '561 patent requires the use of burdensome and complex vibromechanical tactile devices, and is not suitable for long distance communication.

It is a purpose of this invention to address any or all of the above-identified problems in the prior art, as well as other problems which will become apparent to the skilled artisan from the following detailed description of this invention.

SUMMARY OF THE INVENTION

Generally speaking, this invention fulfills the above described needs in the art by providing a method of communicating comprising the steps of:

providing a first human being at a first location;

providing a computer at a second location that is remote from the first location;

providing a satellite;

providing at least one sensor (preferably a plurality--e.g. tens, hundreds, or thousands, with each sensor monitoring the firing of one or more brain nodes or synapse type members) on the first human being;

detecting brain activity of the first human being using the at least one sensor, and transmitting the detected brain activity to the satellite as a signal including brain activity information;

the satellite sending a signal including the brain activity information to the second location;

a receiver at the second location receiving the signal from the satellite and forwarding the brain activity information in the signal to the computer;

comparing the received brain activity information of the first human being with normalized or averaged brain activity information relating to the first human being from memory; and

determining whether the first human being was attempting to communicate particular words, phrases or thoughts, based upon the comparing of the received brain activity information to the information from memory.

In certain embodiments, the invention includes the following step: asking the first human being a plurality of questions and recording brain activity of the first human being responsive to the plurality of questions in the process of developing said normalized or averaged brain activity information relating to the first human being stored in the memory. A database in a memory may include, for each of a plurality (e.g. one hundred or thousands) of individuals, a number of prerecorded files each corresponding to a particular thought, attempt to communicate a word, attempt to communicate a phrase or thought, or mental state. Measured brain activity of a given individual may be compared to files from that database of that individual to determine what the individual is attempting to communicate or what type of mental state the individual is in.

In certain embodiments, the plurality of questions are the same question.

In certain embodiments, the plurality of questions are different questions.

In certain embodiments, the invention includes the step of normalizing or averaging recorded brain activity responsive to a given question or set of questions in developing the normalized or averaged brain activity information relating to the first human being.

It is an object of this invention to enable brain activity of a first human being to be monitored, with the activity being transmitted to a remote location so that individuals and/or a computer at the remote location can determine what the first human being was thinking or intending to communicate. In such a manner, human beings can communicate with one another via monitoring of brain activity, and transmission of the same.

It is another object of this invention to communicate monitored brain activity from one location to another in a wireless manner, such as by IR, RF, or satellite.

It is another object of this invention to provide a system capable of identifying particular nodes in an individual's brain, the firings of which affect characteristics such as appetite, hunger, thirst, communication skills (e.g. which nodes are utilized to communicate certain words such as "yes", "no", or phrases such as "I don't know", "I'm not sure", or numbers such as "one", "two", "ten", "one hundred" and the like), thought processes, depression, and the like). When such nodes are identified, they may be specifically monitored by one or more sensors to analyze behavior or communication or words, phrases, or thoughts. In other embodiments, devices mounted to the person (e.g. underneath the scalp) may be energized in a predetermined manner or sequence to remotely cause particular identified brain node(s) to be fired in order to cause a predetermined feeling or reaction in the individual, such as lack of hunger, lack or depression, lack or thirst, lack of aggression, lack of alzheimer's disease effects, or the like.

Brain node firings are the basis of thought and mind processes of individuals. Certain embodiments of this invention enable such brain firings and behavior to be captured by an external device. It is an object of this invention to utilize a normalization or normalizing curve (or waveform or pattern) based upon monitored brain activity to detect or determine thought processes by the monitored individual. In such a manner, individuals can transmit by satellite what they are thinking or intending to think via their monitored brain activity, without the need to talk or write down information.

Each individual has a distinct pattern of brain node firings or brain activity. Each person is believed to be different in this regard. Thus, a separate brain activity file may be stored in a memory for each individual, and analyzed or compared to received brain activity from the monitored individual in order to determine what that individual is thinking or attempting to communicate.

It is an object of this invention to utilize brain monitoring and transmission of monitored brain activity for lie detection and/or human communication.

It is another object of this invention to formulate or build-up a file for each individual based upon patterns recorded in response to that individual answering or responding to numerous predetermined questions with known intended responses. Subsequently, monitored brain activity from that individual may then be compared to information stored corresponding to that individual to determine whether the individual is lying or what the individual is intending to communicate in the monitored brain activity. The higher the level of detail of the file, the higher the level of potential communication by certain embodiments of this invention.

At least one sensor on the scalp or skin in certain embodiments provides signals representative of physiological activity generated in the brain of a monitored individual. A data acquisition device receives the signals representative of the physiological activity generated in the monitored brain, and transforms the signals into a pattern or curve corresponding to the monitored brain activity. This is then transmitted (e.g. by satellite) to a computer located at a remote location, with the monitored brain activity pattern or curve being stored in a memory at the remote location. The computer then causes the received pattern or curve information to be compared with stored brain activity pattern information relating to the monitored individual in order to determine (a) whether the monitored individual is lying in response to a particular question, or (b) what the monitored individual is communicating or attempting to communicate.

Another object of this invention is to utilize normalization curves representative of received brain activity patterns from the monitored individual, and to compare the received normalized data with normalized brain activity pattern or curve data stored in memory relating to that individual. The use of normalization curves in one or both of the individual's file and received brain activity improves reliability, accuracy, and efficiency.

In certain embodiments of this invention, the computer located at the remote location includes a neural network suitably programmed in accordance with known neural network techniques, for the purpose of receiving the monitored brain activity signals, transforming the signals into useful forms, training and testing the neural network to distinguish particular forms and patterns of physiological activity generated in the brain of the monitored individual, and/or comparing the received monitored brain activity information with stored information relating to that individual in order to determine what the individual is attempting to communicate.

This invention further fulfills the above described needs in the art by providing a method of affecting a mental or physiological state of an individual, the method comprising the steps of:

providing at least one firing device capable of being energized on an individual; and

energizing the firing device to cause the firing device to cause a particular or group of brain nodes to be fired in the individual in order to affect the mental or physiological state of the individual.

In certain embodiments, the method including the step of providing the at least one firing device on or under the scalp of the individual in proximity of the brain of the individual.

In certain embodiments, the method including the step of identifying at least one brain node related to the mental or physiological state intended to be affected, targeting the identified brain node, and energizing the firing device or devices to cause the identified node to be fired in order to affect the mental or physiological state of the individual.

In certain embodiments, the method is utilized to cause the individual to be one of less hungry, less thirsty, less anxious, and less depressed.

In certain embodiments, the remote node firing devices are electrically energized and generate electromagnetic waves which cause a plurality of brain nodes to be fired.

This invention will now be described with respect to certain embodiments thereof, along with reference to the accompanying illustrations.

IN THE DRAWINGS

FIG. 1 is a block diagram illustrating the system and method according to a first embodiment of this invention.

FIG. 2 is a block diagram illustrating the neural network inclusive computer of the FIG. 1 embodiment of this invention.

FIGS. 3(a)-3(f) are exemplary graphs of monitored brain activity of different individuals, with, for example, FIG. 3(a) illustrating monitored brain activity of a particular individual who is attempting to communicate the word "no" and FIG. 3(b) illustrating monitored brain activity of the same individual when that individual is attempting to communicate the word "yes."

DETAILED DESCRIPTION OF CERTAIN EMBODIMENTS OF THIS INVENTION

Referring now more particularly to the accompanying drawings in which like reference numerals indicate like parts throughout the several views.

There are significant individual differences in electrical and magnetic activity in the brain. Brain node or synapse firings are chemically and/or electrically caused and/or related. Some characteristics of brain activity may be relatively stable when measured from day to day. Brain responses to sensory stimulation (e.g. visual, audible, olfactory, gustatory, etc.) as well as higher order cognitive processing (e.g. decision-making or thought/word communication), can be examined in great detail using a variety of recording procedures. A recording of brain electrical activity is called an electroencephalograph (EEG), and a comparable record of magnetic activity is called a magnetoencephalogram (MEG). When human sensory systems are stimulated by a particular event (a given sound or optical effect) or when a human wishes to communicate a particular word or phrase (e.g. the word "yes" or the word "no"), there is a predictable sequence of processing that occurs in the brain. This processing generates an event related potential that can be recorded from the scalp beginning shortly after the onset of the stimulation, and lasting for approximately 0.5-4 seconds after the stimulation. These potentials can be repeatedly generated from individuals given the same stimulus or wishing to communicate the same word or phrase. In certain embodiments of this invention, brain activity may be repeatedly sampled, and response patterns averaged by way of a normalization curve or the like. Comparable recordings of averaged or normalized magnetic activity may be referred to as evoked fields. Neuroelectric and neuormagnetic recordings are subsets of general measurings referred to as bioelectric and biomagnetic measures. These measures refer to recordings which may be made from different types of tissue including neural, muscle, heart, etc. For example, EEG, evoked potentials (EP), MEG, position emission tomography (PET) of glucose, or single photon emission computed tomography (SPECT) may be used to monitor brain activity in different embodiments of this invention.

Event related potentials have been shown to be stable and unique to individuals. See U.S. Pat. No. 5,325,862, which is incorporated herein by reference. Although the actual shape of such potentials varies considerably from individual to individual, there is stability within individuals over time for individual waveforms. Sources of these potentials and variations thereof include individual differences in brain anatomy and differences in the way in which information is processed by each individual. Thus, it is feasible herein to utilize monitored brain waveforms for the purpose of determining whether an individual is lying or not, or what word or phrase a particular individual is attempting to communicate (without the need for writing information down or speaking).

Thus, evoked fields and/or event related potentials can be utilized as classifiers for several purposes. For example, because these potentials and/or fields are relatively unique to individuals, an individual's evoked field or event related potential (or brainprint) can be utilized to determine what thoughts an individual is communicating or attempting to communicate given knowledge of the identification of that individual and previously recorded patterns associated with that individual communicating predetermined words, phrases or thoughts. Because there is a remarkable degree of stability in individual waveforms of a person over time, it is possible to identify changes in individual event related potentials and evoked field patterns which can be utilized to determine when an individual is lying, or impaired in any way.

There are numerous neural networks in the brain, these networks having complex inner connections and non-linear response patterns. Relationships between the latencies and amplitudes of event related potentials and evoked field waveform features have become well understood. In addition, there are many individual variations in waveform morphology. Computing techniques modeled after brain neural functions are known in the art. They are typically referred to as neural network analysis techniques or computers. Neural network analysis computing technology offers a method for finding complex, non-linear relationships in large data sets, even when the nature of the relationships is not known in advance. Neural network technology is implemented sometimes using computer software programs, but may also be hardware implemented. Neural network theory, and detailed descriptions of specific techniques, are available in numerous books and articles set forth in the aforesaid '862 patent, as well as in, for example, any of U.S. Pat. Nos. 5,136,687; 5,059,814; 5,461,699; 5,737,485; 5,224,203; and 5,640,493, the entire disclosures of which are all hereby incorporated herein by reference. Such neural computing systems have a capability to learn features of data sets and classify same into either unknown or predetermined categories. A variety of neural network techniques may be utilized to classify event related potentials, evoke fields, or any other type of pattern corresponding to monitored brain behavior. In most neural networks, input values are adjusted through a series of layers by a series of transforms and weighted so that output categories are correctly predicted. Thus, a neural computing system herein may be utilized to receive monitored brain activity and based upon predetermined stored and/or learned information, determine based upon the received information what word, phrase, or thoughts the monitored individual is attempting to communicate. In such a manner, the monitoring of brain activity may be utilized to allow individuals to communicate from one location to another, with the neural computer or any other type of computer analyzing the monitored brain information (e.g. via comparison with previously recorded brain activity of that person) and outputting information indicative of the word, phrase, or thoughts which the monitored individual is attempting to communicate.

FIG. 1 illustrates a particular monitored individual 3 according to an embodiment of this invention. Individual 3 includes a head 5. As illustrated, sensors 7 may be attached or otherwise disposed adjacent to the scalp or skin of the individual 3. Sensors 7 detect and monitor brain activity of individual 3. Sensors 7 can detect event related potentials and/or event related fields (i.e. ERPs or ERFs). Optionally, sensor 7 may be utilized to detect any other type of "brainprint" indicative of brain activity of individual 3.

The monitored "brainprint" of individual 3 is forwarded to a small transmitter 9 which is preferably embedded in the skin of individual 3, or in close proximity to individual 3. Transmitter 9 causes the monitored "brainprint" information detected by sensor 7 to be transmitted by way of antenna 11 as wireless signals 13. In certain embodiments of this invention, signals 13 propagate through atmospheric free space in the form of uplink satellite signals toward satellite 15. Satellite 15 receives signals 13 and then redirects those signals back toward Earth as signals 17 which include information therein (analog or digital) indicative of the monitored brain activity of individual 3. Signals 17 are received by antenna 19. Antenna 19 and individual 3 are both preferably located on Earth at different locations. In certain embodiments, antenna 19 is located at a location remote from individual 3. For example, individual 3, sensor 7, transmitter 9, and antenna 11 may all be located in Europe while receiving antenna 19 and computer 21 may be located in the United States.

FIG. 1 illustrates both a digital embodiment 23 and an analog embodiment 25 of receiving systems. Either may be utilized. When signals 17 include digital information, they are received by antenna 19 and forwarded to tuner 27. The signals are processed through equalizer 29, demodulator 31, parallel to serial converter 33, deinterleaver 35, decoder 37, descrambler 39, digital estimator 41, and finally to neural network analysis or other type of computer 21. Monitored firings of brain nodes may be broken down into digital form (e.g. the firing of a node is equivalent to a "1" and nonfiring to a "0"). These 1s and 0s, which are digital, may be modulated onto a carrier and then transmitted to the satellite so that the monitored brain activity in the signal is in digital form. When the computer receives this monitored signal from the satellite, the demodulating system analyzes the received digital information (e.g. 1s and 0s) which is indicative of the firing of select brain nodes of the monitored individual. These digital signals may be transformed, in certain embodiments, into analog form similar to the illustrations of FIG. 3, or alternatively may be kept in digital form and compared with prestored digital signals to determine what the monitored person was intending to communicate.

In analog embodiments, signal 17 is received by antenna 19, and the information forwarded to tuner 27, amplifier 43, and the analog information inclusive signal 45 is forwarded to computer 21. In analog embodiments, the signals received by the monitoring sensors are in the form of waves similar to those shown in FIG. 3 herein.

FIG. 2 is a block diagram of computer 21 in certain embodiments of this invention. The input thereto may be in either analog or digital form. Computer 21 includes processor 51, RAM 53, comparing device 55, and memory 57 for storing a plurality of files or patterns of measured brain activity or responses of particular individuals. For example, memory or storage 57 may include one file for individual X which includes hundreds of monitored brain activity (e.g. ERPs or ERFs) that were measured when individual X was attempting to communicate the word "no." Another file in storage or memory 57 may have stored therein hundreds or thousands of monitored brain patterns or activities of individual X when individual X was attempting to communicate the word "yes." Storage or memory 57 may also include similar files for individual X including patterns which were measured when the individual was attempting to communicate different words or phrases. Each of these files may have a normalized curve, waveform or pattern formed or developed for each word, phrase, or thought for each individual, based upon all of the recorded patterns or curves for that word, phrase, or thought (e.g. 1,000 such recordings for the phrase "help me," and 1,000 for the phrase "I've been caught." Memory 57 further includes in certain embodiments many different files for many different individuals, all including files for each individual's past communicating of particular words, phrases, or thoughts.

Normalized curves or patterns corresponding to each individual's attempt to communicate a particular word, thought, or a pattern may be stored in storage or memory 57. Thus, for individual X attempting to communicate the word "no", a normalized curve, waveform, or a pattern may be stored in memory 57 indicative or such a communication. Likewise, a normalized curve, waveform, or pattern may be stored in memory 57 for individual Y attempting to communicate the word "no" and another distinct normalized curve, waveform, or pattern may be stored in memory 57 for individual Y attempting to communicate the word "yes." In a similar manner, a normalized curve, waveform or pattern may be stored in memory 57 for individual Y attempting to communicate the phrase "I don't know" or "I'm not sure." Thus, if one hundred different human beings have files in memory 57 corresponding to each of these individual's attempt to communicate the phrase "I don't know", then one hundred different normalized waveforms, curves or patterns would be stored in memory 57, each corresponding to a particular individual. A normalized curve, waveform, or pattern may be developed by repeatedly asking an individual tens, hundreds, or thousands of times a particular question or group of questions which evoke a known response such as "I don't know," or "no" or "yes." Each time the response is made, a curve, waveform, or a pattern is recorded. After tens, hundreds, or even thousands of these patterns have been recorded, a normalized curve, waveform or pattern is formed based upon same so as to be indicative of that particular individual's attempt to communicate the phrase. In a similar manner, if it is desired to store normalized curves, waveforms, or patterns for ten different words, phrases or thoughts communicated by a particular individual, then a normalized curve, waveform, or pattern is developed for each of the different ten items so that ten different normalized curves, waveforms or patterns are stored in memory 57 for that individual and classified accordingly. Thus, when computer 21 receives signals indicating brain activity from that monitored individual, the received signals are compared by device 55 to the ten different normalized signals in memory 57 in order to determine what the individual is attempting to communicate.

FIGS. 3(a)-3(f) illustrate different normalized curves which may be stored in memory 57. FIG. 3(a) shows a normalized curve indicative of individual "Joe" attempting to communicate the word "no." FIG. 3(b) shows a normalized curve indicative of individual "Joe" attempting to communicate the word "yes." FIG. 3(c) shows a normalized curve indicative of another individual "Steve" attempting to communicate the word "no", while FIG. 3(d) shows a normalized curve indicative of individual "Steve" attempting to communicate the word "yes." Finally, FIG. 3(e) shows a normalized curve indicative of still another individual "Anita" attempting to communicate the word "no", while FIG. 3(f) illustrates a normalized curve of "Anita" attempting to communicate the word "yes."

Thus, if computer 21 receives a signal including monitored brain information identified as being from individual "Steve", then computer 21 causes the received signal to be compared by device 55 with the normalized curves or waveforms shown in FIGS. 3(c) and 3(d) and all others normalized stored signals of "Steve." If a match or a close match is found between the received monitored signal and the normalized curve of FIG. 3(c), then the computer determines that "Steve" was attempting to communicate the word "no." Meanwhile, if no match is found with the normalized curve of FIG. 3(c), but a match or a substantial match is found with regard to the normalized curve or waveform of FIG. 3(d), then the computer determines that "Steve" was attempting to communicate the word "yes." If no match is found between the received "Steve" signal and any normalized curve or waveform of either FIG. 3(c) or FIG. 3(d), or with any other normalized curve stored in memory 57 corresponding to "Steve", then the computer determines that it is unclear what "Steve" was attempting to communicate.

Thus, different embodiments of this invention may be utilized to help individuals communicate with one another without having to send faxes, make telephone calls, speak, or the like. For instance, military personnel located in the Middle East or Europe can communicate with superiors in the Pentagon, simply by use of monitored brain activity being transmitted by satellite to the Pentagon. Alternatively, a special operations individual (e.g. a spy) located in Europe could be asked a question by way of a telephone call, fax, or the like, and that individual can respond to that question simply by thinking the answer so that that individual's monitored brain activity which is transmitted back to the United States can be analyzed to determine the individual's response. In further embodiments of this invention, two-way human communication is possible, provided that human beings at both locations have equipment capable of analyzing and monitoring received monitored brain activity. In such a manner, individuals at two remote locations may communicate with one another without either individual having to speak a word, write anything down, or the like.

In other embodiments, devices mounted to the person (e.g. underneath the scalp) may be energized in a predetermined manner or sequence to remotely cause particular identified brain node(s) to be fired in order to cause a predetermined feeling or reaction in the individual, such as lack of hunger, lack or depression, lack or thirst, lack of aggression, lack of alzheimer's disease effects, or the like. In an example of such an embodiment, the sensors may be replaced with remote firing devices. The computer may cause satellite signals to be sent to a receiver on or proximate an individual, which receiver forwards instructions to the remote firing devices that are mounted, e.g. under the scalp of the individual, in order to selectively cause same to fire or be energized. Such energizing of the device(s) under or near the scalp in a predetermined manner tend to cause identified brain nodes to fire a predetermined number of times. This is useful, for example, in the following scenarios. For example, the system can be used to identify which brain node(s) in a particular individual are typically fired causing that individual to not be hungry. If that individual has an eating disorder or problems with obesity, then the firing devices can be remotely energized thereby causing the identified brain node(s) to be fired at predetermined or random times in order to cause the individual to not be hungry (even if the individual has not eaten for several hours or several days).

In a similar manner, brain nodes which cause an individual to be jovial or not depressed can be identified, and caused to be remotely fired by the computer and firing devices 7 mounted under the scalp in a predetermined manner or sequence(s) in order to minimize or prevent depression of the individual. This may eliminate the need for drugs such a Prozac. Alternatively, such drug(s) may be administered after such remote node firings, and the nodes at issue thereafter being monitored as discussed above and a biofeedback being performed to determine the effectiveness of the drug(s) or alternatively to enable a system to be utilized combining drug treatment with remote node firings to more effectively prevent or minimize depression of the individual. Thus, the biofeedback may enable the identified nodes to be fired by the firing devices and/or drug treatment at the proper level to most efficiently treat the disease, illness or state. This invention, including remote firings and/or monitoring, is not limited to these examples, and its potential uses are almost endless. Brain node firings can be remotely controlled in a predetermined manner or sequence(s) (even random or sequential) to reduce, minimize, or eliminate undesirable behavior or mental characteristics. This may eliminate or reduce the need for burdensome drug treatments and the like. Brain node firings of a normal person, or of a particular person in a given mental or physical state, may be monitored and the brain activity stored and analyzed in the computer 21 memory. This stored brain activity may then be caused by remotely causing the firing devices to cause particular brain node(s) to be fired at given times or intervals in a predetermined manner or sequence. The computer may be programmed to instruct the brain sensors and/or firing devices to identify which brain nodes are responsible for which types of physical or mental behavior, and then the computer transmits firing instructions to the firing devices for those nodes to cause them to be fired in a predetermined manner to effect such physical or mental behavior.

Once given the above disclosure, many other features, modifications, and improvements will become apparent to the skilled artisan. Such other features, modifications, and improvements are, therefore, considered to be a part of this invention, the scope of which is to be determined by the following claims.