Three Turks Get 5 Months In Swiss Jail for Armenian Genocide Denial

Three Turks Sentenced in Switzerland for Denying Armenian Genocide

BERN, Switzerland (–A Swiss court has ruled against three Turkish-born residents for denial of the Armenian Genocide in a case filed by the Chairman of the Switzerland-Armenia Union, Sargis Shahinyan.

Denial of the Armenian Genocide is illegal under Swiss law.

Ali Mercan and two others were found guilty of violating the Swiss Law on Preventing Racism and are obliged to pay 30 thousand Swiss francs and are facing 150 days imprisonment.

The defendants appealed the verdict, but the Swiss Federal Court reiterated the legitimacy of the ruling.

Mercan has said the defendants will appeal to the European Court of Human Rights.




Sep 30 at 22:17 | Kyiv Post

Tax collection should be straightforward and boring, but not in Ukraine. Instead of being a matter for mild-mannered accountants and government auditors, Ukraine has returned to the state-sanctioned gangsterism of the 1990s and early 2000s.

This seems to be be the only explanation for two raids five days apart, in Berdyansk and Kherson, chronicled in front page stories today. (“Return of the Goon Squads/Tax police fire on workers in Berdyansk, wounding four” and “Thugs attack festival crowd in Irpin, injuring three”.) In both incidents, government tax police donned masks, flak jackets and used guns in storming two businesses as part of court-sanctioned tax inspections.

In Berdyansk, a YouTube clip showed scared, unprofessional and tentative young police officers in masks trying to stop a group of workers from entering an agricultural complex on Sept. 24. As frightened as they looked, the officers were still dangerous. They fired wildly into a crowd of workers, injuring four, including two seriously enough to be hospitalized.

Then, five days later in Kherson, tax police raided a business and beat up a mayoral candidate seriously enough to hospitalize him.

In neither case did there appear to be any justification for such use of force. Despite official explanations to the contrary, it did not appear that workers in either place were armed or dangerous. In civilized and democratic societies, there is no excuse for this kind of law enforcement – poorly trained officers wearing masks and using excessive force. These are signs of a society in which police are politicized. More likely, this force was employed to settle some business dispute or even to take control of the enterprise.

At an investor conference on Sept. 28, Prime Minister Mykola Azarov lambasted critics for failing to give his government credit for stabilizing the nation and launching reforms. He scolded journalists for negative reporting that is deterring investors.


There are no “reforms” under way – only a grab to monopolize political power by the Party of Regions. It is not a negative perception that scares away investors. A poor investment climate is the deterring reality. No one’s property or money is safe in this nation. The government and the powerful business cliques who back it use corruption and bureaucracy to stifle fair economic competition.

Tax authorities’ sweeping powers and their willingness to use them may lead to large-scale crackdowns on anyone who disagrees with the ruling powers – much as the State Tax Administration was abused by tax chief Azarov under ex-President Leonid Kuchma.

We wish that life was better for investors, for reasons of national and self-interest. A better investment climate could lift millions of Ukrainians out of poverty. It would also help ensure the future success of the Kyiv Post and every other investor or business in Ukraine who is here to stay. Ignoring reality because of everyone’s wish for a better investment climate is not going to help anyone or make it happen.

Clashes between government forces and militants going on in Rasht

Clashes between government forces and militants going on in Rasht

02.10.2010 22:08

Author: Asia-Plus

DUSHANBE, October 2, 2010, Asia-Plus – Clashes between government forces and alleged Islamist militants in Rasht district, some 30 kilometers east of Dushanbe, are going on, the source at one of the country’s power wielding structures told Asia-Plus Saturday evening.

According to him, violent clashes are taking place in Kamarob Gorge.

On October 1, one of helicopters of the Ministry of Defense made a crash landing.  According to one of versions, the helicopter sustained damage as its vane hit the mountain, while according to other version, the helicopter’s vane was damaged by shell.  No crew was injured, the source said.

He also noted that another government serviceman had been wounded during the operation in Rasht.  There is no information about the number of militants.  Phone communication with Rasht district is still cut off.

We will recall that the government forces on September 22 launched a special operation to hunt down persons involved in a September 19 attack on a military convoy in Kamarob Gorge that killed at least 26 government troops.

Several days ago, the Security Council Secretary Amirqul Azimov was sent Gharm, the administrative center of Rash district by president’s order.  He, in particular, stated that external forces that were unhappy with peace and stability in Tajikistan were involved in destabilization of the situation in the country.

Subliminal Posthypnotic Scripts

[SEE: Canadian Company Develops Subconscious Screening Technology ; Psycho-Semantic Model ]

Subliminal Posthypnotic Scripts

as allegedly employed by the U.S. National Security Agency

  • Decide for yourself how much of the following is based on fact, paranoia and/or propaganda. However you decide, either way, it’s an interesting read.

Subliminal implanted posthypnotic suggestions and scripts using acoustically delivered and phonetically accelerated posthypnotic commands without somnambulistic preparation in the subject for intelligence and counterintelligence applications by the United States National Security Agency.


1.1. The following information is an overview of one area of NSA Intelligence Technology and Applications. A Technology Title, Applications, Technology Description, case history summaries and the NSA’s Behavioral Modification Procedure Outline documented for the non-technical person.


2.1. Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency. “Computer Simulated Subconscious Speech Language”.


3.1. Intelligence:

3.1.1. Used on foreign and domestic diplomats, spies, and citizens to gather intelligence, steal advanced technology for US Defense applications. Surveys of citizen’s opinions to government events and propaganda. Heavy survey use during times of war, economic strife and political elections. War against drugs. Used to identify investments that have high yield to support clandestine operations. Used to direct field agents without the agents having to carry communications hardware and encryption devices.

3.2. Counterintelligence:

3.2.1. Used on foreign and domestic diplomats, spies, and citizens to identify intelligence operations; scope, participants, communication methods, and weaknesses in individuals, systems, equipment, or signals that can be exploited. Additional applications include misinformation dissemination, confusing and confounding leaders during critical decision moments, distorting significance of various facts to sway decisions and actions in US favor, behavioral modification of foreign spies to betray their loyalties, self initiated executions (suicides).

3.3. Behavior Modification and Accelerated Resocialization:

3.3.1. This technology is used to develop and control spies, political candidates, and other public figures through psychological intimidation, fear and extortion.


4.1. Age Regression: The act of bringing back past memories in a subject though the use of hypnosis. The memories can be very vivid and real in the mind of the subject.

4.2. Hypnoamnesia: Temporary loss of memory due to a posthypnotic suggestion.

4.3. NSA: United States National Security Agency, Fort Mead, Maryland.

4.4. ODO: On-Duty Officer, or officer-on-duty.

4.5. Posthypnotic Command: Same as Posthypnotic Suggestion. This term “Command” is more commonly used when the hypnosis is forcibly given to the subject and when the subject’s will has been broken down though the use of REM Sleep Deprivation and Suggestibility Index increasing drugs like CNS and Cardiovascular Stimulants. The exposure to extreme REM deprivation and select chemical stimulants cause the subject to have no ability to resist the “Suggestion” any longer thereby making it a “Command”.

4.6. Posthypnotic Suggestion: A subconscious suggestion or command resident and potentially active in the subject following a hypnotic trance or period of direct access to the subconscious mind.

4.7. Posthypnotic Suggestibility Index: An index or rating of a subject’s susceptibility and sensitivity to hypnosis.

4.8. REM DEP: Abbreviation for REM Sleep Deprivation or REM Deprivation. A subject deprived from REM Sleep has multiple symptoms i.e. reduced protein synthesis, black circles around eyes, loss of short term memory, confusion, impulsiveness, anger, frustration, diminished self-esteem, increased suggestibility, reduced productivity, apathy, and depression. Long term REM Deprivation results in death.

4.9. Script: A carefully constructed series of words arranged in the form of a posthypnotic suggestion. The script will generally consist of four separate parts;

  • (1) an identifier (subject’s name, description, or other identifying factor),
  • (2) trigger activation condition or conditions (when, what or how the suggestion will trigger),
  • (3) the content (what the trigger will precipitate in the perception of the subject),
  • (4) and a duration (when or under what conditions will it stop or finish).

Additional reinforcing scripts are usually added to “strengthen” or reinforce the central posthypnotic command.

4.10. Somnambulatory State: An abnormal condition of sleep in which motor acts (like walking, running) are performed. This state is typically achieved and a prerequisite to traditional hypnosis.

4.11. Subliminal Implant: A posthypnotic suggestion successfully delivered to the subject’s subconscious mind.

4.12. Transceivers (NSA): Nearly microscopic electronic surveillance devices that collect and transmit encrypted audio, color video, and location coordinates collected at the subject site to NSA Satellites that in turn forward it to NSA central intelligence operations. The devices also receive encrypted audio scripts from NSA central intelligence operations through the satellites and deliver it to the subject’s site in the form of a subliminal posthypnotic suggestion. These devices are approximately the size of the head of a straight pin and can be concealed in houses, offices, automobiles, planes, and street corners.


5.1. In addition to the ability to see and hear what is going on inside people’s homes, vehicles, and businesses through the use of nearly microscopic digital surveillance technology, the NSA is able to interrogate and influence a person subconsciously without the knowledge or consent of the subject.

5.2. Thought Labels (Response Labels):

5.2.1. Have you ever watched a baseball game? Did you see the catcher and pitcher communicate using a series of itches, baseball cap rearrangement, and clothing tugs? An elaboration of this communication technique is used by the NSA to detect a fleeting thought in a subject or “read minds” so to speak.

5.2.2. Lets discuss how an itch, clothing tug or even an innocent sneeze can be used to label a thought. For simplicity, we will call itches, clothing tugs, sneezes, coughs, or involuntary muscle spasms that are performed during subconscious interrogation “thought labels”.

5.3. Post-Hypnotic Delivery Method:

5.3.1. The NSA combines hypnosis and thought labels to interrogate people without the subject being aware of it. “How can hypnosis be used?” you might ask. The subconscious mind operates at a speed of about 1200 to 1400 words per minute. This is many times faster than the conscious mind that operates at 250 to 450 WPM (words per minute). The posthypnotic script can be spoken at fast conversational speed approximately 250 WPM and a recorder or a computer speeds up the message up to approximately 1200 to 1400 WPM. Remember what happens when you play a 33 rpm record at 78 rpm?

The resulting voice sound like the old American cartoon characters the Chipmunks. This is only slightly past doubling (2X) the delivery speed. At speeds as high as 1400 WPM, the voices would sound like a high pitched chattering whine. Remember when the words “Drink Coca Cola” were written on one frame of a movie in a theatre back in the 1960s?

The frame rate in movies is played at 30 frames/second. At 1/30th of a second the conscious mind could not recognize the message but the subconscious mind could read it clearly. The audience increased their Coca-Cola consumption by 65% that night resulting in the Federal Government prohibiting subliminal advertising. The following probable reasons for not achieving a higher percentage of subliminal delivery effectiveness (> 65%) are described as follows. In that 1/30th of a second some people were blinking, some people were looking around the theatre, looking at spouses, children, candy, popcorn, etc. or they had sufficiently poor eyesight that they could watch the movie but could not distinguish the small writing clearly.

5.3.2. In the early years of this technology, the NSA originally recorded a spoken posthypnotic suggestion message into a tape deck and sped it up by speeding up the tape. This process was labor intensive, required each officer to have excellent diction and mastery of the language and dialect required, and was of poor quality due to background noise and the delay in timing during recording and processing.

It also required extensive training to assure that each officer spoke at the same rate of speed so that the resulting “sped-up” script was delivered at the correct speed. Now computers are used to append digitized samples of optimized, ideal phonemes together to form words and the words are sped-up to the correct delivery speed. Where dialects are present, a different set of base phonemes is used.

5.3.3. Currently, to optimize efficiency and accommodate the variety of languages on the planet, phonetic elements from each language and distinct dialect are sampled, digitally edited to optimize them, and appended during delivery to form words and words arranged to make sentences in the from of scripts that resemble hypnotic suggestions. The empty space between words is minimized and pitch rise is compressed and filtered. Repetitive sine waves are also removed from the phonetic element’s acoustic wave train thus reducing the actual number of sine waves making up a word by 50% or more.

This reduces the actual length of the time it takes the phoneme to be delivered prior to accelerating (speeding-up) the delivery (like fast forward). This helps the message to be played at higher speeds and reduces the subject’s ability to recognize it as accelerated speech. The technique of using optimized digitally sampled and edited phonemes appended together to for words and then sentences structured as hypnotic suggestions can be termed “computer simulated subconscious speech language”.

5.3.4. The subconscious mind is also very sensitive. It can hear things that the conscious mind ignores. If you have watched television, you have probably noticed that there are many “subliminal tapes” on the market to program your subconscious mind. These tapes have their “messages” recorded/hidden in the sounds of ocean waves, music, or other sounds but they are not sped-up to subconscious delivery speeds and are therefore not very effective.

The subconscious mind can hear and discern the message even when there is background noise like waves, cars, planes, or even when someone else is speaking to you in normal conversation. Your conscious mind won’t hear anything unless it is very quite in the house. If you are very attentive you may hear what sounds like a low-pitched tape on fast forward, and played at low volume. This is the sound of the NSA’s high-speed audio subliminal message.

5.3.5. This modification of the phonetic elements, played at low volume, combined with the environmental background noise makes it very difficult for a subject to record the NSA message. Even if the subject were to effectively record the message, it is very difficult to filter (separate) the NSA’s message from background noise.

Then, reconstructing the missing sine waves from the acoustic wave train and slowing the message down to discern the actual content of the “posthypnotic” script with the conscious mind would be nearly impossible for the average citizen. To briefly summarize, the subject would have no chance in analyzing a NSA message without the following items: Professional state-of-the-art technology recording equipment. Digital acoustic wave editing equipment. Advanced engineering knowledge of acoustic wave science. Phonetics and linguistics expertise. Hypnosis theory and scripting. Ideal environmental conditions for recording. NSA ignorance of the subject’s intent and ability to capture a message.

5.3.6. This technology is the perfect intelligence tool. It is nearly impossible to detect or measure, difficult to trace back to the NSA. The symptoms that the NSA can “program” or inflict into the subject can cause fear that they might be thought to be insane if they were to report the NSA activities.

The subject does not know the source of the technology or the technology itself, the subject has no proof or evidence, only their perception, suffering, and isolation. Additionally, potential recourses that are available to the subject can be interrogated out and preventative actions taken by the NSA to further isolate or disable the subject.

5.4. Using the Post-Hypnotic Delivery Method with Thought Labels:

5.4.1. The NSA technique is simple; they transmit their human programming message through the audio-visual electronic surveillance equipment installed in your home, car, or office to you. The subliminal message delivered to you could be “Mr. Jones, imagine that the IRS were auditing your taxes. Think back to a time you have cheated on your taxes and that you are worried that the IRS might find out in an audit.

If you have never cheated on your taxes and have nothing to fear you will feel an itch on your right-hand ear lobe that will go away when you scratch it. If you can be caught by an IRS audit, you will feel an itch in the left nostril of your nose that will disappear after you itch it twice.” From your perspective, you have just had a fleeting thought about your past tax returns and had an innocent itch (thought label).

To the NSA Officer On Duty (ODO), you have just communicated to him whether you have ever: 1) cheated on your taxes, and: 2) If the IRS could catch you in an audit.

5.4.2. This is a very oversimplified example of a typical NSA interrogation. Actual interrogation messages may consist of several hundred words and be very complex and sophisticated. Most messages consist of several dozen words. Yes indeed, the NSA has exceeded the wildest expectations of the book “1984”. As you can imagine, the spy world has reached a new plateau that directly affects every person in the USA and abroad. This electronic surveillance system extends down through Mexico, Central America, and deep into populated regions of South America. It also has been installed in Australia, Africa, and the free-world countries in Europe.

5.4.3. The NSA’s goal is to have the whole world under its electronic eye by the year 2005. They are almost there now, but are having difficulties with high-tech countries that have the counterintelligence resources to identify the high frequency bursts of microwave transmission from the transceivers. The system also has the ability to take a “voice print” from any person and place it on file. This file can be used to locate the subject later by comparing it to real-time surveillance audio samples received from the field as long as the subject is speaking in close proximity to a transceiver.

If the person is aware that the NSA has this capability and remains silent, the NSA can transmit a periodic worldwide subliminal message that addresses the person by name and causes them to dream and talk in their sleep. After the person talks, the voiceprint would be eventually identified and the person’s location can be identified nearly anywhere in the world. Yes, it is a small world, and getting smaller all the time.

5.4.4. This technology was originally conceived under CIA studies and fascination with the power of hypnosis in the late 1950’s and perfected by very early 1960s and implemented with unlimitedresources to all areas of vital national security interest first. Originally, after noting the behavioral effects in visual subliminal effects like the highly publicized event where stating “Drink Coca Cola” on a single movie frame “delivered a higher rates of speed than normal movie viewing raised the obvious question, “Does the human hearing work as good as eyesight accepting subliminal messages?”

Preliminary theory work was transferred to Fort Mead NSA who had expertise in characterizing language in analog domains where a sampled phoneme could be edited (shortened by removing excess sine waveforms from the “acoustic wavetrain”) and electronically reconstructed back into shortened words of language. Some of the early experiments included “Remote Viewing at NSA where the Viewer would relax, open their mind and explain the clarity of images that were described by the NSA using this technology.

These early experiments allowed the NSA to refine the specifications of the “Computer Simulated Subconscious Speech Language” and the scripting formats to maximize the ability to deliver an accurate “vision or picture” into the subject. Pictures already seen by the subject could simply be recalled using “Age regression” script variations.


6.1. Please refer to the book “Inside America’s Most Secret Agency, The Puzzle Palace” by James Bamford, Published by Houghton Mifflin Company, 1982. This book contains extensive information and references on the NSA’s history and the NSA’s first surveillance system that originally only eavesdropped on telephones and is now expanded to audio-visual.


7.1. NSA Self-Initiated Execution (Suicide): 7.1.1. Bamford’s “The Puzzle Palace” references one of the NSA’s first self-initiated execution (suicide) with this “Thought Control” technology they developed. The NSA employee reportedly ranoff NSA property saying demons were in his mind and he killed himself.

7.2. NSA Initiated Execution to Cover-up in the News: 7.2.1. A University of California at Berkley student that went into a bar on or around November 27, 1990 took hostages and insisted to the police that the CIA Director talk with him so that he could get relief from the suffering. The young man had sent letters to the president and the CIA but the requests had fallen on deaf ears.

After the young man panicked and shot a customer in the bar, a SWAT team fatally shot him, the San Jose police found copies of the letters written to the President referring to people that could “read minds” and that he had learned how they do it. The NSA had been unsuccessfully brainwashing him and had no alternative but to terminate him to assure their security. It is interesting that what was originally broadcast on the news “The gunman was demanding to talk with the Director of the CIA” etc. disappeared quickly (suppressed?) from later news accounts.

7.3. NSA Initiated Execution to Cover-up in Music: 7.3.1. Curt Cobain of the musical group “Nirvana” was another victim of NSA brainwashing and was terminated by NSA. Cobain had started writing clues to the NSA activities into his music to communicate it to his music followers. He referred in music to the NSA as the “Friends inside his head”. Once the NSA puts on the highest level of brainwashing pain, the subject expires quickly. Cobain used heroin to numb and otherwise slow the effect of the brainwashing.

7.4. NSA Initiated Executions in Overseas Defense Project:

7.4.1. Some years back several employees of the United Kingdom’s Government working on a top secret Radar Project committed suicide with no apparent penetration by a hostile government, drug abuse or any other commonality other than working in a secured government project. They were not “Staged” suicides (murders) because some of them happened behind doors that could not be opened from the outside. These men were subjected to the same technology and processes that the U.C. Berkley student, the NSA officer, Curt Cobain, and thousands of others have experienced.

7.5. Musical references of NSA Technology:

7.5.1. Talking Heads; a music group popular in the eighties, wrote a song explaining the scientific process of the NSA’s brainwashing technology in a song called “Wild Wild Life”. The song gave an example of what the audible transmission sounded like at the end of the song (like a tape on fast forward).

They mentioned in the song that “They (NSA) talk so fast…” and that the musical group had spent “All their time and money…” unsuccessfully trying to find a place that the NSA would not be able to harass them. The Talking Heads exposed the technology, gave an example of what it sounds like, scenarios of how the NSA might select you for the brainwashing, and the scope of the electronic surveillance system.

7.6. NSA Counterintelligence Experiments:

7.6.1. Many experiments were performed by the NSA to determine the conditions and procedures that would be required to turn spies that were trusted by US enemies into assassins that we could invisibly manage. In early experiments, the resulting NSA experimental subjects would get extensive attention in the news because of the horror and unusual nature of the atrocity.

7.6.2. One example that comes to mind happened several years ago and created much news. A man became obsessed with his son, poured gasoline on him and ignited it. He had planned to do the same to himself but his desire for survival overpowered the NSA’s behavioral conditioning. After he was imprisoned, he spoke about how all of a sudden his mind became clear and he couldn’t figure out how he could do this crime.

The hypnosis was simply removed and the subject was allowed to sleep so that experts studying the file would not find out anything if the subject would have been subjected to traditional hypnotherapy or other psychoanalytical techniques. Another successful counterintelligence experiment completed with no liability or traceability to the NSA.

7.6.3. Perhaps ten years ago I read of several elderly people died of sleep deprivation in Florida. The doctors tried everything they could do but could not stop the sleep deprivation that resulted in a 100% effective termination yield. The NSA had developed the right combination of delivered anxiety scripts combined with muscular tension and delivery schedules optimized according to decreasing post hypnotic durability over time as the subject’s health degraded.

7.6.4. David Koresh of the Branch Davidians spent many hours talking with FBI negotiators about God and the Bible and finally waited for “God” to tell him what to do in the final hours of the siege. The compound probably had numbers of Personal Journals (required for subjects by the NSA during brainwashing) that could lead to questions about how this cult came to this level. Additionally, just like other loose ends the NSA had to secure, “God spoke to them and said to commit suicide” and they did securing another one of the NSA’s great experiments in mind control and social pathology.

7.6.5. A friend of mine, David Sautter and I worked at Singer, Kearfott Division, producing government weapons where we worked under a multi-tier security system; Company Security, FBI, DIA, and at the top of the ladder watching the watchers; the NSA. I discussed the NSA’s technology with Dave and a few months later, I heard he had committed suicide inside of a locked room. This theme should familiar by now and the details of the case will be destroyed or rewritten by NSA influences to preserve national security.

7.7. The cases of NSA activities go on and on. With access to the FBI’s Crime Information Center (CIC), we could find several thousand files having the characteristic patterns where the NSA had experimented on the individuals with their “Thought Control” technology.

7.8. Currently, the NSA has many subjects in the field (our society) that need only a series of “triggers” (carefully constructed posthypnotic scripts) to send them over the edge and on a mission to kill. The NSA calls them “Shooters on a Shelf”. A recent example was Russell Eugene Weston, Jr. that went on a shooting spree at the Capitol around July 26, 1998. He was diagnosed with schizophrenia, had delusions that he had an affiliation with the CIA or FBI and thought a radio-tracking device was planted in his tooth.

He was a product of NSA brainwashing. He did not have the ability to recognize the advanced technology even though he knew that “someone” (CIA, FBI, etc.) was communicating with him and that this communication ability spanned across the USA leading him to believe that he had a tracking device planted on him. Because of the real effects of the NSA hypnosis treatments, he therefore reasoned that the schizophrenia medication would not help and so he quit taking it. This was a man desperately trying to alleviate the suffering the NSA inflicted on him.

7.9. Through the years, I have met thousands of people that have been brainwashed into Christianity to a level where God tells them what to do in their minds (described as a gentle voice by victims) and they mindlessly obey. Yes, they have “Friends inside their heads” also. It appears the Biblical Anti-Christ in the Book of Revelations has arrived and is convincing many subjects that Jesus is back on earth and directing them.


8.1. The following procedural outline documents typical techniques, processes, explanations, and definitions of the National Security Agency’s Behavioral Modification Procedure using Subliminal Implanted Posthypnotic Suggestions through acoustically delivered phonetically edited language elements combined into scripts without somnambulistic preparation in the subject.

8.2. In simpler terms, the subject is unknowingly given hypnosis while the subject is completely awake and is tortured and punished with this hypnosis into a predetermined behavior by the National Security Agency. The behavior is usually extremely religious, is called “reborn” by the church, with the subject’s life-long goal of “a personal relationship with Jesus Christ”.

8.2.1. ABSTRACT, Behavioral Modification: The NSA’s behavioral modification process starts with identification and qualification of the subject. The NSA used to choose subjects based on the subject’s net present value to the agency in public visibility, financial resources, political clout, or other intelligence and counter-intelligence reasons. Additional considerations are given to minimizing security risks of exposure, the subject’s posthypnotic suggestibility index, the subject’s intelligence and reasoning ability, moral and superstitious beliefs, and the subject’s social status and the weakness of the subject’s primary support groups (family).

Now a recent report referenced in the March 26th Business section of the Orange County Register from the National Sleep Foundation reports that 40% of Americans are experiencing sleeping problems. This news could indicate that the NSA is broadening its influence to the greater public. As explained below in this document, the NSA always starts its behavioral modification process with REM Deprivation. After selection, the subject is subjected to long periods of REM Sleep Deprivation and reinforced torturing posthypnotic suggestions that will breakdown the subject’s will, confidence, self-reliance, and moral values. Meanwhile, the subject is increasingly isolated from their familiar and trusted peer groups causing the subject to experience depression, apathy, and ultimately social and financial failure. Typical post-hypnotic induced delusions reported by subjects are tingling in various areas of the body, which are thought to be resulting from microwave beams. Hearing ticks thumps or cracks from walls, ceilings, clocks, lights, etc. Beliefs that the subject’s neighbors are conspiring against them, or that the subject is being followed. Sometimes subjects believe that the various perceptions, feelings and experiences are the result of “Implants” in their body.

It is important for the subjects to understand that the NSA controls this technology from nuclear hardened underground shelters and the neighbors next door have nothing to do with the subject’s experiences. Nobody has the time or inclination to follow a subject around with a microwave gun to tickle various parts of the body.

We are saturated with microwaves all the time from television stations, communication satellites, etc and yet we do not have any symptoms because microwaves do not have the ability to trigger localized synaptic responses in our brains. Furthermore, when the subject is in a room surrounded by several people, and the subject is the only one experiencing the “thoughts”, tingling feelings, etc., then obviously a delivery method is being employed that affects only the subject; high-speed acoustic delivered hypnosis. After a while, the subject has an emotional breakdown and a new support group is built around the subject. The new support group is typically a church with doctrines centered in the Bible but the NSA also uses cults and other social groups. The NSA prefers Christian churches because the doctrines allow “God or Jesus to speak directly to the subject” and the negative reinforcement can be attributed with Satan and the positive rewards can be considered to be blessings from God thereby masking the NSA’s technology and processes.

When the NSA uses other relationships without in which the subject experiences a religious awakening and “Gives their Life to Christ” and the NSA achieves total control of the subject. The subject is slowly released from the damaging uncomfortable hypnosis and it is replaced with positive rewarding hypnosis as “God and Jesus works in their life”. Soon, the subject has complete loyalty to Jesus (AKA: NSA) and will do anything on command from Jesus (NSA). The subject is required to give daily status reports in the form of prayers in the privacy of their home, office, or car where the NSA’s electronic surveillance system captures and sorts the prayers by “Keywords”. The NSA then delivers additional hypnosis in the form of punishments or rewards or directs the subject accordingly to “God’s will”. If the subject resist’s the NSA’s instructions, additional punishments are inflicted on the subject. The subject is institutionalized in this system where any nonconformances committed by the subject are watched, critiqued, and reported on through prayer by other “Christians” to the NSA. Thus, the new church peer group acts as a behavioral reinforcing mechanism that will bring any of the subject’s problems to the NSA as they have been trained themselves (this is similar to the Nazi Gestapo of World War 2 and other communist approaches). A subject that has successfully completed the NSA’s behavioral modification program lives out the rest of their mediocre life in service to Jesus (NSA) and never causes any waves in the church or news media for fear of reprisal from the NSA. The subject’s lives are relatively unproductive because their focus is on their “Life after death” and not what they accomplish while they are alive. They avoid “worldly activities”, and usually are confused and disjointed in rational thoughts and concepts. For instance, they don’t believe in anything that is not in the Bible, i.e. dinosaurs, evolution, space travel, even though they ride on airplanes and watch television both of which are not referenced in the Bible.


8.3.1. Triggering Techniques: The NSA minimizes security risks by using multiple posthypnotic delivery techniques for applying negative reinforcement into the subject. The patterns fall into three major categories; real-time deliveries, prescheduled deliveries via a preprogrammed computer, and posthypnotic or “conditional” deliveries. The NSA does not use real-time transmitted posthypnotic commands exclusively because the subject might recognize when the NSA was not actively watching causing a security concern and it would be cost prohibitive to baby-sit the subject 24 hours a day. Behavioral modification generally occurs fastest when using negative reinforcement continuously. It is not practical or economical to watch a subject continuously to apply real time deliveries. Additionally, using all three script delivery patterns confuses the subject, causes the subject to believe they are always being watched, and maximizes behavioral change over time though continuous pressure.

8.3.2. Real-Time Subconscious Implant Delivery: Real-time means that the NSA ODO is transmitting the posthypnotic command script to the subject and observing the subject’s response. This technique is required for subliminal interrogations. All NSA standard posthypnotic command scripts can be delivered real-time. This form of delivery can precipitate the perception of a “voice” heard in the mind of a subject to give them information (true or false) or orders depending on the purpose of the NSA’s activities.

8.3.3. Prescheduled Subconscious Implant Delivery: The NSA central switching computer can transmit a script to a specified subject at a pre-specified time. The transmitted script’s transmission range can be limited to a single building, a city, or a large geographical area (i.e. North America or Europe). By having prescheduled scripts, the subject has seemingly randomly occurring thoughts and feelings that can’t be associated with a commonly recurring situation like event-triggered scripts precipitate.

8.3.4. Event-Triggered (conditional) Implant Delivery: Posthypnotic subconscious implants that are triggered (activated) with an event, thought, or code word (event-triggered or conditional) are strongly experienced by the subject and are powerful tools for reinforcing a predetermined desired behavior and inflicting delusions. This type of posthypnotic commands are the ones most commonly used by hypnotherapists to help people quit smoking, study better, or in general, change behavior (behavioral modification). There is extensive information on the Internet and college libraries about this form of posthypnotic command delivery and how to “script” and use them. The NSA can reinforce a predetermined desired behavior by associating a subconscious implant (negative or positive reinforcement) with an event. An example is that when the NSA want’s to isolate the subject from the company of a specific person place or thing, the subject will be implanted with a feeling of increased anxiety, hostility, tension, simple discomfort, or a feeling of a lack of peace. When the subject leaves the person, place, or thing, another posthypnotic implant is triggered that rewards the subject’s behavior with a feeling of relief from the anxiety, hostility, tension, discomfort, and peace is restored in the subject’s mind.

Example: This script will always cause a girl or boy not to sleep with the opposite sex: “You will feel very tense and not be able to relax if you kiss, sleep with, or stay long at your (boy or girl) friend’s house and you will feel a deep peace when you leave their house to go back home”. These types of scripts left unmanaged and not removed can cause great harm as the subject develops and social conditions and behaviors change over time. It should be noted that the NSA precisely tailors the type of negative and/or positive reinforcement, the degree of the reinforcement, the duration of the reinforcing effect and the conditions of the trigger. This posthypnotic event-triggered reinforcement can be initiated gradually and can remain so subtle that the subject believes that the discomfort is naturally occurring and that it is the subject’s decision uninfluenced by anyone else that the subject should avoid the person, place or thing. This subconscious implant can be combined with other implants like a posthypnotic-triggered thought to enhance the subject’s decision toward the situation. For example the subject can be subconsciously implanted with a command to be very sensitive to the changes in their feelings and to feel great about making strong decisions to take charge of their lives. This can be reinforced with another posthypnotic suggestion to avoid all the situations that cause the subject discomfort and that each time the subject commits himself/herself to removing a situation of this kind in their lives, they will feel an increasing control over their lives. Note that as the subject perceives an increasing control over their lives they are actually losing control to the NSA proportionately. Numerous other examples exist and it is beyond the scope of this document to document every possibility.

8.3.5. Stage 1 (Prescreen Evaluation): The subject’s Posthypnotic Suggestibility Index is determined by a series of simple tests. Hypnoamnesia is applied to the subject for the name of an object or individual and the subject’s speed is timed to determine how quickly they can overcome or not overcome the posthypnotic suggestion “You will not be able to remember the name of “____” no matter how hard you try.

Other posthypnotic suggestions can be used to create fear or discomfort in the subject that can be remedied by flight or movement. The subject must overcome a posthypnotic suggestion that they cannot move no matter how hard they try. In summary, a posthypnotic suggestion is given to the subject and the subject’s ability to overcome it is evaluated. A full study of the subject’s religious, superstitions, fears, and insecurities is made through standard subliminal interrogation techniques and behavioral observation. Interrogation scenarios are presented to the subject using standard subliminal interrogation techniques and somnambulistic interrogation techniques. The standard two types of scenarios are “Open-ended Questions” (similar to multiple choice with response labels pre-assigned to each choice) or “Reject if Disagreeable” (negative response label if the subject disagrees). More advanced techniques of interrogation scenarios are used as required or as determined by the experience of the ODO. Real-time observation, standard subliminal interrogation techniques and somnambulistic interrogation techniques are used to determine the subject’s overall social status, abilities, attitudes, and communication skills with primary support groups and friends. Scientific understanding and practical applications experience in the fields of psychology, hypnosis, pharmacology, and problem analysis are considered risks in the subject that may complicate or inhibit subsequent behavioral modification processes. Once the subject identifies the technology used it is nearly impossible to contain the potential security breach without terminating the subject. Most NSA initiated executions (suicides) are the result of the subject identifying the technology used or carelessness on the part of the ODO managing the file. The NSA technology affords powerful control over the subject, the subject’s environment, and the subject’s ability to plan and implement a disclosure to appropriate Government Agencies. When the subject finally does achieve a disclosure, the subject’s physical and mental condition is depleted. The subject’s ability to communicate concisely has been arrested, and the subject has already been set up and dishonored in the sight of local and federal law enforcement agencies to assure the subject’s testimony is questionable and unsubstantiated. Where the NSA feels that these steps cannot be achieved in medium risk subjects, the NSA will not recruit the subject into the behavioral modification process.

8.3.6. Stage 2 (Standard Process): This stage is where most subjects are behaviorally modified to serve and follow “God” (AKA NSA management of the subject’s civil rights). If the subject accepts religion and direction at this stage the NSA reinforces the subject’s relationship with Jesus and closes the file. This shortened program receives the maximum return for the NSA for the least investment and minimizes the security risk. It also causes the least amount of damage and institutionalization in the subject. Coincidence: Coincidence is used to create the perception in the subject that supernatural events are beginning in the subject’s life. A combination of posthypnotic commands and pre-information awarded to the subject prior to an upcoming experience that the NSA intelligence system has discovered gives the subject a feeling that “God” or some other supernatural being is taken interest in their life. The following is one typical technique used by the NSA. NSA Intelligence gathers information regarding the topic of the sermon in the subject’s church. This information is gathered through electronic surveillance equipment installed in the church. The NSA then implants a posthypnotic command that triggers the subject’s mind into concern and contemplation about the sermon’s topic prior to going to church. When the subject hears the sermon, the sermon seems to be speaking directly to the subject that adds to God’s mysterious and unexplainable ability to address the innermost concerns of the subject, especially when the subject has not shared those concerns with any other human being. Another typical method used by NSA concerns tragic events occurring to loved ones. NSA Intelligence receives a local broadcast or preliminary information through electronic surveillance that a subject’s relative has been injured or killed. The subject is given a posthypnotic suggestion that a feeling of dread or loss is welling up inside them and they are directed to think of that particular loved one. When they are finally notified through official channels, the subject believes that they have special powers, insights, or communications from God, aliens, or other entities. REM Sleep Deprivation: The Rapid Eye Movement (REM) stage of sleep is controlled and usually limited to one to two cycles per night resulting in micro-sleeps during the day. REM deprivation inhibits short-term memory, concentration, tactile abilities, verbal articulation, reasoning, and self will. Protein synthesis is inhibited and thereby reduces the subject’s ability to heal after physical damage or after periods of extensive exercise. The result is that the subject’s general health degrades as does social bonds and work/school performance. The NSA performs control of REM Sleep through various methods. Posthypnotic implants can be implanted that place a subject in a light sleep (posthypnotic trance) with various combinations of muscular tension and computer cycling implant deliveries (to be discussed later). Subjects typically complain of no sleep, restless sleep, waking up every hour on the hour, staying awake until the hour they have to get up, waking up an hour after they retire and not returning to sleep, and typically cannot recall any dreams. Additionally, they will complain of repeating torturing thoughts, racing thoughts, and facial itching and numbness. Daily fatigue, poor recall of names, and caffeine consumption is typical. Dark rings’ surrounding the eyes is evident and the darkened area around the eyes can be reported as sore or tender by the subject. The subtle perceptual impairing effects of REM deprivation make it more difficult for the subject to identify the REM Deprivation problem. When the REM depravation onslaught is gradual and accompanied by a posthypnotic command that the subject “will feel energetic and rested”, the subject will not recognize the REM Deprivation. Additional posthypnotic commands can be implanted that will make it difficult for the subject to “see or perceive” the rings surrounding their eyes. I have seen many subjects with very dark eye rings and the subjects could not recognize them at all. Shame Factor Enhancement: Various posthypnotic suggestions are implanted in the subject after a week or so long period of REM deprivation. The content of the posthypnotic scripts is constructed to cause the subject to perform embarrassing and otherwise shameful acts (usually sexual but always anti-social). These shameful behaviors are used by the NSA later to shame the person into a lower self esteem, reduced confidence in their own self discipline, a need for forgiveness from God. These embarrassments provide a means to Blackmail or discredit the subject if the NSA is detected and otherwise threatened by the subject. The NSA will always use another law enforcement agency to document the behavioral discrepancy to retain anonymity. The NSA has been known to help subjects avoid prosecution to gain loyalty or create an adversarial relationship between the acting agency and the subject (another intimidation factor) even though the NSA was responsible for creating the behavioral problem in the subject’s life. Religious Relevance and Convictions: The NSA typically implants posthypnotic suggestions that are clearly referenced in the Bible. The subject may be punished (through negative reinforcement) by anything that is referenced in the Bible to substantiate the validity of the “Word of God”. When the NSA does not follow the standard Biblical references, most subjects fail to recognize the contradictions out of ignorance or an inability to rationalize, or, they find other ways to justify the events to receive peace from God (NSA). This component of the NSA process is to provide the subject with an increased sense of fear and intimidation resulting from God’s presence and force. “Thou shall not disobey God”. Paranoia: Paranoia is a powerful tool used by the NSA. It provides a means to develop the subject’s distrust of other people including the subject’s primary group that could provide positive support during this time of distress in the subject’s life. Paranoia is often recognized and discounted as a character fault by most peoples in American society and therefore discredits the subject’s testimony even further. Uninformed, but well wishing people including friends, may recommend to the subject to pursue counseling. This negative feedback can make the subject fear that people will believe the subject is crazy. When the subject seeks professional counseling, the result will be a misdiagnosis with an expensive, inappropriate and ineffective treatment. The observed symptoms result from simply hypnosis, not biological, chemical, or environmental stresses. A misdiagnosis strongly motivates the subject not to communicate their experiences to others to avoid social disgrace of a “schizophrenia” label and additional financial burden. This isolation of the subject and their reluctance to communicate their experience to others reduces NSA security risk. The NSA cannot allow the subject to share information with other subjects that have already experienced the program and thereby starting a pool of information that could be compiled and used to expose the NSA system. The subject is led to believe that the subject’s neighbors, work associates and/or family are conspiring against the subject through a number of scripts delivered to the subject by the NSA. The NSA can further complicate the conspiracy delusion by using the same technology to have a work associate ask the subject a question or to make a comment that can be used by the NSA to confirm the subjects fears. This technique further isolates the subject from trusting their peer groups, causes additional emotional distress and hostility toward these people. The subject sometimes resorts to violent behavior, which is viewed by observers as irrational, unprovoked behavior that may be treated as criminal behavior by law enforcement personnel.

8.3.7. Stage 3 (Extreme Process): This method is very severe and usually results in a two to five year program. Because of the severity of the suffering, the subject is usually permanently impaired for integration into normal mainstream life and is essentially institutionalized. The result is that the subject must reside in a less competitive environment like a church group. Subjects that receive this program tend to be highly superstitious, are agitated easily when objective evidence that contradicts their belief system is presented.

They tend to believe in the spiritual world (demons, ghosts, god, spiritual entities, etc) and consider the spiritual world to be more powerful and important than the material or real world. This program basically follows the following steps; REM deprivation, breakdown of self esteem and confidence, intense suffering, exaggerated conscience, spiritual contact, reborn in Jesus Christ, Spiritual battle, release (saved by the Savior), and recovering (blessed by Jesus Christ). Whenever possible the NSA will skip or reduce these steps to minimize security risk and financial cost. Increasing Dependence on Drugs and Alcohol: As the REM Deprivation increases the subject must depend on Central Nervous System (CNS) Stimulants to compensate for degradation of productivity at work, school, and in interpersonal relationships. This serves the NSA in several ways. Use of drugs (especially CNS stimulants) increases the subject’s index of suggestibility. Or in other words, the post hypnotic commands are more effective and the subject has greater difficulty resisting the impulses generated by the commands.

In addition, the increased stress of coping with the drugs in conjunction with the resisting the newly introduced posthypnotic commands serves to push the subject closer to an emotional breakdown. If the subject uses illegal drugs, the NSA tries to set the subject up for a conviction to get assure that the subject looses credibility. Who would believe a drug user that claimed that he/she was being harassed by a government agency that was tormenting them with hypnosis? It also serves the NSA in the program by documenting something that the subject will be ashamed of when the program reaches the exaggerated conscience stage. Alcohol, sleeping pills and other medications also inhibit REM Stage sleep and increase irritability over time thereby further degrading and isolating the subject. In summary, the NSA benefits from the subject responding to the REM Deprivation assault with self-medication. This response discredits the subject by labeling them in society as a drug user, it enhances the effect of the implanted posthypnotic commands and it gives the subject a reason for shame that will be used against the subject later to justify the punishment from “God”. It should be noted that the subject is not really guilty of anything, except being a victim that was manipulated in a carefully controlled scientific behavior modification process. Poor Nutrition: The poor nutrition reduces the energy the subject has and serves later as another justification of God’s punishment. The subject will be taught later that “the body is the temple” and that to abuse it is to violate God’s will. Apathy: After the subject’s self-esteem is broken down and continuing failure and persistent suffering start to dominate every day, the individual becomes apathetic as a defense mechanism. At this stage the subject has committed another sin of “not persevering through faith” which is later used on the subject later to increase a feeling of guilt. Depression: Depression precipitates as a result of chronic REM Sleep Deprivation, social isolation and a feeling of helplessness in the subject. Commonly, when the subject seeks professional counseling, they are misdiagnosed and treated for depression with medications but the root cause of the problem (negative reinforcing posthypnotic suggestions inflicted over long periods of time) is not treated or corrected. Insecurity: The subject starts to experience severe insecurity in this stage. The NSA uses this insecurity against the subject in several ways. Because of the impaired reasoning ability and emotional isolation, the subject is susceptible to the approaches of insincere people, which are used by the NSA to emotionally hurt the subject more.

This allows the NSA to convince the subject that people can’t be trusted and that only the NSA (Jesus) can be trusted. This serves to isolate the subject from supportive peer groups and makes the subject emotionally dependent on the NSA resulting in the NSA gaining more power in the subject’s life. Journals and Diaries: Most of the subjects are directed to keep a “Journal” or diary by the NSA so that the subject can record and review feelings, events, observations, and “God’s directions” that normally would be unavailable due to short term memory loss during extended periods of REM Deprivation. The NSA uses the Subject’s Journals in a variety of ways. Degrading Spelling and Grammatical Performance: Subjects in these prolonged stages of REM deprivation, confusion, and emotional distress, have very poor grammar, spelling, and short attention spans. Slowed Speech: Subjects experience slower speech and have a greater time articulating concise points as a result of the REM Deprivation and other performance degrading posthypnotic commands. Very slight alcohol consumption can exasperate the damage of REM Deprivation and precipitate slurred speech. Confusion: Confusion results from three primary sources; REM Deprivation, specific posthypnotic commands to reinforce the confusion, and the emotional damage and stress that is being inflicted. The confusion allows the NSA to continuously inflict damage to the subject’s life without real-time observation. A confused person generally is not as productive as an organized clear thinker is and has a greater potential to offend people by what they say or do and is less likely to recognize when they have made mistakes. All of these symptoms assist the NSA’s objectives in this stage and subsequent stages. In addition, the confusion restricts the individual from analyzing the source of their suffering and taking corrective actions, and therefore reduces the NSA’s security risk. Poor Concentration: Difficulty concentrating impairs the subject’s productivity and restrains the subject from making self-improvements and corrections in behavior. It makes it very difficult for the subject to do any research or reading to evaluate his/her condition. This paves the way for the NSA to demonstrate that the subject cannot do anything on their own without “God”, thereby increasing the frustration and anxiety of the subject (inducing emotional breakdown) and ultimately making the subject totally dependant on the will of God. Loose Association and Personality Disorders: The subject experiences disjointed thought at this stage (Loose Association) that appears to observers as a strange sense of humor or inappropriate responses when engaging in conversations. Ongoing sarcasm and other negative attitudes and undesirable personality traits can be present. Anger: The way that the subject experiences anger is of profound importance. If the subject allows the NSA to redirect the increasing anger and hostilities toward the NSA to another person in the form of violence (misplaced aggression), the NSA will reinforce the violent behavior with posthypnotic commands. The result is a person that can achieve national acclaim as a murderer that heard voices of Satan directing him/her. Typically, the Subject is encouraged to commit acts of violence with spouses, friends, or employers resulting in further social isolation and increased shame.

Some examples of NSA directed victims of misplaced aggression include recent US Postal Workers whom work within the Postal Service. This is one of the vial “communication intercept” channels the NSA is directed to monitor. The routes of suspect mail and the postal worker processing it are continuously monitored by NSA. Sometimes the NSA ODO takes issue with a Postal Worker and harasses them or subjects the postal worker to behavioral modification. Delusions: Delusions are used to discredit the witness and also provide an additional source for fear, intimidation and confusion. Delusions can be but are not limited to the Subject developing conspiracy theories of fellow employees and friends, beliefs that Angels or Demons are communicating or visiting them, tingling sensations from microwave guns or implants, beliefs in supernatural events, etc. Audio Hallucinations: Subjects often report hearing walls clicking, footsteps in the house, the sound of someone trying to open the door, drilling at the door, etc. These audio hallucinations are also used to discredit the witness and also provide an additional source for paranoia, fear, and negative reinforcement. Voices in the Subject’s Mind: The voices in the subject’s mind are achieved in a variety of ways using real-time and prescheduled posthypnotic suggestion deliveries, and Noun Substitution implant techniques. Noun Substitution Posthypnotic Implant: The subject can have a posthypnotic suggestion implanted that changes the form of pronouns in the subject’s internal thinking. The result is the subject perceives that someone is telling him/her to do something with nearly every thought. An example is; the subject thinks, “I should go to church today”. With the noun substitution posthypnotic suggestion the subject experiences the following internal thought, “You should go to church today!”

Notice that by implanting the posthypnotic command into the subject’s subconscious mind to think the pronoun “You” instead of “I” the subject will perceive that they are being directed by a voice even though the majority of the internal thought content is their own naturally occurring thought. This subconscious implant can be used in combination with other implants to increase the subject’s perception of threat, fear, and therefore paranoia.

It can be used with other posthypnotic suggestion implants that will give the subject the perception of either a “good” or “evil” voice or spirit is directing him/her. This implant is powerful because it gives the subject the perception that the spirit, angel, God or Holy Spirit knows and directs the subject’s every thought. It provides a convincing proof that “God knows every thought of his children”. Subjects that don’t have a superstitious frame of reference and seek professional help are usually misdiagnosed as schizophrenic. Tinnitus (Ear Ringing): Tinnitus is commonly reported by subjects harassed by the NSA and typically has no pharmacological or biochemical basis and is produced by a posthypnotic suggestion. It is often misdiagnosed as ringing caused by excessive aspirin use and is actually an audio hallucination triggered by hypnosis. Complete Quiet Silence: Used by the NSA as a positive reinforcement for two general reasons; the subject has the tinnitus removed to indicate that the subject has “The Lord’s Peace Restored”, and secondly, the subject has achieved a milestone toward being released by God (the NSA). Quiet Wind: The audio hallucination of a quiet wind is used to convince the subject that the Holy Spirit is visiting him/her. An excellent example of this hallucination combined with the fear that accompanies it is contained in Phil Collin’s lyrics of a song that has the chorus “I can get so scared, Listen to the wind”. Visual Hallucinations: Visual hallucinations are usually implanted in the waking moments when a subject is coming out of sleep or is in a somnambulatory state (light sleep) preferably in a darkened room. The hallucinations are fleeting, usually lasting less than one minute and are not durable. Typical hallucinations reported by subjects are Angels, large spiders, and movement of various shadowy objects across the ceiling, bright spot of light ahead of the subject, etc. The television show “Sightings” has had numerous reports of people seeing “Aliens” at waking moments. These types of news accounts create confusion in US society and serve to keep people searching for the wrong phenomenon thus keeping the NSA’s technology secure (disinformation). Tactile, Olfactory hallucinations and Muscle Spasms: Tactile hallucinations can be more durable and are used to communicate a desired direction to the subject typically after a real-time interrogation. Typical behavioral cues issued by the NSA are manifested in the form of: Temporary sensation of pressure to the tip of the right index finger (symbolizing Faith or have Faith). Temporary sensation of pressure to the tip of the left index finger (symbolizing no Faith or “deception of Satan”). Temporary sensation of pressure to the center of the right palm (symbolizing Jesus “Sitting at the right-hand of God”). Temporary sensation of pressure to the ball of the right foot (symbolizing “Get on the Ball” or “hurry-up”). Temporary sensation of pressure to the tip of the right foot big toe (symbolizing “Right Direction”). Temporary sensation of pressure to the tip of the right foot center toe (symbolizing “Fucking-up Direction”). Temporary sensation of pressure to the tip of the left foot big toe (symbolizing “Wrong Direction”). Temporary sensation of pressure to the buttocks (symbolizing “Bad Attitude” or “subject is acting like an ass”). Temporary sensation of pressure on tip of penis or clitoris (symbolizes immoral thoughts like subject is thinking/acting with his penis or her clitoris). Temporary sensation of pressure to the left ear drum (symbolizing “do not listen”). Temporary sensation of pressure to the right ear drum (symbolizing “listen”). An involuntary blink of the right or left eye (symbolizing: right eye = God’s agreement or left eye = Satan’s agreement). Temporary tingling sensation on the Testicles (symbolizing insufficient male confidence or “Having no balls or strength”). Temporary tingling on other areas of the body to imply that something invisible and/or supernatural is touching the subject. May be perceived as threatening or reassuring to the subject. Can be used to intimidate and confuse the subject often times combined with additional posthypnotic implants to inflict delusions like “being attacked with microwaves” or being caressed by Angels. Muscular spasm or perceived pressures near the jugular vein on right side of neck (symbolizing Satan having subject by Jugular or throat). This is used to inflict fear and doubt. Muscular spasms are sometimes used to inflict severe pain on the subject by causing extreme involuntary contraction of the sphincter in the anal region or other lower back or leg muscles. Perceived odor sensation of a thick, sweet smell (symbolizing Satan’s sweet victory over the subject’s soul).

9. Misc

This section is written in an attempt to provide interested individuals with some of the considerations and precautions when seeking to demonstrate the NSA’s civil rights abuses by demonstrating the effectiveness and concepts of subliminal access using Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject.

9.1. Reverse engineering of the NSA’s technology to prove it’s abuses against the American people is quite difficult. Consider the following.

9.2. If the scientists and technicians perform their research in a facility that the NSA has the standard transceivers installed, and therefore the NSA can influence the direction of research or the data by effecting perceptual effects in the researchers. These perceptual effects can be confusion, lack of attention to important details, oversights, bad assumptions, incorrect interpretation of the test data. These same misperceptions will also be incorporated into the research test subjects. The technology cannot be developed and optimized if the NSA has any access to the test subjects.

The test scripts given to the test subject delivered from the researcher can be neutralized by the NSA delivering a canceling script immediately after the researcher’s script. The NSA’s test script can also include a hypnoamnesia script at the end to cancel any residual perception in the subject so that the test subject would report no effects and the researcher would conclude the test script had no effect.

9.3. The research must be carried out in a facility secured from all NSA electronic intrusion. All equipment in the facility must be TEMPEST protected and electrically isolated from the outside world. The research personnel and their subjects must never leave the secured area of the facility so that they cannot be subliminally interrogated by the NSA. The NSA would take this opportunity to deliver disinformation scripts to the subject or researcher. Foodstuffs and supplies would be the logical choice of NSA intrusion if all other security measures were effective against the NSA.

9.4. The NSA will exploit all opportunities to introduce microscopic transceivers into the facility of it’s surrounding grounds. The minimal requirements for the NSA to take control of the research are:

9.4.1. NSA audio delivery (a micro receiver with a micro speaker)

9.4.2. Visibility of the targets (researcher or test subject) to capture response labels during subliminal interrogations. This can be through normal illumination or infrared to see through window, or millimeter wave or other technologies that can see through barriers like walls and ceilings.

9.4.3. Audible response labels can be used if the NSA has a micro receiver with a micro speaker inside but cannot get a transmitter in and operating without detection. Sneezes, coughs, clearing of throat that can be picked up by laser microphones, audible amplification microphones, etc. can also be used as response labels.

9.5. The NSA currently has satellites with millimeter wave technology that will allow visible intrusion into most facilities. The test facilities should be deep underground, AKA 100 feet with no adjacent access from other facilities, sewer lines, water lines or power conduits etc.

9.6. Any facilities existing will have to be debugged before habitation and research begins.

9.7. Subjects must be able to be subjected to traditional hypnosis after facility habitation as a test prior to research to assure that the NSA has minimal scripts already implanted.

9.8. This technology is the highest level of intelligence gathering for the USA. The abuses resulting from mismanagement of this area of the NSA’s intelligence system must force Congress to legislate additional laws to protect the citizens. The NSA must regulate this system better. The NSA will take all necessary steps without limit to assure that this technology is preserved and autonomously under their control.

Obama’s Cancer

Obama’s Cancer

Obama is loosing vision but I believe he has the wisdom to not become short sighted amidst a sea of disinformation.

Bush wanted a dismembered Pakistan to hegemonies Central Asia and get closer to containing China through India.

Obama wanted a subjugated Pakistan working closely with America as a proxy. Unlike The Neo con, Obama is pragmatic and forward thinking realising America can not sustain a war in Afghanistan nor can it seek to contain China. Obama recognised very early on it has to win over Pakistan and make amends with China as well as Russia to maintain any kind of American influence in this part of the world.

Neo Cons wanted ALL the cake and eat it themselves and the Obama government under a crippling global recession is looking to share the cake.

However, I think the issue comes from deep divides inside the Obama camp. Generals with their own political interests sharply aligned with the Neo Cons and then there are advisers and strategists who sparingly obvious – hardcore Indianphiles.

Therefore what precipitates?

A confused policy towards Pakistan, completely mixed up something else is said and something else is done. Obama is no Bush; he is savvy and a real diplomat with great understanding of the wider implications. If Obama manages to curb the politically motivated General/s and the Indianphiles within his advisory panels then you will see Obama’s commitment to end hostilities in Afghanistan pan out. Obama is all too aware that peace in Afghanistan dos not come, without a price. While Pakistan is the solution to creating reconciliation inside Afghanistan and bringing Afghans together thus creating an “environment” for a face saving American exist, Pakistan too has a price.

Pakistan has suffered enormously by being the non NATO member nation and seeks to resolve its border disputes with India over Kashmir. Pakistan also has a legitimate stake in Afghanistan and one must remember historically pre British Raj interference the region called Pakistan was aligned with Central Asia and was one nation with what is called Afghanistan today. Pakistan also seek repatriations for the damage that has been caused by supporting some one else’s war. All the above are legitimate requests from Pakistan no one can accuse Pakistan of double gaming as these are vital to the security and stability of Pakistan.

In terms of concessions – America and NATO must provide Pakistan with access to European and Atlantic markets to trade and allow it to develop and better itself. The days of Colonialism or Imperialism have long gone; we live in a globalised community and instead of subjugating nations should look to creating partnerships if they seek stability and access to rich vital resources.

Pakistan has always been a willing partner to the West and especially to America but has been let down every time. America must stop biased and derogatory scathing attacks towards Pakistan and treat it like a partner and a friend.

America must decide does it want to continue a war whose very premise is unambiguous and cloudy. With such a war the end objective is always as cloudy and unambiguous and essentially could see it never ending. The alternative is America end the war, even here America must decide and learn the lessons of history does it want another Vietnam a Soviet style defeat which will have strong repercussions or a face saving exist through reconciliation.

I am sure everyone in America and NATO agrees a face saving exist is the only way out of this quagmire. To achieve this America needs to stop demonising or subjugating Pakistan and start treating it with the respect it deserves. It is time to put all the Indianphiles and pro Neo Cons in the closest and stand with Pakistan on this one. History has shown time and time again – Pakistan has delivered results.

Obama must do all he can possibly do to end the biased and scathing attacks on Pakistan both verbal and on Pakistani soil. America will not have any glorified victory in Afghanistan, this is not World War 2 and is every much like Vietnam.

It is time for rationale politics and strategies that reflect the ground realities. While Obama’s chief advisors in none other than Zbigniew Brzezinski – I do see him as an intelligent, pragmatic and wise President that can end the war in Afghanistan in the appropriate way.

The cancer Obama refers to is spread all over in Afghanistan approximately 80% of the body of Afghanistan is consumed with this cancer. If Obama is going to treat it and spend months and months attacking innocent targets inside the tribal belt of Pakistan then Obama’s cancer will begin to consume America and American forces inside Afghanistan pretty rapidly. It is a time for pragmatism, good diplomacy and looks for credible advice from credible sources not ones carrying ulterior motives like a spin of a dice changing the course of The Great Game. Ansar Ul Haq

Nato supplies remain suspended at Torkham

[The photo below gives a glimpse of the magnitude of the problem for US decision-makers. If the border stays closed; Obama's war is lost.  His only option is to completely halt the cross-border raids (and hopefully the drone attacks), or to move the Afghan war into Pakistan.]

Nato supplies remain suspended at Torkham

Trucks carrying Nato supplies are seen parked at Torkham, the main border crossing in Pakistan’s Khyber district. – AFP

KARACHI: Nato supply remained suspended for the fourth day in a row after Pakistani authorities ordered a halt on the supply trucks going to Afghanistan.According to security officials, about 200 Nato oil tankers and supply containers were stranded at the Torkham border on Sunday after being rejected clearance to proceed. Security forces also sent Nato trucks and containers back to Peshawar from another check-post near the border.

The order to suspend the supply trucks from passing through Torkham border into Afghanistan came after Nato helicopters conducted strikes inside Pakistan. According to a Foreign Office statement, the route will be opened after public anger over the Nato strikes eases. – DawnNews

Pakistan may lose the war in Afghanistan

It is not likely that the new book on Charlie Chan (Charlie Chan: The Untold Story of the Honorable Detective and His Rendezvous with American History by Yunte Huang) contains the aphorism, “War like bamboo; once started, hard to contain,” since, among other reasons, I just made it up. Still, that happens to be the case, and for proof of that just look at what is happening to Pakistan. It may lose the war in Afghanistan.

Pakistan teeters. Today’s Post says that the Obama administration now frets about that nation’s stability. The Pakistani military is making those low, growling noises that precede a coup or an attempt to place yet another civilian at the head of the government. At the same time, the government that remains is making a show of slapping down NATO for the occasional air strike that kills Pakistani civilians. As with the drone attacks, the government pretends abhorrence — but would find their cessation even more abhorrent.

The problem with Pakistan is Afghanistan. The war next door has pushed the Taliban into the rugged no-man’s land of Pakistan. NATO, meaning mostly the United States, chases the Taliban there, spreading the war and helping to destabilize a country that was already on the edge. This could have been foreseen. It is what happened in Vietnam. The war there spread to both Cambodia and Laos. To say that both governments were destabilized is to compliment the Khmer Rouge. They were imploded.

The classic example of a war that got way out of control is, obviously, World War I. Before your knew it, the assassination of the Archduke Franz Ferdinand in Sarajevo resulted in Turks and Arabs duking it out in the Arabian desert and Brits and Germans even fighting in Africa. All of Europe got involved, and so did its colonies and former colonies way away from the Balkans. Aussies and Kiwis fought at Gallipoli, which was not only a long way from Tipperary, but on the other side of the globe from Canberra.

Now a new book, Richard Overy’s “1939: countdown to War” shows that not even Hitler knew how to contain war. I say “not even” because early on Hitler was assumed to be in control of events. It was his war. He started it, and it was assumed he wanted it. Not so, Avery says. Hitler wanted a wee war with Poland, a minor dust-up that would have given him Poland and the Danzig Corridor. He absolutely believed that the British and the French would chicken out, as they had done at Munich. Of this, he was assured by his foreign minister, Joachim von Ribbentrop. When they instead issued an ultimatum, “Hitler turned to Ribbentrop with a savage look and asked, “What now?” Overy writes.

Britain and France had had it with Hitler. They had a commitment to Poland, and they were going to honor it. Hitler was both shocked and shaken. He had assured his generals that the war would be contained and that, in fact, the pact he had signed with Stalin had virtually assured a limited war. He was wrong, disastrously so as far as his generals were concerned. They did nothing about it, of course. The plot against Hitler came much later — much too late.

It may not be always thus, but it is often thus. Wars have a way of spreading. The chaos of violence is not containable. This is what’s happening in Pakistan on account of a war that President Obama didn’t really want to fight in the first place. NATO can’t win this war. Afghanistan can’t win it. But Pakistan sure can lose it.

A threatened government

A threatened government

By Kunwar Idris
President Zardari would like ‘all political forces to unite’. But why and against whom when there is no threat to democracy nor, as Babar Awan insists, even to the government? — Photo by APP
One can readily agree with the president and the prime minister, and even with their far more garrulous law minister, that democracy is under no threat in the country. The only problem is that when they speak of democracy in abstract terms they, in fact, mean their coalition government.

It would also be safe to say that their government, however faltering, is not threatened by a coup. The army high command is discerning enough to know that despite its image being burnished by rescue and relief services during the floods, the people would not welcome its intervention in politics, nor does it have a ready solution for the many and serious problems besetting the country.

The Punjab chief minister, Shahbaz Sharif, who has observed the magnitude of the flood disaster more closely than other political leaders, and also has seen the army at work, seemed to have guessed right when he said the threat was particularly non-existent so long as Gen Kayani headed the army.

The real threat to democracy, more imminently to the government, arises from the growing discontent of the people over the conduct of the political parties and their leaders. The global economic recession has only compounded the failure of the political system on every front. The floods have added to the hardships of the people but, in a way, also provided a convenient peg to political leaders on which to hang the blame.

In the current situation if a military takeover is unlikely, Altaf Hussain’s revolution against the feudals, capitalists and parasites backed by ‘patriotic generals’ is even more unlikely. But it also needs to be realised that the present chaotic, gung-ho system cannot last for another 30 months.

Mid-term polls would have been an ideal solution but the floods have ruled that out for the present. Now hardly any other course is left open to political parties, more particularly the PPP, than to let each organ of the state function as envisaged in the constitution and parliamentary conventions.

The alternatives being mentioned are to the contrary. President Zardari would like ‘all political forces to unite’. But why and against whom when there is no threat to democracy nor, as Babar Awan insists, even to the government?

Nawaz Sharif is looking for a change but only through constitutional means which in plain terms means he is waiting for the PPP-led coalition to lose majority in parliament through defections.

The life-blood to parliamentary democracy is supplied by a vigorous opposition and not a unity government artificially cobbled together. The line separating the treasury benches from the opposition in parliament has always been hazy in Pakistan. It was never hazier than now.

Elements within the government are also among its worst detractors and some others opposing it are, in fact, in cahoots. The coalitions at the centre and in the provinces are large, divided and costly because every partner wants a share in the perks of power without pursuing a common purpose.

The first requirement for any parliamentary system to survive and deliver is to draw a clear line between the government and the opposition. The two must not merge to become a behemoth which indeed this government would if PML-Q were also to join its newfound partner PML-F in government.

If all moderate political forces were to strut about in the corridors of power, it would be left to the extremists of the madrassahs and the militants of the mountains to bring down every government and ultimately the democratic system itself.

In a parliamentary democracy while the official opposition goes by conventions, the role of each organ of the state is defined in the constitution. The executive authority vests in the prime minister and his cabinet. The president is ceremonial head of state and also the symbol of national unity. So it should have been in Pakistan after the 18th Amendment. But the overwhelming emotions flowing from Benazir Bhutto’s murder and her husband’s total control over the party machine have all but negated that principle.

It would be difficult for Mr Zardari to reconcile to being a ceremonial head of state, nor can parliament, as presently constituted, shake his hold on power. The common man’s utter lack of faith in the supremacy of parliament was recently demonstrated in the less than 19 per cent turnout in a hotly contested by-election in Rawalpindi city. The parliamentary system would get a chance to work only if Asif Zardari and Yousuf Raza Gilani were to swap positions which can be made possible through a by-election.

The head of state being a neutral and a national figure must be recognised as a basic feature of the constitution that is put beyond the amending jurisdiction of parliament (the presidency must not become a party office). The other two features should be the fundamental rights of the citizens and independence of the judiciary. Both will be in jeopardy if the appointment of judges were to be made subject to the approval of a parliamentary committee.

From the judges, in return, the citizens should expect speed, sympathy and total freedom from every kind of prejudice whenever a breach of fundamental rights comes to their notice. The aggrieved people now have to make interminable rounds of the courts till the right they seek to assert is all but extinguished.

The independence of the judiciary, in the final analysis, will be sustained not by the procedure of appointments but by the protection the judges provide to ordinary citizens against unjust laws and arbitrary actions by the executive arm of the government. For that, it appears, one has to wait for the constitutional wrangle at the top to come to an end.

Imbecilic NATO/American Incursions Have Lit the Fuse

Nato supply line will re-open when security improves: FO

Drivers sit before Afghanistan-bound Nato trucks parked on the roadside in Pakistani tribal area of Khyber on Friday, Oct. 1, 2010. – AP

ISLAMABAD: Pakistan will only re-open a supply route for coalition troops in Afghanistan once public anger over Nato incursions eases and security improves, the foreign ministry spokesman said on Sunday.

Militants on Saturday threatened more attacks on tankers carrying fuel to Afghanistan through routes in Pakistan to avenge the incursions.

“Unless the reaction cools down and we make sure that the supply line is secured, we cannot reopen it,” Foreign Ministry spokesman Abdul Basit told Reuters.

Angered by repeated incursions by Nato helicopters over the past week, Pakistan blocked a supply route for Nato troops in Afghanistan after one such strike killed three Pakistani soldiers on Thursday in the northwestern Kurram region. – Reuters

Nato’s stolen combat material seized near Islamabad

By Munawer Azeem
Nato tankers are waiting for security clearance in Chaman.—APP
Nato tankers are waiting for security clearance in Chaman.—APP

[Miles of tractor-trailers...irresistible targets, or irresistible opportunity for plunder?]

ISLAMABAD: Another godown laden with stolen items of Nato forces, including combat material, was unearthed in the capital’s rural area of Tarnol during a police raid on Saturday night.

Police sources told Dawn that the dealer of the stolen supplies of Nato sold the items to individuals and the large quantity of the items were purchased by militants. Four people were arrested during the raid.

Police had arrested four people and seized Nato items from another godown in the same loclitity on Friday night.

The Saturday raid was conducted in response to information gathered from the accused arrested on Friday.

Police and anti-terrorism squad personnel cordoned off the area of Dhok Paracha in Tarnol and raided the godown in a house and found a large quantity of items used by armed forces.

The seized items were: vehicles–four wheel DG-5 and six wheel DG-3–used as armed personnel carrier, accessories of helicopter, and other vehicles.

Besides, sophisticated equipments used during combat, communication system, wireless sets, heavy duty generators, mounts, motors, plastic boxes, almirahs, filters, vacuum cleaners, kit of mountain divers, stretchers, water bags, senior officer bags, shoes and gloves were also seized.

A senior police officer said that out of the four people arrested on Friday night, two were buyers and the two others owned the godown. The buyers had come from Landi Kotal to purchase generators and some other goods.

The godown owners told police that the transporters of Nato supplies unloaded the goods at their doorstep and any locality as convenient to them.

“Normally the transporters stole some items from the supplies and some times they unload the entire containers,” the officer quoted the accused as saying.

“Whenever, the entire container was stolen for them, the transporters set them in fire on the pretext of Taliban’s attack,” he said.

The officer said the accused revealed that there were more godown in Islamabad and other cities where huge quantity of stolen items of Nato supplies were kept.

He said the transporters get handsome amount to steal the goods from the supplies. He said the area was under police surveillance, which conducted search operation to unearth remaining godown in the locality.

Karzai Wasn’t Kidding–Afghanistan begins disbanding private security firms

Afghanistan begins disbanding private security firms

Kabul estimates that up to 40,000 Afghans are employed by private security firms, seen as a parallel security operations outside government control. – (File Photo)

KABUL: Afghanistan has begun disbanding private security companies operating in the country, shutting down eight firms and seizing over 400 weapons, the Interior Ministry said on Sunday.

The move is part of President Hamid Karzai’s ambitious plan to take over all Afghan security responsibilities from foreign troops by 2014.

Since Karzai’s decree in August, a plan has been drawn up for the process which is expected to be complete by the end of the year, Interior Ministry spokesman Zemarai Bashary said. The United Nations and Nato-led International Security Assistance force had given it their support, he added.

“The interior ministry is implementing this plan with seriousness and decisiveness,” he told a regular briefing.

The first targets are illegal armed groups operating as private security firms, companies with temporary permits and those who provide security escorts for foreign forces and have been engaged in criminal acts and security breaches.

The government has already closed down an Afghan security firm with 75 employees, and several smaller groups which provided security escorts for convoys, Bashary said.

Firms are exempt whose guards work inside compounds used by foreign embassies and international businesses and aid and charitable organisations.

General David Petraeus, the top US and Nato commander in Afghanistan, said late last month that Karzai was also prepared to allow companies operating from some fixed sites, including power plants, to continue their work.

“The plan is arranged in a such a manner that it does not create a security gap, yet at the same time (we can) dismantle the private security companies,” Bashary said.

Employees from the firms can join the Afghan security forces if they wish, he added.


Bashary said he did not have an estimate of the total number of firms, but there were 52 registered with the government, half of them foreign.

Kabul estimates that up to 40,000 Afghans are employed by these firms, seen as a parallel security operations outside government control. Their heavily armed guards forcing a route through traffic is a common sight on Afghan streets.

Many Afghans see them as operating with impunity, and they have been accused of a series of killings, crimes and scandals, but have rarely been convicted.

Karzai’s government tried unsuccessfully last year to register the firms, find out the amount of arms they had and where they came from, and how much money the industry was worth, an Afghan security source has said.

The US State Department said last year it would review its use of contractors at overseas embassies after a scandal over sexual hazing by security guards at its Kabul mission.

When Karzai issued the deadline for the closure of the firms in August, the Pentagon called the deadline “very challenging” but said Washington would work with Kabul and seek to improve oversight and management of private security firms. – Reuters

In border row, Pakistan shows US vulnerability

In border row, Pakistan shows US vulnerability

* Former US state dept official says Pakistan played its ‘trump card’
* US think tank director fears political repercussions from ‘border violence’

WASHINGTON: The United States and Pakistan have never had an easy partnership, but despite heated feuds on everything from drone attacks to terror plots, the two governments have found a way to work together.

Now, Pakistan has played what some experts consider the ultimate trump card – closing its main border crossing with Afghanistan to US-led forces who depend on the route for oil, ammunition and other war supplies.

Islamabad took action after accusing NATO helicopters of killing three Pakistani soldiers on their own territory, a stark reminder of Pakistan’s sovereignty concerns as it cooperates with the US. Gunmen torched more than two dozen NATO supply trucks Friday in southern Pakistan.

Former US State Department official Marvin Weinbaum said Pakistan felt obliged to act tough at a time when the civilian government is under growing pressure, including from the powerful military, after its response to major floods.

“They have to show their trump card because it’s for domestic political reasons, especially with a weak government. But it is serious and it points out our vulnerability,” said Weinbaum, a scholar-in-residence at the Middle East Institute.

A prolonged closure of the border would mark “a fundamental change in our relationship with Pakistan. For the US, Pakistan can be reluctant to do this or reluctant to do that, and that is all ultimately tolerable as long as the supply routes remain largely open and protected,” he added.

Repercussions: But Shuja Nawaz, director of the South Asia Center at the Atlantic Council think-tank, feared political repercussions from the border violence. He faulted NATO for initially saying it acted in self-defense.

Such incidents “feed the paranoia inside Pakistan’s military and civil establishments that perhaps there is some sort of master plan to take advantage and cross the border at will,” Nawaz said.

“There is a very strong possibility that it could get out of hand,” he added.

Richard Holbrooke, the veteran diplomat who serves as US pointman on Pakistan and Afghanistan, said ties with Pakistan were “more complicated than any strategic relationship I’ve ever been involved in.”

“But at the end of the day, success in Afghanistan – however you define success – is not achievable unless Pakistan is part of the solution, not part of the problem,” he told a forum in Washington.

Fundamentally, Pakistan’s chief objective is to limit the influence of rival India in Afghanistan, US National War College associate professor Bernard Finel said.

But without Pakistani cooperation, the US would have to scale back any goals of nation-building in Afghanistan and adopt a lighter footprint, Finel said. afp

“The stated goal of cutting taxes to spur US capital investment was not achieved”

“The stated goal of cutting taxes to spur US capital investment was not achieved”

The conclusion of a commentary piece in the Financial Times. I’m posting the text, since the link seems not to work consistently:

Non-US groups reaped fruits of Bush tax cuts

By Richard Bernstein

Continuation of the Bush tax cuts has been the subject of much discussion in US political and economic circles.

Those on the right object to most forms of increasing government revenue, while the left wants to narrow disparities of income and wealth.

The tax cuts’ two bills, in 2001 and 2003 – changed laws so that personal income tax rates were reduced, exemptions for the Alternative Minimum Tax increased, and dividend and capital gains taxes also cut.

Yet in the debate, it seems of no moment to either side whether the tax cuts were effective in achieving their goal of spurring business investment and making the US economy more competitive.

Our own examination of US non-residential investment indicates that the reduction in capital gains tax rates failed to spur US business investment and failed to improve US economic competitiveness.

The 2000s – that is, the period immediately following the Bush tax cuts – were the weakest decade in US postwar history for real non-residential capital investment.

Not only were the 2000s by far the weakest period, but the tax cuts did not even curtail the secular slowdown in the growth of business structures.

Rather, the slowdown accelerated into a full decline.

During each decade from the 1950s to the 1990s, growth in real gross non-residential investment averaged between 3.5 per cent and 7.4 per cent per decade. During the 2000s, it averaged a mere 1 per cent.

Similarly, the growth rate for investment in equipment and software ranged from 5.7 per cent to 9.9 per cent in these earlier decades. It averaged 1.9 per cent during the 2000s.

Average growth in non-residential structures ranged from 1.3 per cent to 5.7 per cent from the 1950s to the 1990s. During the 2000s, it declined by 0.8 per cent.

The stated goal of cutting taxes to spur US capital investment was not achieved.

Where did the benefit of the tax cuts go?

We have maintained that an increasing proportion of the benefits of US monetary and fiscal policy are leaking outside the US.

Washington sets policy as if the US were a closed economic system and rarely considers ramifications outside the country.

The consensus regarding the negative effects of rising tax rates on US stocks suggests that investors also might not adequately consider policy leakage when formulating strategies.

The Bush tax cuts may have encouraged capital flight from the US because the dollar was weak and capital – including incremental funds in taxpayers’ pockets – tends to flow to stronger currencies.

In a weak dollar environment, US policymakers must consider whether a tax cut’s positive effects on the US economy might be muted relative to its collaterally positive effects on stronger-currency economies.

Record flows to emerging market debt and equity funds, coupled with anaemic US investment spending, suggest that this might be an issue.

If we are correct about the growing extraterritorial leakage of US monetary and fiscal policies, then an increase in the capital gains tax rate might have a larger negative effect on non-US investments such as emerging market funds and exchange-traded funds than on US investments.

There probably are greater long-term capital gains to be made in non-US investments than in US investments simply because of the outperformance of non-US markets since the tax cuts were enacted.

From December 2003 to August 2010, the MSCI Emerging Market Index appreciated 120 per cent versus a decline of 6 per cent for the S&P 500.

Speculative assets that have appreciated, such as gold, might also suffer if the tax cuts were allowed to expire and investors rushed to cash in gains before the lower tax rate expires.

Business investment data demonstrate that the Bush tax cuts failed to achieve their goal of spurring productive US investment and that this failure has contributed to the poor performance of US stocks.

In a strong dollar environment, the cuts might have encouraged incremental taxpayer savings to flow into US companies, reducing their cost of capital, boosting their return on capital and driving their stock values higher.

Instead, in the weak dollar environment of the times, the cuts leaked abroad and boosted return on capital outside the US.

By so boosting non-US companies’ return on capital relative to that of US companies, the tax cuts made US companies that much less attractive and had the opposite of their intended effect.

It is possible that allowing the Bush tax cuts to expire might damage non-US investment prospects more than those of the US.

Richard Bernstein is chief executive of Richard Bernstein Advisors

Tax Cuts for the rich create jobs outside the US

A standard right wing talking point is that tax cuts for the rich and corporations create jobs.

This is, actually, true. They create jobs overseas.

The tax cuts’ two bills, in 2001 and 2003 – changed laws so that personal income tax rates were reduced, exemptions for the Alternative Minimum Tax increased, and dividend and capital gains taxes also cut.

Yet in the debate, it seems of no moment to either side whether the tax cuts were effective in achieving their goal of spurring business investment and making the US economy more competitive.

Our own examination of US non-residential investment indicates that the reduction in capital gains tax rates failed to spur US business investment and failed to improve US economic competitiveness.

The 2000s – that is, the period immediately following the Bush tax cuts – were the weakest decade in US postwar history for real non-residential capital investment.

Not only were the 2000s by far the weakest period, but the tax cuts did not even curtail the secular slowdown in the growth of business structures.

The logic of this is simple enough. If you have money to invest, you’re going to invest it where it’ll return the most. Right now and in the past couple decades that is either in leveraged financial games, or it is in economies which are growing fast and have low costs. The US does not have high growth compared to China or Brazil or many other developing countries. It has high costs compared to those countries as well.

If you can build a factory overseas which produces the same goods for less, meaning more profit for you, why would you build it in the US?

Until that question is adequately answered, by which I mean “until it’s worth investing in the US”, most of the discretionary money of the rich will either go into useless speculative activities like the housing and credit bubbles, which don’t create real growth in the US, or they will go overseas.

There are a number of ways this question can be answered.

  • You could slap taxes on foreign capital flows;
  • you could slap tariffs on foreign goods produced in low cost domiciles so that companies have to produce in the US to have access to the US market;
  • you could push industries which are hard to outsource but don’t actually decrease American competitiveness. The housing bubble increased the cost of doing real business in the US by inflating real estate costs. A massive buildout making every building in the US energy neutral or an energy producer would increase US competitiveness.
  • you could try and do what America once did: have a tech boom. If the future is being produced in a country then everyone has to invest there and when things are changing fast you can’t offshore production, because speed matters and offshoring is slow. This is why real wages increased during the tech boom of the 90s.

There are other answers as well, but the point is simpler: you must answer the question “why invest in the US instead of a low cost, high growth country?” Until you answer that question tax cuts will not only not do any good, but in a sense will do harm, by increasing the speed at which jobs are offshored out of America.

Robert O. Blake–Rewriting the American Position on Sri Lankan Military Solution

[Blake is another hypocritical American diplomat who frequently speaks out of both sides of his mouth (SEE:  Robert O. Blake two mouth ambassador).  He is one of the principle State Dept. mouthpieces for the American penetration of the former Soviet satellites of Central Asia.]

“Only a peaceful political solution, not a military one, offers a way out of the current cycle of escalating violence…This is why the United States was troubled by the Sri Lankan Government’s decision to terminate the 2002 cease-fire agreement. The cease-fire agreement, although often violated, nonetheless provided a framework for negotiation and committed the parties to seeking a negotiated settlement. The termination of the agreement will make it more difficult to achieve that negotiated settlement that can produce a lasting, peaceful solution to Sri Lanka’s conflict.”By Robert. O. Blake. Jr, January 11, 2008

Lanka achieved a milestone when LTTE was defeated – Blake

Assistant Secretary of State for South and Central Asian Affairs Robert Blake said that Sri Lanka achieved a milestone when the Government successfully defeated the LTTE in May 2009 ending the three-decade long conflict.

Addressing the emerging role of U.S. foreign policy in South Asia at the San Diego World Affairs Council, California he said: “I have returned to Sri Lanka several times since the end of the war and observed a renewed sense of purpose among its people,” he said.Speaking about the US foreign policy, which is switching its heavily Europe -focused policy to Asia, mainly India, Pakistan and Afghanistan, he said the US needed to focus on other South Asian countries too.

“But even though India, Pakistan and Afghanistan receive much of the focus from the news media and foreign policy analysts, they should not overshadow recent developments in Bangladesh, Sri Lanka, Nepal, Maldives and Bhutan that have positive ramifications for the region”, Blake, the former US Ambassador in Sri Lanka, said. He cited the recent end to devastating civil wars in Sri Lanka and Nepal that have ushered in new eras of peace, reconciliation and prosperity.

“In the past 15 months, Sri Lanka’s stock market has risen ‘an astounding 150 percent’ to become the highest performing stock market in Asia” he said.

Plan to Blow Up Zhob Airport Foiled; Three Arrested

The Baloch Hal News

ZHOB: Police in Zhob District  have foiled an attempt to blow up the Airport and the Police line and arrested three suspects on Saturday during a raid near Quetta national highway.

District Police Officer (DPO Zhob), Raz Mohammad Tarin disclosed this while addressing a news conference here on Saturday. He said that acting on a tip-off police have formed two teams of under the supervision of competent officers to look after the matter. “Three suspects were arrested from a deserted house near Quetta national highway in Zhob town during a successful raid,” he added.

The suspects were identified as Noorullah, Hamidullah and Hanifa and they arrived from Waziristan with the intention of blowing up Zhob Airport and police line, said Raz Mohammad.

Police have recovered 46 shells of anti-aircraft gun, 11 mortar shells, a hand grenade and ten packets of explosive material from their possession. He informed that one of the suspects Noorullah hails from South Waziristan while Hameedullah and Hanfia belong to Loralai district of Balochistan. He said that important disclosures are expected from suspects during an interrogation.

We Are Never Wrong

We Are Never Wrong

Peter Chamberlin

We have to stop thinking of the organized effort to control society as a dark conspiracy and learn to see its very existence as a sign of hope.  If a small group of evil men can figure-out a way to take control of human fate, then other groups of intelligent men and women with the best intentions should be just as capable of learning how to break their control.

Hope is the commodity that we are most in need of at this time.  If we look at the plot to control mankind’s destiny through the lens of “conspiracy,” we feel compelled to surrender to the broken spirit of hopelessness, thinking that our situation is above human resolution.  This is the weakness of spirit that compels many to look for outside intervention from a divine or extraterrestrial source, or else from imaginary unions of upright moral men.  We will find that no one else will save us.  It is a task which we must accomplish for ourselves.

The world is in the unbelievable mess it is in not by accident, but because of an ancient plan.  All the money and power in the world cant’ make anything better by themselves, simply because the people with all the power, who control nearly all the money, won’t let things get better until they get what they want.  What they want isn’t merely the Asian oil and gas resources; what they want is the entire world.

The existential problems we face today as a Nation are the symptoms of a long-term condition of deterioration, where the rot has had plenty of time to settle in.  Presidents only have 4-8 years to try to set the country on the path to recovery (if any of them was ever of a mind to try), but the powerful individuals and families who are causing all the trouble have their entire lifetimes in their positions of ill-gotten power to screw things up.  With their hands on the bank accounts of every politician, they work with their stables full of lifetime representatives to create the perception that change is afoot, even though they work twice as hard making sure that everything remains the same.

The many problems that W. inherited from Bill Clinton and from his father (not to mention the mountain of crises created by the father of the neoconservative revolution, Ronnie Ray-guns) were without simple solutions, these things were never meant to be solved.  In our great social experiment in the behavioral science of the “strategy of tension,” problems are created as solutions unto themselves; crises are opportunities for social control that presidents are to “manage” (as in “conflict management”).

Proof of this can be seen in the continuity of political, military, economic and legal decisions made by successive administrations of alternating political parties.  If the two parties really had differing interests, then policies would have swung back and forth between polar extremes.  But this never happens.  Despite the fact that every candidate for office campaigns on promises to correct the misguided policies of his predecessor, no president has ever fulfilled his promises to correct anything.  Social problems are created with the intention of allowing them to compound, or accumulate, until they approach something like a “critical mass.”  When society is agitated to this point, then controlled events and reactions to them provide the means to full control, without resorting to massive force.  “Conflict management” is a very real behavioral science and it is made possible by an intimate knowledge of human reactions to shocking events.

Our behavior is not actually “controlled,” it is predicted.  That’s one of humanity’s principle traits—our actions are usually predictable.  With the astounding technology available to those who wish to direct the course of human destiny, it is fairly obvious that American leaders probably understood beforehand just what the negative reactions will be to any American action.  Nasty little backlashes to American policies like “al Qaida” are never really “bolts out of the blue.”  It is usually fairly easy for anyone to foresee certain reactions, if they are familiar with the person actors who are involved.

With the right analytical hardware and software, it should be possible for anyone to predict some future events with a high degree of accuracy.  If negative reactions to American policies such as the 911 attacks were anticipated by the planners beforehand, then the fact that they were allowed to take place becomes proof that they had been incorporated into the master plan.  It is highly probably that our leaders knew 911 would be a horrific day, yet they did nothing to deter the attacks, and probably took significant steps to guarantee a successful outcome leading to perpetual war and world government.

Every president builds on the mistakes of his predecessors, adopting and adapting all the idiotic mistakes, making them his own.  Obama became Bush, just as Bush became Clinton the globalist, interventionist, war-hawk before him.  The hybridized mutant policies that grew out of these compounded errors were each president’s personal “window dressing,” to cover a central plan that has never changed or swayed one iota from its sick original goals, which were formulated many decades ago.  If each president was really “his own man,” following his own best ideas and solutions for what is clearly wrong with our country, then this binding thread of continuity of purpose and plan would not exist.  But, “exist,” it clearly does.

The problem with running a government that never admits error is that each new administration is saddled with baggage generated by the past.  Instead of ending defective popular programs from the previous administration, the new president merely bent each program to his liking, producing freakish new programs which gave with one hand, while taking back with the other.  Such programs continued to produce mandated increases to cover inflationary cost increases, yet they contained contradictory “needs based” standards which usually confiscated whatever was given.

Nothing else seemed to be possible in a system of government which never admits its mistakes or corrects its past errors.  Bureaucracy always multiplies itself if given the opportunity.  The same applies to military bureaucracy; it always finds ways to multiply itself, also by replicating past mistakes.  In our case, the strategy of redundancy provided the easiest (though most dangerous) solution.  American military strategy was to replicate small copies of the US Army in allied countries.

Clinton’s sadly mistaken policies compounded Reagan’s error of allowing CIA Dir. Wm. Casey to ship militants to Uzbekistan and the Ferghana Valley.  The intervention-loving Democrat president shamelessly created the “Islamist” mercenary forces who operated in “liberated” Soviet space, from Bosnia, to Chechnya, to Kyrgyzstan and Tajikistan.  These militants were all ours.  Clinton’s “Islamist” armies waged war in the former Yugoslavia, in both Chechen wars, as well as in the Tajik civil war.

Bush Jr. merely revived the same policy, using the same militant leaders in the same locations, with similar results.  Only Bush had his military minds adapt a less violent “democratic-revolutionary” counterpart for his “Islamist” forces, putting the behavioral conditioners to work softening-up the ground in countries that offered no military openings.  This gave us the series of “colored revolutions” in Eurasia.

By contracting-out much of these operations to private security firms and foreign governments without oversight, it has become easier for the international networks of criminals, militants, arms-traders, drug-runners to coalesce into a powerful force which operates outside of all laws.  Thanks to Bush and Cheney, some folks refer to the International militant networks as “al Qaida,” even though bin Laden’s real organization only consisted of a few thousand Arab and N. African militants.

After each illegal covert paramilitary operation, where contractors were secretly supplied with Soviet military equipment, often using American military transport (SEE:  The Tuzla Airlift–Sometimes History Refuses to Be Silent), the controllable remnants of these private armies were either absorbed into standing national militaries, or transferred to the next secret war.  The wild, unreliable remnants of the private armies split-off into smaller private networks, each independently pursuing its own goals.  Even though broken-down into separate militant components, all of these mercenary forces continued to serve the mission of the planners, by sowing destabilization wherever they went and whoever they hooked-up with.

In Europe, some of the right-wing nationalists and their networks of friends merged with the “stay behind forces” created by American and British military intelligence to fight covert “low-level insurgencies” against their allies in liberal democrat European governments.  These were the so-called “Gladio” forces.  Gladio was basically a large series of interconnected psychological warfare experiments conducted upon America’s European allies, without their consent, much like the illegal US syphilis research conducted on Guatemalans without consent which Obama recently apologized for.  Gladio provided the American military with the valuable lab results it needed before designing the global Gladio program which we are engulfed in.

The terror war is a global campaign to force worldwide acceptance of a distorted redefinition of words certain words like “terrorism,” and “aggression,” in order to paint our own acts of state terrorism as self-defense.  This purposeful distortion of everyday reality has produced the expected state of cognitive dissonance in the population at large, making the blurring of other lines much easier.  By forcing the people to accept that “black is white” and to hold contradictory beliefs, they are left confused, not knowing what to think.  They are stunned.  The introduction of further shock or extreme tension to someone in this confused state of mind produces fear and a reaction to run away or withdraw from the source of the tension.  In this manner, groups of select people are herded like frightened cattle, in whatever direction the controllers want to stampede them.

The shock of the 911 event is a steering force.  Since the early days of the wars which followed this event, the American people have been bounced from steering event to steering event.  We have become extremely weary from all of this bouncing.  We don’t bounce so easily anymore.  They have cried “wolf” once too often, Obama is slowly finding out.  Hopefully, we will one day discover that the strategy of terror was self-defeating, meaning that it was better suited to short term operations, since the shock value diminished with successive events.  Targeted populations became accustomed to the constant shocks.  Constant terrorism in places like Peshawar has hardened the wills of many people just as much as it has broken the will of others.

Obama is continuing a very big mistake of Bush and Cheney by continuing the pipeline wars in the traditional/unconventional American way, that of using  “Islamists” to gain an unfair advantage over Russia and Gazprom on their “home turf” in Central Asia.  Instead of working with Russia, China and others to find solutions to the sadly mistaken and corrupt energy policies set down by Bush and Cheney, Obama is continuing their mistakes and making them worse.  America is sticking to its guns, continuing the war in Afghanistan, relying on military force wherever we can, bribing and extorting our partners in crime, to take or buy what we want, instead of finding acceptable common ground with others for turning a planned military solution into an international logistics problem, one carried-out for the common good.

Now that Obama has inherited this mélange of compounded errors from his predecessors, he finds that the less extreme options of both the military and the revolutionary angles have largely played-out.  He is backed into a corner and has no choices left to him, except to begin trying to solve some of the previous mistakes, even if that means forgetting about a second term and taking a stand for truth against his powerful backers and handlers.  The problem with Obama is that he doesn’t seem to realize that he has reached the end of his rope.  Tinkering with revisions to the mistakes, making cosmetic changes around the edges of separate dilemmas, is only making matters worse by running-out the ticking clock and wasting money on imaginary solutions which solve nothing.

His so-called “reset” with Russia is not a change, it is a continuation of America’s primary strategy, merely an open acknowledgement of what has always been the central goal of the plan.  That central goal is the merger of American and Russian power into one central world government—the “New World Order” hinted at by George H.W. Bush in his infamous “New World Order” speech.

1990-09-11  Joint session to Congress after Iraq invasion of Kuwait:

“A new partnership of nations has begun.

We stand today at a unique and extraordinary moment. The crisis in the Persian Gulf, as grave as it is, also offers a rare opportunity to move toward an historic period of cooperation. Out of these troubled times, our fifth objective — a new world order — can emerge….together with Arabs, Europeans, Asians, and Africans in defense of principle and the dream of a new world order….old adversaries like the Soviet Union and the United States can work in common cause.”

This merger between East and West was to be accomplished by an equalization of economic status and political status.  As things got worse here, they steadily improved in the neo-Soviet world, once recovery from the Soviet empire’s collapse had begun.  Every American president in my own lifetime has pushed destructive central policies which have amounted to a systematic destruction of American industrial and economic power.  All of them have shepherded policies which have steadily lowered American living standards and eliminated opportunities, while simultaneously elevating the living standards in foreign lands by exporting American investment and industry in a calculated effort to cripple American labor.  Focused primarily on equalizing the economic, political and legal standards between the United States and the former Soviet Union, economic order has been established in Russia, while economic chaos threatens to prevail over the entire United States.

But it is in the political realm where the equalizing of the status quo has become most apparent.  Using the excuse of a more efficient terror war, American political rights have been steadily diminished, to more closely approximate the neo-Soviet ideas of “democracy” that are being developed by Putin and Medvedev.  Just last week, the FBI raided the homes of political activists in Minneapolis and Iowa in connection to a terrorism investigation.  The government agents were investigating antiwar activists, looking for evidence to charge them with supporting terrorism.:

Suddenly, the government has decided to go fishing, looking for justification to shut the mouths of ordinary American citizens who care enough about their country to openly disagree with the war plans or solutions that have been given to major catastrophes.  By this reasoning, I guess that I should expect a loud knock at my door in the middle of the night or early morning, as should all of you who are reading this.  I have always known that it would one day come to an hour when the fascists who are swarming like flies at the base of our decaying form of government would emerge from the ruins to eat us all alive.  That is why all of us in the free blogosphere must double our efforts to spread truth and save America from the evil which is destroying our Constitutional rights.

These immoral raids were the work of a government desperate to win a victory in the American homeland which it cannot hope to win on the real battlefields in Asia.  America’s terror war has always been about expanding its arena of complete control into the “Third World,” but more specifically, into the former USSR.  In the process, US leaders have failed and endangered every alliance because of our military gambit.  Critics of this failed policy must be silenced, hence the FBI raids, as well as the expanded Internet wiretaps.  Obama is following Putin/Medvedev’s Russian model of “Sovereign Democracy” to remove the pesky aspects of First Amendment rights from American soil, as a preliminary step to world dictatorship enforced by the American/Soviet alliance.

How far are we now from seeing full-blown neo-soviet style “democracy” in the United States?  How far is it really between the two positions, when you consider the state of protest in both countries?  In Russia, protests against government policy can only take place if they are government approved.  In America it is much the same.  Protestors are confined at major political conventions to authorized protest areas.  Putin has suggested that authorities should bash a few skulls of those who hold illegal protests.  In places as diverse as London and Pittsburgh, American and British police have been doing just that, using clubs and tear gas to corral protests into blind allies and cul-de-sacs.   How far are we from the complete synchronization of American democracy with neo-Soviet “democracy”?   The only real difference may be that here opposition reporters and political activists do not yet disappear in the middle of the night, or get snatched off busy city streets at high noon?  At least we know where those arrested in the Midwest still are.   That one difference could disappear with the stroke of Obama’s pen.

That is why it is so important that people make an extra effort right now to spread the truth about our messy reality, before we lose access to the Internet, as well as our First Amendment rights.  We still have the right to peaceably assemble and to express our common outrage at the lack of progress in world affairs that is a product of our broken electoral system, which never corrects its mistakes.  We still have the ability to communicate freely, even though it should be understood by all that every word that we write or speak through the electronic media is being analyzed by data-mining, behavioral profiling, super-computers.

The day will soon be upon us where no one can communicate; the merger between East and West will have been completed.  On that day, many will lose their freedom, as well as their lives.  Until then, we will not let a few arrests in Iowa or Minnesota deter us from what we have to do.

We have a country and a world needing saved—and that’s just what we plan to do.