My Lai Massacre and The Phoenix Program


The My Lai Massacre happened on 16th March 1968 during the Vietnam War . The year 2018 marks 50 years since the massacre and many mainstream media outlets have covered the anniversary with poignant articles describing the horrors . Not many articles have linked the massacre to the Phoenix Program instigated by the C.I.A.

The Phoenix Program was a covert operation of terrorism , murder ,  assassination and rape , designed to undermine the North Vietnamese Army and particularly the Viet Cong . The program was indiscriminate , as are most terrorist operations , it targeted civilians including women , the elderly and children .

As an extension of other parallel programs of behavioral modification , many US soldiers in the Vietnam War were administered experimental substances , designed to increase their aggression , moral behavior and perception .

One particular substance stands out , the chemical agent called 3-Quinuclidinyl benzilate , or BZ for short .

According to the Wikipedia page :

“The agent commonly became known as “Buzz” because of this abbreviation and the effects it had on the mental state of the human volunteers intoxicated with it in research studies at Edgewood Arsenal in Maryland.”

To quote from an official military document :

“NATO Code: BZ
Signs and Symptoms :
Mydriasis; dry mouth; dry skin; increased deep tendon reflexes; decreased level of consciousness; confusion; disorientation; disturbances in perception and interpretation (illusions and/or hallucinations); denial of illness; short attention span; impaired memory.”

“The patient is often disoriented to time and place. Disturbances in judgment and insight occur. The patient may abandon socially imposed restraints and resort to vulgar and inappropriate behavior. Perceptual clues may no longer be readily interpretable. The patient is easily distracted and may have memory loss, most notably short-term memory. In the face of these deficits, patients try to make sense of their environment and will not hesitate to make up answers on the spot to questions that confuse them. Speech becomes slurred and often senseless, and loss of inflection produces a flat, monotonous voice. References become concrete and semiautomatic, with colloquialisms, clichés, profanity, and perseveration.”

“BZ produces effects not just in individuals, but also in groups, with shared illusions and hallucinations ( folie à deux , folie en famille , and “mass hysteria”) .”

Sounds just like the behavior of the US soldiers involved in the massacre .

Also sounds like the behavior of many other modern terror organizations currently operating in the Middle East and beyond .

The reality is that soldiers are seen as expendable by the controlling powers , war provides the ideal opportunity to trial and hone experimental substances and behavioral modification methodology and technology . A further opportunity for the continuation of experimentation is provided when the unwitting troops return home .

Gulf War syndrome ?


Or human experimentation ?

Related :

  2. The Phoenix Program, My Lai and the “Tiger Cages”
  3. “The Phoenix Program”: CIA’s Killer Squads To Eliminate The Vietcong
  4. The Phoenix Program – Douglas Valentine

Also related :

  1. Edgewood Arsenal human experiments
  2. Government Experiments on U.S. Soldiers: Shocking Claims Come to Light in New Court Case
  3. Vietnam Veterans of America Sues Military and CIA Over Secret Testing of Soldiers
  4. Vets Sue CIA Over Mind Control Tests
  5. Veterans’ group: CIA blocking lawsuit over experiments on troops
  6. US Army – BZ Study (PDF)
  7. US Army LSD Tests (PDF)

Further related :

  1. Jacob’s Ladder (film)
  2. Jacob’s Ladder Decoded
  3. The Real Story of JACOB’S LADDER: Government Drug Tests and “the Ladder”
Posted in Mind Control, Psychology, Psychotronic Warfare, Uncategorized | Leave a comment

ECoG Speech Synthesis , BCI’s , Implant Arrays


As shown in the diagram above there are a variety of methods available which are capable of reading neuronal LFP’s (local field potentials) . LFP’s are basically electrical signals produced by individual neurons or neuronal clusters when they they are activated .

Specific functions in the human body are governed by specific areas of the brain .


As we can see from the above diagram the area that governs human speech is termed Broca’s area , named after French surgeon Paul Broca .

Electrocorticography (ECoG)

One particular neural recording method is termed electrocorticography (ECoG) .

ECoG requires a MEMS implant which involves invasive brain surgery .

This method differs from EEG recording which is non-invasive as the electrodes are placed over the cranium and scalp .

ECoG has a much higher resolution and accuracy than EEG recording and is less susceptible to signal noise .

As can be seen in the above diagram an ECoG implant can take two specific forms :

  • A flexible electrode grid which sits under the cranium and lies on the surface of the brain .


  • An electrode array , which again sits under the cranium but actually penetrates the brain tissue .

Scientists have used the ECoG method to read , record and analyze a wide variety of neural signals .

For example scientists have used cranial electrode implants to record the neural signals which govern motor functions in a living monkey , the neural signals have then been decoded in real time and used to control a robotic arm .

To illustrate how varied the research in this particular field is , another scientist claims that he has decoded the pattern of electrical impulses and neural signaling which form memories .

In fact , software and computerized tools are available that can measure and analyze almost any electrical signal from any area of the human brain .

As can be seen in the acknowledgments in the above links , a large portion of the research is funded by the military .

Speech from ECoG

Continuous speech has been decoded from ECoG implants using specialized software .

A few research papers are listed below with key excerpts from the papers .

“Here, we show for the first time that continuously spoken speech can be decoded into the expressed words from intracranial electrocorticographic (ECoG) recordings.Specifically, we implemented a system, which we call Brain-To-Text that models single phones, employs techniques from automatic speech recognition (ASR), and thereby transforms brain activity while speaking into the corresponding textual representation.”

“The high temporal and spatial resolution of ECoG recordings allowed us to trace the temporal dynamics of speech production through the areas in the brain relevant for continuous natural speech production.”

“Automatic Speech Recognition is a technology that enables the recognition of spoken language into a textual representation by computers.”

“KEY CONCEPT 1. Brain-computer Interfaces (BCIs)
A Brain-Computer Interface is a system which sends messages or commands to a computer without using the brain’s normal output pathways of peripheral nerves and muscles.”

“KEY CONCEPT 2. Automatic Speech Recognition (ASR)
Automatic Speech Recognition is a technology that enables the recognition of spoken language into a textual representation by computers. These technologies often rely on statistical models like Hidden-Markov-Models and can now be found in a large variety of consumer electronics from cars to mobile phones.”

A phone is a distinct speech sound that can be perceptually differentiated from other speech sounds.”

“KEY CONCEPT 4. ECoG Phone Models
ECoG phone models can be used to estimate the likelihood that an internal of ECoG activity is a certain phone. This generative models might for example return that newly recorded data have a probability of 0.6 of being a /l/, but only a probability of 0.1 of being a /b/.”

“Conclusion and Discussion

We show that ECoG is the most promising technique and demonstrate how audibly spoken speech can be recognized from ECoG data using ASR technology in our Brain-to-text system.”

“Continuous speech production is a highly complex process involving many parts of the human brain. To date, no fundamental representation that allows for decoding of continuous speech from neural signals has been presented. Here we show that techniques from automatic speech recognition can be applied to decode a textual representation of spoken words from neural signals. We model phones as the fundamental unit of the speech process in invasively measured brain activity (intracranial electrocorticographic (ECoG)) recordings. These phone models give insights into timings and locations of neural processes associated with the continuous production of speech and can be used in a speech recognizer to decode the neural data into their textual representations.”

“Electrical activity measured from the cortex, or electrocorticography (ECoG), offers several advantages over other neuroimaging modalities for characterization and real-time decoding of brain activity. Specifically, ECoG is well-suited for the study of speech and language owing to its unique spatial and temporal resolution capabilities that allow it to accurately capture the fast-changing dynamics of the large cortical networks underlying speech processing .”


So there we have it , ‘silent speech’ can be recorded , measured , analyzed and decoded in real time . In other words , no pun intended , these particular systems can actually decode the thought patterns of individual words from the human brain .

Part II coming soon (ish)

Posted in Mind Control, Psychotronic Warfare, Science, State Surveillance & Control, Targeted Individuals | Leave a comment

Playland – Establishment Sodomites , Rapists & Sadists

Cultocracy note :

Events described in the book Playland by author Tony Daly represent normal working practice by establishment employees . Tony Daly was aged 20 when he was drugged with hypnotic sedatives , raped and mind controlled by establishment filth . It is likely that the whole process was part of a sadistic and disgusting method termed Monarch mind control , practiced on a massive scale in the UK . After the initial ordeal Tony was pimped out to high ranking political figures and others as part of a large scale blackmailing operation .


As always , the keyword is control .

‘I was raped and pimped out to VIP sex parties at 20 and kept my dark secret for 38 years’

In harrowing book Playland, author Tony Daly reveals how he was plucked from an amusement arcade as a young man in the Seventies and thrust into a terrifying nightmare

Alison Philips –

“Four years earlier I’d been in Derry on Bloody Sunday. A friend of mine was killed that day by British troops. In the six months which followed, 256 people died. The bombs got bigger and deafeningly louder. I wanted to escape it all. That’s why I had ended up in London.”

After losing all the money he had on him that Saturday afternoon in London, Tony wandered down Oxford Street into the Playland amusement arcade. Just as he was leaving, he was approached by a man who introduced himself as Keith.

Tony explained he’d lost his money and Keith offered to buy him a drink in a nearby pub. Shortly afterwards, they were joined by another man.

“They asked where I was from and were incredibly friendly,” recalls Tony. “I remember thinking, ‘This doesn’t feel quite right’ but then I thought, ‘But this is London, maybe this is what happens in London’.”

The men said they were going for a meal and invited Tony along.

“I truly thought they were just being friendly. Remember, I didn’t know anyone in London and I was keen to meet people.

“When they asked me to go back to their flat, it did seem odd but I was a bit tipsy and didn’t want to appear rude so I went along.”

By the time they arrived at the flat Tony was feeling decidedly unwell. He says: “I was overcome with a wave of nausea. I said, ‘I’m sorry, I really need to be getting home’.”

But when he got up to leave, the evening took a different turn. Suddenly, Tony was being forced into a bedroom, where he was slapped around the face, flung on to a bed and violently raped .

Tony was raped twice. The following morning one of the men gave him £30 and told him there were “very important men” he should meet.

Then his rapist revealed he had taken photos of Tony in the night and threatened to send them to Tony’s family if he told anyone what had happened.

Tony was being touted as prey for a group of high-profile men and had no idea how to respond.

It was the beginning of a three-month ordeal where he was groomed by a pimp who regularly had sex with him as well as selling him to a string of important members of London society.

He was taken to parties attended by well-known MPs, captains of industry and the super-wealthy where he was forced to have sex and perform sex acts.

To dull the pain of what was going on he began drinking heavily. He was introduced to cocaine. He rarely ate and his health collapsed. Yet he also developed a strange fondness for his pimp.

“At least he showed some kindness to me,” recalls Tony. “But I was totally brainwashed by then. He groomed me so effectively and to such an extent that I was totally dependent on him.”

He says: “If he hadn’t told me to go I wouldn’t have been able to do it. I was totally in his control by that point. But he freed me and for that I was grateful.”

Tony returned home a skinny wreck but never told a soul about what had happened in those months in London.

The mental scars never left him though and he was terrified that one day his abusers would come to reclaim him.

A few months later he was reminded how far their tentacles could reach…

He says: “Our house was raided by the army. Afterwards, the officer in charge called me over and said, ‘This is a calling card from your friends in London’.

“I knew they were trying to intimidate me. I’d been used by MPs and very important people – they needed to be sure I’d be too scared to tell my story.”

Later, Tony married, had children and the events of 1976 faded. Then, in 2014, stories emerged about VIP paedophiles – abusers in the highest echelons of politics and power.

Read the full article here at the

Read an extract from Playland at the link below :

Essential reading :

  1. Britain’s secret Deep State with ex-spies and lobbyists the ones really running the country
  2. The British Mind Control Agent

Further reading :


  1. Kincora Whitewash Part II
  2. Kincora Whitewash – Police call to exonerate Mi5
  3. Hundreds of boys ‘tortured’ at youth detention centres in 1970s and 1980s
  4. Trudeau government gag order in CIA brainwashing case silences victims
  5. Child Abuse Inquiry Member Silenced to Ensure Theresa May Became PM
  6. Liz MacKean Who Exposed BBC Pedophilia Cover Up Found Dead
  7. UK MoD Cadet Sex Abuse
  8. Police Investigation into Aston Hall – Human Experimentation on Children
  9. Former Navy & Coutts boss Charged with Historic Sex Offences
  10. Kincora Whitewash – Update
  11. UK Privy Council Members Collude To Cover Up State Child Abuse In Scotland
  12. UK Institutional Child Sex Abuse – It Just Gets Worse
  13. Where is the outrage ?
Posted in Mind Control, State Corruption, State Surveillance & Control, Targeted Individuals, Uncategorized | 2 Comments

Plastic Particles Found in Bottled Water & North West Rivers

Cultocracy note :

More evidence of the wholesale poisoning of the planet .

A river in the North West of England was found to have the highest concentration of microplastic contamination in the world .

To quote from the report on bottled water :
“Interestingly, 4% of retrieved particles were found to have signatures of industrial lubricants coating the polymer .”


From The Guardian :

Microplastic pollution in oceans is far worse than feared, say scientists

A study reveals highest microplastic pollution levels ever recorded in a river in Manchester, UK and shows that billions of particles flooded into the sea from rivers in the area in just one year

The number of tiny plastic pieces polluting the world’s oceans is vastly greater than thought, new research indicates.

The work reveals the highest microplastic pollution yet discovered anywhere in the world in a river near Manchester in the UK. It also shows that the major floods in the area in 2015-16 flushed more than 40bn pieces of microplastic into the sea.

The surge of such a vast amount of microplastic from one small river catchment in a single event led the scientists to conclude that the current estimate for the number of particles in the ocean – five trillion – is a major underestimate.

Microplastics include broken-down plastic waste, synthetic fibres and beads found in personal hygiene products. They are known to harm marine life, which mistake them for food, and can be consumed by humans too via seafood, tap water or other food. The risk to people is still not known, but there are concerns that microplastics can accumulate toxic chemicals and that the tiniest could enter the bloodstream.

“Given their pervasive and persistent nature, microplastics have become a global environmental concern and a potential risk to human populations,” said Rachel Hurley from the University of Manchester and colleagues in their report, published in Nature Geoscience.

Read the full article here at The Guardian

From Orb Media


Some of the bottles we tested contained so many particles that we asked a former astrophysicist to use his experience counting stars in the heavens to help us tally these fluorescing constellations.

Sizes ranged from the width of a human hair down to the size of a red blood cell. Some bottles had thousands. A few effectively had no plastic at all.

One bottle had a concentration of more than 10,000 particles per liter.

Bottled water evokes safety and convenience in a world full of real and perceived threats to personal and public health.

Packaged drinking water is a lifeline for many of the 2.1 billion people worldwide who lack access to safe tap water.2 The danger is clear: Some 4,000 children die every day from water-borne diseases, according to the World Health Organization.

Humans need approximately two liters of fluids a day to stay hydrated and healthy—even more in hot and arid regions.

Orb’s findings suggest that a person who drinks a liter of bottled water a day might be consuming tens of thousands of microplastic particles each year.

How this might affect your health, and that of your family, is still something of a mystery.

Read the full article here at Orb Media

Click here for the full report in PDF format

Related :

  1. Polymer Nano Fibres Found Globally in Drinking Water
  2. Brain Damage and Behavioural Disorders in Fish induced by Plastic Nanoparticles
  3. Chemtrails: Aerosol and Electromagnetic Weapons in the Age of Nuclear War

Further reading :


  1. Micro- and Nano-plastics and Human Health (PDF)
  2. Human health effects of micro – and nano – plastics
  3. Micro(nano)plastics: A threat to human health?
  4. Currently Known Chemicals of Key Concern
  5. BPA Toxic Effects & Symptoms: How BPA Destroys Your Body
Posted in Uncategorized | Leave a comment

FCC Accuses Stealthy Startup of Launching Rogue Satellites

Cultocracy note :

How many more ‘rogue’ satellites are up there and what is their purpose ?

FCC Accuses Stealthy Startup of Launching Rogue Satellites

The U.S. communications agency says tiny Internet of Things satellites from Swarm Technologies could endanger other spacecraft

By Mark Harris – IEEE Spectrum

On 12 January, a Polar Satellite Launch Vehicle (PSLV) rocket blasted off from India’s eastern coast. While its primary cargo was a large Indian mapping satellite, dozens of secondary CubeSats from other countries travelled along with it. Seattle-based Planetary Resources supplied a spacecraft that will test prospecting tools for future asteroid miners, Canadian company Telesat launched a broadband communications satellite, and a British Earth-observation mission called Carbonite will capture high-definition video of the planet’s surface.

Also on board were four small satellites that probably should not have been there. SpaceBee-1, 2, 3, and 4 were briefly described by the Indian space agency ISRO as “two-way satellite communications and data relay” devices from the United States. No operator was specified, and only ISRO publicly noted that they successfully reached orbit the same day.

IEEE Spectrum can reveal that the SpaceBees are almost certainly the first spacecraft from a Silicon Valley startup called Swarm Technologies, currently still in stealth mode. Swarm was founded in 2016 by one engineer who developed a spacecraft concept for Google and another who sold his previous company to Apple. The SpaceBees were built as technology demonstrators for a new space-based Internet of Things communications network.

Read the full article here at IEEE Spectrum

Related :


Further reading :

  1. Air Force Chief Goldfein: ‘We’ll be fighting from space in a matter of years’
  2. SpaceX to launch internet satellites: Elon Musk’s mission to Connect Humanity begins
  3. China and Russia developing ‘destructive’ weapons for space conflict, US warns
  4. US Government Take Over of 5G ? AI & Weaponized Internet
  6. SpaceX to Launch X-37B – Satellite Killer
Posted in Psychotronic Warfare, State Surveillance & Control, Uncategorized | Leave a comment

Potent malware that hid for six years spread through routers

Cultocracy note :

State sponsored hackers represent around 99% of serious breaches in computer networks and systems . In the past the ‘electronic knicker sniffers’ tended to monitor and track each other in an infantile game of cat and mouse , that is when they were not messing up home and business computers by looking through your private files , planting incriminating electronic ‘evidence’ or stealing industry secrets and blueprints .

It now looks like the ‘Cyber War’ has entered a new phase . An online article at arsTECHNICA suggests that a sophisticated malware platform named ‘Slingshot’ was found in routers manufactured by MikroTik . The malware was similar to other advanced backdoor trojans such as Stuxnet and Regin , these people just love an advanced backdoor . You can safely assume that most routers are compromised in a similar manner .

The interesting point is that the malware was found by Kaspersky Lab , a software developer based in Russia . In late 2017 the US administration banned all government agencies from using Kaspersky software .

This has got to be good news for the consumer , hopefully this marks a continuing trend whereby rival state sponsored snoopers ‘out’ each others bit of kit .

The downside of this trend is that we will soon find out that nearly every piece of computing hardware ever manufactured in the history of mankind has been infected with something or other .

Traditional hacking techniques that rely on hardware or software exploits will soon become redundant as we enter the age of the ‘Internet of Things’ .

The only thing left for them to hack now is ourselves .

They are working overtime on that one .

Potent malware that hid for six years spread through routers

Nation-sponsored Slingshot is one of the most advanced attack platforms ever

Researchers have discovered malware so stealthy it remained hidden for six years despite infecting at least 100 computers worldwide.

Slingshot—which gets its name from text found inside some of the recovered malware samples—is among the most advanced attack platforms ever discovered, which means it was likely developed on behalf of a well-resourced country, researchers with Moscow-based Kaspersky Lab reported Friday. The sophistication of the malware rivals that of Regin—the advanced backdoor that infected Belgian telecom Belgacom and other high-profile targets for years—and Project Sauron, a separate piece of malware suspected of being developed by a nation-state that also remained hidden for years.

The main purpose of the malware appears to be espionage. Kaspersky Lab’s analysis suggested Slingshot was used to log desktop activity and clipboard contents and to collect screenshots, keyboard data, network data, passwords, and USB connection data. The ability for Slingshot to access the operating system kernel means the malware had access to whatever data was stored on the hard drive or in the internal memory of an infected machine. Infected computers were located primarily in Kenya and Yemen, but also in Afghanistan, Libya, Congo, Jordan, Turkey, Iraq, Sudan, Somalia, and Tanzania. Most of the victims appeared to be targeted individuals. Some, however, were government organizations and institutions.

Read the full article here at arsTECHNICA

Related :

  1. Highly advanced backdoor trojan cased high-profile targets for years
  2. Banking malware is using techniques once reserved for state-sponsored hacking gangs
  3. The Slingshot APT (PDF)

Further reading :

  1. How Technology Stopped Being Innovation
  2. Intel – 5 Eyes Inside
  3. Smart Meters could leave British Homes Vulnerable to Cyber Attacks
  4. Inside the Race to Hack the Human Brain
  5. Those Who Control the Data Control the Future
Posted in State Surveillance & Control, Targeted Individuals, Uncategorized | Leave a comment

Amazon Partnership with British Police Alarms Privacy Advocates

Ava Kofman – The Intercept

Police in Lancashire, a county in northwest England, have rolled out a program to broadcast crime updates, photos of wanted and missing people, and safety notifications to Amazon Echo owners. Since February, the free app has been available to those using Alexa, a cloud-based voice assistant hooked up to the Echo smart speaker. The first of its kind in the U.K., the program was developed by the police force’s innovations manager in a partnership with Amazon developers.

The program marks the latest example of third parties aiding, automating, and in some cases, replacing, the functions of law enforcement agencies — and raises privacy questions about Amazon’s role as an intermediary. Lancashire County will store citizens’ crime reports on Amazon’s servers, rather than those operated by the police. “If we can reduce demand into our call centers via the use of voice recognition or voice-enabled technology, and actually give the community the information they need without them needing to ring into police, then that’s massive,” Rob Flanagan, Lancashire Constabulary innovations manager, told the College of Policing conference, according to TechSpot.

But broadcasting is just the beginning of the county’s plans. The next iteration of the pilot program, expected to launch by year’s end, will allow users to report crimes directly to their smart speakers. After that, Flanagan imagines that Alexa might be used not just by civilians, but internally by officers for briefings and important information. “The cop [would] be able to say ‘Give me the warrant details for Joe Blocks,’ and then it would read back that person’s warrant and details and send the information to the offices mobile device that they have on their person,” Flanagan told Gizmodo. (Flanagan and the Lancashire Constabulary did not respond to repeated requests for comment).

To David Murakami Wood, a scholar of surveillance, the program serves as a startling reminder of the growing reach that technology companies have into our daily lives, intimate habits, and vulnerable moments — with and without our permission. Alexa is hardly the first of our personal devices to be transformed into a police hotline. And given the sensitive nature of crime reporting, civil liberties experts wonder whether storing reports with a third party like Amazon might pose an obstacle to citizens hoping to report crimes anonymously.

Read the full article here at

Related :

  1. Alexa, are you listening?
Posted in State Surveillance & Control, Uncategorized | Leave a comment

China eyes ‘black tech’ to boost security as parliament meets

BEIJING – Reuters

At a highway check point on the outskirts of Beijing, local police are this week testing out a new security tool: smart glasses that can pick up facial features and car registration plates, and match them in real-time with a database of suspects.

The AI-powered glasses, made by LLVision, scan the faces of vehicle occupants and the plates, flagging with a red box and warning sign to the wearer when any match up with a centralized “blacklist”.

The test – which coincides with the annual meeting of China’s parliament in central Beijing – underscores a major push by China’s leaders to leverage technology to boost security in the country.

That drive has led to growing concerns that China is developing a sophisticated surveillance state that will lead to intensifying crackdowns on dissent.

“(China’s) leadership once felt a degree of trepidation over the advancement of the internet and communication technologies,” said David Bandurski, co-director of the China Media Project, a media studies research project at the University of Hong Kong.

“It now sees them as absolutely indispensable tools of social and political control.”

Read the full article here at Reuters

Related :

  1. Beijing bets on facial recognition in a big drive for total surveillance

Also related (UK) :

  1. BIG BROTHER’S FACEBOOK Is YOUR face on a database of 19 million photos which lets Brit cops SPY on ordinary people?
  2. CCTV watchdog warns UK police over use of facial recognition
  3. The surveillance state in 2018
  4. UK ANPR systems are one of the ‘world’s biggest surveillance systems’
  5. UK has 1% of world’s population but 20% of its CCTV cameras

Further reading :


  1. The Deep Learning AI Playbook
  2. The New Blacklist
  3. Mind Games – Connect the Dots
  4. How Technology Stopped Being Innovation
Posted in State Surveillance & Control, Uncategorized | Leave a comment