..............................................................

>From the New Paradigms Project [Not Necessarily Endorsed]:
Conspiracy Shopping Cart: http://a-albionic.com/shopping.html

http://surf.to/illuminati_news

From: Lloyd Miller <[EMAIL PROTECTED]>
Subject: Covert Operations of the U.S.National Security Agency
Date: Friday, May 12, 2000 7:51 PM

 Subject:  Covert Operations of the U.S.National Security Agency


John St Clair Akwei vs National Security Agency Ft George G. Meade, MD, USA (Civil 
Action 92-0449)

Webmaster: Where-ever Mr. Akwei is now, he'd better watch his back while getting on a 
plane  ....


1. THE NSA’S MISSION AND DOMESTIC INTELLIGENCE OPERATION

 · Communications Intelligence (COMINT)

Blanket coverage of all electronic communications in the US and the world to ensure 
national security. The NSA at Ft Meade, Maryland has had the most advanced computers 
in the world since the early 1960s. NSA technology is developed and implemented in 
secret from private corporations, academia and the general public.

· Signals Intelligence (SIGINT)

The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF 
waves in the environment for wirelessly tapping into computers and tracking persons 
with the electrical currents in their bodies. Signals Intelligence is based on the 
fact that everything in the environment with an electric current in it has a magnetic 
flux around it which gives off EMF waves. The NSA/DoD (Department of Defense) has 
developed proprietary advanced digital equipment which can remotely analyze all 
objects, whether manmade or organic, that have electrical activity.



· Domestic Intelligence (DOMINT)

The NSA has records on all US citizens. The NSA gathers information on US citizens who 
might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are 
authorized by executive order to spy on anyone. The NSA has a permanent national 
security anti-terrorist surveillance network in place. This surveillance network is 
completely disguised and hidden from the public. Tracking individuals in the US is 
easily and cost-effectively implemented with the NSA’s electronic surveillance 
network. This network (DOMINT) covers the entire US, involves tens of thousands of NSA 
personnel, and tracks millions of persons simultaneously. Cost-effective 
implementation of operations is assured by NSA computer technology designed to 
minimize operations costs.

NSA personnel serve in quasi-public positions in their communities and run cover 
business and legitimate businesses that can inform the intelligence community of 
persons they would want to track. NSA personnel in the community usually have cover 
identities such as social workers, lawyers and business owners.



· Individual Citizens Occasionally Targeted for Surveillance by 
Independently-Operating NSA Personnel

NSA personnel can control the lives of hundreds of individuals in the US by using the 
NSA’s domestic intelligence network and cover businesses. The operations independently 
run by them can sometimes go beyond the bounds of law. Long-term control and sabotage 
of tens of thousands of unwitting citizens by NSA operatives is likely to happen. NSA 
DOMINT has the ability to assassinate US citizens covertly or run covert psychological 
control operations to cause subjects to be diagnosed with ill mental health.



2. NSA’S DOMESTIC ELECTRONIC SURVEILLANCE NET WORK

As of the early 1960s, the most advanced computers in the world were at the NSA, Ft 
Meade. Research breakthroughs with these computers were kept for the NSA. At the 
present time the NSA has nanotechnology computers that are 15 years ahead of present 
computer technology.

The NSA obtains blanket coverage of information in the US by using advanced computers 
that use artificial intelligence to screen all communications, regardless of medium, 
for key words that should be brought to the attention of NSA agents! cryptologists. 
These computers monitor all communications at the transmitting and receiving ends. 
This blanket coverage of the US is a result of the NSA’s Signals Intelligence (SIGINT) 
mission.

The NSA’s electronic surveillance network is based on a cellular arrangement of 
devices that can monitor the entire EMF spectrum. This equipment was developed, 
implemented and kept secret in the same manner as other electronic warfare programs.



· Signals Intelligence Remote Computer Tampering

The NSA keeps track of all PCs and other computers sold in the US. This is an integral 
part of the Domestic Intelligence network. The NSA’s EMF equipment can tune in RF 
emissions from personal computer circuit boards (while filtering out emissions from 
monitors and power supplies). The RF emission from PC circuit boards contains digital 
information in the PC. Coded RF waves from the NSA’s equipment can resonate PC 
circuits and change data in the PCs. Thus the NSA can gain wireless modem-style entry 
into any computer in the country for surveillance or anti-terrorist electronic warfare.



· Detecting EMF Fields in Humans for Surveillance

A subject’s bioelectric field can be remotely detected, so subjects can be monitored 
anywhere they are. With special EMF equipment NSA cryptologists can remotely read 
evoked potentials (from EEGs). These can be decoded into a person’s brain-states and 
thoughts. The subject is then perfectly monitored from a distance. NSA personnel can 
dial up any individual in the country on the Signals Intelligence EMF scanning network 
and the NSA’s computers will then pinpoint and track that person 24 hours a day. The 
NSA can pick out and track anyone in the US.



3. NSA SIGNALS INTELLIGENCE USE OF EMF BRAIN STIMULATION

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) 
and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since 
the MKULTRA program of the early 1950s, which included neurological research into 
radiation (non-ionizing EMF) and bioelectric research and development. The resulting 
secret technology is categorized at the National Security Archives as “Radiation 
Intelligence,” defined as “information from unintentionally emanated electromagnetic 
waves in the environment, not including radioactivity or nuclear detonation.” Signals 
Intelligence implemented and kept this technology secret in the same manner as other 
electronic warfare programs of the US Government. The NSA monitors available 
information about this technology and withholds scientific research from the public. 
There are also international intelligence agreements to keep this technology secret. 
The NSA has proprietary electronic equipment that analyzes electrica!
l activity in humans from a distance. NSA computer­generated brain mapping can 
continuously monitor all of the electrical activity in the brain. The NSA records and 
decodes individual brain maps (of hundreds of thousands of persons) for national 
security purposes. EMF Brain Stimulation is also secretly used by the military for 
brain-to-computer link (in military fighter aircraft, for example). For electronic 
surveillance purposes, electrical activity in the speech center of the brain can be 
translated into the subject’s verbal thoughts. RNM can send encoded signals to the 
brain’s auditory cortex, thus allowing audio communications direct to the brain 
(bypassing the ears). NSA operatives can use this covertly to debilitate subjects by 
simulating auditory hallu­cinations characteristic of paranoid schizophrenia. Without 
any contact with the subject, Remote Neural Monitoring can map out electrical activity 
from the visual cortex of a subject’s brain and show images from the subje!
ct’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes 
are seeing. Visual memory can also be seen. RNM can send images direct to the visual 
cortex, bypassing the eyes and optic nerves. NSA operatives can use this 
surreptitiously to put images into a surveillance subject’s brain while they are in 
REM sleep for brain-programming purposes.



· Capabilities of NSA Operatives Using RNM

There has been a Signals Intelligence network in the US since the 1940s. The NSA, Ft 
Meade has in place a vast, two­ way, wireless RNM system which is used to track 
subjects and non-invasively monitor audiovisual information in their brains. This is 
all done with no physical contact with the subject. RNM is the ultimate method of 
surveillance and domestic intelligence. Speech, 3D sound, and subliminal audio can be 
sent to the auditory cortex of the subject’s brain (bypassing the ears), and images 
can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods, and 
motor control. Speech cortex/auditory cortex link has become the ultimate 
communications system for the intelligence community. RNM allows for a complete 
audiovisual brain-to-brain link or brain-to-computer link.



4. NATIONAL SECURITY AGENCY SIGNALS INTELLIGENCE ELECTRONIC BRAIN LINK TECHNOLOGY

NSA SIGINT can remotely detect, identify and monitor a person’s bioelectric fields. 
The NSA’s Signals Intelligence has the proprietary ability to monitor, remotely and 
non-invasively, information in the human brain by digitally decoding the evoked 
potentials in the 30-50 Hz, 5 milliwatt electromagnetic emissions from the brain. 
Neuronal activity in the brain creates a shifting electrical pattern that has a 
shifting magnetic flux. This magnetic flux puts out a constant 30-50 Hz, 5 milliwatt 
electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain 
are spikes and patterns called “evoked potentials.” Every thought, reaction, motor 
command, auditory event, and visual image in the brain has a corresponding “evoked 
potential” or set of “evoked potentials.” The EMF emission from the brain can be 
decoded into the current thoughts, images and sounds in the subject’s brain. NSA 
SIGINT uses EMF-transmitted Brain Stimulation as a communications system to transmi!
t information (as well as nervous system messages) to intelligence agents and also to 
transmit to the brains of covert operations subjects (on a non-perceptible level). EMF 
Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal 
to trigger evoked potentials (events) in the brain, thereby forming sound and visual 
images in the brain’s neural circuits. EMF Brain Stimulation can also change a 
person’s brain-states and affect motor control. Two-way electronic Brain Link is done 
by remotely monitoring neural audiovisual information while transmitting sound to the 
auditory cortex (bypassing the ears) and transmitting faint images to the visual 
cortex (bypassing the optic nerves and eyes). The images appear as floating 2D screens 
in the brain.

Two-way electronic Brain Link has become the ultimate communications system for 
CIA/NSA personnel. Remote neural monitoring (RNM, remotely monitoring bioelectric 
information in the human brain) has become the ultimate surveillance system. It is 
used by a limited number of agents in the US Intelligence Community.



5. [NO HEADING IN ORIGINAL DOCUMENT]



RNM requires decoding the resonance frequency of each specific brain area. That 
frequency is then modulated in order to impose information in that specific brain 
area. The frequency to which the various brain areas respond varies from 3 Hz to 50 
Hz. Only NSA Signals Intelligence modulates signals in this frequency band. (See Table 
1.)







This modulated information can be put into the brain at varying intensities from 
subliminal to perceptible.

Each person’s brain has a unique set of bioelectric resonance/ entrainment 
frequencies. Sending audio information to a person’s brain at the frequency of another 
person’s auditory cortex would result in that audio information not being perceived. 
The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group 
at the NSA, Ft Meade. They used RNM 3D sound direct to the brain to harass the 
Plaintiff from 10/90 to 5/91.

As of 5/91 they have had two-way RNM communications with the Plaintiff and have used 
RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to 
the authorities about their activities against the Plaintiff in the last 12 years. The 
Kmnnecome group has about 100 persons working 24 hours a day at Ft Meade. They have 
also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff 
isolated. This is the first time ever that a private citizen has been harassed with 
RNM and has been able to bring a lawsuit against NSA personnel misusing this 
intelligence operations method.



6. NSA TECHNIQUES AND RESOURCES

Remote monitoring/tracking of individuals in any location, inside any building, 
continuously, anywhere in the country. A system for inexpensive implementation of 
these operations allows for thousands of persons in every community to be spied on 
constantly by the NSA.



· Remote RNM Devices

NSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for 
tracking individuals, and can send messages through the nervous systems to affect 
their performance. RNM can electronically identify individuals and track them anywhere 
in the US. This equipment is on a network and is used for domestic intelligence 
operations, government security and military base security, and in case of bioelectric 
warfare.



· Spotters and Walk-Bys in Metropolitan Areas

Tens of thousands of persons in each area working as spotters and neighborhood 
/businessplace spies (sometimes unwittingly) following and checking on subjects who 
have been identified for covert control by NSA personnel. Agents working out of 
offices can be in constant communication with spotters who are keeping track of the 
NSA’s thousands of subjects in public. NSA agents in remote offices can instantly 
identify (using RNM) any individual spotted in public who is in contact with 
surveillance subject.



 · Chemicals and Drugs into Residential Buildings with Hidden, NSA-Installed and 
Maintained Plastic Plumbing Lines

The NSA has kits for running lines into residential tap water and air ducts of 
subjects for the delivery of drugs (such as sleeping gas or brainwashing-aiding 
drugs). This is an outgrowth of CIA pharmapsychology (psychopharmacology).



· Brief Overview of Proprietary US Intelligence/Anti Terrorist Equipment Mentioned

Fixed network of special EMF equipment that can read EEGs in human brains and 
identify/track individuals by using digital computers. ESB (Electrical Stimulation to 
the Brain) via EMF signal from the NSA Signals Intelligence is used to control 
subjects. EMF equipment that gathers information from PC circuit boards by deciphering 
RF emissions, thereby gaining wireless modem-style entry into any personal computer in 
the country. All equipment hidden, all technology secret, all scientific research 
unreported (as in electronic warfare research). Not known to the public at all, yet 
complete and thorough implementation of this method of domestic intelligence has been 
in place since the early 1980s.



RESOURCES

These publications have only been discovered since December 1991, after Plaintiff had 
already notified authorities (Dept. of Justice, etc.) of Public Corruption by named 
NSA employees. When no action was taken against the NSA employees, I researched the 
Intelligence Community electronic surveillance technology involved and discovered the 
following publications.



The Body Electric: Electromagnetism and the Foundation of Life, by Robert Becker, M.D. 
Monitoring neuroelectric information in the brain; EM waves; ESB (pp. 265, 313, 318).

Cross Currents, by Robert Becker. Simulating auditory hallucinations (pp. 70, 78, 105, 
210, 216, 220, 242, 299, 303). Remote computer tampering using the RF emissions from 
the logic board (p. 174).

Currents of Death, by Paul Brodeur. Driving brain electrical activity with external 
EM; magnetophosphenes; Delgado (pp. 27, 93).

The Zapping of America, by Paul Brodeur, DoD EM ESB research; simulating auditory 
hallucinations.

Of Mice, Men and Molecules, by John H. Heller, 1963. Bioelectricity; probing the brain 
with EM waves (p. 110).

The Three-Pound Universe, by Judith Hooper. CIA EEG research; EEGs for surveillance 
(pp. 29, 132, 137).

In the Palaces of Memory, by George Johnson. EM emissions from the brain; the brain as 
an open electromagnetic circuit.

The Puzzle Palace, by James Bamford. Signals intelligence; most advanced computers in 
the early sixties. The US Intelligence Community. Glossary terms at National Security 
Archives: Radiation Intelligence (information from unintentionally emanated 
electromagnetic energy, excluding radioactive sources).

The Search for the “Manchurian Candidate,” by John Marks. Electrical or radio 
stimulation to the brain; CIA R&D in bioelectrics (p. 227).

Secret Agenda, by Jim Hougan. National security cult groups.

Crimes of the Intelligence Community, by Morton Halperin. Surreptitious entries; 
intelligence agents running operations against government workers.

War in the Age of Intelligent Machines. NSA computer supremacy, complete control of 
information.

Alternate Computers, by Time-Life Books. Molecule computers.

The Mind, by Richard Restak, M.D. EEG Systems, Inc.; decoding brain EM emanations; 
tracking thoughts on a computer (p. 258).

MedTech, by Lawrence Galton. Triggering events in the brain, direct to auditory cortex 
signals.

Cyborg, by D. S. Halacy, Jr. 1965. Brain-to-computer link research contracts given out 
by the US Government.

Psychiatry and the CIA: Victims of Mind Control, by Harvey M. Weinstein, M.D. Dr. 
Cameron; psychic driving; ultraconceptual communications.

Journey Into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, by 
Gordon Thomas. Intelligence R&D; Delgado; psychic driving with radio telemetry (pp. 
127, 276, 116, 168-69).

Mind Manipulators, by Alan Scheflin and Edward M. Opton.

MKULTRA brain research for information-gathering.

The Brain Changers, by Maya Pines. Listening to brain EM emissions (p. 19).

Modern Bioelectricty. Inducing audio in the brain with EM waves; DoD cover-up; EM wave 
ESB; remote EEGs.

Magnetic Stimulation in Clinical Neurophysiology, by Sudhansu Chokroverty. 
Magnetophosphenes; images direct to the visual cortex.

The Mind of Man, by Nigel Calder. US Intelligence brain research.

Neuroelectric Society Conference, 1971. Audio direct to the brain with EM waves; 
two-way remote EEGs.

Brain Control, by Elliot S. Valen stein. ESB; control of individuals.

Towards Century 21, by C. S. Wallia. Brain stimulation for direct-to-brain 
communications (p. 21).

Mind Wars, by Ron McRae (associate of Jack Anderson). Research into brain-to-brain 
electronic communications; remote neural EM detection (pp. 62, 106, 136).

Mind Tools, by Rudy Rucker. Brain tapping; communications with varying biomagnetic 
fields (p. 82).

US News & World Report, Jan 2, 1984. EM wave brain stimulation; intelligence community 
high tech (p. 38).

Ear Magazine. Article on extremely low frequency radio emissions in the natural 
environment; radio emissions from the human body.

City Paper, Washington, DC, Jan 17, 1992. Article on FCC and NSA “complete radio 
spectrum” listening posts.

Frontiers in Science, by Edward Hutchings, Jr, 1958 (p. 48). Beyond Biofeedback, by 
Elmer and Alyce Green, 1977 (p. 118). The Body Quantum, by Fred Alan Wolf.

Cloning: A Biologist Reports, by Robert Gilmore McKinnell. Ethical review of cloning 
humans.

Hoover’s FBI, by former agent William Turner. Routines of electronic surveillance work 
(p. 280).

July 20, 2019, by Arthur C. Clarke. LIDA; neurophonics; brain­computer link.

MegaBrain, by Michael Hutchison. Brain stimulation with EM waves; CIA research and 
information control (pp. 107, 108, 117, 120, 123).

The Cult of Infonnation, by Theodore Rosnak, 1986. NSA Directive #145; personal files 
in computers; computer-automated telephone tapping.

The Body Shop. 1968 implantation of an electrode array on the visual cortex for video 
direct to the brain; other 1960’s research into electronically triggering phosphenes 
in the brain, thus bypassing the eyes.

Evoked Potentials, by David Regan. Decoding neuroelectric information in the brain.

 http://surf.to/illuminati_news

 Buy Viagra On-Line:  http://a-albionic.com/ads/srch.html
Shop for Cars On-Line:  http://a-albionic.com/ads/srch.html

Forwarded for info and discussion from the New Paradigms Discussion List,
not necessarily endorsed by:
***********************************
Lloyd Miller, Research Director for A-albionic Research (POB 20273,
Ferndale, MI 48220), a ruling class/conspiracy research resource for the
entire political-ideological spectrum.  Quarterly journal, book sales,
rare/out-of-print searches, New Paradigms Discussion List, Weekly Up-date
Lists & E-text Archive of research, intelligence, catalogs, & resources.
 To Discuss Ideas:
  mailto:[EMAIL PROTECTED]      http://msen.com/~lloyd/
  For Ordering Info & Free Catalog:
   mailto:[EMAIL PROTECTED]    http://a-albionic.com/formaddress.html
  For Discussion List:
   mailto:[EMAIL PROTECTED]
   text in body:  subscribe prj <[EMAIL PROTECTED]>
 **FREE RARE BOOK SEARCH: <[EMAIL PROTECTED]> **
   Explore Our Archive:  <http://a-albionic.com/a-albionic.html>
Every Diet Has Failed!  What Can I do?
Click Below to "Ask Dr. Kathleen"!
http://www.radiantdiet.com/cgi-bin/slim/deliver.cgi?ask-1364
***********************************

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths,
misdirections
and outright frauds—is used politically by different groups with major and
minor
effects spread throughout the spectrum of time and thought. That being said,
CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html
<A HREF="http://home.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to