In an earlier article, I reviewed the varied aspects of personality profiling and simulation. While serving as Head of the Artificial Intelligence Department at the U.S. Army War College, 1993-1995, I conducted studies on profiling, psychological programming, and brainwashing. I explored and developed personality simulation systems, an advanced technology used in military war games, FBI profiling, political campaigning, and advertising. Part of my discovery was that:
Unenlightened human minds are combinations of infantile beliefs and emotional patterns
These patterns can be simulated in profiling systems
These profiling systems can be used to program and control people
Personality simulation systems are being used to create political campaigns that apply voter profiles to control their voting behavior. TV commercials and programs use personality simulation to profile viewers to control their purchasing and viewing behaviors. And sophisticated propaganda and brainwashing techniques are being used by the cabal to keep American citizens under control.
The Technology of Thought and Behavior Control
The long evolution of developing procedures to control human behavior all came to a head in the modern world with Pavlov, a Russian scientist. In the early years of the twentieth century, Pavlov made the discovery that you can condition a dog to salivate on command simply by associating food with the ringing of a bell. Once that association is fixed in the dog's mind, the food can be removed and the dog will salivate merely when it hears the bell.
Pavlov carried out the identical experiments on human beings with the same results. Those principles have been adapted to television and motion pictures and can now make Americans salivate in response to a wide array of bells and whistles. We can call it phase one in the evolution of human behavior control.
Phase two was accomplished by the same Russian scientist, Pavlov. Very few people know of this part of his research. During a particularly severe storm in Russia, heavy rains continued for days and Pavlov's laboratories were flooded. Pavlov and his research assistants were able to return to the laboratory only after the flood waters had receded days later. Upon returning, Pavlov discovered something truly remarkable. Before the flood, many of the dogs had been conditioned to respond to various stimuli. Lo and behold, all traces of the conditioning in the dogs had disappeared! Bells, food, nothing could induce the former salivation response that had been so carefully implanted in the dogs' nervous systems.
What mysterious influence could account for this remarkable turn of events, Pavlov wondered. So, being a good scientist, he studied carefully what had transpired while he was away from the dogs. They had been left without food or warmth. They had been isolated for days; some of them had drowned. They had been subjected to extreme stress, never knowing if they would live or die. These were the factors that had produced the washing away of the previous conditioning from the dogs' brains - brain-washing.
Pavlov and other Russians followed up this line of research, but it was the Chinese communists in the 1950s who first saw its real potential for use with human beings. They employed these very principles in brainwashing American and other Allied prisoners of war during the Korean conflict. Isolation, periodic denial of food or water, cold and exposure, extreme stress associated with uncertainty of life or death--these conditions, together with a continual barrage of indoctrination produced the erasing of previous beliefs and behavior patterns in American soldiers in particular. Thus brainwashing became phase two in the evolution of human behavior control.
But brainwashing is not very reliable, as the remarkable film "The Manchurian Candidate" shows. The trigger mechanisms can be tampered with, sometimes even erased, before the desired behavior can be carried out.
These procedures are only used now by the CIA and other intelligence services for programming special assassins (see the movie "Parallax View"). Neither classic Pavlovian conditioning nor brainwashing can produce the general results that black-budget project directors in intelligence services desire: absolute control of a human personality.===snipped===> "And Ye Shall Know The Truth And The Truth Shall Set You Free"
WAKE UP AMERICA....ITs OUR COUNTRY!!!
Love "Light" and Energy
Main Core also allegedly draws on four smaller databases that, in turn, cull from federal, state, and local “intelligence” reports; print and broadcast media; financial records; “commercial databases”; and unidentified “private sector entities.” Additional information comes from a database known as the Terrorist Identities Datamart Environment, which generates watch lists from the Office of the Director of National Intelligence for use by airlines, law enforcement, and border posts. According to the Washington Post, the Terrorist Identities list has quadrupled in size between 2003 and 2007 to include about 435,000 names. The FBI’s Terrorist Screening Center border crossing list, which listed 755,000 persons as of fall 2007, grows by 200,000 names a year. A former NSA officer tells Radar that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to Main Core, as does a Pentagon program that was created in 2002 to monitor anti-war protestors and environmental activists such as Greenpeace etc.
[Using Virtual Reality to Document Human Existence, Gregory Peter Panos, PersonaForm, Beverly Hills:]
www.wtec.org/ConvergingTechnologies/Report/NBIC_report.pdf [Cut and Paste URL to Download]
www.wtec.org/ConvergingTechnologies/1/NBIC_frontmatter.pdf [Cut and Paste URL to Download]
Titan Rain was the U.S. government's designation given to a series of coordinated attacks on American computer systems since 2003. The attacks were labeled as Chinese in origin, although their precise nature (i.e., state-sponsored espionage, corporate espionage, or random hacker attacks) and their real identities (i.e., masked by proxy, zombie computer, spyware/virus infected) remain unknown. The designation 'Titan Rain' has been changed, but the new name for the attacks is itself classified if connected with this set of attacks.
In early December 2005 the director of the SANS Institute, a security institute in the U.S., said that the attacks were "most likely the result of Chinese military hackers attempting to gather information on U.S. systems." Titan Rain hackers gained access to many U.S. computer networks, including those at Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA.
[Artificial Metempsychosis. A Search Of Methodology For Personality Simulation; Mikhail Solovyov, Department of Biophysics, St. Petersburg University, Russia, 1992]: www.cryonet.org/cgi-bin/dsp.cgi?msg=2879.2
[Government Collecting DNA Secretly [WHY]